i have found that using hmac-sha1 with a key larger than 64 bytes
causes the encryption to return an incorrect digest.

did anyone know about this and is there a work around?

as i understand it, this would mean crypto++ fails tests 6 and 7 from
this document? http://tools.ietf.org/html/rfc4231#section-4.8

i have yet to try the tests myelf as i am having trouble getting a
matching output on the other tests (out of lack of experience with the
lib and crypto in genereal :/ ).

r.d.

-- 
You received this message because you are subscribed to the "Crypto++ Users" 
Google Group.
To unsubscribe, send an email to [email protected].
More information about Crypto++ and this group is available at 
http://www.cryptopp.com.

Reply via email to