boringssl/crypto/rsa
David Benjamin cfa9de85a3 Revert "Revert "Reduce maximum RSA public exponent size to 33 bits.""
This reverts commit ba70118d8e. Reverting this
did not resolve the regression and the cause is now known.

BUG=593963

Change-Id: Ic5e24b74e8f16b01d9fdd80f267a07ef026c82cf
Reviewed-on: https://boringssl-review.googlesource.com/7454
Reviewed-by: Steven Valdez <svaldez@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
2016-03-14 19:04:17 +00:00
..
blinding.c Always use |BN_mod_exp_mont|/|BN_mod_exp_mont_consttime| in RSA. 2016-03-08 22:30:19 +00:00
CMakeLists.txt Add a run_tests target to run all tests. 2015-10-26 20:33:44 +00:00
internal.h Always use |BN_mod_exp_mont|/|BN_mod_exp_mont_consttime| in RSA. 2016-03-08 22:30:19 +00:00
padding.c Move all signature algorithm code to crypto/x509. 2016-02-26 22:39:02 +00:00
rsa_asn1.c Fix i2d_RSAPrivateKey, i2d_RSAPublicKey memory leaks 2016-03-07 15:48:21 +00:00
rsa_impl.c Revert "Revert "Reduce maximum RSA public exponent size to 33 bits."" 2016-03-14 19:04:17 +00:00
rsa_test.cc Refuse to parse RSA pubkeys with invalid exponents. 2015-12-21 23:49:02 +00:00
rsa.c Match upstream's error codes for the old sigalg code. 2016-03-11 21:15:47 +00:00