diff options
author | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2025-01-17 00:58:54 +0100 |
---|---|---|
committer | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2025-01-17 00:58:54 +0100 |
commit | 54bd81999007b467420acab780c704c91bc1b057 (patch) | |
tree | fb2e3dbc899e6acd89f82406d6712508c015e1c8 /src/Common/Random.c | |
parent | c79f8102e094f512ac5c706fa30a2741d697b003 (diff) | |
download | VeraCrypt-54bd81999007b467420acab780c704c91bc1b057.tar.gz VeraCrypt-54bd81999007b467420acab780c704c91bc1b057.zip |
Windows/Linux/macOS: implement AES hardware support on ARM64 (ARMv8)
Diffstat (limited to 'src/Common/Random.c')
-rw-r--r-- | src/Common/Random.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/src/Common/Random.c b/src/Common/Random.c index 0aab0cff..10995f74 100644 --- a/src/Common/Random.c +++ b/src/Common/Random.c @@ -878,6 +878,7 @@ BOOL SlowPoll (void) } } +#ifndef _M_ARM64 // use RDSEED or RDRAND from CPU as source of entropy if present if ( IsCpuRngEnabled() && ( (HasRDSEED() && RDSEED_getBytes (buffer, sizeof (buffer))) @@ -886,6 +887,7 @@ BOOL SlowPoll (void) { RandaddBuf (buffer, sizeof (buffer)); } +#endif burn(buffer, sizeof (buffer)); @@ -1011,6 +1013,7 @@ BOOL FastPoll (void) return FALSE; } +#ifndef _M_ARM64 // use RDSEED or RDRAND from CPU as source of entropy if enabled if ( IsCpuRngEnabled() && ( (HasRDSEED() && RDSEED_getBytes (buffer, sizeof (buffer))) @@ -1019,6 +1022,7 @@ BOOL FastPoll (void) { RandaddBuf (buffer, sizeof (buffer)); } +#endif burn (buffer, sizeof(buffer)); |