summaryrefslogtreecommitdiff
path: root/src/regress/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Add regress for CMS sign and verify.jsing2019-11-041-2/+125
* Hook cms regress.jsing2019-11-021-1/+2
* Include cms.h.jsing2019-11-021-1/+2
* Initial regress for cms.jsing2019-11-022-0/+199
* Feed the bntest output to bc(1). This checks the result of the bigbluhm2019-09-052-13/+16
* check for asprintf failing allocationderaadt2019-06-271-1/+4
* Use propper regress target to integrate better into test framework.bluhm2019-05-141-2/+4
* Add a test vector for Streebog 512 from Guido Vrankentb2019-05-091-1/+2
* Do not check for working go executable during make clean cleandir obj.bluhm2019-04-241-1/+3
* Add a test for the bn_to_string() function introduced in v3_utl.c r1.32.tb2019-04-132-6/+133
* Add regress tests for the EVP_aes_*_wrap() API. Based on the tests intb2019-03-172-4/+19
* link sm4 regress to the buildtb2019-03-171-1/+2
* Add a regress test for the SM4 block cipher from the Chinese standardtb2019-03-172-0/+117
* add support for xchacha20 and xchacha20-poly1305dlg2019-01-223-3/+191
* Rework the sm3 regress based on a suggestion by jsing. Zap the weirdtb2018-11-121-30/+36
* Hook up sm3 regress tests.tb2018-11-111-1/+2
* Add sm3 regress tests.tb2018-11-112-0/+101
* Clean up and free objects at the completion of the regress test.jsing2018-11-101-1/+13
* Fix a leak reported by Ben L bobsayshilol () live ! co ! uk.tb2018-11-101-1/+3
* fix a leak pointed out by Ben L (bobsayshi () live ! co ! uk)tb2018-11-101-4/+8
* The Botan library from ports an be configured to use OpenSSL orbluhm2018-11-092-1/+22
* Add subdirectires with SUBDIR += instead of a single assignment withtb2018-11-091-47/+46
* Add missing NULL checks on allocation, style(9) and consistently usejsing2018-11-081-35/+34
* Add missing BN_free() calls.jsing2018-11-081-1/+3
* Use ASN1_TYPE_new()/ASN1_TYPE_free() to avoid leaking memory.jsing2018-11-081-12/+17
* Use in-place (un)wrapping in the keywrap tests.tb2018-11-071-5/+8
* better failure printing, add more checkstb2018-11-061-9/+35
* link rand/ to buildtb2018-11-061-2/+4
* add a regression test for bn_rand_interval()tb2018-11-062-0/+98
* With the fixed length checks in aes_wrap.c 1.11, we can remove the uglytb2018-10-201-11/+3
* Run Wycheproof testvectors for AES Key Wrap without padding (RFC 3394)tb2018-10-191-4/+144
* truncate long comments in audit summarytb2018-10-191-2/+7
* simplify BN_bin2bn() calls; no need to pre-declare the variable.tb2018-10-181-11/+6
* Avoid a bad out of bounds access that caused intermittent crashes.tb2018-10-181-2/+2
* whitespace cleanup and other minor things from gofmttb2018-10-071-44/+39
* make sure all CStrings are freedtb2018-10-061-3/+7
* plug a memory leaktb2018-10-061-1/+2
* wrap a few more overlong linestb2018-10-061-14/+36
* wrap some overlong fmt.Printfstb2018-10-061-53/+106
* It's slightly simpler to get the ECDH public key as an EC_POINT by usingtb2018-10-061-16/+15
* free EC_POINT and EC_GROUPtb2018-10-061-1/+4
* Run Wycheproof ECDH Web Crypto test vectors against libcrypto.tb2018-10-061-6/+155
* merge runECDSAWebCryptoTest() into runECDSATest()tb2018-10-061-53/+31
* factor ECDSA signature extraction into its own functiontb2018-10-061-24/+35
* make allocate/use/defer dances more consistent in ECDSA sig extractiontb2018-10-061-9/+8
* Run Wycheproof ECDSA Web Crypto test vectors against libcrypto.tb2018-10-051-7/+166
* Better refer to RFC 8422 which obsoletes RFC 4492.tb2018-10-041-2/+2
* While we don't explicitly support curve secp256r1, we can run 1250 teststb2018-10-041-11/+2
* in ECDH, gather statistics where it makes more sensetb2018-09-301-8/+5
* Add a comment on the acceptable RSASSA cases.tb2018-09-221-2/+3