I am using Crypt::Blowfish and DBD::ODBC on win32/12.12.2/Strawberry When I
use pp the .exe it creates when 2 zero byte files that correlate to the
dll's that it should have included and that it is calling for that module.
I have verified this by copying the original .dll files into the cache'd
directory (over writing the strange names that get created) and the script
will run correctly.  I can force include a dll but since it doesn't have the
correct name (when I include ODBC.dll it gets named ODBC.dll, but somewhere
in the packing process it uses a different name (3d2b5e28.dll).

If this is not easily fixed is there a way to tell exactly where it is going
to extra to?  I see that -T can be passed to it to control part of the name,
but I still wouldn't know exactly where it was going to.  I figure I can
just include the ODBC.dll and run a copy to copy it to 3d2b5328.dll before I
run that module

Travis

Reply via email to