Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
10 hours | Windows: Fix various compiler warnings | Mounir IDRASSI | 1 | -1/+1 | |
2 days | Linux: Fix build error following latest code cleanup | Mounir IDRASSI | 1 | -2/+2 | |
2 days | Windows: Remove support for 32-bit driver code. Set build target as Windows ↵ | Mounir IDRASSI | 2 | -61/+29 | |
10. Simplify code and fix all warnings in driver. | |||||
4 days | Linux: Fix build error caused by changes for dynamic CPU SHA support detection | Mounir IDRASSI | 2 | -56/+61 | |
4 days | Linux: Fix detection of SHA CPU support on virtualized environment by trying ↵ | Mounir IDRASSI | 1 | -0/+66 | |
SHA instruction | |||||
5 days | Add support for SHA-256 x86 instrinsic for enhance performance of ↵ | Mounir IDRASSI | 9 | -0/+302 | |
PBKDF2-HMAC-SHA256 | |||||
2024-09-08 | Windows: Add support for x86 and x64 build for driver and binaries using ↵ | Mounir IDRASSI | 5 | -20/+26 | |
Visual Studio 2019 We also enable Control Flow Guard and Spectre Mitigation | |||||
2024-06-12 | Avoid conflict with C++17 features std::byte by using uint8 type instead of byte | Mounir IDRASSI | 18 | -91/+90 | |
2024-04-10 | Fix: 7 typos (#1324) | RoboSchmied | 2 | -4/+4 | |
Signed-off-by: RoboSchmied <github@roboschmie.de> | |||||
2023-11-13 | wolfCrypt as crypto backend for VeraCrypt (#1227) | lealem47 | 5 | -1/+301 | |
* wolfCrypt as crypto backend for VeraCrypt * Refactor to use EncryptionModeWolfCryptXTS class | |||||
2023-08-06 | Linux/macOS: Add explicit include of <sys/types.h> to define ssize_t | Mounir IDRASSI | 1 | -0/+2 | |
Some systems (e.g. Alpine Linux) seems to require this. | |||||
2023-08-04 | fix warnings and UB (#1164) | kovalev0 | 2 | -2/+2 | |
* Crypto: fix warning mismatched bound ../Crypto/cpu.c:67:32: warning: argument 2 of type 'uint32[4]' {aka 'unsigned int[4]'} with mismatched bound [-Warray-parameter=] 67 | int CpuId(uint32 input, uint32 output[4]) | ~~~~~~~^~~~~~~~~ In file included from ../Crypto/cpu.c:3: ../Crypto/cpu.h:236:33: note: previously declared as 'uint32 *' {aka 'unsigned int *'} 236 | int CpuId(uint32 input, uint32 *output); Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> * Core/Unix: fix warning ignoring return value Unix/CoreUnix.cpp: In member function 'virtual std::shared_ptr<VeraCrypt:\ :VolumeInfo> VeraCrypt::CoreUnix::MountVolume(VeraCrypt::MountOptions&)': Unix/CoreUnix.cpp:682:55: warning: ignoring return value of 'int chown(const char*, __uid_t, __gid_t)' declared with attribute 'warn_unused_result' [-Wunused-result] 682 | chown (mountPoint.c_str(), GetRealUserId(), GetRealGroupId()); | ~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> * Main/Forms: fix warning cast to pointer from integer of different size Forms/MainFrame.cpp: In member function 'void VeraCrypt::MainFrame:\ :UpdateVolumeList()': Forms/MainFrame.cpp:1718:106: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast] 1718 | Gui->InsertToListCtrl (SlotListCtrl, ++prevItemIndex, fields, 0, (void *) volume->SlotNumber); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Forms/MainFrame.cpp:1753:114: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast] 1753 | Gui->InsertToListCtrl (SlotListCtrl, ++prevItemIndex, fields, 0, (void *) slotNumber); | ^~~~~~~~~~~~~~~~~~~ Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> * Crypto: fix undefined behavior signed integer overflow In function 'twofish_set_key': cc1: warning: iteration 4 invokes undefined behavior [-Waggressive-loop-optimizations] ../Crypto/Twofish.c:626:23: note: within this loop 626 | for (i = 0; i != 40; i += 2) | ~~^~~~~ Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> --------- Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> Co-authored-by: Vasiliy Kovalev <kovalev@altlinux.org> | |||||
2023-07-18 | Windows: Fix compiler warnings | Mounir IDRASSI | 1 | -1/+0 | |
2023-06-30 | Correctly detect ARM builds when listing CPU features in headers | Mounir IDRASSI | 1 | -4/+4 | |
2023-06-13 | Crypto: Fix detection of SSSE3 intrinsics in compiler | Mounir IDRASSI | 1 | -1/+1 | |
We use correct define CRYPTOPP_BOOL_SSSE3_INTRINSICS_AVAILABLE | |||||
2023-05-26 | Windows: Add missing Blake2s source files to VS 2019 crypto project | Mounir IDRASSI | 1 | -0/+3 | |
2022-08-21 | Fixed a typo error (#929) | Matteo Baccan | 1 | -1/+1 | |
Hi I have fixed a little typo error: a double semicolon at the end of one line ciao matteo | |||||
2022-03-26 | Windows: Add various checks to address Coverity reported issues. | Mounir IDRASSI | 1 | -2/+2 | |
2022-03-26 | Remove dead code from chacha_ECRYPT_encrypt_bytes (Coverity) | Mounir IDRASSI | 1 | -15/+8 | |
2022-03-21 | Add missing Blake2s source files | Mounir IDRASSI | 10 | -0/+1474 | |
2022-03-08 | Implement support of Blake2s-256 hash algorithm and remove deprecated ↵ | Mounir IDRASSI | 12 | -1410/+47 | |
algorithms RIPEMD-160 and GOST89. | |||||
2022-02-13 | Linux/FreeBSD: Enable building without AESNI support by setting environment ↵ | Mounir IDRASSI | 2 | -0/+4 | |
variable DISABLE_AESNI to 1 during build or passing NOAESNI=1 to make command This comes following Github issue #892 and which should be solved thanks to this. | |||||
2021-08-30 | Windows: Fix some VS static analyzed warnings | Mounir IDRASSI | 1 | -1/+1 | |
2021-08-16 | MacOSX: Make AESNI availability linked to compiler target and not ↵ | Mounir IDRASSI | 1 | -0/+1 | |
compilation host | |||||
2021-07-13 | Windows: Fix compilation error on ARM64 caused by definition of UINT64_MAX | Mounir IDRASSI | 1 | -1/+1 | |
2021-01-02 | Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵ | Mounir IDRASSI | 6 | -2/+659 | |
System encryption still not implemented on ARM64 | |||||
2020-12-11 | Windows Driver: Fix build error using Windows 10 WDK caused by name conflict ↵ | Mounir IDRASSI | 1 | -4/+4 | |
for KeSaveExtendedProcessorState/KeRestoreExtendedProcessorState functions | |||||
2020-12-11 | Crypto: small speed optimization of Streebog and removal of unused macro | Mounir IDRASSI | 1 | -35/+17 | |
2020-07-25 | Remove unused variable in Streebog implementation | Mounir IDRASSI | 1 | -97/+0 | |
2020-07-15 | Enable FIPS mode in JitterEntropy random generator in order to let the ↵ | Mounir IDRASSI | 1 | -1/+1 | |
function jent_read_entropy report failure if any of the continuous statistical tests fail. | |||||
2020-06-26 | Whirlpool: Remove unused "num" variable affectation in WHIRLPOOL_add | Mounir IDRASSI | 1 | -1/+0 | |
2020-06-25 | Crypto: Fix random crash in Streebog in 32-bit, caused by use of aligned ↵ | Mounir IDRASSI | 1 | -8/+8 | |
SSE2 instructions _mm_load_si128. Now we use _mm_loadu_si128 instead which is not slower than _mm_load_si128 on recent CPUs | |||||
2020-06-19 | Windows: remove duplicated function to detect AES-NI support in CPU | Mounir IDRASSI | 2 | -22/+2 | |
2019-12-09 | Fix wrong check on the define CRYPTOPP_BOOL_X64 | Mounir IDRASSI | 1 | -1/+1 | |
2019-12-09 | Linux/MacOSX: use x64 optimized SHA256 implementation instead of limiting it ↵ | Mounir IDRASSI | 1 | -1/+1 | |
to Windows. | |||||
2019-12-09 | Add burn calls for temporary ss variable (#569) | Hanno Böck | 1 | -0/+13 | |
2019-12-09 | Linux: fix NOASM compilation (#563) (#568) | alt3r 3go | 6 | -10/+10 | |
Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com> | |||||
2019-11-09 | Windows: include rdrand.h file only in Windows case since it is not yet ↵ | Mounir IDRASSI | 1 | -0/+2 | |
included for other OSes | |||||
2019-11-07 | Windows: fix driver build error caused by missing header | Mounir IDRASSI | 1 | -0/+5 | |
2019-11-03 | Linux/MacOSX: Fix build error caused by RDRAND_getBytes/RDSEED_getBytes ↵ | Mounir IDRASSI | 1 | -1/+1 | |
implemented only on Windows | |||||
2019-11-02 | Windows: when building for EFI bootloader, don't make calls to RDRAND/RDSEED ↵ | Mounir IDRASSI | 1 | -1/+2 | |
functions since we don't link against their implementation in EFI bootloader | |||||
2019-10-30 | Update Jitterentropy Library to version 2.2.0 | Mounir IDRASSI | 3 | -183/+331 | |
2019-10-30 | Disable both RDRAND and RDSEED if a failure is detected | Mounir IDRASSI | 1 | -0/+13 | |
2019-10-30 | Add check for buggy RDRAND (AMD Ryzen CPU case) even if we always use RDSEED ↵ | Mounir IDRASSI | 1 | -0/+13 | |
instead of RDRAND when RDSEED is available (which is the case on modern CPUs) | |||||
2019-10-30 | Windows: use separate assembly files for RDRAND and RDSEED in order to fix a ↵ | Mounir IDRASSI | 6 | -228/+291 | |
mysterious crash when MASM_RDSEED_GenerateBlock is called after MASM_RDRAND_GenerateBlock. | |||||
2019-10-29 | Fix wrong detection of AMD CPUs. | Mounir IDRASSI | 1 | -2/+2 | |
2019-10-28 | Linux: Fix compilation error on non-x86 platform by providing generic ↵ | Mounir IDRASSI | 1 | -0/+25 | |
implementation for jent_get_nstime function | |||||
2019-10-28 | Linux: Fix compilation error if type __u64 is already defined by gcc | Mounir IDRASSI | 1 | -5/+3 | |
This is the case with Mageia Cauldron which has gcc 9.2.1 | |||||
2019-10-24 | Linux/MacOSX: Better approach to avoid that jitterentropy code is optimized ↵ | Mounir IDRASSI | 1 | -1/+5 | |
by the compiler | |||||
2019-10-23 | Linux/MacOSX: Add missing JitterEntropy implementation | Mounir IDRASSI | 1 | -4/+13 | |