-
Let us say we use P-384 for an ECDSA ecdsa-rdfc-2019. The specification clearly says that SHA-384 must be used to hash the transformed document in the (1) and (2) bullet points of [§ 3.2.4 Hashing](ht…
-
Currently, the IETF defines “id-MLDSA87-ECDSA-P384-SHA512,” which restricts the input message to SHA-512 for the hybrid signature of MLDSA and NISTP384. However, including the SHA-384 option would red…
-
The DRBG used within Caliptra needs to be changed from SHA-2-384 to SHA-2-512. Tests must be updated to meet the new requirements.
-
Dear @kmille,
There is an historical missing security password.
Can you add supports of :
- SCRAM-SHA-1
- SCRAM-SHA-1-PLUS
- SCRAM-SHA-256
- SCRAM-SHA-256-PLUS
- SCRAM-SHA-512
- SCRAM-SHA-…
-
Can you add supports of :
- SCRAM-SHA-1
- SCRAM-SHA-1-PLUS
- SCRAM-SHA-224
- SCRAM-SHA-224-PLUS
- SCRAM-SHA-256
- SCRAM-SHA-256-PLUS
- SCRAM-SHA-384
- SCRAM-SHA-384-PLUS
- SCRAM-SHA-512
- SC…
-
Both CP 1.3 and CP 1.4 allow for this value in the field. Could you expand the code to check for this value as well?
-
Hi,
While looking into wocky I noticed the following lines:
https://github.com/TelepathyIM/wocky/blob/master/wocky/wocky-auth-registry.c#L279-L283
The `SCRAM-SHA1` and `SCRAM-SHA-256` SASL me…
-
Hiya, the following tests are failing for `P-384` with our implementation:
- `ecdsa-rdfc-2019 (issuers) VC 1.1` `The "proof" MUST verify with a conformant verifier.`
- `ecdsa-rdfc-2019 (issuers) VC …
-
Work plan:
- [ ] Add benchmarks analogous to bench/x25519.rs for P-256 and P-384 ECDH `compute_public_key` (covers base point multiplication), ECDH `agree_ephemeral`, (covers variable point multiplic…
-
### Description
Several outstanding test failures exist for RSA and ECDSA in the cryptotest framework.
RSA:
- [ ] `wycheproof RSA-2048 pss verify sha-384 #64`
- [ ] `wycheproof RSA-3072 pss ve…