aboutsummaryrefslogtreecommitdiffstats
path: root/checks/pk_valid.dat
Commit message (Collapse)AuthorAgeFilesLines
* Add some more ECDSA tests (generated using Crypto++ 5.6)lloyd2011-02-161-0/+55
|
* Add a set of ECDSA tests using the Brainpool curves. Test caseslloyd2011-02-141-0/+65
| | | | | | generated using Crypto++ 5.6.1. Requested in PR 141.
* Fix the ordering of the GOST 34.10 signature values. Add a testlloyd2011-02-071-4/+12
| | | | | | | | | derived from a DNSSEC RFC. Bug reported by Bert Hubert to the mailing list. According to Bert, this ordering is compatible with the version included in OpenSSL. Also, benchmark GOST 34.10 using the GOST 34.11 hash since that is always what it is used with.
* Wrap lineslloyd2010-09-031-7/+23
|
* Add a test for RSA verification with raw padding and an unusual keylloyd2010-04-211-0/+33
|
* Add a couple of verification tests for GOST 34.10lloyd2010-03-161-0/+18
| | | | | | | | | | | Generating the test vectors found yet another inane (and, of course, undocumented) behavior in the GOST implementation included in OpenSSL; it treats the hash inputs as little endian. Just out of curiousity, I checked RFC 5832, which supposedly specifies this algorithm; not a peep about endian conversions. The more I deal with standards coming out of the CryptoPro people, the less confidence I have in them.
* Deconstify PK_Ops. It's quite reasonable that some op will want tolloyd2010-03-091-20/+20
| | | | | | | | | | | | | precompute only as needed, or will want to access some other expensive resource or etc. Change how the secret for generating blinding is done in cases where a PRNG isn't available. Use the operations public op to hide the secret, for instance the seed for a DH blinding variable is 2^x mod p. Make use of being able to mutate internal structures in the RW signer, since that does have access to a PRNG, so use it to initialize the blinder on first call to sign().
* Remove the sign() operation from the public key objects, totally replacedlloyd2010-03-051-0/+18
| | | | | | by using the ops. Add real ECDSA test vectors (two found in ANSI X9.62)
* Add some test vectors for EMSA3(Raw) with RSA generated using Crypto++lloyd2008-11-301-0/+58
|
* Add verification tests for RSA/EMSA4 signatures generated by Crypto++ 5.5.2lloyd2008-11-281-0/+136
| | | | using SHA-224, SHA-256, and RIPEMD-160
* Add test vectors for RSA/EMSA2 generated by Crypto++ 5.5.2lloyd2008-11-281-0/+318
| | | | | using hashes SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, and Whirlpool.
* Add test vectors for RSA EMSA3 with RIPEMD-160 and Tiger. Generated bylloyd2008-11-281-0/+153
| | | | Crypto++ 5.5.2 on motoko (x86-64 Gentoo)
* Add a set of test vectors for RSA/EMSA3 with SHA-1, SHA-224, SHA-256,lloyd2008-11-281-0/+337
| | | | SHA-384, and SHA-512 generated using Crypto++ 5.5.2
* Initial checkin1.5.6lloyd2006-05-181-0/+3806