Releases: usnistgov/ACVP-Server
Releases · usnistgov/ACVP-Server
v1.1.0.20
Demo: 2021-07-28
Prod: 2021-08-19
Public Web:
- Update
PUT
operation on/testSessions/{tsId}/vectorSets/{vsId}/results
endpoint to allow forPUT
when vs in error state.
Algorithms:
- SP800-56C Correct 56C L lower bounds to 112 as minimum
- KBKDF validator to check for the absence of a fixedDataOrder value of "none" when a counterLength of "0" is present.
- New algorithm
"KAS-KC" / null / "Sp800-56"
- New algorithm
"KAS-KDF" / "OneStepNoCounter" / "Sp800-56Cr2"
- New KDF type for SP800-56Ar3 (ECC and FFC) and SP800-56Br2 (IFC)
- Conditioning Component BlockCipher - updates returned bits to be the length of the key size used, rather than the static 128 bit block size.
v1.1.0.19
Demo: 2021-06-23
Prod: 2021-07-07
Algorithms:
- KAS - enables SHA-1 for KAS registrations (includes full kas and kas kdf testing)
Web.Public:
- Updates capability registrations received at the
/testSessions
POST endpoint to be case sensitive going forward. This is a potentially client breaking change, depending on whether or not the client was using properties whose casings matched the protocol/specification.
v1.1.0.18
Demo: 2021-05-26
Prod: 2021-06-09
Algorithms:
- HMAC
- KAS KDFs max
z
len correction65336
->65536
- asni x9.42
- updates parameter validation to ensure at least one valid type included
- update properties to be on the byte boundary
- KAS 1.0
- KdfNoKc update label in expected/actual from "tag" -> "hashZ"
- ensure that key confirmation object is provided for key confirmation option
- Adds 104 bits as valid nonce length for AES-CCM
- KAS IFC corrects issue where failing test not introduced for val test group
- Disables modulo 1024 for RSA KeyGen 1.0
- RSA KeyGen correction to validator when RSA key aux values don't meet appropriate lower bounds
- DRBG update max testable bitlength from 1024 -> 65536
- CMAC removes keylen projection from prompt file for TDES vectors
- KDF Update keyIn length to be equal to the output of the aux function
- usnistgov/ACVP#1013
- Additionally adds an optional parameter
customKeyInLength
to allow for the customization of the key in length.
- GCM write out IV in prompt file only when "external" for encrypt operations, or always for decrypt
- Updates IsSample for CTR modes so that the size of the messages is the same on every environment
- KTS for
ktsMethod
validate that if!supportsNullAssociatedData
, that a validassociatedDataPattern
is present. - SHAKE parameter validation update to check for
outputLen
property
Public Web:
- Previously, would return "retry" objects indefinitely if attempting to pull vector set json that had already been archived through archival process (expiration or certification). Now returning an "archived" object rather than retry object for this scenario.
- HealthCheck endpoint
- Version endpoint
v1.1.0.17 Hotfix2
-
Updates to crypto caching system to correct improperly generated RSA keys
v1.1.0.17 Hotfix1
Demo: 2021-05-06
Prod: 2021-05-06
- Fixed public exponent pool correction
- Update RSA validation routine to no longer attempt validate aux values for B.3.6 when
InfoGeneratedByServer
- Update to B.3.6 aux value generation
v1.1.0.17
Demo: 2021-04-16
Prod: 2021-04-28
- Web-Public fixes "failed" test session disposition when a
GET
is issue on a test session that has already been published (or is in the process of a certify being approved) - New algorithm
KAS-ECC
/CDH-Component
/Sp800-56Cr3
- Speed improvements for algorithms that utilize SHA as a primitive.
- ANSIx9.42 OID updates
- RSA Probable primes with auxiliary probable primes generated updated to ensure the most significant bit is always "1"
- RSA Probable primes correction for 6144 modulo using the incorrect lower bound
v1.1.0.16 Hotfix 1
Demo: 2021-03-16
Prod: 2021-03-17
- Corrects SHA2 parameter validator to check for 3x the digest size rather than the digest size as a value within the message lengths domain
- Wasn't fully rejecting SHA1 from KAS registration
- Determine "features" of KAS-IFC scheme group generation based on scheme metadata, rather than the "not null" presence of the array that describes that scheme feature.
- Updates
/testSessions/ GET
endpoint to enable pagination- Should be related to #89, but can't completely verify until the fix is out there.
- The execution time against the endpoint is vastly improved.
v1.1.0.16
Demo: 2021-02-26
Prod: 2021-03-08
- Removes SHA1 as valid MAC algorithm for full KAS testing
- KAS-IFC SSC corrects "failure for changed z" test case generation to properly mangle the value for the KAS2 scheme.
- KeyWrapping corrects property label within parameter validation from
ptLen
->payloadLen
- Correction to KAS IFC flavors to successfully generate vectors for the higher modulo
v1.1.0.15
Demo 2021-01-14
Prod 2021-02-12
- New Algorithms (Demo only)
- KAS-KDF / OneStep / Sp800-56Cr2
- KAS-KDF / TwoStep / Sp800-56Cr2
- KAS-KDF / HKDF / Sp800-56Cr2
- ACVP-AES-XTS / null / 2.0 (Demo only)
- New revision of XTS testing that allows for the separation of data unit length and payload length
- usnistgov/ACVP#1102
- TLSv1.2 / KDF / RFC7626
- new TLS v1.2 testing using the extended master secret extension
- #41
- X9.42 correction for DER encoding
- Added conformance "RFC3686" to AES-CTR testing (Demo only)
- KAS SP800-56Ar3, SP800-56Br2 update prompt file to include
kdfMode
for TwoStep KDFs - MathDomain
- correction to edge case where a "range" math domain supports a small number of values.
- cSHAKE and derivatives, updates test case generation to fix situations where certain
MathDomain
interactions would fail to generate vectors
- AES-CCM - correct "expected results" json file to no longer include
pt
property in failure verification test cases - KTS correction to maximum L calculation within OAEP
- AES-FF1 fixes issue with larger message lengths
- KAS group generation updates
v1.1.0.14 Hotfix 3
- TLSv1.3 release to prod environment
- SHA-1 is no longer an option for any SigGen algorithm
- We introduced a temporary fix for the TOTP errors and are looking into the issue long-term. Please report feedback to us on TOTP if you encounter any issues.
- Additional compute resources were added to Demo to help reduce the frequency of longer delays and provide added redundancy