03:45:03 https://paste.debian.net/1239153/ 03:45:20 My sha256 sums. 03:46:43 "mj-xmr[m] Can you see my..." <- Yes. I'm just in EU timezone. 03:49:20 mj-xmr I put comments like 3-4 days ago but I think I put it in a pending review on accident and didnt submit it 03:49:29 my bad 03:49:35 Aaaah. Classic :) 04:04:26 "Seems good! https://github.com/..." <- Yep :) 04:35:25 HEYY people good morning... (full message at https://libera.ems.host/_matrix/media/r0/download/libera.chat/f825b2226b87c5a8ceecf5f0b88163b562e89409) 04:36:01 JayendraMadara[m: please ask in r/moneromining on reddit, this channel here is for monero development and not mining 04:36:10 you will get a better answer there 04:36:26 thank youuuu 04:45:45 Here's an easier alternative that fixes the stale submodules problem: 04:45:45 https://github.com/monero-project/monero/pull/8296 12:16:18 not sure why you think submodules are still a problem. it only happened to me because my repo had a bunch of local changes in it, including an explicitly checked out submodule 12:19:28 most people will be building from a clean tree 16:36:00 Anyone know much about block ciphers (especially blowfish)? I am wondering about the implications of ciphering the same block multiple times, i.e. in order to have a cipher text that isn't a multiple of the block size. 16:36:40 my use case (second half): https://gist.github.com/tevador/50160d160d24cfc6c52ae02eb3d17024?permalink_comment_id=4144862#gistcomment-4144862 16:50:39 "not sure why you think submodule..." <- It happened to me as well. Most people were us :) 16:51:29 I think a command of setting up environment shouldn't astonish people. 16:51:34 Thanks for approving anyway. 17:26:16 It must be fine, since this is quite likely to happen with disk encryption, where file headers are often the same. With different nonces obviously. 17:26:36 (and with a good mode)\ 18:57:56 Anyone have a recommended AES implementation? I think AES would be better than blowfish for 128-bit jamtis address indices. 18:59:22 If it is for coding for monero, I suggest the one in the monero tree, with the argument that if it's broken, it already breaks monero. 19:01:55 moneromooo: is it a full implementation? I see this `aesb.c`, but it doesn't seem complete (encrypt and decrypt) 19:02:43 Good point. It might be encrypt only. If so, you could look for the matching decrypt on the internet, it's likely the original includes both. 19:15:28 aesb.c just has a couple steps, yeah, not full algo 19:16:10 you want oaes_lib.c 19:17:09 oaes_encrypt, oaes_decrypt 19:18:50 sweeet thanks hyc 19:21:37 Just check whether you end up in a code path that uses rand, IIRC that code uses it, though we don't hit that path.