Ecosyste.ms: Timeline

Browse the timeline of events for every public repo on GitHub. Data updated hourly from GH Archive.

usnistgov/ACVP

jbrock24 created a comment on an issue on usnistgov/ACVP
Hi @null0link, we appreciate you reaching out to us with this. It's great to hear ways that we can improve our testing. We do our best to write good tests by understanding the RFCs and specificatio...

View on GitHub

jbrock24 closed an issue on usnistgov/ACVP
kdf-components: IKEv2 KDF - missing SA full-rekeying testing
Currently IKEv2 KDF is tested by the following test cases: ``` "tests": [ { "tcId": 1, "gir": "DEBB121F462376CB9...", "girNew": "84C351B81361A5...", "nInit": "C1728473C73...
celic added rossnist to usnistgov/ACVP
livebe01 created a comment on an issue on usnistgov/ACVP
@chih-kao I'll move this ticket to the repository that tracks issues with our ACVTS environments. This repository is more focused on issues with the algorithm specifications.

View on GitHub

livebe01 created a comment on an issue on usnistgov/ACVP
@chih-kao can you provide additional information, such as which vector set and test session ids have taken up to 10 hours to generate?

View on GitHub

chih-kao opened an issue on usnistgov/ACVP
Is the DEMO server running?
The time to generate test vectors with the same registration file vary from 10 minutes to 10 hours. Today 1/27/2025 is the worst, I have tried a few (5 - 10) times and cannot get back any vectors. ...
jarnold01 edited a wiki page on usnistgov/ACVP
celic created a comment on an issue on usnistgov/ACVP
We do not create a separate group per hash function. They are shuffled within the test cases in a group so that every hash appears at least once. On Fri, Jan 24, 2025, 2:29 PM smuellerDD **...

View on GitHub

smuellerDD created a comment on an issue on usnistgov/ACVP
And the server does not reject it? For me, it did.Von meinem iPad gesendetAm 24.01.2025 um 19:26 schrieb Joachim Vandersmissen ***@***.***>: Obviously, this becomes very interesting if the hash a...

View on GitHub

jvdsn created a comment on an issue on usnistgov/ACVP
Obviously, this becomes very interesting if the hash algorithms contains all 12 algorithms supported by the server. 12 x 12 (external) + 12 (internal) = 156 test groups!?

View on GitHub

jvdsn created a comment on an issue on usnistgov/ACVP
@smuellerDD just to clarify, mixing and matching preHash and pure requests does work, but it seems like the server doesn't like it if you provide multiple capabilities. So what you'd do is somethi...

View on GitHub

livebe01 created a branch on usnistgov/ACVP

livebe01-patch-1-1 - Industry Working Group on Automated Cryptographic Algorithm Validation

jbrock24 created a comment on an issue on usnistgov/ACVP
Hi @almau, we don't have any plans on adding support for 6144 or 8192 modulo sizes to RSA SigGen or SigVer. As far as we are concerned, if you test and pass the _testable_ RSA sizes, we trust that ...

View on GitHub

jbrock24 closed an issue on usnistgov/ACVP
RSA: updating the supported RSA modulo sizes in sigGen and sigVer modes.
**Protocol Section** https://pages.nist.gov/ACVP/draft-celi-acvp-rsa.html#name-keygen-registration-table-2 https://pages.nist.gov/ACVP/draft-celi-acvp-rsa.html#name-rsa-siggen-fips186-5-capabi h...
jbrock24 closed an issue on usnistgov/ACVP
KAS-ECC Revision Sp800-56Ar3 fixedInfoPartyU and fixedInfoPartyV are missing?
KAS-ECC Revision Sp800-56Ar3 fixedInfoPartyU and fixedInfoPartyV are missing? In ACVP KDA TwoStep KDA uPartyInfo and vPartyInfo are clearly included. So iut knows how to construct the fixedInfo....
jbrock24 closed an issue on usnistgov/ACVP
Errors in sample registration documentation for various Algorithms
I ran the examples from https://pages.nist.gov/ACVP/draft-fussell-acvp-ecdsa.html#name-ecdsa-algorithm-registratio and getting the following messages: ECDSA-sigGen-1.0: Invalid Curves supplied: ...
smuellerDD closed an issue on usnistgov/ACVP
ML-DSA observations: pre-hash vs pure
I am not sure the following is considered a bug or a feature, so I am just reporting it: request: ``` "capabilities":[ { "parameterSets":[ "ML-DS...
smuellerDD closed an issue on usnistgov/ACVP
ML-DSA observation: context payload
The context payload is seemingly always required, even though the context is optional. Even the following does not work: ``` "contextLength":[ { "...
smuellerDD created a comment on an issue on usnistgov/ACVP
Am Mittwoch, 15. Januar 2025, 22:02:50 CET schrieb Chris Celi: Hi Chris, > We want to include a preHash property so that it appears on the algorithm > certificate. This could be done in a number ...

View on GitHub

smuellerDD created a comment on an issue on usnistgov/ACVP
Am Mittwoch, 15. Januar 2025, 22:05:50 CET schrieb Chris Celi: Hi Chris, > The `contextLength` should not need to be included if the > `signatureInterfaces` property does not include `external`. ...

View on GitHub

smuellerDD created a comment on an issue on usnistgov/ACVP
Am Mittwoch, 15. Januar 2025, 22:23:42 CET schrieb Chris Celi: Hi Chris, > The test harness should never be performing cryptographic operations, your > assumption is right. > > If you're testing...

View on GitHub

celic created a comment on an issue on usnistgov/ACVP
The test harness should never be performing cryptographic operations, your assumption is right. If you're testing an implementation where the preHash is performed separately, you would only have...

View on GitHub

celic created a comment on an issue on usnistgov/ACVP
The `contextLength` should not need to be included if the `signatureInterfaces` property does not include `external`. Is this the behavior you are experiencing? As a general property for `Domain...

View on GitHub

celic created a comment on an issue on usnistgov/ACVP
We want to include a preHash property so that it appears on the algorithm certificate. This could be done in a number of ways though not necessarily through the registration properties directly. We...

View on GitHub

smuellerDD created a comment on an issue on usnistgov/ACVP
Thank you, for the hint. It naturally works this way too. To the ACVP Server maintainers: is this the approach to take?

View on GitHub

smuellerDD created a comment on an issue on usnistgov/ACVP
One followup: shouldn't the server provide the message digest instead of the message for pre-hashed DSA? Note, allegedly the test harness is not supposed to do any cryptographic operation. But here...

View on GitHub

crypto4a created a comment on an issue on usnistgov/ACVP
I've worked around this in the past by using a list with a single zero value e.g., `"contextLength" : [ 0 ]`

View on GitHub

smuellerDD created a comment on an issue on usnistgov/ACVP
It applies also to ML-DSA

View on GitHub

Load more