On Monday, July 1, 2019 at 9:58:12 PM UTC-4, Mouse wrote:
>
>
> So, no - the above change does *not* look like a bug.
>
 

I don't think that change is the bug, the bug is that SymmetricEncrypt (and 
SymmetricDecrypt) did not also change to use MAC::DIGESTSIZE at the same 
time. It continues to use MAC::DEFAULT_KEYLENGTH

Fixing that in master and it works properly with NULLHash:

diff --git a/gfpcrypt.h b/gfpcrypt.h
index 1b26a56b..f15c397e 100644
--- a/gfpcrypt.h
+++ b/gfpcrypt.h
@@ -716,7 +716,7 @@ public:
         if (DHAES_MODE)
         {
             macKey = key;
-            cipherKey = key + MAC::DEFAULT_KEYLENGTH;
+            cipherKey = key + MAC::DIGESTSIZE;
         }
         else
         {
@@ -748,7 +748,7 @@ public:
         if (DHAES_MODE)
         {
             macKey = key;
-            cipherKey = key + MAC::DEFAULT_KEYLENGTH;
+            cipherKey = key + MAC::DIGESTSIZE;
         }
         else
         {



-- 
You received this message because you are subscribed to "Crypto++ Users". More 
information about Crypto++ and this group is available at 
http://www.cryptopp.com and 
http://groups.google.com/forum/#!forum/cryptopp-users.
--- 
You received this message because you are subscribed to the Google Groups 
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to cryptopp-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/cryptopp-users/f9102d96-e126-44b1-b3f5-9aadb9d64016%40googlegroups.com.

Reply via email to