Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Add CBC-MAC(AES) tests that use longer inputs | lloyd | 2007-09-17 | 1 | -1/+85 |
| | |||||
* | Check in an initial implementation of CBC-MAC. | lloyd | 2007-09-16 | 1 | -136/+136 |
| | | | | | | | The test vectors were generated by Crypto++ 5.5 on a Linux/x86-64 machine. Test vectors for CBC-MAC(DES) all pass, for inputs up to 63 bytes. For CBC-MAC(AES-128), all test vectors with inputs over 10 bytes fail to verify against what Crypto++ produces. Unknown at this time where the bug lies. | ||||
* | Comment out the CBC-MAC test vectors for now since they cause warnings | lloyd | 2007-09-13 | 1 | -136/+136 |
| | | | | about unknown algorithm names. | ||||
* | Check in some test vectors for plain FIPS 113 CBC-MAC using DES and AES-128 | lloyd | 2007-08-03 | 1 | -0/+137 |
| | |||||
* | Update reference for the SEED test vectors | lloyd | 2006-09-14 | 1 | -2/+2 |
| | |||||
* | Add checks for MD4, MD5, and SHA-1 for zero-length inputs | lloyd | 2006-08-13 | 1 | -0/+3 |
| | |||||
* | Remove the public domain notices from the self-test/benchmark code, | lloyd | 2006-08-09 | 1 | -2/+0 |
| | | | | because it turns out to be something of a legal minefield. | ||||
* | Initial checkin1.5.6 | lloyd | 2006-05-18 | 1 | -0/+32302 |