Ralph Holz (TUM) wrote, On 12/13/2010 02:38 PM:
Good day,
I was wondering how wildcards in CNs are evaluated in nss (also,
wondering if it's the same in openssl). The X.509 RFC seems to
indicate the following:
*.domain.dom matches a.domain.dom, but not a.b.domain.dom
If you want to match sub-s
Nelson Bolyard wrote, On 06/22/2010 07:49 AM:
On 2010-06-21 17:57 PDT, Brian Smith wrote:
From arcfour.c:
http://mxr.mozilla.org/mozilla/source/security/nss/lib/freebl/arcfour.c#390
My guess is that valgrind is considering malloc(5) to allocate 5 bytes, when
really it allocates 8 bytes at
Robert Relyea wrote, On 06/22/2010 01:54 AM:
On 06/19/2010 01:43 PM, Mads Kiilerich wrote:
Hi
I'm trying to port an application from OpenSSL to NSS. The biggest
problem right now is that valgrind reports that NSS accesses invalid
memory when using RC4. There is no problem with chunk
Hi
I'm trying to port an application from OpenSSL to NSS. The biggest
problem right now is that valgrind reports that NSS accesses invalid
memory when using RC4. There is no problem with chunk sizes up to 8 and
sizes divisible with 4, but for other sizes it access the source and
destination i
4 matches
Mail list logo