aboutsummaryrefslogtreecommitdiffstats
path: root/checks
Commit message (Expand)AuthorAgeFilesLines
* If the numeric_limits tests fail, make the output a little less dramaticlloyd2010-09-031-4/+4
* Wrap lineslloyd2010-09-031-7/+23
* Use the standalone version of the hex decoder instead of the wrapper thatlloyd2010-09-038-122/+102
* Add 3 more tests of Tiger, test vectors via Crypto++lloyd2010-08-231-0/+20
* For passhash9, add another interface that allows the caller to specifylloyd2010-08-221-4/+9
* When creating a PBKDF2, first check if the argument name is a knownlloyd2010-08-211-0/+5
* Turns out OpenSSL's implementation of PBKDF2 allows empty passphrases,lloyd2010-08-211-0/+4
* Add a new option for benchmarking --buf-size which specifies the size oflloyd2010-07-303-9/+25
* Add new option --dyn-load to the check/selftest prog that will loadlloyd2010-07-281-1/+18
* Rename S2K to PBKDF, because that is by far the most common name - S2Klloyd2010-07-093-23/+25
* Fix ECB benchmarkinglloyd2010-06-301-1/+3
* Give all Filter objects a method for querying their namelloyd2010-06-282-2/+21
* Expose a datestamp in build.h, provide function in version.h forlloyd2010-06-141-1/+2
* Work around GCC 3.x bug with reverse iteratorslloyd2010-06-111-2/+6
* Remove FORK-256; it's obscure and has been definitively broken.lloyd2010-05-252-936/+0
* Another XTEA vectorlloyd2010-05-101-0/+1
* Prevent crash if asked to benchmark unknown block cipher with a modelloyd2010-05-051-4/+11
* Modify the implementation of multiplication mod 65537 used in IDEA tolloyd2010-04-301-0/+520
* Add a couple of Comb4P tests, generated by the python implementationlloyd2010-04-231-0/+9
* Add a test for RSA verification with raw padding and an unusual keylloyd2010-04-211-0/+33
* Don't bother benchmarking 512 or 768 bit keys; considering an RSAlloyd2010-03-211-7/+4
* Replace PointGFp::check_invaraints, which would either return silentlylloyd2010-03-192-16/+20
* If check against copy fails, print algo namelloyd2010-03-191-1/+1
* There are some nasty API problems that are caused by having to pass alloyd2010-03-191-2/+2
* Add a couple of verification tests for GOST 34.10lloyd2010-03-162-0/+49
* Fix GOST 34.10 benchmarklloyd2010-03-161-1/+1
* Disable fault protection for DSA, NR, and GOST 34.10 benchmarkslloyd2010-03-151-2/+2
* Centralize which ECC domains are used for benchmarkinglloyd2010-03-131-34/+17
* Skip bench on very small ECC groups; 112 == DESlloyd2010-03-131-3/+1
* Add 192 and 256 bit groups to the ECDSA benchmark lineuplloyd2010-03-131-1/+3
* Disable fault protection for ECDSA benchmark, easier profilinglloyd2010-03-131-1/+1
* Simple cleanupslloyd2010-03-131-6/+13
* Remove access to the Jacobian coordinate getters get_{x,y,z}, as welllloyd2010-03-131-136/+59
* Remove call to disable key testing, now a per-build optionlloyd2010-03-101-4/+2
* Deconstify PK_Ops. It's quite reasonable that some op will want tolloyd2010-03-092-27/+34
* Dont need RNG in this testlloyd2010-03-091-3/+2
* Rename PK_Encryptor_MR_with_EME and PK_Decryptor_MR_with_EME tolloyd2010-03-082-10/+10
* Modify pubkey classes to take names instead of object pointers.lloyd2010-03-085-139/+139
* Remove the sign() operation from the public key objects, totally replacedlloyd2010-03-054-203/+113
* This checkin represents a pretty major change in how PK operations arelloyd2010-03-042-138/+43
* Use KDF2/PK_Key_Agreement in DH benchmarklloyd2010-03-041-5/+5
* More keygen testslloyd2010-03-041-0/+8
* Test GOST with 521-bit prime field (was setting off bug before)lloyd2010-03-041-1/+1
* Split up load/store tests public vs privatelloyd2010-03-041-11/+29
* For each keygen tests, save the file as pem then reload it.lloyd2010-03-041-27/+80
* Add similar decoding constructors to the private keyslloyd2010-03-042-3/+3
* Add a new constructor to each public key algorithm (only the publiclloyd2010-03-042-97/+2
* Remove odd DH use in ECDH testlloyd2010-03-041-4/+0
* Some botan exception throws are plain STL exceptionslloyd2010-03-041-7/+1
* Add a new function to public key x509_subject_public_key which returnslloyd2010-03-041-6/+2