On Monday, July 1, 2019 at 9:58:12 PM UTC-4, Mouse wrote:
>
>
> So, no - the above change does *not* look like a bug.
>
I don't think that change is the bug, the bug is that SymmetricEncrypt (and
SymmetricDecrypt) did not also change to use MAC::DIGESTSIZE at the same
time. It continues to use MAC::DEFAULT_KEYLENGTH
Fixing that in master and it works properly with NULLHash:
diff --git a/gfpcrypt.h b/gfpcrypt.h
index 1b26a56b..f15c397e 100644
--- a/gfpcrypt.h
+++ b/gfpcrypt.h
@@ -716,7 +716,7 @@ public:
if (DHAES_MODE)
{
macKey = key;
- cipherKey = key + MAC::DEFAULT_KEYLENGTH;
+ cipherKey = key + MAC::DIGESTSIZE;
}
else
{
@@ -748,7 +748,7 @@ public:
if (DHAES_MODE)
{
macKey = key;
- cipherKey = key + MAC::DEFAULT_KEYLENGTH;
+ cipherKey = key + MAC::DIGESTSIZE;
}
else
{
--
You received this message because you are subscribed to "Crypto++ Users". More
information about Crypto++ and this group is available at
http://www.cryptopp.com and
http://groups.google.com/forum/#!forum/cryptopp-users.
---
You received this message because you are subscribed to the Google Groups
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/cryptopp-users/f9102d96-e126-44b1-b3f5-9aadb9d64016%40googlegroups.com.