Open Bug 668005 Opened 9 years ago

Replace SSL_BUFFER_FUDGE with precise length calculations

Categories

(NSS :: Libraries, defect)

defect
Not set
trivial

Tracking

(Not tracked)

People

(Reporter: briansmith, Unassigned)

Details

It isn't clear from reading the code that SSL_BUFFER_FUDGE is sufficiently large, and we must remember to check/update it when we add new algorithms and bulk cipher modes to libssl. The code would be clearer if we had a function or macro that did the calculation explicitly.
You need to log in before you can comment on or make changes to this bug.