summaryrefslogtreecommitdiff
path: root/src/regress (follow)
Commit message (Expand)AuthorAgeFilesLines
* Add my copyright.tb2018-08-241-1/+2
* Remove DSA from TODO list and add RSA-PSS back.tb2018-08-241-2/+2
* Also test DSA with the DER encoded key. Lots of help from jsing, thanks!tb2018-08-241-1/+27
* Run our DSA against wycheproof test vectors.tb2018-08-231-1/+129
* Add license header.inoguchi2018-08-231-0/+17
* Check reusing SSL/TLS session ticket by regression testinoguchi2018-08-231-8/+38
* fix return valuetb2018-08-211-3/+3
* Remove ChaCha20-Poly1305 from the TODO listtb2018-08-211-2/+2
* A failure to _seal() should be looked into, so turn this into antb2018-08-211-7/+2
* Factor the calls to EVP_AEAD_CTX_open() and EVP_AEAD_CTX_seal() intotb2018-08-211-48/+76
* add two missing \ntb2018-08-201-3/+3
* Test EVP_AEAD_CTX_open() at the same time as EVP_AEAD_CTX_seal()tb2018-08-201-5/+23
* remove two redundant teststb2018-08-201-10/+1
* Use sealed instead of out in a couple of places in preparation oftb2018-08-201-12/+13
* Shuffle the decoding of the hex strings to the top and group all lengthtb2018-08-201-22/+26
* Run the Wycheproof ChaCha20-Poly1305 test vectors against libcrypto.tb2018-08-201-1/+141
* Add regress coverage for CBB_add_u32().jsing2018-08-161-3/+4
* Run the wycheproof ECDSA test vectors against libcrypto.jsing2018-08-101-7/+147
* Run the X25519 wycheproof test vectors against libcrypto.jsing2018-08-101-13/+82
* Rework regress so that it is easier to add additional test types.jsing2018-08-101-35/+59
* Use a table rather than a switch when converting strings to NIDs.jsing2018-08-101-14/+13
* Provide a harness that runs test vectors from Project Wycheproof againstjsing2018-07-253-1/+253
* avoid using argv[0] for printing to stderrtb2018-07-231-2/+2
* Bob's license was missing, add it.tb2018-07-181-1/+16
* some more style fixestb2018-07-171-19/+19
* Add missing $OpenBSD$ markers.tb2018-07-1741-22/+42
* remove unused, empty filetb2018-07-171-0/+0
* Replace getprogname() to argv[0] in bnaddsubinoguchi2018-07-171-3/+2
* re-commit the removal of the EC_POINTs_mul() regression tests with num > 1tb2018-07-151-161/+27
* $OpenBSD$tb2018-07-151-0/+1
* Also revert regression tests so that EC_POINTs_mul() with longer vectorstb2018-07-151-26/+160
* Update EC regression tests.tb2018-07-111-160/+26
* $OpenBSD$tb2018-07-102-1/+2
* Now that all *_free() functions are NULL safe, we can generate thetb2018-07-105-239/+123
* +addsubtb2018-07-101-1/+2
* Add simple regression tests for BN_{,u}{add,sub}(3). With input from jcatb2018-07-102-0/+248
* This code is already painful enough to look at. Putting the braces at thetb2018-06-161-74/+64
* Update regress for DES cipher suite removal.jsing2018-06-022-49/+41
* Zero the client random so that it is easier to spot unintended differences.jsing2018-06-021-0/+1
* Link free directory to libcrypto regress test suite.tb2018-05-151-1/+2
* Test DSO_free(NULL).tb2018-05-151-1/+3
* remove _CONF_free_data(). It doesn't belong here.tb2018-05-151-3/+2
* Remove the /* ASN1_item_free */ annotations I added in r1.9 again.tb2018-05-151-113/+113
* Test X509_CRL_METHOD_free(NULL)tb2018-04-231-1/+2
* About half of the listed functions are wrappers of ASN1_item_free().tb2018-04-231-113/+113
* Add a big pile of *_free() functions which I audited to be NULL-safe.tb2018-04-231-2/+109
* Make ENGINE_free() succeed on NULL. Matches OpenSSL's behavior andtb2018-04-142-11/+14
* tweak usage()tb2018-04-101-1/+1
* Revise regress to match tls_keypair_clear() removal.jsing2018-04-071-18/+3
* test X509_NAME_add_entry_by_txt(3); feedback and OK jsing@schwarze2018-04-074-2/+81