a44dae7fd3
This uses the full binary GCD algorithm, where all four of A, B, C, and D must be retained. (BN_mod_inverse_odd implements the odd number version which only needs A and C.) It is patterned after the version in the Handbook of Applied Cryptography, but tweaked so the coefficients are non-negative and bounded. Median of 29 RSA keygens: 0m0.225s -> 0m0.220s (Accuracy beyond 0.1s is questionable.) Bug: 238 Change-Id: I6dc13524ea7c8ac1072592857880ddf141d87526 Reviewed-on: https://boringssl-review.googlesource.com/26370 Reviewed-by: Adam Langley <alangley@gmail.com> |
||
---|---|---|
.. | ||
aes | ||
bn | ||
cipher | ||
des | ||
digest | ||
ec | ||
ecdsa | ||
hmac | ||
md4 | ||
md5 | ||
modes | ||
policydocs | ||
rand | ||
rsa | ||
self_check | ||
sha | ||
tls | ||
bcm.c | ||
CMakeLists.txt | ||
delocate.h | ||
FIPS.md | ||
intcheck1.png | ||
intcheck2.png | ||
intcheck3.png | ||
is_fips.c |