Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Rework the sm3 regress based on a suggestion by jsing. Zap the weird | tb | 2018-11-12 | 1 | -30/+36 |
| | | | | | | hex_encode() function and use byte arrays instead of strings to store the expected values. Snatch and tweak hexdump() from beck's key_schedule test to pretty-print data in case of failure. | ||||
* | Hook up sm3 regress tests. | tb | 2018-11-11 | 1 | -1/+2 |
| | |||||
* | Add sm3 regress tests. | tb | 2018-11-11 | 2 | -0/+101 |
| | |||||
* | Clean up and free objects at the completion of the regress test. | jsing | 2018-11-10 | 1 | -1/+13 |
| | | | | From Ben L <bobsayshilol at live dot co dot uk>. | ||||
* | Fix a leak reported by Ben L bobsayshilol () live ! co ! uk. | tb | 2018-11-10 | 1 | -1/+3 |
| | |||||
* | fix a leak pointed out by Ben L (bobsayshi () live ! co ! uk) | tb | 2018-11-10 | 1 | -4/+8 |
| | |||||
* | The Botan library from ports an be configured to use OpenSSL or | bluhm | 2018-11-09 | 2 | -1/+22 |
| | | | | | | | | LibreSSL as crypto provider. When we run their regression tests, we are actually testing our library. This is far from perfect. A lot of LibreSSL features have not been implemented as Botan provider. Even if provider openssl is specified, botan-test runs a lot of non-openssl tests. This can be improved later. | ||||
* | Add subdirectires with SUBDIR += instead of a single assignment with | tb | 2018-11-09 | 1 | -47/+46 |
| | | | | line continuations. | ||||
* | Add missing NULL checks on allocation, style(9) and consistently use | jsing | 2018-11-08 | 1 | -35/+34 |
| | | | | goto err instead of handrolling. | ||||
* | Add missing BN_free() calls. | jsing | 2018-11-08 | 1 | -1/+3 |
| | | | | From Ben L <bobsayshilol at live dot co dot uk>. | ||||
* | Use ASN1_TYPE_new()/ASN1_TYPE_free() to avoid leaking memory. | jsing | 2018-11-08 | 1 | -12/+17 |
| | | | | From Ben L <bobsayshilol at live dot co dot uk>. | ||||
* | Use in-place (un)wrapping in the keywrap tests. | tb | 2018-11-07 | 1 | -5/+8 |
| | |||||
* | better failure printing, add more checks | tb | 2018-11-06 | 1 | -9/+35 |
| | |||||
* | link rand/ to build | tb | 2018-11-06 | 1 | -2/+4 |
| | |||||
* | add a regression test for bn_rand_interval() | tb | 2018-11-06 | 2 | -0/+98 |
| | |||||
* | With the fixed length checks in aes_wrap.c 1.11, we can remove the ugly | tb | 2018-10-20 | 1 | -11/+3 |
| | | | | length checks here. | ||||
* | Run Wycheproof testvectors for AES Key Wrap without padding (RFC 3394) | tb | 2018-10-19 | 1 | -4/+144 |
| | | | | | | against libcrypto. Currently contains caller-side length checks that should really be done in the library. This will be fixed after an upcoming commit to libcrypto. | ||||
* | truncate long comments in audit summary | tb | 2018-10-19 | 1 | -2/+7 |
| | |||||
* | simplify BN_bin2bn() calls; no need to pre-declare the variable. | tb | 2018-10-18 | 1 | -11/+6 |
| | |||||
* | Avoid a bad out of bounds access that caused intermittent crashes. | tb | 2018-10-18 | 1 | -2/+2 |
| | |||||
* | whitespace cleanup and other minor things from gofmt | tb | 2018-10-07 | 1 | -44/+39 |
| | |||||
* | make sure all CStrings are freed | tb | 2018-10-06 | 1 | -3/+7 |
| | |||||
* | plug a memory leak | tb | 2018-10-06 | 1 | -1/+2 |
| | |||||
* | wrap a few more overlong lines | tb | 2018-10-06 | 1 | -14/+36 |
| | |||||
* | wrap some overlong fmt.Printfs | tb | 2018-10-06 | 1 | -53/+106 |
| | |||||
* | It's slightly simpler to get the ECDH public key as an EC_POINT by using | tb | 2018-10-06 | 1 | -16/+15 |
| | | | | | EC_KEY_set_public_key_affine_coordinates() and EC_KEY_get0_public_key() than using EC_POINT_set_affine_coordinates_GFp() directly. | ||||
* | free EC_POINT and EC_GROUP | tb | 2018-10-06 | 1 | -1/+4 |
| | |||||
* | Run Wycheproof ECDH Web Crypto test vectors against libcrypto. | tb | 2018-10-06 | 1 | -6/+155 |
| | |||||
* | merge runECDSAWebCryptoTest() into runECDSATest() | tb | 2018-10-06 | 1 | -53/+31 |
| | |||||
* | factor ECDSA signature extraction into its own function | tb | 2018-10-06 | 1 | -24/+35 |
| | |||||
* | make allocate/use/defer dances more consistent in ECDSA sig extraction | tb | 2018-10-06 | 1 | -9/+8 |
| | |||||
* | Run Wycheproof ECDSA Web Crypto test vectors against libcrypto. | tb | 2018-10-05 | 1 | -7/+166 |
| | |||||
* | Better refer to RFC 8422 which obsoletes RFC 4492. | tb | 2018-10-04 | 1 | -2/+2 |
| | |||||
* | While we don't explicitly support curve secp256r1, we can run 1250 tests | tb | 2018-10-04 | 1 | -11/+2 |
| | | | | against its ANSI equivalent prime256v1 (compare RFC 4492, Appendix A). | ||||
* | in ECDH, gather statistics where it makes more sense | tb | 2018-09-30 | 1 | -8/+5 |
| | |||||
* | Add a comment on the acceptable RSASSA cases. | tb | 2018-09-22 | 1 | -2/+3 |
| | |||||
* | gather statistics in checkAead{Open,Seal}() as well. | tb | 2018-09-22 | 1 | -1/+7 |
| | |||||
* | remove some unneeded checks | tb | 2018-09-22 | 1 | -15/+5 |
| | |||||
* | gather and print some statistics on the acceptable cases we need to | tb | 2018-09-22 | 1 | -8/+60 |
| | | | | look into | ||||
* | more flags printing | tb | 2018-09-22 | 1 | -23/+23 |
| | |||||
* | improve logic involving acceptableAudit | tb | 2018-09-22 | 1 | -5/+5 |
| | |||||
* | Swap order of "action" and "wt.Flags" in a few fmt.Printfs. | tb | 2018-09-22 | 1 | -17/+17 |
| | |||||
* | Introduce a couple of convenience targets to help with auditing the | tb | 2018-09-22 | 2 | -5/+41 |
| | | | | acceptable cases. | ||||
* | Print the flags field in INFO: and FAIL: messages. It's helpful in | tb | 2018-09-21 | 1 | -17/+17 |
| | | | | identifying the important failures while auditing. | ||||
* | fix order of arguments in fmt.Printf() | tb | 2018-09-18 | 1 | -2/+2 |
| | |||||
* | add missing default case to switch | tb | 2018-09-16 | 1 | -1/+3 |
| | |||||
* | EVP_aead_chacha20_poly1305() can't actually fail. | tb | 2018-09-16 | 1 | -4/+1 |
| | |||||
* | Rename *AesCcmOrGcm* into the slightly less ugly *AesAead*. | tb | 2018-09-16 | 1 | -9/+9 |
| | |||||
* | another typo. time to sleep | tb | 2018-09-15 | 1 | -2/+2 |
| | |||||
* | typos | tb | 2018-09-15 | 1 | -3/+3 |
| |