From 21ee1904b5c46f314b862eea33d3b86fcf6c7c88 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Niels=20M=C3=B6ller?= Date: Thu, 8 Jan 2004 13:37:13 +0100 Subject: (TMP_DECL, TMP_ALLOC): New macros. When alloca is unavailable, they work by allocating a fix amount of stack and imposing a hard limit on what can be allocated. Updated all users of alloca. Rev: src/nettle/bignum-random.c:1.4 Rev: src/nettle/cbc.c:1.8 Rev: src/nettle/dsa-keygen.c:1.7 Rev: src/nettle/hmac.c:1.6 Rev: src/nettle/pkcs1-rsa-md5.c:1.3 Rev: src/nettle/pkcs1-rsa-sha1.c:1.3 Rev: src/nettle/rsa-decrypt.c:1.5 Rev: src/nettle/rsa-encrypt.c:1.8 Rev: src/nettle/sexp.c:1.15 --- rsa-encrypt.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) (limited to 'rsa-encrypt.c') diff --git a/rsa-encrypt.c b/rsa-encrypt.c index ecc6760b..fab5f82b 100644 --- a/rsa-encrypt.c +++ b/rsa-encrypt.c @@ -36,6 +36,7 @@ #include "rsa.h" #include "bignum.h" +#include "nettle-internal.h" int rsa_encrypt(const struct rsa_public_key *key, @@ -44,7 +45,7 @@ rsa_encrypt(const struct rsa_public_key *key, unsigned length, const uint8_t *message, mpz_t gibbberish) { - uint8_t *em; + TMP_DECL(em, uint8_t, NETTLE_MAX_BIGNUM_BITS / 8); unsigned padding; unsigned i; @@ -64,7 +65,7 @@ rsa_encrypt(const struct rsa_public_key *key, padding = key->size - length - 3; assert(padding >= 8); - em = alloca(key->size - 1); + TMP_ALLOC(em, key->size - 1); em[0] = 2; random(random_ctx, padding, em + 1); -- cgit v1.2.1