Closed Sai-Anudeep47 closed 1 year ago
Okay. 2/3 Issues addressed. For the last one I need to finish integration flow test. Will finish in the morning
Following are few additional observations.
fmt.Println("-------- protectedHeaderInner Value -------- ")
fmt.Println("protectedHeaderInner: ", protectedHeaderInner)
fmt.Println("protectedHeaderBytes: ", protectedHeaderBytes)
fmt.Println("protectedHeaderBytes_EncodetoString: ", hex.EncodeToString(protectedHeaderBytes))
@Sai-Anudeep47 yes you are correct
Ok. This should be now resolved.
@herrjemand The issue is still noticed with latest fix. Following is a observation upon debugging.
Upon modifying conformance code with above changes, the expected behavior is observed where AAD bytes generated by conformance owner is same as generated on client side. Even though AAD being matched, during authentication check for encrypted text, it throws afore mentioned exception, as follows
🤦 Sorry for that.
Fixed now
To simplify issue resolution process, please provide network logs, and or test voucher. aad_bytes_conformance_owner.log
What part of the spec are you testing?
What protocol are having issue with?
Issue description
In both the cases, AAD bytes are used for authentication check and following are observations w.r.t the same
[x] At https://github.com/fido-alliance/fdo-fido-conformance-server/blob/main/core/shared/signing.misc.go#L50, the context must be "Encrypt0" rather than "Encrypt" as mentioned in https://tinyurl.com/aadrfc
[x] It is observed that at https://github.com/fido-alliance/fdo-fido-conformance-server/blob/main/core/shared/enc.crypto.go#L218 protectedHeaderInner returns unwanted values similar to #27 and missing map type for "Alg"
[x] Also, it is observed, that encoded aadbytes returns invalid byte array which when compared with aad value generated on client side.