v1.1.0.12
Web API:
- Correction to public API implementation around vendor phone numbers.
- Additional information included in
/validations/{id}
endpoint - More strict validation of casing, especially around "algo/mode/revision" for test session registrations
Algorithms:
- RSA-SP property name correction
- RSA-SP Adds
P
andQ
to CRT prompt file projection - Several RSA modes renamed to better align with the standards document names
Old Identifier | New Identifier |
---|---|
RSA / keyGen / 1.0 | RSA / keyGen / FIPS186-4 |
RSA / sigGen / 1.0 | RSA / sigGen / FIPS186-4 |
RSA / sigVer / 1.0 | RSA / sigVer / FIPS186-4 |
RSA / legacySigVer / 1.0 | RSA / sigVer / FIPS186-2 |
- DRBG output bit length no longer required to be a mod of the output length of the underlying cipher
- minimum output length is now the output length of the underlying cipher
- usnistgov/ACVP#808
- KeyWrap only include
testPassed
property in the expected answers sample projection when the case is a failing test - various TDES modes now validate the
iv
included within theresultsArray
for MCT tests - KMAC ACVP server was creating a customization string for use in IUT testing, but not using it for its own crypto invoke
- ParallelHash - Correction to right_encode / left_encode functions, now properly encodes "0"
- KAS SP800-56Ar3 fixes NRE when
macMethods
not provided within akeyConfirmation
registration property. - KAS KDFs parameter validation NRE fix
- KAS-SSC-IFC adds
hashFunctionZ
property to group level when hash is not "none" - AES-XPN - corrects IV/Salt generation
- AES/TDES MCT sample results files no longer include the
"pt": ""
or"ct": ""
at the root of the test case - New algorithms
- ConditioningComponent / AES-CBC-MAC / SP800-90B
- ConditioningComponent / BlockCipher_DF / SP800-90B
- ConditioningComponent / Hash_DF / SP800-90B
- KAS-IFC / null / Sp800-56Br2
- KTS-IFC / null / Sp800-56Br2
- KAS-IFC-SSC / null / Sp800-56Br2
- KAS-ECC / null / Sp800-56Ar3
- KAS-ECC / null / Sp800-56Ar3
Misc:
- C-based SHA implementations added and used as all hash + hmac functions
- Internal modeling changes to metadata
- should not have impact to users, though help with testing is always welcome