Hi Everyone, We have a new release candidate available at https://www.cryptopp.com/cryptopp563rc2.zip <https://www.cryptopp.com/cryptopp563rc1.zip>. Here are the checksums:
$ md5sum cryptopp563rc2.zip 8be71145deecfde7e64a1e05c3d5e82b $ sha1sum cryptopp563rc2.zip c3431e2c2778e6dcb0e12ba4530f720b31efdb1d $ sha256sum cryptopp563rc2.zip 876822292ffc56ced28bf1ef3811aa8299919fcea22df76dbed51924267c6e18 We needed to update the source code due to an ARMEL workaround under GCC 5.2 at/above -O2 for the integer class. See https://github.com/weidai11/cryptopp/issues/31. Since the change was non-trivial, it kicked-off another round of testing. Because one non-trivial change was added, another was added to algparam.h. The change removed the last significant portion of latent undefined behavior by limiting the VC 6.0 hack to VC 6.0 only (after verifying it did not change the symbols or layout of objects). See https://github.com/weidai11/cryptopp/issues/5. As with the other RC's, there's a diff completely showing the differences between the RC and Crypto++ 5.6.2. Jeff -- -- You received this message because you are subscribed to the "Crypto++ Users" Google Group. To unsubscribe, send an email to [email protected]. More information about Crypto++ and this group is available at http://www.cryptopp.com. --- You received this message because you are subscribed to the Google Groups "Crypto++ Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
