*)&digest[0]);
On Wednesday, 2 February 2022 at 12:19:25 UTC-5 Devharsh Trivedi wrote:
> I am trying to calculate SHA256 digest for entire string vector like this:
>
> byte digest[SHA256::DIGESTSIZE];
> SHA256().CalculateDigest(digest, (const byte*)stringVector.data(),
>
I am trying to calculate SHA256 digest for entire string vector like this:
byte digest[SHA256::DIGESTSIZE];
SHA256().CalculateDigest(digest, (const byte*)stringVector.data(),
stringVector.size());
What is the correct way to calculate hash of entire vector?
--
You received this message because
I love the support and ease of use for authenticated encryption schemes in
Crypto++, any plans for NTRU?
On Friday, 24 September 2021 at 11:53:15 UTC-4 Jeffrey Walton wrote:
> Hi Everyone,
>
> Crypto++ 8.6 was released on September 24, 2021. The 8.6 release was a
> minor, unplanned release. Ther
view this discussion on the web visit https://groups.google.com/d/msgid/cryptopp-users/E510509D-1BDB-49CF-8CC6-6ED59AC8582C%40gmail.com.
<>
Regards,Devharsh.
On Mar 9, 2021, at 7:20 PM, Jeffrey Walton <noloa...@gmail.com> wrote:On Tue, Mar 9, 2021 at 7:06 PM Devharsh Trivedi <devha
ptopp-users/274E8E22-0794-4774-AAAE-0F40C39680B1%40gmail.com.
<>
Regards,Devharsh.
On Mar 9, 2021, at 4:18 PM, Jeffrey Walton <noloa...@gmail.com> wrote:On Tue, Mar 9, 2021 at 4:12 PM Devharsh Trivedi <devharsh.1...@gmail.com> wrote:I have Xcode Version 12.4 (12D4e) and I download
-sdk watchsimulator7.2
Regards,
Devharsh.
> On Mar 9, 2021, at 4:18 PM, Jeffrey Walton wrote:
>
> On Tue, Mar 9, 2021 at 4:12 PM Devharsh Trivedi
> wrote:
>>
>> I have Xcode Version 12.4 (12D4e) and I downloaded Crypto++ 8.5.0
>
> You also need a fe
I have Xcode Version 12.4 (12D4e) and I downloaded Crypto++ 8.5.0
I see TestData/Programs/Vectors folders but don't have TestScripts
On Monday, 8 March 2021 at 03:44:44 UTC-5 Jeffrey Walton wrote:
> On Monday, March 8, 2021 at 12:27:22 AM UTC-5 Jeffrey Walton wrote:
>
>> On Sunday, March 7, 2021
cipher.size() doesn't help :/
the problem is not related to size but the xct pointer itself
however, if I do something similar with mac, it works
*const* byte* xmac = *reinterpret_cast*<*const* byte*>(strMac.data());
dec.DecryptAndVerify(rt, xmac, *sizeof*(xmac), iv, sizeof(iv), aad,
*sizeof*(
Thank you for your reply.
I am following this example
- https://www.cryptopp.com/wiki/XChaCha20Poly1305
and trying to use std::string instead of byte
instead of using byte array for ct like this
dec.DecryptAndVerify(rt, mac, sizeof(mac), iv, sizeof(iv), aad,
sizeof(aad), ct, sizeof(ct));
I am
I am trying to convert a std::string to cryptopp::byte like this
const byte* pt = reinterpret_cast(&alert[0]);
but it doesn't copy the full string, as confirmed by sizeof
sizeof(alert) = 24
sizeof(pt) = 8
why is it truncating to first 8 bytes?
--
You received this message because you are subscr
Also, Is AES-GCM-SIV recommended by NIST?
I see a proposal over here -
https://csrc.nist.gov/CSRC/media/Projects/Block-Cipher-Techniques/documents/BCM/proposed-modes/aes-gcm-siv/aes-gcm-siv-may2019.pdf
On Thursday, 25 February 2021 at 17:26:40 UTC-5 Devharsh Trivedi wrote:
> Thank you for
HMAC is/was before yesterday.
>
>> On Feb 25, 2021, at 14:39, Devharsh Trivedi wrote:
>>
>> Which of the following is more secure?
>> 1. AES-GCM (AEAD)
>> 2. AES-CBC+HMAC (EtA)
>>
>> Ref.: https://www.cryptopp.com/wiki/Authenticated_Encryption
>&g
Which of the following is more secure?
1. AES-GCM (AEAD)
2. AES-CBC+HMAC (EtA)
Ref.: https://www.cryptopp.com/wiki/Authenticated_Encryption
--
You received this message because you are subscribed to "Crypto++ Users". More
information about Crypto++ and this group is available at
http://www.cry
13 matches
Mail list logo