Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Remove DSA from TODO list and add RSA-PSS back. | tb | 2018-08-24 | 1 | -2/+2 | |
| | ||||||
* | Also test DSA with the DER encoded key. Lots of help from jsing, thanks! | tb | 2018-08-24 | 1 | -1/+27 | |
| | ||||||
* | Run our DSA against wycheproof test vectors. | tb | 2018-08-23 | 1 | -1/+129 | |
| | ||||||
* | fix return value | tb | 2018-08-21 | 1 | -3/+3 | |
| | ||||||
* | Remove ChaCha20-Poly1305 from the TODO list | tb | 2018-08-21 | 1 | -2/+2 | |
| | ||||||
* | A failure to _seal() should be looked into, so turn this into an | tb | 2018-08-21 | 1 | -7/+2 | |
| | | | | unconditional failure. | |||||
* | Factor the calls to EVP_AEAD_CTX_open() and EVP_AEAD_CTX_seal() into | tb | 2018-08-21 | 1 | -48/+76 | |
| | | | | | | their own functions to make it easier to handle failures cleanly. Discussed with jsing | |||||
* | add two missing \n | tb | 2018-08-20 | 1 | -3/+3 | |
| | ||||||
* | Test EVP_AEAD_CTX_open() at the same time as EVP_AEAD_CTX_seal() | tb | 2018-08-20 | 1 | -5/+23 | |
| | | | | Suggested by jsing | |||||
* | remove two redundant tests | tb | 2018-08-20 | 1 | -10/+1 | |
| | ||||||
* | Use sealed instead of out in a couple of places in preparation of | tb | 2018-08-20 | 1 | -12/+13 | |
| | | | | testing EVP_AEAD_CTX_open() | |||||
* | Shuffle the decoding of the hex strings to the top and group all length | tb | 2018-08-20 | 1 | -22/+26 | |
| | | | | | tests together. Make failure of the length tests non-fatal, as these are failures of test cases, not of the program. | |||||
* | Run the Wycheproof ChaCha20-Poly1305 test vectors against libcrypto. | tb | 2018-08-20 | 1 | -1/+141 | |
| | | | | | | We currently only support nonces of length 12, so skip a few tests. With input from jsing | |||||
* | Run the wycheproof ECDSA test vectors against libcrypto. | jsing | 2018-08-10 | 1 | -7/+147 | |
| | | | | | Skip the ecdsa_webcrypto_test.json vectors for the time being, as these likely need some extra glue. | |||||
* | Run the X25519 wycheproof test vectors against libcrypto. | jsing | 2018-08-10 | 1 | -13/+82 | |
| | ||||||
* | Rework regress so that it is easier to add additional test types. | jsing | 2018-08-10 | 1 | -35/+59 | |
| | ||||||
* | Use a table rather than a switch when converting strings to NIDs. | jsing | 2018-08-10 | 1 | -14/+13 | |
| | | | | This will make it easier to extend. | |||||
* | Provide a harness that runs test vectors from Project Wycheproof against | jsing | 2018-07-25 | 2 | -0/+251 | |
libcrypto. Initially this just covers RSA signatures, but can be extended to cover other cryptographic algorithms. This regress requires the go and wycheproof-testvector packages to be installed, with the regress being skipped otherwise. Discussed with beck@ and tb@ |