VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Crypto
AgeCommit message (Collapse)AuthorFilesLines
8 daysWindows Driver: Use system functions directly instead of dynamic loading ↵Mounir IDRASSI1-4/+4
since we are targeting Windows 10
10 daysWindows: remove 32-bit logic from the code since we support only 64-bit. ↵Mounir IDRASSI3-26/+5
remove 32-bit EFI bootloader files. We also fix intermediary files folder for Portable and Setup projects
11 daysWindows: remove VS 2019 solution and project files since we migrated to VS 2022.Mounir IDRASSI2-482/+0
11 daysWindows: Fix delayload link warning about comdlg32.dll not used. Remove ↵Mounir IDRASSI1-587/+0
unused old project files
11 daysWindows: move main project files and solution from VS 2010 to VS 2022. ↵Mounir IDRASSI2-99/+159
Delete unused files.
11 daysWindows: Upgrade VS 2019 solution/projects to VS 2022. Remove Win32 ↵Mounir IDRASSI1-132/+4
configuration for driver and binaries. Only setup remains 32-bit to be compatible with both x64 and arm64 Windows.
11 daysWindows: Fix various compiler warningsMounir IDRASSI1-1/+1
13 daysLinux: Fix build error following latest code cleanupMounir IDRASSI1-2/+2
13 daysWindows: Remove support for 32-bit driver code. Set build target as Windows ↵Mounir IDRASSI2-61/+29
10. Simplify code and fix all warnings in driver.
2024-11-11Linux: Fix build error caused by changes for dynamic CPU SHA support detectionMounir IDRASSI2-56/+61
2024-11-10Linux: Fix detection of SHA CPU support on virtualized environment by trying ↵Mounir IDRASSI1-0/+66
SHA instruction
2024-11-10Add support for SHA-256 x86 instrinsic for enhance performance of ↵Mounir IDRASSI9-0/+302
PBKDF2-HMAC-SHA256
2024-09-08Windows: Add support for x86 and x64 build for driver and binaries using ↵Mounir IDRASSI5-20/+26
Visual Studio 2019 We also enable Control Flow Guard and Spectre Mitigation
2024-06-12Avoid conflict with C++17 features std::byte by using uint8 type instead of byteMounir IDRASSI18-91/+90
2024-04-10Fix: 7 typos (#1324)RoboSchmied2-4/+4
Signed-off-by: RoboSchmied <github@roboschmie.de>
2023-11-13wolfCrypt as crypto backend for VeraCrypt (#1227)lealem475-1/+301
* wolfCrypt as crypto backend for VeraCrypt * Refactor to use EncryptionModeWolfCryptXTS class
2023-08-06Linux/macOS: Add explicit include of <sys/types.h> to define ssize_tMounir IDRASSI1-0/+2
Some systems (e.g. Alpine Linux) seems to require this.
2023-08-04fix warnings and UB (#1164)kovalev02-2/+2
* Crypto: fix warning mismatched bound ../Crypto/cpu.c:67:32: warning: argument 2 of type 'uint32[4]' {aka 'unsigned int[4]'} with mismatched bound [-Warray-parameter=] 67 | int CpuId(uint32 input, uint32 output[4]) | ~~~~~~~^~~~~~~~~ In file included from ../Crypto/cpu.c:3: ../Crypto/cpu.h:236:33: note: previously declared as 'uint32 *' {aka 'unsigned int *'} 236 | int CpuId(uint32 input, uint32 *output); Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> * Core/Unix: fix warning ignoring return value Unix/CoreUnix.cpp: In member function 'virtual std::shared_ptr<VeraCrypt:\ :VolumeInfo> VeraCrypt::CoreUnix::MountVolume(VeraCrypt::MountOptions&)': Unix/CoreUnix.cpp:682:55: warning: ignoring return value of 'int chown(const char*, __uid_t, __gid_t)' declared with attribute 'warn_unused_result' [-Wunused-result] 682 | chown (mountPoint.c_str(), GetRealUserId(), GetRealGroupId()); | ~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> * Main/Forms: fix warning cast to pointer from integer of different size Forms/MainFrame.cpp: In member function 'void VeraCrypt::MainFrame:\ :UpdateVolumeList()': Forms/MainFrame.cpp:1718:106: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast] 1718 | Gui->InsertToListCtrl (SlotListCtrl, ++prevItemIndex, fields, 0, (void *) volume->SlotNumber); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Forms/MainFrame.cpp:1753:114: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast] 1753 | Gui->InsertToListCtrl (SlotListCtrl, ++prevItemIndex, fields, 0, (void *) slotNumber); | ^~~~~~~~~~~~~~~~~~~ Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> * Crypto: fix undefined behavior signed integer overflow In function 'twofish_set_key': cc1: warning: iteration 4 invokes undefined behavior [-Waggressive-loop-optimizations] ../Crypto/Twofish.c:626:23: note: within this loop 626 | for (i = 0; i != 40; i += 2) | ~~^~~~~ Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> --------- Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> Co-authored-by: Vasiliy Kovalev <kovalev@altlinux.org>
2023-07-18Windows: Fix compiler warningsMounir IDRASSI1-1/+0
2023-06-30Correctly detect ARM builds when listing CPU features in headersMounir IDRASSI1-4/+4
2023-06-13Crypto: Fix detection of SSSE3 intrinsics in compilerMounir IDRASSI1-1/+1
We use correct define CRYPTOPP_BOOL_SSSE3_INTRINSICS_AVAILABLE
2023-05-26Windows: Add missing Blake2s source files to VS 2019 crypto projectMounir IDRASSI1-0/+3
2022-08-21Fixed a typo error (#929)Matteo Baccan1-1/+1
Hi I have fixed a little typo error: a double semicolon at the end of one line ciao matteo
2022-03-26Windows: Add various checks to address Coverity reported issues.Mounir IDRASSI1-2/+2
2022-03-26Remove dead code from chacha_ECRYPT_encrypt_bytes (Coverity)Mounir IDRASSI1-15/+8
2022-03-21Add missing Blake2s source filesMounir IDRASSI10-0/+1474
2022-03-08Implement support of Blake2s-256 hash algorithm and remove deprecated ↵Mounir IDRASSI12-1410/+47
algorithms RIPEMD-160 and GOST89.
2022-02-13Linux/FreeBSD: Enable building without AESNI support by setting environment ↵Mounir IDRASSI2-0/+4
variable DISABLE_AESNI to 1 during build or passing NOAESNI=1 to make command This comes following Github issue #892 and which should be solved thanks to this.
2021-08-30Windows: Fix some VS static analyzed warningsMounir IDRASSI1-1/+1
2021-08-16MacOSX: Make AESNI availability linked to compiler target and not ↵Mounir IDRASSI1-0/+1
compilation host
2021-07-13Windows: Fix compilation error on ARM64 caused by definition of UINT64_MAXMounir IDRASSI1-1/+1
2021-01-02Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵Mounir IDRASSI6-2/+659
System encryption still not implemented on ARM64
2020-12-11Windows Driver: Fix build error using Windows 10 WDK caused by name conflict ↵Mounir IDRASSI1-4/+4
for KeSaveExtendedProcessorState/KeRestoreExtendedProcessorState functions
2020-12-11Crypto: small speed optimization of Streebog and removal of unused macroMounir IDRASSI1-35/+17
2020-07-25Remove unused variable in Streebog implementationMounir IDRASSI1-97/+0
2020-07-15Enable FIPS mode in JitterEntropy random generator in order to let the ↵Mounir IDRASSI1-1/+1
function jent_read_entropy report failure if any of the continuous statistical tests fail.
2020-06-26Whirlpool: Remove unused "num" variable affectation in WHIRLPOOL_addMounir IDRASSI1-1/+0
2020-06-25Crypto: Fix random crash in Streebog in 32-bit, caused by use of aligned ↵Mounir IDRASSI1-8/+8
SSE2 instructions _mm_load_si128. Now we use _mm_loadu_si128 instead which is not slower than _mm_load_si128 on recent CPUs
2020-06-19Windows: remove duplicated function to detect AES-NI support in CPUMounir IDRASSI2-22/+2
2019-12-09Fix wrong check on the define CRYPTOPP_BOOL_X64Mounir IDRASSI1-1/+1
2019-12-09Linux/MacOSX: use x64 optimized SHA256 implementation instead of limiting it ↵Mounir IDRASSI1-1/+1
to Windows.
2019-12-09Add burn calls for temporary ss variable (#569)Hanno Böck1-0/+13
2019-12-09Linux: fix NOASM compilation (#563) (#568)alt3r 3go6-10/+10
Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com>
2019-11-09Windows: include rdrand.h file only in Windows case since it is not yet ↵Mounir IDRASSI1-0/+2
included for other OSes
2019-11-07Windows: fix driver build error caused by missing headerMounir IDRASSI1-0/+5
2019-11-03Linux/MacOSX: Fix build error caused by RDRAND_getBytes/RDSEED_getBytes ↵Mounir IDRASSI1-1/+1
implemented only on Windows
2019-11-02Windows: when building for EFI bootloader, don't make calls to RDRAND/RDSEED ↵Mounir IDRASSI1-1/+2
functions since we don't link against their implementation in EFI bootloader
2019-10-30Update Jitterentropy Library to version 2.2.0Mounir IDRASSI3-183/+331
2019-10-30Disable both RDRAND and RDSEED if a failure is detectedMounir IDRASSI1-0/+13
2019-10-30Add check for buggy RDRAND (AMD Ryzen CPU case) even if we always use RDSEED ↵Mounir IDRASSI1-0/+13
instead of RDRAND when RDSEED is available (which is the case on modern CPUs)