1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 |
|
TARGETNAME=Crypto TARGETTYPE=DRIVER_LIBRARY INCLUDES = .. NTTARGETFILES = \ "$(OBJ_PATH)\$(O)\Aes_$(TC_ARCH).obj" \ "$(OBJ_PATH)\$(O)\Aes_hw_cpu.obj" SOURCES = \ Aes_$(TC_ARCH).asm \ Aes_hw_cpu.asm \ Aeskey.c \ Aestab.c \ cpu.c \ Rmd160.c \ Serpent.c \ Sha2.c \ Twofish.c \ Whirlpool.c ttacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>