On 04/23/2013 07:21 PM, Tim Shen wrote:
I've made a proposal under the guide of application. Is it detailed and realistic?
Out of curiosity, do you plan to use a Thompson automaton where possible, or just NFAs throughout?
-- Florian Weimer / Red Hat Product Security Team