summaryrefslogtreecommitdiff
path: root/src/regress/lib/libcrypto/wycheproof (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* update to-do listtb2019-12-031-2/+2
* Run Wycheproof ECDSA P1363 test vectors against libcrypto.tb2019-12-031-8/+8
* Add an EcPoint variant and pass it to the ECDH test runner.tb2019-12-031-20/+31
* Annotate test vector files with an enum which we can then pass to thetb2019-12-031-27/+48
* Run additional 3004 ECDH and 1575 ECDSA test vectors against libcrypto.tb2019-11-281-3/+12
* move the HKDF tests up a bittb2019-11-281-68/+68
* update to-do listtb2019-11-281-2/+1
* go fmttb2019-11-281-10/+10
* no need for fallthroughtb2019-11-281-19/+7
* Run HKDF test vectors against libcrypto.tb2019-11-281-1/+95
* Run XChaCha20-Poly1305 test vectors against libcrypto.tb2019-11-281-14/+43
* typotb2019-11-281-2/+2
* Add to do list.tb2019-11-271-1/+7
* Only run the test vectors from x25519_test.json for now.tb2019-11-271-2/+6
* RSASig now has the more specific name RSASSA-PKCS1-v1_5.tb2019-11-271-10/+14
* Only print the basename of skipped test files.tb2019-11-271-2/+3
* go fmttb2019-11-271-10/+9
* Run RSAES-PKCS1-v1_5 test vectors against libcrypto.tb2019-11-271-9/+104
* Make error messages look like other test cases.tb2019-11-271-4/+4
* Add glue for new RSA-OAEP tests.tb2019-11-271-2/+158
* Skip tests with unsupported signature algorithm SHA512/224 as well.tb2019-11-271-2/+2
* The DSA test vectors were split up and more tests were added.tb2019-11-271-2/+2
* New failure mode for AES-CCM: "very long nonce".tb2019-11-271-2/+2
* Prepare update of wycheproof-testvectors. Skip some tests for thingstb2019-11-271-2/+10
* Do not check for working go executable during make clean cleandir obj.bluhm2019-04-241-1/+3
* Use in-place (un)wrapping in the keywrap tests.tb2018-11-071-5/+8
* With the fixed length checks in aes_wrap.c 1.11, we can remove the uglytb2018-10-201-11/+3
* Run Wycheproof testvectors for AES Key Wrap without padding (RFC 3394)tb2018-10-191-4/+144
* truncate long comments in audit summarytb2018-10-191-2/+7
* simplify BN_bin2bn() calls; no need to pre-declare the variable.tb2018-10-181-11/+6
* Avoid a bad out of bounds access that caused intermittent crashes.tb2018-10-181-2/+2
* whitespace cleanup and other minor things from gofmttb2018-10-071-44/+39
* make sure all CStrings are freedtb2018-10-061-3/+7
* plug a memory leaktb2018-10-061-1/+2
* wrap a few more overlong linestb2018-10-061-14/+36
* wrap some overlong fmt.Printfstb2018-10-061-53/+106
* It's slightly simpler to get the ECDH public key as an EC_POINT by usingtb2018-10-061-16/+15
* free EC_POINT and EC_GROUPtb2018-10-061-1/+4
* Run Wycheproof ECDH Web Crypto test vectors against libcrypto.tb2018-10-061-6/+155
* merge runECDSAWebCryptoTest() into runECDSATest()tb2018-10-061-53/+31
* factor ECDSA signature extraction into its own functiontb2018-10-061-24/+35
* make allocate/use/defer dances more consistent in ECDSA sig extractiontb2018-10-061-9/+8
* Run Wycheproof ECDSA Web Crypto test vectors against libcrypto.tb2018-10-051-7/+166
* Better refer to RFC 8422 which obsoletes RFC 4492.tb2018-10-041-2/+2
* While we don't explicitly support curve secp256r1, we can run 1250 teststb2018-10-041-11/+2
* in ECDH, gather statistics where it makes more sensetb2018-09-301-8/+5
* Add a comment on the acceptable RSASSA cases.tb2018-09-221-2/+3
* gather statistics in checkAead{Open,Seal}() as well.tb2018-09-221-1/+7
* remove some unneeded checkstb2018-09-221-15/+5
* gather and print some statistics on the acceptable cases we need totb2018-09-221-8/+60