summaryrefslogtreecommitdiff
path: root/src/regress (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Instead of enumerating the files to clean by hand, set PROGS=${TESTS}.tb2018-08-312-5/+7
| | | | Suggested by jsing
* Make sure to clean up the .d files with 'make clean'tb2018-08-301-2/+2
|
* AES is now done also.tb2018-08-291-3/+3
|
* Pass algorithm as a string to all *TestGroup functions for consistency.tb2018-08-291-22/+22
|
* Run Wycheproof AES-GCM testvectors against libcrypto.tb2018-08-291-42/+83
|
* Calculate and check tag during AES-CCM encryption test.tb2018-08-291-1/+25
|
* typotb2018-08-291-2/+2
|
* Don't fatal on keys of invalid sice, just print an INFO.tb2018-08-291-2/+3
|
* Run Wycheproof AES-CMAC testvectors against libcrypto.tb2018-08-281-2/+116
|
* remove some extra parens and fix some other formatting issuestb2018-08-281-17/+17
| | | | pointed out by gofmt (thanks anton)
* zap trailing whitespacetb2018-08-281-7/+7
|
* tweak failure messagestb2018-08-271-9/+9
|
* dedup AES-CBC-PKCS5 encryption and decryption checkstb2018-08-271-66/+24
|
* 2x missing "..."tb2018-08-271-3/+3
|
* Run Wycheproof AES-CCM testvectors against libcrypto.tb2018-08-271-2/+200
|
* Add protocol and cipher patterns in regress appstest.shinoguchi2018-08-271-18/+88
|
* Check return value of EVP_CipherInit_ex()tb2018-08-261-6/+15
|
* Run Wycheproof AES-CBC-PKCS5 testvectors against libcrypto.tb2018-08-261-1/+189
|
* Remove some redundant info from log.Fatalftb2018-08-261-2/+2
|
* simplify returned valuetb2018-08-261-2/+2
|
* Stop s_server if error occurs in regress appstest.shinoguchi2018-08-261-4/+13
|
* Also run DSA tests with the PEM encoded public key.tb2018-08-251-2/+22
|
* Add my copyright.tb2018-08-241-1/+2
| | | | Discussed with jsing
* Remove DSA from TODO list and add RSA-PSS back.tb2018-08-241-2/+2
|
* Also test DSA with the DER encoded key. Lots of help from jsing, thanks!tb2018-08-241-1/+27
|
* Run our DSA against wycheproof test vectors.tb2018-08-231-1/+129
|
* Add license header.inoguchi2018-08-231-0/+17
|
* Check reusing SSL/TLS session ticket by regression testinoguchi2018-08-231-8/+38
| | | | | | | | | - Added checking for session ticket reusing with using openssl(1) s_server and s_client command in appstest.sh - Confirm certificate verification status. - Save s_server message to log file. ok tb@ and jsing@
* fix return valuetb2018-08-211-3/+3
|
* Remove ChaCha20-Poly1305 from the TODO listtb2018-08-211-2/+2
|
* A failure to _seal() should be looked into, so turn this into antb2018-08-211-7/+2
| | | | unconditional failure.
* Factor the calls to EVP_AEAD_CTX_open() and EVP_AEAD_CTX_seal() intotb2018-08-211-48/+76
| | | | | | their own functions to make it easier to handle failures cleanly. Discussed with jsing
* add two missing \ntb2018-08-201-3/+3
|
* Test EVP_AEAD_CTX_open() at the same time as EVP_AEAD_CTX_seal()tb2018-08-201-5/+23
| | | | Suggested by jsing
* remove two redundant teststb2018-08-201-10/+1
|
* Use sealed instead of out in a couple of places in preparation oftb2018-08-201-12/+13
| | | | testing EVP_AEAD_CTX_open()
* Shuffle the decoding of the hex strings to the top and group all lengthtb2018-08-201-22/+26
| | | | | tests together. Make failure of the length tests non-fatal, as these are failures of test cases, not of the program.
* Run the Wycheproof ChaCha20-Poly1305 test vectors against libcrypto.tb2018-08-201-1/+141
| | | | | | We currently only support nonces of length 12, so skip a few tests. With input from jsing
* Add regress coverage for CBB_add_u32().jsing2018-08-161-3/+4
|
* Run the wycheproof ECDSA test vectors against libcrypto.jsing2018-08-101-7/+147
| | | | | Skip the ecdsa_webcrypto_test.json vectors for the time being, as these likely need some extra glue.
* Run the X25519 wycheproof test vectors against libcrypto.jsing2018-08-101-13/+82
|
* Rework regress so that it is easier to add additional test types.jsing2018-08-101-35/+59
|
* Use a table rather than a switch when converting strings to NIDs.jsing2018-08-101-14/+13
| | | | This will make it easier to extend.
* Provide a harness that runs test vectors from Project Wycheproof againstjsing2018-07-253-1/+253
| | | | | | | | | | libcrypto. Initially this just covers RSA signatures, but can be extended to cover other cryptographic algorithms. This regress requires the go and wycheproof-testvector packages to be installed, with the regress being skipped otherwise. Discussed with beck@ and tb@
* avoid using argv[0] for printing to stderrtb2018-07-231-2/+2
|
* Bob's license was missing, add it.tb2018-07-181-1/+16
| | | | ok beck
* some more style fixestb2018-07-171-19/+19
|
* Add missing $OpenBSD$ markers.tb2018-07-1741-22/+42
|
* remove unused, empty filetb2018-07-171-0/+0
|
* Replace getprogname() to argv[0] in bnaddsubinoguchi2018-07-171-3/+2
| | | | ok tb@