зеркало из https://github.com/mozilla/gecko-dev.git
dbf19a6cd5
Calling CERT_NewTempCertificate on an enterprise certificate is inefficient because NSS tries (and fails) to find a copy of that certificate in its internal data structures (which includes querying softoken, which involves hitting the disk). We can avoid doing so for these certificates in NSSCertDBTrustDomain::GetCertTrust because we already know what trust values they should have (after checking the relevant blocklists). Differential Revision: https://phabricator.services.mozilla.com/D45588 --HG-- extra : moz-landing-system : lando |
||
---|---|---|
.. | ||
apps | ||
certverifier | ||
ct | ||
mac/hardenedruntime | ||
manager | ||
nss | ||
sandbox | ||
.eslintrc.js | ||
generate_certdata.py | ||
generate_mapfile.py | ||
moz.build | ||
nss.symbols |