W3C home > Mailing lists > Public > public-xmlsec@w3.org > August 2012

Please review: updated XML Encryption 1.1 interop test status and document

From: <Frederick.Hirsch@nokia.com>
Date: Mon, 6 Aug 2012 21:59:41 +0000
To: <public-xmlsec@w3.org>
CC: <Frederick.Hirsch@nokia.com>
Message-ID: <1CDC8BDC-1DB9-4DCC-869A-BB34E1502B9E@nokia.com>
I have updated the "XML Encryption 1.1 Interop Test Report"  [1] as follows:

(1) Added text to the introduction explaining that test results per company are either 'Y' for completed, or 'U' for un-tested, and that 'U' should not be taken to imply anything regarding the implementation.
Changed 'N' items to 'U' in the document. The exact wording in the introduction is:

"Tests that are marked 'Y' are completed, 'U' means 'untested' and should not be taken to make a statement about the implementation (as testing may simply not have been performed for interop due to timing or other reasons)."

I also added this text to the introduction of the "XML Signature 1.1 Interop Test Report".

(2) Marked the SHA-384 test as completed, as it was done as part of XML Signature 1.1 interop. Added a reference to XML Signature 1.1 interop test report. 

(3) Marked AES-128-GCM as done, thus marking all of AES-GCM as done. If there is no objection to this we can put the interop test vector into CVS and link to it from the test cases document.
Added column for Microsoft with Y for AE-128-GCM and U for the others (Oracle also completed AES-128-GCM)

(4) Marked  RSA-OAEP Key Transport section as done, though only SHA-1 MGF function explicitly tested, as this tests general mechanism which supports pluggable algorithms, so should be enough.

Please indicate support for these changes and test conclusions, or concern if any at this time. Silence will mean you agree to both the noted interop tests as being completed, as well as the document text.
A +1 is enough to indicate support.

The remaining items of concern for XML Encryption 1.1 interop are:

(a) Key Agreement for which only interop testing from Oracle is recorded:

Elliptic Curve Diffie-Hellman (Ephemeral-Static mode)	
Diffie-Hellman Key Agreement (Ephemeral-Static mode)

(b) Symmetric Key Wrap

 AES-128-pad, AES-192-pad , AES-256-pad Symmetric Key Wrap algorithms - optional.

Please indicate on the list if you are able to interop test any of these.

Thanks

regards, Frederick

Frederick Hirsch, Nokia
Chair XML Security WG

[1]  http://www.w3.org/2008/xmlsec/Drafts/xmlenc-core1-interop/Overview.src.html
Received on Monday, 6 August 2012 22:00:13 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Monday, 6 August 2012 22:00:13 GMT