Index: net/ssl/client_cert_store_impl_nss.cc |
diff --git a/net/ssl/client_cert_store_impl_nss.cc b/net/ssl/client_cert_store_impl_nss.cc |
index ab7144ec0cecd41b8e04f081634b2e6a1e0c2412..ee0df19b7b3324b8eba991d23c8b2d5fd93b82f0 100644 |
--- a/net/ssl/client_cert_store_impl_nss.cc |
+++ b/net/ssl/client_cert_store_impl_nss.cc |
@@ -49,12 +49,16 @@ void GetClientCertsImpl(CERTCertList* cert_list, |
if (!ca_names_items.empty()) |
ca_names.names = &ca_names_items[0]; |
+ size_t num_raw = 0; |
for (CERTCertListNode* node = CERT_LIST_HEAD(cert_list); |
!CERT_LIST_END(node, cert_list); |
node = CERT_LIST_NEXT(node)) { |
+ ++num_raw; |
// Only offer unexpired certificates. |
if (CERT_CheckCertValidTimes(node->cert, PR_Now(), PR_TRUE) != |
secCertTimeValid) { |
+ VLOG(1) << "expired cert " |
+ << (node->cert->nickname ? node->cert->nickname : ""); |
continue; |
} |
@@ -67,9 +71,15 @@ void GetClientCertsImpl(CERTCertList* cert_list, |
cert->IsIssuedByEncoded(request.cert_authorities)) || |
(query_nssdb && |
NSS_CmpCertChainWCANames(node->cert, &ca_names) == SECSuccess)) { |
+ VLOG(1) << "selected cert " |
+ << (node->cert->nickname ? node->cert->nickname : ""); |
selected_certs->push_back(cert); |
} |
+ else |
+ VLOG(1) << "skipped cert " |
+ << (node->cert->nickname ? node->cert->nickname : ""); |
} |
+ VLOG(1) << "num_raw:" << num_raw << " num_selected:"<< selected_certs->size(); |
std::sort(selected_certs->begin(), selected_certs->end(), |
x509_util::ClientCertSorter()); |