-
Notifications
You must be signed in to change notification settings - Fork 3.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug report: HMAC operation produces incorrect output with hex keys with bytes >= 0x80 #437
Comments
Haven't looked into it much yet but this appears to be the same issue as other Crypto based functions have had in the past with string vs buffer input. |
imhotepisinvisible
added a commit
to imhotepisinvisible/CyberChef
that referenced
this issue
Dec 14, 2018
Add test vectors from RFC4231
I've submitted a PR that should fix the issue. Looks like it came in in PR #391 |
Thanks for the fix @imhotepisinvisible |
This was referenced Dec 13, 2020
BRAVO68WEB
pushed a commit
to BRAVO68WEB/CyberChef
that referenced
this issue
May 29, 2022
BRAVO68WEB
pushed a commit
to BRAVO68WEB/CyberChef
that referenced
this issue
May 29, 2022
BRAVO68WEB
pushed a commit
to BRAVO68WEB/CyberChef
that referenced
this issue
May 29, 2022
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Summary
The HMAC operation seems to produce incorrect output when using with hex keys with bytes >= 0x80
Example
Openssl:
CyberChef:
https://gchq.github.io/CyberChef/#recipe=HMAC(%7B'option':'Hex','string':'00000000000000000000000000000000'%7D,'SHA256')&input=dGVzdA
Output (correct):
43b0cef99265f9e34c10ea9d3501926d27b39f57c6d674561d8ba236e7a819fb
Openssl:
CyberChef:
https://gchq.github.io/CyberChef/#recipe=HMAC(%7B'option':'Hex','string':'00000000000000000000000000000080'%7D,'SHA256')&input=dGVzdA
Output (incorrect):
40793ae8db3df4bcb12aa92cd3a1ca619a55cc3070e0eb06dedb47afdd4c6e06
The text was updated successfully, but these errors were encountered: