boringssl/crypto/rsa
Brian Smith 7241ca5ce4 Avoid one |BN_mod_inverse| in |RSA_check_key|.
|BN_mod_inverse| is expensive and leaky. In this case, we can avoid
it completely by taking advantage of the fact that we already have
the two values that are supposed to be inverses of each other.

Change-Id: I2230b4166fb9d89c7445f9f7c045a4c9e4c377b3
Reviewed-on: https://boringssl-review.googlesource.com/8925
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
2016-07-27 17:19:11 +00:00
..
blinding.c Require the public exponent to be available in RSA blinding. 2016-04-18 23:34:46 +00:00
CMakeLists.txt Add a run_tests target to run all tests. 2015-10-26 20:33:44 +00:00
internal.h Require the public exponent to be available in RSA blinding. 2016-04-18 23:34:46 +00:00
padding.c Make local functions static. 2016-03-20 16:37:58 +00:00
rsa_asn1.c RSA_marshal_private_key: add missing CBB_flush() 2016-07-13 03:49:41 +00:00
rsa_impl.c Split unlock functions into read/write variants. 2016-05-31 21:09:29 +00:00
rsa_test.cc Revert "Move C++ helpers into |bssl| namespace." 2016-07-12 08:09:33 -07:00
rsa.c Avoid one |BN_mod_inverse| in |RSA_check_key|. 2016-07-27 17:19:11 +00:00