Hi , Your program results are what I would expect from CBC\CTS mode using the StreamTransformationFilter. Though I don't have any test vectors handy to really scrutinize Crypto++ in AES\CBC-CTS, I don't expect a problem.
This leaves the code where blocking and stealing of the last two cipher text blocks is manually fed ito the encryptor. Can you post your code? Jeff On 8/8/08, Yongce <[EMAIL PROTECTED]> wrote: > > Hi Jeff, > > Here is a sample program. > > [SNIP] > > result (VC9 + Crypto++5.5.1): > ----------------------------------------------------------------------------------------- > Plaintext (29 bytes): > this is a message for testing > Assertion failed: length % s == 0, file .\modes.cpp, line 101 > ----------------------------------------------------------------------------------------- > > Yongce > > On 8月8日, 上午5时55分, "Jeffrey Walton" <[EMAIL PROTECTED]> wrote: > > Hi Yongce, > > > > I have not encountered the issue. Can you send me a sample which > > demonstrates the issue. I'll see if anything jumps out at me. > > > > Jeff > > > > > On 8/6/08, Yongce <[EMAIL PROTECTED]> wrote: > > > > > > Hi All, > > > > > > I found that using CBC_CTS_Mode directly can only process > > > > data with length of multiple block size. > > > > And result of using CBC_CTS_Mode directly was different from that of > > > > using > > > > StreamTransformationFilter wapping CBC_CTS_Mode. > > > > > > I thought that CBC_CTS_Mode could process data with arbitrary length > > > > and result of the two using of CBC_CTS_Mode should be the same. > > > > What's wrong? > > > > > > Regards, > > > > Yongce > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the "Crypto++ Users" Google Group. To unsubscribe, send an email to [EMAIL PROTECTED] More information about Crypto++ and this group is available at http://www.cryptopp.com. -~----------~----~----~----~------~----~------~--~---
