I don't see a good alternative. -fno-lto seems it.
> On May 5, 2021, at 14:23, Jeffrey Walton wrote:
>
> Hi Everyone,
>
> LTO is slowly accumulating bugs. From what I have seen in the
> post-mortems, it looks like LTO is either (1) results in a compile
> error (older compilers) or (2) results
Hi Everyone,
LTO is slowly accumulating bugs. From what I have seen in the
post-mortems, it looks like LTO is either (1) results in a compile
error (older compilers) or (2) results in a runtime error (newer
compilers).
For (2), it appears LTO mishandles code with GCC extended inline
assembly. To
On Wed, 5 May 2021 09:58:11 -0400
Jeffrey Walton wrote:
> On Tue, May 4, 2021 at 2:08 PM Rogier wrote:
> >
> > I keep getting segfaults within cryptopp on freebsd for at least PBKDF
> > DeriveKey(). I used the sample code from the wiki:
> > https://www.cryptopp.com/wiki/PKCS12_PBKDF
> >
> > I u
On Wed, May 5, 2021 at 7:04 AM 'Florian Kleinicke' via Crypto++ Users
wrote:
>
> I need to decrypt a file using CryptoPP that was previously encrypted using
> pyAEScrypt.
> It uses the "aes file format" as defined here:
> https://www.aescrypt.com/aes_file_format.html
>
> Therefore I need to get
On Tue, May 4, 2021 at 2:08 PM Rogier wrote:
>
> I keep getting segfaults within cryptopp on freebsd for at least PBKDF
> DeriveKey(). I used the sample code from the wiki:
> https://www.cryptopp.com/wiki/PKCS12_PBKDF
>
> I used the cryptopp-lib that is available through the binary ports collecti
I need to decrypt a file using CryptoPP that was previously encrypted using
pyAEScrypt.
It uses the "aes file format" as defined
here: https://www.aescrypt.com/aes_file_format.html
Therefore I need to get the IV out of the header and dump the remaining
header. Did anyone do this before? I'm not