Re: [cryptopp-users] Add -fno-lto for GCC and compatibles

2021-05-05 Thread Uri Blumenthal
I don't see a good alternative. -fno-lto seems it. > On May 5, 2021, at 14:23, Jeffrey Walton wrote: > > Hi Everyone, > > LTO is slowly accumulating bugs. From what I have seen in the > post-mortems, it looks like LTO is either (1) results in a compile > error (older compilers) or (2) results

[cryptopp-users] Add -fno-lto for GCC and compatibles

2021-05-05 Thread Jeffrey Walton
Hi Everyone, LTO is slowly accumulating bugs. From what I have seen in the post-mortems, it looks like LTO is either (1) results in a compile error (older compilers) or (2) results in a runtime error (newer compilers). For (2), it appears LTO mishandles code with GCC extended inline assembly. To

Re: [cryptopp-users] Segfaults on FreeBSD

2021-05-05 Thread Rogier Boon
On Wed, 5 May 2021 09:58:11 -0400 Jeffrey Walton wrote: > On Tue, May 4, 2021 at 2:08 PM Rogier wrote: > > > > I keep getting segfaults within cryptopp on freebsd for at least PBKDF > > DeriveKey(). I used the sample code from the wiki: > > https://www.cryptopp.com/wiki/PKCS12_PBKDF > > > > I u

Re: [cryptopp-users] Decrypting AEScrypt encrypted file with CryptoPP

2021-05-05 Thread Jeffrey Walton
On Wed, May 5, 2021 at 7:04 AM 'Florian Kleinicke' via Crypto++ Users wrote: > > I need to decrypt a file using CryptoPP that was previously encrypted using > pyAEScrypt. > It uses the "aes file format" as defined here: > https://www.aescrypt.com/aes_file_format.html > > Therefore I need to get

Re: [cryptopp-users] Segfaults on FreeBSD

2021-05-05 Thread Jeffrey Walton
On Tue, May 4, 2021 at 2:08 PM Rogier wrote: > > I keep getting segfaults within cryptopp on freebsd for at least PBKDF > DeriveKey(). I used the sample code from the wiki: > https://www.cryptopp.com/wiki/PKCS12_PBKDF > > I used the cryptopp-lib that is available through the binary ports collecti

[cryptopp-users] Decrypting AEScrypt encrypted file with CryptoPP

2021-05-05 Thread 'Florian Kleinicke' via Crypto++ Users
I need to decrypt a file using CryptoPP that was previously encrypted using pyAEScrypt. It uses the "aes file format" as defined here: https://www.aescrypt.com/aes_file_format.html Therefore I need to get the IV out of the header and dump the remaining header. Did anyone do this before? I'm not