Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Initial version of a base64 regress. | jsing | 2014-05-03 | 3 | -1/+382 | |
| | ||||||
* | Simple sha{224,256,384,512} test using the FIPS 180-2 test vectors available | miod | 2014-05-02 | 2 | -2/+45 | |
| | | | | from http://csrc.nist.gov/groups/ST/toolkit/examples.html | |||||
* | KNF. | jsing | 2014-05-01 | 1 | -324/+296 | |
| | ||||||
* | Provide an EVP implementation for ChaCha. | jsing | 2014-05-01 | 2 | -0/+17 | |
| | | | | ok miod@ | |||||
* | Add ChaCha to libcrypto, based on djb's public domain implementation. | jsing | 2014-05-01 | 3 | -1/+270 | |
| | | | | ok deraadt@ | |||||
* | When compiling with AES_WRAP_TEST, make main() return a meaningful value | miod | 2014-04-22 | 2 | -1/+14 | |
| | | | | | instead of garbage, and add this to the libcrypto regress. Note these tests are incomplete, as they always use the default IV. | |||||
* | ECDSA signature computation involves a random number. Remove the test trying to | miod | 2014-04-18 | 1 | -116/+0 | |
| | | | | | force what RAND_bytes() will return and comparing it against known values - I can't let you do this, Dave. | |||||
* | crypto/modes/gcm128.c can be used as its own selftest. Add it to regress, | miod | 2014-04-17 | 2 | -1/+14 | |
| | | | | conveniently leaving the benchmark code not compiled in the test. | |||||
* | Invoke OPENSSL_add_all_algorithms_noconf() to enforce OPENSSL_cpuid_setup() | miod | 2014-04-17 | 1 | -5/+1 | |
| | | | | | has been called, for, depending how libcrypto, it might be a hidden symbol. Reported by jsg@ | |||||
* | move enginetest to regress as was done with the other tests | jsg | 2014-04-17 | 3 | -1/+292 | |
| | ||||||
* | adapt to the less old des api | jsg | 2014-04-16 | 1 | -49/+49 | |
| | ||||||
* | Import the OpenSSL libcrypto tests in a form suitable for our rergress | miod | 2014-04-15 | 48 | -0/+9639 | |
infrastructure. The following tests have not been imported, for their code lacks a licence: asn1, rsa, sha256, sha512, wp. |