Closed
Bug 668005
Opened 13 years ago
Closed 10 months ago
Replace SSL_BUFFER_FUDGE with precise length calculations
Categories
(NSS :: Libraries, defect, P5)
NSS
Libraries
Tracking
(Not tracked)
RESOLVED
INACTIVE
People
(Reporter: briansmith, Unassigned)
Details
It isn't clear from reading the code that SSL_BUFFER_FUDGE is sufficiently large, and we must remember to check/update it when we add new algorithms and bulk cipher modes to libssl. The code would be clearer if we had a function or macro that did the calculation explicitly.
Updated•2 years ago
|
Severity: trivial → S4
Updated•10 months ago
|
Status: NEW → RESOLVED
Closed: 10 months ago
Priority: -- → P5
Resolution: --- → INACTIVE
You need to log in
before you can comment on or make changes to this bug.
Description
•