Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2023-07-18 | Windows: Fix compiler warnings | Mounir IDRASSI | 1 | -1/+0 | |
2023-06-30 | Correctly detect ARM builds when listing CPU features in headers | Mounir IDRASSI | 1 | -4/+4 | |
2023-06-13 | Crypto: Fix detection of SSSE3 intrinsics in compiler | Mounir IDRASSI | 1 | -1/+1 | |
We use correct define CRYPTOPP_BOOL_SSSE3_INTRINSICS_AVAILABLE | |||||
2023-05-26 | Windows: Add missing Blake2s source files to VS 2019 crypto project | Mounir IDRASSI | 1 | -0/+3 | |
2022-08-21 | Fixed a typo error (#929) | Matteo Baccan | 1 | -1/+1 | |
Hi I have fixed a little typo error: a double semicolon at the end of one line ciao matteo | |||||
2022-03-26 | Windows: Add various checks to address Coverity reported issues. | Mounir IDRASSI | 1 | -2/+2 | |
2022-03-26 | Remove dead code from chacha_ECRYPT_encrypt_bytes (Coverity) | Mounir IDRASSI | 1 | -15/+8 | |
2022-03-21 | Add missing Blake2s source files | Mounir IDRASSI | 10 | -0/+1474 | |
2022-03-08 | Implement support of Blake2s-256 hash algorithm and remove deprecated ↵ | Mounir IDRASSI | 12 | -1410/+47 | |
algorithms RIPEMD-160 and GOST89. | |||||
2022-02-13 | Linux/FreeBSD: Enable building without AESNI support by setting environment ↵ | Mounir IDRASSI | 2 | -0/+4 | |
variable DISABLE_AESNI to 1 during build or passing NOAESNI=1 to make command This comes following Github issue #892 and which should be solved thanks to this. | |||||
2021-08-30 | Windows: Fix some VS static analyzed warnings | Mounir IDRASSI | 1 | -1/+1 | |
2021-08-16 | MacOSX: Make AESNI availability linked to compiler target and not ↵ | Mounir IDRASSI | 1 | -0/+1 | |
compilation host | |||||
2021-07-13 | Windows: Fix compilation error on ARM64 caused by definition of UINT64_MAX | Mounir IDRASSI | 1 | -1/+1 | |
2021-01-02 | Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵ | Mounir IDRASSI | 6 | -2/+659 | |
System encryption still not implemented on ARM64 | |||||
2020-12-11 | Windows Driver: Fix build error using Windows 10 WDK caused by name conflict ↵ | Mounir IDRASSI | 1 | -4/+4 | |
for KeSaveExtendedProcessorState/KeRestoreExtendedProcessorState functions | |||||
2020-12-11 | Crypto: small speed optimization of Streebog and removal of unused macro | Mounir IDRASSI | 1 | -35/+17 | |
2020-07-25 | Remove unused variable in Streebog implementation | Mounir IDRASSI | 1 | -97/+0 | |
2020-07-15 | Enable FIPS mode in JitterEntropy random generator in order to let the ↵ | Mounir IDRASSI | 1 | -1/+1 | |
function jent_read_entropy report failure if any of the continuous statistical tests fail. | |||||
2020-06-26 | Whirlpool: Remove unused "num" variable affectation in WHIRLPOOL_add | Mounir IDRASSI | 1 | -1/+0 | |
2020-06-25 | Crypto: Fix random crash in Streebog in 32-bit, caused by use of aligned ↵ | Mounir IDRASSI | 1 | -8/+8 | |
SSE2 instructions _mm_load_si128. Now we use _mm_loadu_si128 instead which is not slower than _mm_load_si128 on recent CPUs | |||||
2020-06-19 | Windows: remove duplicated function to detect AES-NI support in CPU | Mounir IDRASSI | 2 | -22/+2 | |
2019-12-09 | Fix wrong check on the define CRYPTOPP_BOOL_X64 | Mounir IDRASSI | 1 | -1/+1 | |
2019-12-09 | Linux/MacOSX: use x64 optimized SHA256 implementation instead of limiting it ↵ | Mounir IDRASSI | 1 | -1/+1 | |
to Windows. | |||||
2019-12-09 | Add burn calls for temporary ss variable (#569) | Hanno Böck | 1 | -0/+13 | |
2019-12-09 | Linux: fix NOASM compilation (#563) (#568) | alt3r 3go | 6 | -10/+10 | |
Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com> | |||||
2019-11-09 | Windows: include rdrand.h file only in Windows case since it is not yet ↵ | Mounir IDRASSI | 1 | -0/+2 | |
included for other OSes | |||||
2019-11-07 | Windows: fix driver build error caused by missing header | Mounir IDRASSI | 1 | -0/+5 | |
2019-11-03 | Linux/MacOSX: Fix build error caused by RDRAND_getBytes/RDSEED_getBytes ↵ | Mounir IDRASSI | 1 | -1/+1 | |
implemented only on Windows | |||||
2019-11-02 | Windows: when building for EFI bootloader, don't make calls to RDRAND/RDSEED ↵ | Mounir IDRASSI | 1 | -1/+2 | |
functions since we don't link against their implementation in EFI bootloader | |||||
2019-10-30 | Update Jitterentropy Library to version 2.2.0 | Mounir IDRASSI | 3 | -183/+331 | |
2019-10-30 | Disable both RDRAND and RDSEED if a failure is detected | Mounir IDRASSI | 1 | -0/+13 | |
2019-10-30 | Add check for buggy RDRAND (AMD Ryzen CPU case) even if we always use RDSEED ↵ | Mounir IDRASSI | 1 | -0/+13 | |
instead of RDRAND when RDSEED is available (which is the case on modern CPUs) | |||||
2019-10-30 | Windows: use separate assembly files for RDRAND and RDSEED in order to fix a ↵ | Mounir IDRASSI | 6 | -228/+291 | |
mysterious crash when MASM_RDSEED_GenerateBlock is called after MASM_RDRAND_GenerateBlock. | |||||
2019-10-29 | Fix wrong detection of AMD CPUs. | Mounir IDRASSI | 1 | -2/+2 | |
2019-10-28 | Linux: Fix compilation error on non-x86 platform by providing generic ↵ | Mounir IDRASSI | 1 | -0/+25 | |
implementation for jent_get_nstime function | |||||
2019-10-28 | Linux: Fix compilation error if type __u64 is already defined by gcc | Mounir IDRASSI | 1 | -5/+3 | |
This is the case with Mageia Cauldron which has gcc 9.2.1 | |||||
2019-10-24 | Linux/MacOSX: Better approach to avoid that jitterentropy code is optimized ↵ | Mounir IDRASSI | 1 | -1/+5 | |
by the compiler | |||||
2019-10-23 | Linux/MacOSX: Add missing JitterEntropy implementation | Mounir IDRASSI | 1 | -4/+13 | |
2019-10-17 | Linux: Workaround for gcc 4.4.7 bug under CentOS 6 that causes VeraCrypt ↵ | Mounir IDRASSI | 1 | -0/+14 | |
built under CentOS 6 to crash when Whirlpool hash is used. | |||||
2019-10-04 | Fix "error "SSSE3 instruction set not enabled" when compiling using GCC ↵ | El Mostafa Idrassi | 1 | -0/+2 | |
version < 4.9 without -mssse3 option (SSSE3=1 when using make). (#507) Compiling with -mxxx defines the corresponding macro of the intrinsics. For example, -mssse3 defines __SSSE3__ macro to 1. In GCC versions < 4.9, it is not possible to use and call x86 intrinsics only at runtime without compiling the entire file with the -mxxx option. For example, if we want to call SSSE3 intrinsics without compiling with -mssse3, the macro __SSSE3__ is not defined. Therefore, when including <tmmintrin.h>, this results in "error "SSSE3 instruction set not enabled"" because of : #ifndef __SSSE3__ # error "SSSE3 instruction set not enabled" Since GCC 4.9, this has been fixed and it is possible to call x86 intrinsics from select functions in a file that are tagged with the corresponding target attribute without having to compile the entire file with the -mxxx option. This can be seen in <tmmintrin.h> which in recent versions (>= 4.9) contains : #ifndef __SSSE3__ #pragma GCC push_options #pragma GCC target("ssse3") #define __DISABLE_SSSE3__ Since SSSE3 is only used under Windows for ChaCha256, this can be fixed by preceding '#include <tmmintrin.h>' with #if defined (_MSC_VER) && !defined (TC_WINDOWS_BOOT). See https://gcc.gnu.org/gcc-4.9/changes.html | |||||
2019-10-02 | Align section types of Whirlpool_C and SHA256_K (#479) | Hans-Peter Jansen | 1 | -1/+1 | |
in order to fix LTO linking. After switching to LTO for openSUSE Tumbleweed, veracrypt build failed with: [ 185s] ../Crypto/Whirlpool.c:105:45: error: 'Whirlpool_C' causes a section type conflict with 'SHA256_K' [ 185s] 105 | CRYPTOPP_ALIGN_DATA(16) static const uint64 Whirlpool_C[8*256+R] CRYPTOPP_SECTION_ALIGN16 = { [ 185s] | ^ [ 185s] ../Crypto/Sha2.c:321:34: note: 'SHA256_K' was declared here [ 185s] 321 | CRYPTOPP_ALIGN_DATA(16) uint_32t SHA256_K[64] CRYPTOPP_SECTION_ALIGN16 = { [ 185s] | ^ [ 185s] lto-wrapper: fatal error: g++ returned 1 exit status Aligning section types of Whirlpool_C and SHA256_K fixes this. | |||||
2019-08-26 | Windows: fix compilation error of legacy MBR bootloader caused by missing ↵ | Mounir IDRASSI | 1 | -1/+1 | |
intrin.h header | |||||
2019-03-21 | Linux: Fix compilation error caused by wrong include of "intrin.h" | Mounir IDRASSI | 1 | -3/+1 | |
2019-03-02 | Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵ | Mounir IDRASSI | 2 | -0/+24 | |
especially Format and Expander | |||||
2019-03-01 | Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵ | Mounir IDRASSI | 7 | -0/+1852 | |
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha) | |||||
2019-02-12 | Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by ↵ | Mounir IDRASSI | 8 | -4/+1038 | |
Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de) | |||||
2019-02-08 | Windows: Add implementation of ChaCha20 based random generator. Use it for ↵ | Mounir IDRASSI | 12 | -4/+929 | |
driver need of random bytes (currently only wipe bytes but more to come later). | |||||
2019-02-01 | Windows: use CPU RDRAND or RDSEED as an additional entropy source for our ↵ | Mounir IDRASSI | 7 | -0/+519 | |
random generator when available | |||||
2019-02-01 | Fix detection of CPU features AVX2 & BMI2. Add detection of RDRAND & RDSEED ↵ | Mounir IDRASSI | 2 | -3/+41 | |
CPU features. Detect Hygon CPU as AMD one. | |||||
2019-01-30 | Help compiler optimize some crypto code on 64-bit build since x64 capable ↵ | Mounir IDRASSI | 1 | -0/+5 | |
CPUs always support SSE and SSE2 |