Creating a MAC

Heather Shaw heathjs21 at yahoo.com
Thu Aug 18 15:10:48 CEST 2005


Thank you for the help.   Let me tell you what I am
trying to do.  I found some test examples in the
document located at:
http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf
 for Appendix A: Sample #1.   I am trying to verify my
logic by using their key and text to compare results
to ensure I am correctly utilizing the libraries in
libcrypt.



More information about the Gnupg-devel mailing list