зеркало из https://github.com/mozilla/gecko-dev.git
dbf19a6cd5
Calling CERT_NewTempCertificate on an enterprise certificate is inefficient because NSS tries (and fails) to find a copy of that certificate in its internal data structures (which includes querying softoken, which involves hitting the disk). We can avoid doing so for these certificates in NSSCertDBTrustDomain::GetCertTrust because we already know what trust values they should have (after checking the relevant blocklists). Differential Revision: https://phabricator.services.mozilla.com/D45588 --HG-- extra : moz-landing-system : lando |
||
---|---|---|
.. | ||
tests/gtest | ||
BRNameMatchingPolicy.cpp | ||
BRNameMatchingPolicy.h | ||
CertVerifier.cpp | ||
CertVerifier.h | ||
ExtendedValidation.cpp | ||
ExtendedValidation.h | ||
NSSCertDBTrustDomain.cpp | ||
NSSCertDBTrustDomain.h | ||
OCSPCache.cpp | ||
OCSPCache.h | ||
OCSPVerificationTrustDomain.cpp | ||
OCSPVerificationTrustDomain.h | ||
TrustOverride-AppleGoogleDigiCertData.inc | ||
TrustOverride-GlobalSignData.inc | ||
TrustOverride-StartComAndWoSignData.inc | ||
TrustOverride-SymantecData.inc | ||
TrustOverride-TestImminentDistrustData.inc | ||
TrustOverrideUtils.h | ||
moz.build |