<?xml version="1.0" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"><channel><title>BlackFeather'S Blog-大坑的aes GCM解密算法</title><link>http://www.fenlog.com/post/123.html</link><generator>RainbowSoft Studio Z-Blog 2.2 Prism Build 140101</generator><language>zh-CN</language><pubDate>Tue, 01 Sep 2020 14:57:27 +0800</pubDate><item><title>Re:大坑的aes GCM解密算法</title><author>jm</author><link>http://www.fenlog.com/post/123.html#cmt4310</link><pubDate>Mon, 17 Oct 2022 14:50:00 +0800</pubDate><guid>http://www.fenlog.com/post/123.html#cmt4310</guid><description><![CDATA[真的是巨坑无比，找遍官网、维基、github都没有找到可以用的示例。<br/>中间还尝试了EVP_aead_aes_256_gcm()方法，同样无效。<br/>还好最后找到博主的这篇笔记，感谢！]]></description></item></channel></rss>
