3 Commits

Author SHA1 Message Date
nelsonb%netscape.com
31f013d0e6 In ssl3_GatherData, the value of gs->inbuf.len was incorrect during the
GS_HEADER state.  It should be correct in all states.
In ssl_DestroyGather, prior to freeing the buffers, the code zeroed out
the ciphertext buffer.  It now zeros out the plaintext buffer instead.


git-svn-id: svn://10.0.0.236/trunk@83200 18797224-902f-48f8-a5cc-f745e15eee43
2000-12-02 00:54:01 +00:00
nelsonb%netscape.com
f845bee819 With this change, SSL will not crash if the next lower layer's Recv
function returns more data than we asked for.  SSL will turn that event
into a PR_BUFFER_OVERFLOW_ERROR error.  iWS team asked for this.


git-svn-id: svn://10.0.0.236/trunk@80640 18797224-902f-48f8-a5cc-f745e15eee43
2000-10-07 02:22:22 +00:00
relyea%netscape.com
a4d4d45374 Initial NSS Open Source checkin
git-svn-id: svn://10.0.0.236/trunk@64788 18797224-902f-48f8-a5cc-f745e15eee43
2000-03-31 20:13:40 +00:00