VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/EncryptionThreadPool.c
AgeCommit message (Collapse)AuthorFilesLines
2024-11-16Windows: remove 32-bit logic from the code since we support only 64-bit. ↵Mounir IDRASSI1-6/+0
remove 32-bit EFI bootloader files. We also fix intermediary files folder for Portable and Setup projects
2024-11-13Windows: Remove support for 32-bit driver code. Set build target as Windows ↵Mounir IDRASSI1-4/+4
10. Simplify code and fix all warnings in driver.
2024-06-12Avoid conflict with C++17 features std::byte by using uint8 type instead of byteMounir IDRASSI1-3/+3
2022-03-08Implement support of Blake2s-256 hash algorithm and remove deprecated ↵Mounir IDRASSI1-2/+2
algorithms RIPEMD-160 and GOST89.
2021-08-30Windows: Fix some VS static analyzed warningsMounir IDRASSI1-1/+1
2021-08-07Windows: Better implementation of PRF autodetection optimization.Mounir IDRASSI1-22/+23
2021-08-07Windows Driver: fix BSOD during mounting caused by commit for PRF ↵Mounir IDRASSI1-2/+0
auto-detection speedup
2021-08-02Windows: clear DeriveKeyWork work item only if they have correct typeMounir IDRASSI1-3/+6
2021-07-15Windows: Avoid leaking sensitive values in work item of threads poolMounir IDRASSI1-0/+14
2021-07-14Windows: Reduce time of mount with PRF auto-detectionMounir IDRASSI1-4/+65
2020-07-02Windows: Don't use API for Processor Groups support if there is only 1 CPU ↵Mounir IDRASSI1-37/+72
group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
2020-02-10Windows: Implement support for processor groups in the driver and fix build ↵Mounir IDRASSI1-54/+63
issues caused by previous implementation
2020-01-29 Adding Processor Groups support for more than 64 processors (#581)techvintage1-3/+57
* Adding Processor Groups support for more than 64 processors * Revert " Adding Processor Groups support for more than 64 processors" This reverts commit e1d5fe0a55f46a53549450972c5b5506a43ca94c. * Adding Processor Groups support for >64 logical processors
2019-03-02Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵Mounir IDRASSI1-1/+1
especially Format and Expander
2019-03-01Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵Mounir IDRASSI1-4/+41
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
2017-06-23Update IDRIX copyright yearMounir IDRASSI1-1/+1
2016-08-15Windows: Add support for Streebog (hash) and kuznyechik (encryption)Mounir IDRASSI1-0/+5
2016-05-10Fix space before tabDavid Foerster1-1/+1
2016-05-10Remove trailing whitespaceDavid Foerster1-10/+10
2016-05-10Normalize all line terminatorsDavid Foerster1-511/+511
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-5/+9
and TrueCrypt 3.0.
2014-11-08Simplify code handling iterations count: in boot mode, we'll set the correct ↵Mounir IDRASSI1-1/+1
iterations count inside derive_u_sha256 and derive_u_ripemd160 depending in the value of the iterations parameter. On normal mode, we use normal values of iterations count. Removes the special test parameter from RIPEMD160 functions.
2014-11-08Implement support for creating and booting encrypted partition using ↵Mounir IDRASSI1-0/+5
SHA-256. Support SHA-256 for normal volumes as well.
2014-11-08Remove deprecated/legacy cryptographic algorithms and encryption modes that ↵Mounir IDRASSI1-5/+0
are never used by VeraCrypt. This will speed up volumes opening in many cases.
2014-11-08Enhance security by rising the iterations used in PBKDF2 : 327670 instead of ↵Mounir IDRASSI1-1/+1
1000 when booting in encrypted system partition, and 2000000 instead of 2000 when using encrypted containers and partitions
2014-11-08Add original TrueCrypt 7.1a sourcesMounir IDRASSI1-0/+507