Releases: usnistgov/ACVP-Server
Releases · usnistgov/ACVP-Server
v1.1.0.12
Web API:
- Correction to public API implementation around vendor phone numbers.
- Additional information included in
/validations/{id}endpoint - More strict validation of casing, especially around "algo/mode/revision" for test session registrations
Algorithms:
- RSA-SP property name correction
- RSA-SP Adds
PandQto CRT prompt file projection - Several RSA modes renamed to better align with the standards document names
| Old Identifier | New Identifier |
|---|---|
| RSA / keyGen / 1.0 | RSA / keyGen / FIPS186-4 |
| RSA / sigGen / 1.0 | RSA / sigGen / FIPS186-4 |
| RSA / sigVer / 1.0 | RSA / sigVer / FIPS186-4 |
| RSA / legacySigVer / 1.0 | RSA / sigVer / FIPS186-2 |
- DRBG output bit length no longer required to be a mod of the output length of the underlying cipher
- minimum output length is now the output length of the underlying cipher
- usnistgov/ACVP#808
- KeyWrap only include
testPassedproperty in the expected answers sample projection when the case is a failing test - various TDES modes now validate the
ivincluded within theresultsArrayfor MCT tests - KMAC ACVP server was creating a customization string for use in IUT testing, but not using it for its own crypto invoke
- ParallelHash - Correction to right_encode / left_encode functions, now properly encodes "0"
- KAS SP800-56Ar3 fixes NRE when
macMethodsnot provided within akeyConfirmationregistration property. - KAS KDFs parameter validation NRE fix
- KAS-SSC-IFC adds
hashFunctionZproperty to group level when hash is not "none" - AES-XPN - corrects IV/Salt generation
- AES/TDES MCT sample results files no longer include the
"pt": ""or"ct": ""at the root of the test case - New algorithms
- ConditioningComponent / AES-CBC-MAC / SP800-90B
- ConditioningComponent / BlockCipher_DF / SP800-90B
- ConditioningComponent / Hash_DF / SP800-90B
- KAS-IFC / null / Sp800-56Br2
- KTS-IFC / null / Sp800-56Br2
- KAS-IFC-SSC / null / Sp800-56Br2
- KAS-ECC / null / Sp800-56Ar3
- KAS-ECC / null / Sp800-56Ar3
Misc:
- C-based SHA implementations added and used as all hash + hmac functions
- Internal modeling changes to metadata
- should not have impact to users, though help with testing is always welcome
v1.1.0.11
- New algorithm "TLS-v1.3 / KDF / RFC4886"
- DEMO
- New algorithm - "KAS-KDF / HKDF / Sp800-56Cr1"
- New algorithm - "KAS-IFC-SSC / null / Sp800-56Br2"
- KAS-ECC Update ephemeral nonce to always be at the byte boundary
- KAS-IFC
- Removes VAL type tests for KTS
- Updates projections to include additional information
- Restructures registration for KAS/KTS-IFC
- usnistgov/ACVP#945
- usnistgov/ACVP#942
- Only client cert auth is required for "Algorithms" endpoint, previously required JWT
- Updates CTR modes (AES and TDES) with a new boolean property performCounterTests
- ANSI 9.63 - fixes padding on
zin certain situations - AES-CCM changes tagLen from
MathDomain->int[]to match specification