Bug 878932, Part 2: Make certificate verification implementation prefs dynamic, r=cviecco

--HG--
extra : rebase_source : 4b413cfd8e122ee4e0fea64d624285856e2cb0cb
This commit is contained in:
Brian Smith 2014-01-20 15:55:12 -08:00
parent bbf60e0ee9
commit 84299706e6

View File

@ -996,6 +996,8 @@ void nsNSSComponent::setValidationOptions(bool isInitialSetting,
CertVerifier::crl_download_allowed : CertVerifier::crl_local_only,
#endif
odc, osc, ogc);
CERT_ClearOCSPCache();
}
// Enable the TLS versions given in the prefs, defaulting to SSL 3.0 (min
@ -1602,7 +1604,9 @@ nsNSSComponent::Observe(nsISupports* aSubject, const char* aTopic,
|| prefName.Equals("security.missing_cert_download.enabled")
|| prefName.Equals("security.OCSP.require")
|| prefName.Equals("security.OCSP.GET.enabled")
|| prefName.Equals("security.ssl.enable_ocsp_stapling")) {
|| prefName.Equals("security.ssl.enable_ocsp_stapling")
|| prefName.Equals("security.use_insanity_verification")
|| prefName.Equals("security.use_libpkix_verification")) {
MutexAutoLock lock(mutex);
setValidationOptions(false, lock);
} else if (prefName.Equals("network.ntlm.send-lm-response")) {