never mind, turns out i was not counting the size of my key properly
and this caused issues only when the key length was larger than 64
bytes, so i never noticed it before.

r.d.

On Aug 21, 9:23 pm, ramy <[email protected]> wrote:
> i have found that using hmac-sha1 with a key larger than 64 bytes
> causes the encryption to return an incorrect digest.
>
> did anyone know about this and is there a work around?
>
> as i understand it, this would mean crypto++ fails tests 6 and 7 from
> this document?http://tools.ietf.org/html/rfc4231#section-4.8
>
> i have yet to try the tests myelf as i am having trouble getting a
> matching output on the other tests (out of lack of experience with the
> lib and crypto in genereal :/ ).
>
> r.d.

-- 
You received this message because you are subscribed to the "Crypto++ Users" 
Google Group.
To unsubscribe, send an email to [email protected].
More information about Crypto++ and this group is available at 
http://www.cryptopp.com.

Reply via email to