summaryrefslogtreecommitdiff
path: root/automation/taskcluster/docker-aarch64/setup.sh
diff options
context:
space:
mode:
authorRobert Relyea <rrelyea@redhat.com>2023-05-15 09:40:02 -0700
committerRobert Relyea <rrelyea@redhat.com>2023-05-15 09:40:02 -0700
commit5dd4021a38686b0b1d4f62aa727f908a267c0a51 (patch)
treeb11d161caa0f7d9eb49ca6a454c7c6e13d8d60c2 /automation/taskcluster/docker-aarch64/setup.sh
parent95ae9a34c1b69467827ce28451fc9564c14b96f2 (diff)
downloadnss-hg-5dd4021a38686b0b1d4f62aa727f908a267c0a51.tar.gz
Bug 1774657 Updating an old dbm with lots of certs with keys to sql results in a database that is slow to access.
This patch solves the problems in 3 ways: 1) The initial underlying issue is solved by not generating a trust record for user certs if they have default trust values (lib/softoken/legacydb/pcertdb.c). This will cause new databases created from old dbm databases to function normally. 2) Skip the integrity check if the record we are reading is already the default trust value (lib/softoken/sftkdb.c). This will increase the performance of reading sqlite databases created from the old dbm databases before patch 1 to perform reasonably. 3) Increase the cashe count. (lib/softoken/lowpbe.c). This affects applications which do multiple private key operations on the same private keys. Usually high speed operations would copy the keys to a session key for better performance, but sometimes that's not possible. This allows up to 20 RSA keys to be references by the application without a performance hit from the PBE checking integrity and/or decrypting the key entry. Differential Revision: https://phabricator.services.mozilla.com/D165221
Diffstat (limited to 'automation/taskcluster/docker-aarch64/setup.sh')
0 files changed, 0 insertions, 0 deletions