summaryrefslogtreecommitdiff
path: root/src/regress/lib/libcrypto/wycheproof (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Fix a logic error that hid the failing ZeroLengthIv tests.tb2020-04-271-3/+3
* Some of the test vectors that were added in the upstream committb2020-01-271-7/+9
* whitespace from go fmt + update a commenttb2019-12-141-4/+4
* Run Wycheproof HMAC test vectors against libcrypto.tb2019-12-141-1/+96
* update to-do listtb2019-12-091-2/+1
* Run Wycheproof DSA P1363 test vectors against libcrypto.tb2019-12-091-19/+71
* update to-do listtb2019-12-031-2/+2
* Run Wycheproof ECDSA P1363 test vectors against libcrypto.tb2019-12-031-8/+8
* Add an EcPoint variant and pass it to the ECDH test runner.tb2019-12-031-20/+31
* Annotate test vector files with an enum which we can then pass to thetb2019-12-031-27/+48
* Run additional 3004 ECDH and 1575 ECDSA test vectors against libcrypto.tb2019-11-281-3/+12
* move the HKDF tests up a bittb2019-11-281-68/+68
* update to-do listtb2019-11-281-2/+1
* go fmttb2019-11-281-10/+10
* no need for fallthroughtb2019-11-281-19/+7
* Run HKDF test vectors against libcrypto.tb2019-11-281-1/+95
* Run XChaCha20-Poly1305 test vectors against libcrypto.tb2019-11-281-14/+43
* typotb2019-11-281-2/+2
* Add to do list.tb2019-11-271-1/+7
* Only run the test vectors from x25519_test.json for now.tb2019-11-271-2/+6
* RSASig now has the more specific name RSASSA-PKCS1-v1_5.tb2019-11-271-10/+14
* Only print the basename of skipped test files.tb2019-11-271-2/+3
* go fmttb2019-11-271-10/+9
* Run RSAES-PKCS1-v1_5 test vectors against libcrypto.tb2019-11-271-9/+104
* Make error messages look like other test cases.tb2019-11-271-4/+4
* Add glue for new RSA-OAEP tests.tb2019-11-271-2/+158
* Skip tests with unsupported signature algorithm SHA512/224 as well.tb2019-11-271-2/+2
* The DSA test vectors were split up and more tests were added.tb2019-11-271-2/+2
* New failure mode for AES-CCM: "very long nonce".tb2019-11-271-2/+2
* Prepare update of wycheproof-testvectors. Skip some tests for thingstb2019-11-271-2/+10
* Do not check for working go executable during make clean cleandir obj.bluhm2019-04-241-1/+3
* Use in-place (un)wrapping in the keywrap tests.tb2018-11-071-5/+8
* With the fixed length checks in aes_wrap.c 1.11, we can remove the uglytb2018-10-201-11/+3
* Run Wycheproof testvectors for AES Key Wrap without padding (RFC 3394)tb2018-10-191-4/+144
* truncate long comments in audit summarytb2018-10-191-2/+7
* simplify BN_bin2bn() calls; no need to pre-declare the variable.tb2018-10-181-11/+6
* Avoid a bad out of bounds access that caused intermittent crashes.tb2018-10-181-2/+2
* whitespace cleanup and other minor things from gofmttb2018-10-071-44/+39
* make sure all CStrings are freedtb2018-10-061-3/+7
* plug a memory leaktb2018-10-061-1/+2
* wrap a few more overlong linestb2018-10-061-14/+36
* wrap some overlong fmt.Printfstb2018-10-061-53/+106
* It's slightly simpler to get the ECDH public key as an EC_POINT by usingtb2018-10-061-16/+15
* free EC_POINT and EC_GROUPtb2018-10-061-1/+4
* Run Wycheproof ECDH Web Crypto test vectors against libcrypto.tb2018-10-061-6/+155
* merge runECDSAWebCryptoTest() into runECDSATest()tb2018-10-061-53/+31
* factor ECDSA signature extraction into its own functiontb2018-10-061-24/+35
* make allocate/use/defer dances more consistent in ECDSA sig extractiontb2018-10-061-9/+8
* Run Wycheproof ECDSA Web Crypto test vectors against libcrypto.tb2018-10-051-7/+166
* Better refer to RFC 8422 which obsoletes RFC 4492.tb2018-10-041-2/+2