aboutsummaryrefslogtreecommitdiffstats
path: root/checks
Commit message (Expand)AuthorAgeFilesLines
* Tick version numbers to 1.10.0lloyd2011-04-141-0/+14
* Make the alg_id param for passhash9 optional. Update callers.lloyd2011-04-111-1/+1
* ECC private keys had two different constructors, one taking a grouplloyd2011-04-087-38/+39
* PR 145 was based around an easy misunderstanding of the CTR code.lloyd2011-04-051-0/+515
* Add support for bcrypt, the Blowfish-based password hashing schemelloyd2011-02-161-0/+52
* Add some more ECDSA tests (generated using Crypto++ 5.6)lloyd2011-02-161-0/+55
* Add the NIST AES key wrap algorithm, as specified in RFC 3394 andlloyd2011-02-151-0/+86
* Remove dead codelloyd2011-02-142-127/+0
* Make this test easier to understandlloyd2011-02-141-46/+25
* Add a set of ECDSA tests using the Brainpool curves. Test caseslloyd2011-02-141-0/+65
* Remove inclusions of unused headers.lloyd2011-02-103-10/+12
* Add a new configure.py option --distribution-info which sets a macrolloyd2011-02-071-2/+1
* Fix the ordering of the GOST 34.10 signature values. Add a testlloyd2011-02-072-16/+17
* Update Keccak to the round 3 variant announced 2011-01-17lloyd2011-01-201-1608/+1608
* Allow benchmark buffers up to 64 MiBlloyd2010-12-221-1/+1
* More VC warning fixeslloyd2010-12-133-16/+16
* Avoid more VC warningslloyd2010-12-131-2/+2
* Add a simple but functioning implementation of Keccak. Only thelloyd2010-12-102-6/+9562
* Thomas Keller reports that Mac OS X 10.5 still uses gcc 4.0.1 and it haslloyd2010-11-121-0/+12
* Update Skein-512 for the new 1.3 specification, just changes the keylloyd2010-11-031-3452/+1560
* Longer CTR testlloyd2010-10-291-0/+50
* Compile fixlloyd2010-10-291-1/+1
* Simple standalone base64 encoderlloyd2010-10-281-0/+4
* In all cases where the block size of the cipher is fixed, the keylloyd2010-10-141-226/+68
* s/BLOCK_SIZE/block_size()/lloyd2010-10-131-1/+1
* Update for RNG changeslloyd2010-10-121-4/+4
* Use size_t in filterslloyd2010-10-122-6/+6
* Fix CRL reason codes and updating of CRLs. Add tests for both cases.lloyd2010-10-073-3/+1
* Forward port CRL fixes from rev 7bb2001cd554a1acc3d345914ea710ff0e1d3a6blloyd2010-10-071-0/+16
* Add a set of tests devised by Rivest which are designed to detect alloyd2010-09-231-0/+18
* Split up src/cert/x509 into a set of modules, though mostly mutuallylloyd2010-09-171-2/+4
* Update all uses of MemoryRegion::append to use either push_back or operator+=lloyd2010-09-153-10/+10
* Remove more implicit vector to pointer conversionslloyd2010-09-141-3/+3
* Remove more uses of vector to pointer implicit conversionslloyd2010-09-135-24/+15
* Anywhere where we use MemoryRegion::begin to get access to the raw pointerlloyd2010-09-135-58/+58
* Add a basic test for cryptoboxlloyd2010-09-071-0/+46
* Call test that was defined but not usedlloyd2010-09-071-4/+5
* My version of Sun Studio has the same reverse iterator bug as GCC 3lloyd2010-09-071-1/+1
* If the numeric_limits tests fail, make the output a little less dramaticlloyd2010-09-031-4/+4
* Wrap lineslloyd2010-09-031-7/+23
* Use the standalone version of the hex decoder instead of the wrapper thatlloyd2010-09-038-122/+102
* Add 3 more tests of Tiger, test vectors via Crypto++lloyd2010-08-231-0/+20
* For passhash9, add another interface that allows the caller to specifylloyd2010-08-221-4/+9
* When creating a PBKDF2, first check if the argument name is a knownlloyd2010-08-211-0/+5
* Turns out OpenSSL's implementation of PBKDF2 allows empty passphrases,lloyd2010-08-211-0/+4
* Add a new option for benchmarking --buf-size which specifies the size oflloyd2010-07-303-9/+25
* Add new option --dyn-load to the check/selftest prog that will loadlloyd2010-07-281-1/+18
* Rename S2K to PBKDF, because that is by far the most common name - S2Klloyd2010-07-093-23/+25
* Fix ECB benchmarkinglloyd2010-06-301-1/+3
* Give all Filter objects a method for querying their namelloyd2010-06-282-2/+21