summaryrefslogtreecommitdiffstats
path: root/net/socket
diff options
context:
space:
mode:
authorwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-09-28 20:32:53 +0000
committerwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-09-28 20:32:53 +0000
commite393b9fc0267deaf55f3624aa7b0bfb08707dfda (patch)
tree3c0d760af8d79d0fd82dae7de28a461cb897ccbe /net/socket
parent2cc98c885571e7ef17222d6fda02f9500c94fc76 (diff)
downloadchromium_src-e393b9fc0267deaf55f3624aa7b0bfb08707dfda.zip
chromium_src-e393b9fc0267deaf55f3624aa7b0bfb08707dfda.tar.gz
chromium_src-e393b9fc0267deaf55f3624aa7b0bfb08707dfda.tar.bz2
Add more LOG(ERROR) messages to track down bug 55678,
identifying the SChannel function that fails with SEC_E_INVALID_HANDLE. R=eroman BUG=55678 TEST=none Review URL: http://codereview.chromium.org/3418036 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60841 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/socket')
-rw-r--r--net/socket/ssl_client_socket_win.cc12
1 files changed, 8 insertions, 4 deletions
diff --git a/net/socket/ssl_client_socket_win.cc b/net/socket/ssl_client_socket_win.cc
index b930e8f..1146fdf 100644
--- a/net/socket/ssl_client_socket_win.cc
+++ b/net/socket/ssl_client_socket_win.cc
@@ -572,7 +572,7 @@ int SSLClientSocketWin::InitializeSSLContext() {
&out_flags,
&expiry);
if (status != SEC_I_CONTINUE_NEEDED) {
- DLOG(ERROR) << "InitializeSecurityContext failed: " << status;
+ LOG(ERROR) << "InitializeSecurityContext failed: " << status;
return MapSecurityError(status);
}
@@ -950,6 +950,7 @@ int SSLClientSocketWin::DidCallInitializeSecurityContext() {
}
if (FAILED(isc_status_)) {
+ LOG(ERROR) << "InitializeSecurityContext failed: " << isc_status_;
int result = MapSecurityError(isc_status_);
// We told Schannel to not verify the server certificate
// (SCH_CRED_MANUAL_CRED_VALIDATION), so any certificate error returned by
@@ -1188,6 +1189,7 @@ int SSLClientSocketWin::DoPayloadDecrypt() {
if (status != SEC_E_OK && status != SEC_I_RENEGOTIATE) {
DCHECK(status != SEC_E_MESSAGE_ALTERED);
+ LOG(ERROR) << "DecryptMessage failed: " << status;
return MapSecurityError(status);
}
@@ -1315,8 +1317,10 @@ int SSLClientSocketWin::DoPayloadEncrypt() {
SECURITY_STATUS status = EncryptMessage(&ctxt_, 0, &buffer_desc, 0);
- if (FAILED(status))
+ if (FAILED(status)) {
+ LOG(ERROR) << "EncryptMessage failed: " << status;
return MapSecurityError(status);
+ }
payload_send_buffer_len_ = buffers[0].cbBuffer +
buffers[1].cbBuffer +
@@ -1386,7 +1390,7 @@ int SSLClientSocketWin::DidCompleteHandshake() {
SECURITY_STATUS status = QueryContextAttributes(
&ctxt_, SECPKG_ATTR_STREAM_SIZES, &stream_sizes_);
if (status != SEC_E_OK) {
- DLOG(ERROR) << "QueryContextAttributes (stream sizes) failed: " << status;
+ LOG(ERROR) << "QueryContextAttributes (stream sizes) failed: " << status;
return MapSecurityError(status);
}
DCHECK(!server_cert_ || renegotiating_);
@@ -1394,7 +1398,7 @@ int SSLClientSocketWin::DidCompleteHandshake() {
status = QueryContextAttributes(
&ctxt_, SECPKG_ATTR_REMOTE_CERT_CONTEXT, &server_cert_handle);
if (status != SEC_E_OK) {
- DLOG(ERROR) << "QueryContextAttributes (remote cert) failed: " << status;
+ LOG(ERROR) << "QueryContextAttributes (remote cert) failed: " << status;
return MapSecurityError(status);
}
if (renegotiating_ &&