i have found that using hmac-sha1 with a key larger than 64 bytes causes the encryption to return an incorrect digest.
did anyone know about this and is there a work around? as i understand it, this would mean crypto++ fails tests 6 and 7 from this document? http://tools.ietf.org/html/rfc4231#section-4.8 i have yet to try the tests myelf as i am having trouble getting a matching output on the other tests (out of lack of experience with the lib and crypto in genereal :/ ). r.d. -- You received this message because you are subscribed to the "Crypto++ Users" Google Group. To unsubscribe, send an email to [email protected]. More information about Crypto++ and this group is available at http://www.cryptopp.com.
