[gnutls-dev] bug in _gnutls_pkcs1_rsa_encrypt

Werner Koch wk at gnupg.org
Thu Aug 19 09:22:23 CEST 2004


On Wed, 18 Aug 2004 13:58:49 -0700, Robey Pointer said:

> extra k/128 byte(s).  The simplicity outweighs the very very small
> chance that you might avoid an extra loop iteration by obsessively
> checking for (and skipping) zeros in the replacement buffer.

The thing is that each call to the random function turns out to be a
real performance hog; asking for a few bytes more in one call is far
cheaper.

The loop does now read:

    for(;;) {
	int j, k;
	byte *pp;

	/* count the zero bytes */
	for(j=k=0; j < i; j++ )
	    if( !p[j] )
		k++;
	if( !k )
	    break; /* okay: no zero bytes */
	k += 3; /* better get some more */  /* <========= */
	pp = get_random_bits( k*8, 1, 1);
	for(j=0; j < i && k ; j++ )
	    if( !p[j] && pp[k-1] )          /* <========= */
		p[j] = pp[--k];
	m_free(pp);
    }

Does this look better?

  Werner







More information about the Gnutls-dev mailing list