summaryrefslogtreecommitdiffstats
path: root/net/third_party
diff options
context:
space:
mode:
Diffstat (limited to 'net/third_party')
-rw-r--r--net/third_party/mozilla_security_manager/nsKeygenHandler.cpp8
-rw-r--r--net/third_party/mozilla_security_manager/nsNSSCertificateDB.cpp6
-rw-r--r--net/third_party/mozilla_security_manager/nsPKCS12Blob.cpp4
3 files changed, 9 insertions, 9 deletions
diff --git a/net/third_party/mozilla_security_manager/nsKeygenHandler.cpp b/net/third_party/mozilla_security_manager/nsKeygenHandler.cpp
index 99d5206..e1aa2e6 100644
--- a/net/third_party/mozilla_security_manager/nsKeygenHandler.cpp
+++ b/net/third_party/mozilla_security_manager/nsKeygenHandler.cpp
@@ -155,7 +155,7 @@ std::string GenKeyAndSignChallenge(int key_size_in_bits,
goto failure;
}
- LOG(INFO) << "Creating key pair...";
+ VLOG(1) << "Creating key pair...";
{
base::AutoNSSWriteLock lock;
privateKey = PK11_GenerateKeyPair(slot,
@@ -166,10 +166,10 @@ std::string GenKeyAndSignChallenge(int key_size_in_bits,
PR_TRUE, // isSensitive?
NULL);
}
- LOG(INFO) << "done.";
+ VLOG(1) << "done.";
if (!privateKey) {
- LOG(INFO) << "Generation of Keypair failed!";
+ VLOG(1) << "Generation of Keypair failed!";
isSuccess = false;
goto failure;
}
@@ -248,7 +248,7 @@ std::string GenKeyAndSignChallenge(int key_size_in_bits,
if (!isSuccess) {
LOG(ERROR) << "SSL Keygen failed! (NSS error code " << PR_GetError() << ")";
} else {
- LOG(INFO) << "SSL Keygen succeeded!";
+ VLOG(1) << "SSL Keygen succeeded!";
}
// Do cleanups
diff --git a/net/third_party/mozilla_security_manager/nsNSSCertificateDB.cpp b/net/third_party/mozilla_security_manager/nsNSSCertificateDB.cpp
index e0876f77..f4ec31a 100644
--- a/net/third_party/mozilla_security_manager/nsNSSCertificateDB.cpp
+++ b/net/third_party/mozilla_security_manager/nsNSSCertificateDB.cpp
@@ -115,14 +115,14 @@ bool ImportCACerts(const net::CertificateList& certificates,
if (!CERT_IsCACert(cert->os_cert_handle(), NULL)) {
not_imported->push_back(net::CertDatabase::ImportCertFailure(
cert, net::ERR_IMPORT_CA_CERT_NOT_CA));
- LOG(INFO) << "skipping cert (non-ca)";
+ VLOG(1) << "skipping cert (non-ca)";
continue;
}
if (cert->os_cert_handle()->isperm) {
not_imported->push_back(net::CertDatabase::ImportCertFailure(
cert, net::ERR_IMPORT_CERT_ALREADY_EXISTS));
- LOG(INFO) << "skipping cert (perm)";
+ VLOG(1) << "skipping cert (perm)";
continue;
}
@@ -133,7 +133,7 @@ bool ImportCACerts(const net::CertificateList& certificates,
// public.)
not_imported->push_back(net::CertDatabase::ImportCertFailure(
cert, net::ERR_FAILED));
- LOG(INFO) << "skipping cert (verify) " << PORT_GetError();
+ VLOG(1) << "skipping cert (verify) " << PORT_GetError();
continue;
}
diff --git a/net/third_party/mozilla_security_manager/nsPKCS12Blob.cpp b/net/third_party/mozilla_security_manager/nsPKCS12Blob.cpp
index eac7ace..35170cc 100644
--- a/net/third_party/mozilla_security_manager/nsPKCS12Blob.cpp
+++ b/net/third_party/mozilla_security_manager/nsPKCS12Blob.cpp
@@ -97,7 +97,7 @@ nickname_collision(SECItem *old_nick, PRBool *cancel, void *wincx)
}
if (!old_nick)
- LOG(INFO) << "no nickname for cert in PKCS12 file.";
+ VLOG(1) << "no nickname for cert in PKCS12 file.";
nick = CERT_MakeCANickname(cert);
if (!nick) {
@@ -112,7 +112,7 @@ nickname_collision(SECItem *old_nick, PRBool *cancel, void *wincx)
return NULL;
}
- LOG(INFO) << "using nickname " << nick;
+ VLOG(1) << "using nickname " << nick;
ret_nick = PORT_ZNew(SECItem);
if(ret_nick == NULL) {
PORT_Free(nick);