diff options
author | Jeffrey Walton <noloader@gmail.com> | 2017-08-19 17:35:56 -0400 |
---|---|---|
committer | Jeffrey Walton <noloader@gmail.com> | 2017-08-19 17:35:56 -0400 |
commit | bc4bb9a952432e52d9595db37f10cd5c6b294335 (patch) | |
tree | b39e7cc3e62bbfe9079f57a0f5a0874908adb0af | |
parent | 7fb5953055d14307a9d4ae95fd6499f3a48f8b95 (diff) | |
download | cryptopp-git-bc4bb9a952432e52d9595db37f10cd5c6b294335.tar.gz |
Fix 0-size FixedSizeAlignedSecBlockwith GetUserKey
-rw-r--r-- | shacal2.cpp | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/shacal2.cpp b/shacal2.cpp index afb5f4d8..2e77dd6f 100644 --- a/shacal2.cpp +++ b/shacal2.cpp @@ -52,7 +52,9 @@ void SHACAL2::Base::UncheckedSetKey(const byte *userKey, unsigned int keylen, co word32 *rk = m_key;
unsigned int i;
- GetUserKey(BIG_ENDIAN_ORDER, rk, m_key.size(), userKey, keylen);
+ // 32-bit GCC 5.4 hack... m_key.size() returns 0. Note: this surfaced after changing
+ // m_key to FixedSizeAlignedSecBlock at commit 1ab1e08ac5b5a0d63374de0c.
+ GetUserKey(BIG_ENDIAN_ORDER, rk, 64, userKey, keylen);
for (i = 0; i < 48; i++, rk++)
{
rk[16] = rk[0] + s0(rk[1]) + rk[9] + s1(rk[14]);
|