0x2000 (8 KiB) is definitely sufficient to mitigate any potential
inadvertant overflow, and an attacker with a crafted malicious
database would have been able to overflow the old 0x8000 (32 KiB)
buffers anyway.
{
const EVP_MD *md;
unsigned char cdg[EVP_MAX_MD_SIZE];
- char salt[0x8000];
+ char salt[0x2000];
size_t dl;
size_t sl;
unsigned int a;
{
unsigned int prf;
unsigned int iter;
- char salt[0x8000];
+ char salt[0x2000];
(void) memset(salt, 0x00, sizeof salt);