-
mj-xmr[m]
-
mj-xmr[m]My sha256 sums.
-
mj-xmr[m]<jeffro256[m]> "mj-xmr[m] Can you see my..." <- Yes. I'm just in EU timezone.
-
jeffro256[m]mj-xmr I put comments like 3-4 days ago but I think I put it in a pending review on accident and didnt submit it
-
jeffro256[m]my bad
-
mj-xmr[m]Aaaah. Classic :)
-
mj-xmr[m]<sethforprivacy[m]> "Seems good! github.com..." <- Yep :)
-
JayendraMadara[mHEYY people good morning... (full message at libera.ems.host/_matrix/media/r0/do…2226b87c5a8ceecf5f0b88163b562e89409)
-
selstaJayendraMadara[m: please ask in r/moneromining on reddit, this channel here is for monero development and not mining
-
selstayou will get a better answer there
-
JayendraMadara[mthank youuuu
-
mj-xmr[m]Here's an easier alternative that fixes the stale submodules problem:
-
mj-xmr[m]
-
hycnot sure why you think submodules are still a problem. it only happened to me because my repo had a bunch of local changes in it, including an explicitly checked out submodule
-
hycmost people will be building from a clean tree
-
UkoeHBAnyone know much about block ciphers (especially blowfish)? I am wondering about the implications of ciphering the same block multiple times, i.e. in order to have a cipher text that isn't a multiple of the block size.
-
UkoeHBmy use case (second half): gist.github.com/tevador/50160d160d2…ment_id=4144862#gistcomment-4144862
-
mj-xmr[m]<hyc> "not sure why you think submodule..." <- It happened to me as well. Most people were us :)
-
mj-xmr[m]I think a command of setting up environment shouldn't astonish people.
-
mj-xmr[m]Thanks for approving anyway.
-
moneromoooIt must be fine, since this is quite likely to happen with disk encryption, where file headers are often the same. With different nonces obviously.
-
moneromooo(and with a good mode)\
-
UkoeHBAnyone have a recommended AES implementation? I think AES would be better than blowfish for 128-bit jamtis address indices.
-
moneromoooIf it is for coding for monero, I suggest the one in the monero tree, with the argument that if it's broken, it already breaks monero.
-
UkoeHBmoneromooo: is it a full implementation? I see this `aesb.c`, but it doesn't seem complete (encrypt and decrypt)
-
moneromoooGood point. It might be encrypt only. If so, you could look for the matching decrypt on the internet, it's likely the original includes both.
-
hycaesb.c just has a couple steps, yeah, not full algo
-
hycyou want oaes_lib.c
-
hycoaes_encrypt, oaes_decrypt
-
UkoeHBsweeet thanks hyc
-
moneromoooJust check whether you end up in a code path that uses rand, IIRC that code uses it, though we don't hit that path.