aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorThai Duong <thaidn@google.com>2016-12-04 19:23:25 -0800
committerThai Duong <thaidn@google.com>2016-12-04 19:23:25 -0800
commitb1b22bc6c0cc99aab75f55372e070bac3d40082d (patch)
tree18ad084e0075ba14c670d5b4b53dada829744372
parent0a3269d0f938a01232628bbbdd4ec5593abcefde (diff)
downloadwycheproof-b1b22bc6c0cc99aab75f55372e070bac3d40082d.tar.gz
Fix more typos in README.md and rename CONTRIBUTING to CONTRIBUTING.md so that it is rendered correctly.
-rw-r--r--CONTRIBUTING.md (renamed from CONTRIBUTING)0
-rw-r--r--README.md11
2 files changed, 5 insertions, 6 deletions
diff --git a/CONTRIBUTING b/CONTRIBUTING.md
index fa97ad3..fa97ad3 100644
--- a/CONTRIBUTING
+++ b/CONTRIBUTING.md
diff --git a/README.md b/README.md
index 1f92960..d8da6f0 100644
--- a/README.md
+++ b/README.md
@@ -64,8 +64,6 @@ The tests detect whether a library is vulnerable to many attacks, including
- Of course, all Bleichenbacher’s attacks
- And many more -- we have over 80 test cases
-### Usage
-
Our first set of tests are written in Java, because Java has a common
cryptographic interface. This allowed us to test multiple providers with a
single test suite. While this interface is somewhat low level, and should not
@@ -78,6 +76,8 @@ Architecture providers such as [Bouncy Castle](http://bouncycastle.org),
[Conscrypt](https://conscrypt.org) and the default providers in
[OpenJDK](http://openjdk.java.net/).
+### Usage
+
Project Wycheproof uses the [Bazel](https://bazel.build/) build system, you need
to [install](https://bazel.build/versions/master/docs/install.html) Bazel to run
the tests.
@@ -121,7 +121,7 @@ Project Wycheproof:
- OpenJDK's SHA1withDSA leaks private keys > 1024 bits
- Test: testBiasSha1WithDSA in
-[DsaTest](https://github.com/google/wycheproof/blob/master/java/com/google/security/wycheproof/testcases/DsaTest.java)
+[DsaTest](https://github.com/google/wycheproof/blob/master/java/com/google/security/wycheproof/testcases/DsaTest.java).
- This bug is the same as
[CVE-2003-0971 - GnuPG generated ElGamal signatures that leaked the private key]
(https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0971).
@@ -129,11 +129,10 @@ Project Wycheproof:
- Bouncy Castle's ECDHC leaks private keys
- Test: testModifiedPublic in
[EcdhTest](https://github.com/google/wycheproof/blob/master/java/com/google/security/wycheproof/testcases/EcdhTest.java).
-
### Contact and mailing list
-If you want to contribute, please read [CONTRIBUTING](CONTRIBUTING) and send us
-pull requests. You can also report bugs or request new tests.
+If you want to contribute, please read [CONTRIBUTING](CONTRIBUTING.md) and send
+us pull requests. You can also report bugs or request new tests.
If you'd like to talk to our developers or get notified about major new
tests, you may want to subscribe to our