Closed Bug 668005 Opened 13 years ago Closed 7 months ago

Replace SSL_BUFFER_FUDGE with precise length calculations

Categories

(NSS :: Libraries, defect, P5)

Tracking

(Not tracked)

RESOLVED INACTIVE

People

(Reporter: briansmith, Unassigned)

Details

It isn't clear from reading the code that SSL_BUFFER_FUDGE is sufficiently large, and we must remember to check/update it when we add new algorithms and bulk cipher modes to libssl. The code would be clearer if we had a function or macro that did the calculation explicitly.
Severity: trivial → S4
Status: NEW → RESOLVED
Closed: 7 months ago
Priority: -- → P5
Resolution: --- → INACTIVE
You need to log in before you can comment on or make changes to this bug.