a44dae7fd3
This uses the full binary GCD algorithm, where all four of A, B, C, and D must be retained. (BN_mod_inverse_odd implements the odd number version which only needs A and C.) It is patterned after the version in the Handbook of Applied Cryptography, but tweaked so the coefficients are non-negative and bounded. Median of 29 RSA keygens: 0m0.225s -> 0m0.220s (Accuracy beyond 0.1s is questionable.) Bug: 238 Change-Id: I6dc13524ea7c8ac1072592857880ddf141d87526 Reviewed-on: https://boringssl-review.googlesource.com/26370 Reviewed-by: Adam Langley <alangley@gmail.com> |
||
---|---|---|
.. | ||
asm | ||
add.c | ||
bn_test_to_fuzzer.go | ||
bn_test.cc | ||
bn_tests.txt | ||
bn.c | ||
bytes.c | ||
check_bn_tests.go | ||
cmp.c | ||
ctx.c | ||
div.c | ||
exponentiation.c | ||
gcd.c | ||
generic.c | ||
internal.h | ||
jacobi.c | ||
montgomery_inv.c | ||
montgomery.c | ||
mul.c | ||
prime.c | ||
random.c | ||
rsaz_exp.c | ||
rsaz_exp.h | ||
shift.c | ||
sqrt.c |