summaryrefslogtreecommitdiff
path: root/src/regress/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Also exercise EVP_aead_aes_128_gcm() and EVP_aead_aes_256_gcm().tb2018-09-151-6/+26
* rename checkChaCha20Poly1305{Open,Seal}() into checkAead{Open,Seal}().tb2018-09-151-5/+5
* Merge AES CCM, AES GCM and ChaCha20 data structures intotb2018-09-151-42/+21
* Add missing conversion specifiertb2018-09-151-2/+2
* Remove a few unnecessary caststb2018-09-021-5/+5
* Print SKIPPED if package wycheproof-testvectors is missing. Thisbluhm2018-09-021-2/+2
* Remove ECDH from TODO list. Done!tb2018-09-021-2/+1
* Unify FAIL printfs.tb2018-09-021-8/+8
* After libcrypto/ecdh/ech_key.c -r1.8 fixed the failing test cases, removetb2018-09-021-13/+3
* Run Wycheproof ECDH tests against libcrypto. Some tests currently fail,tb2018-09-021-1/+154
* Use a Boolean rather than repeated string comparison.tb2018-09-021-3/+5
* Remove RSA-PSS from todo-listtb2018-09-011-2/+2
* Run Wycheproof RSASSA-PSS testvectors against libcrypto.tb2018-09-011-2/+144
* Instead of enumerating the files to clean by hand, set PROGS=${TESTS}.tb2018-08-312-5/+7
* Make sure to clean up the .d files with 'make clean'tb2018-08-301-2/+2
* AES is now done also.tb2018-08-291-3/+3
* Pass algorithm as a string to all *TestGroup functions for consistency.tb2018-08-291-22/+22
* Run Wycheproof AES-GCM testvectors against libcrypto.tb2018-08-291-42/+83
* Calculate and check tag during AES-CCM encryption test.tb2018-08-291-1/+25
* typotb2018-08-291-2/+2
* Don't fatal on keys of invalid sice, just print an INFO.tb2018-08-291-2/+3
* Run Wycheproof AES-CMAC testvectors against libcrypto.tb2018-08-281-2/+116
* remove some extra parens and fix some other formatting issuestb2018-08-281-17/+17
* zap trailing whitespacetb2018-08-281-7/+7
* tweak failure messagestb2018-08-271-9/+9
* dedup AES-CBC-PKCS5 encryption and decryption checkstb2018-08-271-66/+24
* 2x missing "..."tb2018-08-271-3/+3
* Run Wycheproof AES-CCM testvectors against libcrypto.tb2018-08-271-2/+200
* Check return value of EVP_CipherInit_ex()tb2018-08-261-6/+15
* Run Wycheproof AES-CBC-PKCS5 testvectors against libcrypto.tb2018-08-261-1/+189
* Remove some redundant info from log.Fatalftb2018-08-261-2/+2
* simplify returned valuetb2018-08-261-2/+2
* Also run DSA tests with the PEM encoded public key.tb2018-08-251-2/+22
* Add my copyright.tb2018-08-241-1/+2
* Remove DSA from TODO list and add RSA-PSS back.tb2018-08-241-2/+2
* Also test DSA with the DER encoded key. Lots of help from jsing, thanks!tb2018-08-241-1/+27
* Run our DSA against wycheproof test vectors.tb2018-08-231-1/+129
* fix return valuetb2018-08-211-3/+3
* Remove ChaCha20-Poly1305 from the TODO listtb2018-08-211-2/+2
* A failure to _seal() should be looked into, so turn this into antb2018-08-211-7/+2
* Factor the calls to EVP_AEAD_CTX_open() and EVP_AEAD_CTX_seal() intotb2018-08-211-48/+76
* add two missing \ntb2018-08-201-3/+3
* Test EVP_AEAD_CTX_open() at the same time as EVP_AEAD_CTX_seal()tb2018-08-201-5/+23
* remove two redundant teststb2018-08-201-10/+1
* Use sealed instead of out in a couple of places in preparation oftb2018-08-201-12/+13
* Shuffle the decoding of the hex strings to the top and group all lengthtb2018-08-201-22/+26
* Run the Wycheproof ChaCha20-Poly1305 test vectors against libcrypto.tb2018-08-201-1/+141
* Run the wycheproof ECDSA test vectors against libcrypto.jsing2018-08-101-7/+147
* Run the X25519 wycheproof test vectors against libcrypto.jsing2018-08-101-13/+82
* Rework regress so that it is easier to add additional test types.jsing2018-08-101-35/+59