Hi All,

In London, we asked if people could validate the examples in the specs.  Edmund 
Jay reproduced the encrypted JWK example in 
http://tools.ietf.org/html/draft-ietf-jose-json-web-key-23#appendix-C and in 
the process, identified a correction that I wanted to make you aware of, which 
will need to be applied to the specs.  Quoting from Edmund's note to me:

I was able to decrypt the example but the authentication tag value is different:

The tag in the JWE is [125, 249, 143, 191, 240, 4, 204, 132, 62, 241, 113, 178, 
91, 88, 254, 19]

My code is expecting [208, 113, 102, 132, 236, 236, 67, 223, 39, 53, 98, 99, 
32, 121, 17, 236].

So that means the PBES2-HS256+A128KW key wrap and A128CBC content encryption is 
fine and only the HS256 part is wrong.
Using your JSON string values as input to manually craft the JWE also results 
in the same discrepancy with the authentication tag.

My code also independently produced the same authentication tag value as 
Edmunds, so I wanted to make those of you who might also be trying to verify 
this value aware of the discrepancy.  The corrected base64url encoded 
authentication tag value will therefore be 0HFmhOzsQ98nNWJjIHkR7A.

Thanks, Edmund!

                                                            -- Mike

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to