summaryrefslogtreecommitdiff
path: root/src/regress/lib/libcrypto/ec (follow)
Commit message (Expand)AuthorAgeFilesLines
* ec_asn1_test: remove extra parenstb2024-11-081-4/+4
* ec_asn1_test: remove debug leftover that broke the build on Windowstb2024-11-051-3/+1
* ec tests: allow linking against eopenssltb2024-11-042-3/+16
* ec_asn1_test: I somehow managed to commit the version without freezero...tb2024-11-021-3/+4
* ec_asn1_test: set compressed coordinates for the "simple" generatortb2024-11-011-3/+3
* Also exercise the "simple" version of the builtin curves, not only "mont"tb2024-11-011-27/+124
* Split ec_key_test_point_encoding() into chunks of saner sizetb2024-10-291-49/+172
* ec_asn1_test: point doubling is fine, the leak is elsewheretb2024-10-291-3/+1
* Disable point doubling for now, it leaks due to a doc bug.tb2024-10-291-1/+3
* unifdef -m -DCORRECT_PRIV_KEY_PADDING=1 ec_asn1_test.ctb2024-10-281-9/+1
* Enable the tests that depend on correct private key paddingtb2024-10-281-2/+2
* {d2i,i2d}_ECParameters() also want a bit of exercisingtb2024-10-261-1/+28
* ec_asn1_test: play some silly games to cover a few more code pathstb2024-10-261-1/+47
* Add regress coverage for ec_print.ctb2024-10-261-2/+889
* Use macros describing the intent rather than #if 0tb2024-10-251-8/+38
* Add regress for {d2i,i2d}_ECPrivateKey() and {o2i,i2o}_ECPublicKey()tb2024-10-251-1/+1003
* ec_point_conversion: cosmeticstb2024-10-231-4/+4
* ec_point_conversion: extend test coverage by translating back thetb2024-10-231-2/+76
* ec_asn1_test: simplify previoustb2024-10-181-7/+4
* ec_asn1_test: call EC_GROUP_check() for the builtin curvestb2024-10-182-59/+13
* ec_asn1_test: adjust for rejection of non-builtin curve parameterstb2024-10-181-14/+2
* ec_asn1_test: add secp256k1.mtb2024-10-181-10/+81
* ec_asn1_test: remove last hardcoded wei25519 remnanttb2024-10-181-4/+3
* ec_asn1_test: test Wei25519.2 and Wei25519.-3 as welltb2024-10-181-37/+163
* ec_asn1_test: clean up & refactor; test Wei25519 with simple methodtb2024-10-181-109/+189
* EC ASN.1: add reminder that the simple method might also want testingtb2024-10-161-1/+5
* Implement Wei25519 to exercise some more elliptic curve codetb2024-10-161-1/+284
* Extend ec_asn1_test to check for correct curve coefficient encodingtb2024-10-141-5/+50
* Exercise the EC parameters code a bit moretb2024-10-121-1/+103
* CRYPTO_mem_leaks* will go away. Remove calls in legacy teststb2024-02-291-2/+1
* ec_point_conversion: zap an empty linetb2024-01-181-2/+1
* Unifdef OPENSSL_NO_ENGINE in libcrypto regresstb2023-11-191-7/+1
* Remove unused prototypetb2023-08-011-3/+1
* Remove comment containing an outdated pathtb2023-07-261-2/+1
* Fix EC_POINT_is_on_curve() checks.tb2023-07-241-9/+9
* Some more EC2M cleanuptb2023-04-261-14/+3
* ectest: Remove #if 1tb2023-04-181-3/+1
* Unifdef OPENSSL_NO_EC_NISTP_64_GCC_128tb2023-04-181-203/+1
* ectest: drop a broken #if 0 /* optional */ piece of codetb2023-04-181-20/+5
* ec_point_conversion: drop test for sect571k1tb2023-04-181-350/+2
* ectest: drop some gross unused macrostb2023-04-181-49/+1
* ectest: unifdef OPENSSL_NO_EC2Mtb2023-04-181-418/+1
* Skip binary curves in ec_point_conversiontb2023-04-171-3/+14
* Switch all ec tests to using dynamic linkingtb2023-04-173-8/+14
* Simplify Makefiletb2023-04-171-12/+1
* ec_point_conversion: do not rely on ec.h pulling in bn.htb2023-04-151-1/+2
* ectest: missing error checkingtb2023-04-131-5/+11
* Guard GF2m-specifics with OPENSSL_NO_EC2Mtb2023-03-251-2/+7
* Refrain from printing SUCCESS in some of my teststb2022-12-011-6/+4
* Set failed in test_random_points()tb2021-12-291-2/+2