never mind, turns out i was not counting the size of my key properly and this caused issues only when the key length was larger than 64 bytes, so i never noticed it before.
r.d. On Aug 21, 9:23 pm, ramy <[email protected]> wrote: > i have found that using hmac-sha1 with a key larger than 64 bytes > causes the encryption to return an incorrect digest. > > did anyone know about this and is there a work around? > > as i understand it, this would mean crypto++ fails tests 6 and 7 from > this document?http://tools.ietf.org/html/rfc4231#section-4.8 > > i have yet to try the tests myelf as i am having trouble getting a > matching output on the other tests (out of lack of experience with the > lib and crypto in genereal :/ ). > > r.d. -- You received this message because you are subscribed to the "Crypto++ Users" Google Group. To unsubscribe, send an email to [email protected]. More information about Crypto++ and this group is available at http://www.cryptopp.com.
