boringssl/crypto/bn
David Benjamin 593b6a44fe Remove RSAZ-512.
This gives a 15-16% perf boost for 1024-bit RSA keys, but 1024-bit RSA
keys are no longer important enough for this code to carry its weight.

Change-Id: Ia9f0e7fec512c28e90754ababade394c1f11984d
Reviewed-on: https://boringssl-review.googlesource.com/12841
Commit-Queue: David Benjamin <davidben@google.com>
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: Adam Langley <agl@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
2016-12-14 22:12:50 +00:00
..
asm Remove RSAZ-512. 2016-12-14 22:12:50 +00:00
add.c
bn_asn1.c
bn_test.cc
bn_tests.txt Remove RSAZ-512. 2016-12-14 22:12:50 +00:00
bn.c
check_bn_tests.go
CMakeLists.txt Remove RSAZ-512. 2016-12-14 22:12:50 +00:00
cmp.c
convert.c
ctx.c
div.c
exponentiation.c Remove RSAZ-512. 2016-12-14 22:12:50 +00:00
gcd.c
generic.c
internal.h
kronecker.c
montgomery_inv.c
montgomery.c Calculate inverse in |BN_MONT_CTX_set| in constant time w.r.t. modulus. 2016-08-02 16:26:44 +00:00
mul.c
prime.c
random.c
rsaz_exp.c Remove RSAZ-512. 2016-12-14 22:12:50 +00:00
rsaz_exp.h Remove RSAZ-512. 2016-12-14 22:12:50 +00:00
shift.c
sqrt.c