ae11a9
diff --git a/security/certverifier/NSSCertDBTrustDomain.cpp b/security/certverifier/NSSCertDBTrustDomain.cpp
ae11a9
--- a/security/certverifier/NSSCertDBTrustDomain.cpp
ae11a9
+++ b/security/certverifier/NSSCertDBTrustDomain.cpp
ae11a9
@@ -1057,22 +1057,20 @@ InitializeNSS(const nsACString& dir, boo
ae11a9
   // "/usr/lib/nss/libnssckbi.so".
ae11a9
   uint32_t flags = NSS_INIT_NOROOTINIT | NSS_INIT_OPTIMIZESPACE;
ae11a9
   if (readOnly) {
ae11a9
     flags |= NSS_INIT_READONLY;
ae11a9
   }
ae11a9
   if (!loadPKCS11Modules) {
ae11a9
     flags |= NSS_INIT_NOMODDB;
ae11a9
   }
ae11a9
-  nsAutoCString dbTypeAndDirectory("sql:");
ae11a9
-  dbTypeAndDirectory.Append(dir);
ae11a9
   MOZ_LOG(gCertVerifierLog, LogLevel::Debug,
ae11a9
-          ("InitializeNSS(%s, %d, %d)", dbTypeAndDirectory.get(), readOnly,
ae11a9
+          ("InitializeNSS(%s, %d, %d)", PromiseFlatCString(dir).get(), readOnly,
ae11a9
            loadPKCS11Modules));
ae11a9
-  SECStatus srv = NSS_Initialize(dbTypeAndDirectory.get(), "", "",
ae11a9
+  SECStatus srv = NSS_Initialize(PromiseFlatCString(dir).get(), "", "",
ae11a9
                                  SECMOD_DB, flags);
ae11a9
   if (srv != SECSuccess) {
ae11a9
     return srv;
ae11a9
   }
ae11a9
 
ae11a9
   if (!readOnly) {
ae11a9
     UniquePK11SlotInfo slot(PK11_GetInternalKeySlot());
ae11a9
     if (!slot) {