Open
Bug 668005
Opened 10 years ago
Replace SSL_BUFFER_FUDGE with precise length calculations
Categories
(NSS :: Libraries, defect)
NSS
Libraries
Tracking
(Not tracked)
NEW
People
(Reporter: briansmith, Unassigned)
Details
It isn't clear from reading the code that SSL_BUFFER_FUDGE is sufficiently large, and we must remember to check/update it when we add new algorithms and bulk cipher modes to libssl. The code would be clearer if we had a function or macro that did the calculation explicitly.
You need to log in
before you can comment on or make changes to this bug.
Description
•