summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* bump for LibreSSL 2.8.3libressl-v2.8.3OPENBSD_6_4bcook2018-12-151-3/+3
* Backport getentropy changes from deraadt@ on MAINbcook2018-12-155-144/+27
* Implement coordinate blinding for EC_POINT as an additional mitigationtb2018-11-1710-18/+113
* This commit was manufactured by cvs2git to create branch 'OPENBSD_6_4'.libressl-v2.8.2cvs2svn2018-10-070-0/+0
* whitespace cleanup and other minor things from gofmttb2018-10-071-44/+39
* make sure all CStrings are freedtb2018-10-061-3/+7
* plug a memory leaktb2018-10-061-1/+2
* wrap a few more overlong linestb2018-10-061-14/+36
* wrap some overlong fmt.Printfstb2018-10-061-53/+106
* It's slightly simpler to get the ECDH public key as an EC_POINT by usingtb2018-10-061-16/+15
* free EC_POINT and EC_GROUPtb2018-10-061-1/+4
* Run Wycheproof ECDH Web Crypto test vectors against libcrypto.tb2018-10-061-6/+155
* merge runECDSAWebCryptoTest() into runECDSATest()tb2018-10-061-53/+31
* factor ECDSA signature extraction into its own functiontb2018-10-061-24/+35
* make allocate/use/defer dances more consistent in ECDSA sig extractiontb2018-10-061-9/+8
* Run Wycheproof ECDSA Web Crypto test vectors against libcrypto.tb2018-10-051-7/+166
* Better refer to RFC 8422 which obsoletes RFC 4492.tb2018-10-041-2/+2
* While we don't explicitly support curve secp256r1, we can run 1250 teststb2018-10-041-11/+2
* Plug TLS context leak in nc(1) server and client mode. Movebluhm2018-10-041-12/+10
* As per POSIX, when str{,r}chr is comparing it should convert c to a char.martijn2018-10-014-8/+10
* in ECDH, gather statistics where it makes more sensetb2018-09-301-8/+5
* bump for LibreSSL 2.8.2bcook2018-09-301-3/+3
* -T applies to ip6 too, apparently;jmc2018-09-251-4/+4
* bump for LibreSSL 2.8.1libressl-v2.8.1bcook2018-09-231-3/+3
* Add a comment on the acceptable RSASSA cases.tb2018-09-221-2/+3
* gather statistics in checkAead{Open,Seal}() as well.tb2018-09-221-1/+7
* remove some unneeded checkstb2018-09-221-15/+5
* gather and print some statistics on the acceptable cases we need totb2018-09-221-8/+60
* more flags printingtb2018-09-221-23/+23
* improve logic involving acceptableAudittb2018-09-221-5/+5
* Swap order of "action" and "wt.Flags" in a few fmt.Printfs.tb2018-09-221-17/+17
* Introduce a couple of convenience targets to help with auditing thetb2018-09-222-5/+41
* Print the flags field in INFO: and FAIL: messages. It's helpful intb2018-09-211-17/+17
* fix order of arguments in fmt.Printf()tb2018-09-181-2/+2
* Simplify initialization of asn1_cb; use correct spelling of NULL.tb2018-09-171-4/+2
* Move tally mark printing out of the main benchmark loop; ok tb@cheloha2018-09-171-14/+21
* add missing default case to switchtb2018-09-161-1/+3
* EVP_aead_chacha20_poly1305() can't actually fail.tb2018-09-161-4/+1
* Rename *AesCcmOrGcm* into the slightly less ugly *AesAead*.tb2018-09-161-9/+9
* another typo. time to sleeptb2018-09-151-2/+2
* typostb2018-09-151-3/+3
* add a brief comment on the acceptable AES CCM and AES GCM casestb2018-09-151-2/+8
* Also exercise EVP_aead_aes_128_gcm() and EVP_aead_aes_256_gcm().tb2018-09-151-6/+26
* rename checkChaCha20Poly1305{Open,Seal}() into checkAead{Open,Seal}().tb2018-09-151-5/+5
* Merge AES CCM, AES GCM and ChaCha20 data structures intotb2018-09-151-42/+21
* Add missing conversion specifiertb2018-09-151-2/+2
* Modify regress appstest.sh for interoperability testing with OpenSSL 1.1.xinoguchi2018-09-151-16/+40
* Add interoperability test mode for regress appstest.shinoguchi2018-09-141-35/+79
* sync with mozilla-release (one removal, TURKTRUST, more details atsthen2018-09-121-48/+1
* tweak previous;jmc2018-09-122-4/+4