summaryrefslogtreecommitdiff
path: root/src/regress (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* whitespace cleanup and other minor things from gofmttb2018-10-071-44/+39
|
* make sure all CStrings are freedtb2018-10-061-3/+7
|
* plug a memory leaktb2018-10-061-1/+2
|
* wrap a few more overlong linestb2018-10-061-14/+36
|
* wrap some overlong fmt.Printfstb2018-10-061-53/+106
|
* It's slightly simpler to get the ECDH public key as an EC_POINT by usingtb2018-10-061-16/+15
| | | | | EC_KEY_set_public_key_affine_coordinates() and EC_KEY_get0_public_key() than using EC_POINT_set_affine_coordinates_GFp() directly.
* free EC_POINT and EC_GROUPtb2018-10-061-1/+4
|
* Run Wycheproof ECDH Web Crypto test vectors against libcrypto.tb2018-10-061-6/+155
|
* merge runECDSAWebCryptoTest() into runECDSATest()tb2018-10-061-53/+31
|
* factor ECDSA signature extraction into its own functiontb2018-10-061-24/+35
|
* make allocate/use/defer dances more consistent in ECDSA sig extractiontb2018-10-061-9/+8
|
* Run Wycheproof ECDSA Web Crypto test vectors against libcrypto.tb2018-10-051-7/+166
|
* Better refer to RFC 8422 which obsoletes RFC 4492.tb2018-10-041-2/+2
|
* While we don't explicitly support curve secp256r1, we can run 1250 teststb2018-10-041-11/+2
| | | | against its ANSI equivalent prime256v1 (compare RFC 4492, Appendix A).
* in ECDH, gather statistics where it makes more sensetb2018-09-301-8/+5
|
* Add a comment on the acceptable RSASSA cases.tb2018-09-221-2/+3
|
* gather statistics in checkAead{Open,Seal}() as well.tb2018-09-221-1/+7
|
* remove some unneeded checkstb2018-09-221-15/+5
|
* gather and print some statistics on the acceptable cases we need totb2018-09-221-8/+60
| | | | look into
* more flags printingtb2018-09-221-23/+23
|
* improve logic involving acceptableAudittb2018-09-221-5/+5
|
* Swap order of "action" and "wt.Flags" in a few fmt.Printfs.tb2018-09-221-17/+17
|
* Introduce a couple of convenience targets to help with auditing thetb2018-09-222-5/+41
| | | | acceptable cases.
* Print the flags field in INFO: and FAIL: messages. It's helpful intb2018-09-211-17/+17
| | | | identifying the important failures while auditing.
* fix order of arguments in fmt.Printf()tb2018-09-181-2/+2
|
* add missing default case to switchtb2018-09-161-1/+3
|
* EVP_aead_chacha20_poly1305() can't actually fail.tb2018-09-161-4/+1
|
* Rename *AesCcmOrGcm* into the slightly less ugly *AesAead*.tb2018-09-161-9/+9
|
* another typo. time to sleeptb2018-09-151-2/+2
|
* typostb2018-09-151-3/+3
|
* add a brief comment on the acceptable AES CCM and AES GCM casestb2018-09-151-2/+8
|
* Also exercise EVP_aead_aes_128_gcm() and EVP_aead_aes_256_gcm().tb2018-09-151-6/+26
|
* rename checkChaCha20Poly1305{Open,Seal}() into checkAead{Open,Seal}().tb2018-09-151-5/+5
|
* Merge AES CCM, AES GCM and ChaCha20 data structures intotb2018-09-151-42/+21
| | | | single AEAD types. Will be used in upcoming commits.
* Add missing conversion specifiertb2018-09-151-2/+2
|
* Modify regress appstest.sh for interoperability testing with OpenSSL 1.1.xinoguchi2018-09-151-16/+40
| | | | | | | | - add sleep before s_client instead of removing -pause option - change check words for s_client output messages - replace CAfile to CApath for s_time - remove -prexit from s_client - confirm openssl command path is executable
* Add interoperability test mode for regress appstest.shinoguchi2018-09-141-35/+79
| | | | | | | - test s_server and s_client between different version by option -i - indicate other version by defining OTHER_OPENSSL environment variable - fix "SSL/TLS" to "TLS/SSL", since TLS is correct as technical term - s/SKIPPNG/SKIPPING/
* Fix indent and adjust line fit to 80 columns.inoguchi2018-09-081-930/+961
|
* Split test blocks into a function. Test contents are not changed.inoguchi2018-09-081-62/+86
|
* Test more ciphers and randomize the order in regress appstest.shinoguchi2018-09-081-5/+9
| | | | | | - change test target ciphers - randomize the test ciphers order - display test cipher count
* tests all available TLSv1.2 ciphersinoguchi2018-09-071-11/+14
|
* Remove a few unnecessary caststb2018-09-021-5/+5
|
* Print SKIPPED if package wycheproof-testvectors is missing. Thisbluhm2018-09-021-2/+2
| | | | | is the magic string that is recognized by my test framework. OK tb@
* Remove ECDH from TODO list. Done!tb2018-09-021-2/+1
|
* Unify FAIL printfs.tb2018-09-021-8/+8
|
* After libcrypto/ecdh/ech_key.c -r1.8 fixed the failing test cases, removetb2018-09-021-13/+3
| | | | two noisy INFO and reorder things a bit.
* Run Wycheproof ECDH tests against libcrypto. Some tests currently fail,tb2018-09-021-1/+154
| | | | will be fixed with the next commit to libcrypto.
* Use a Boolean rather than repeated string comparison.tb2018-09-021-3/+5
|
* Remove RSA-PSS from todo-listtb2018-09-011-2/+2
|
* Run Wycheproof RSASSA-PSS testvectors against libcrypto.tb2018-09-011-2/+144
|