VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Crypto
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2020-06-18 16:41:24 +0200
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2020-06-19 01:28:07 +0200
commit0e3f4c40e3b1c5d8958148b079d4e9c6ae60ae69 (patch)
treef5f9889f046af1e17312346fcb9e898d4d6cb713 /src/Crypto
parenteaf400b088c147042457a15bd4a3d44941e86cb0 (diff)
downloadVeraCrypt-0e3f4c40e3b1c5d8958148b079d4e9c6ae60ae69.tar.gz
VeraCrypt-0e3f4c40e3b1c5d8958148b079d4e9c6ae60ae69.zip
Windows: remove duplicated function to detect AES-NI support in CPU
Diffstat (limited to 'src/Crypto')
-rw-r--r--src/Crypto/Aes_hw_cpu.h2
-rw-r--r--src/Crypto/cpu.c22
2 files changed, 2 insertions, 22 deletions
diff --git a/src/Crypto/Aes_hw_cpu.h b/src/Crypto/Aes_hw_cpu.h
index 8977cbc0..b294e2ee 100644
--- a/src/Crypto/Aes_hw_cpu.h
+++ b/src/Crypto/Aes_hw_cpu.h
@@ -20,7 +20,9 @@ extern "C"
{
#endif
+#if defined (TC_WINDOWS_BOOT)
byte is_aes_hw_cpu_supported ();
+#endif
void aes_hw_cpu_enable_sse ();
void aes_hw_cpu_decrypt (const byte *ks, byte *data);
void aes_hw_cpu_decrypt_32_blocks (const byte *ks, byte *data);
diff --git a/src/Crypto/cpu.c b/src/Crypto/cpu.c
index 4aeb8d39..99b81700 100644
--- a/src/Crypto/cpu.c
+++ b/src/Crypto/cpu.c
@@ -422,28 +422,6 @@ void DetectX86Features()
*((volatile int*)&g_x86DetectionDone) = 1;
}
-int is_aes_hw_cpu_supported ()
-{
- int bHasAESNI = 0;
- uint32 cpuid[4];
-
- if (CpuId(1, cpuid))
- {
- if (cpuid[2] & (1<<25))
- bHasAESNI = 1;
-#if !defined (_UEFI) && ((defined(__AES__) && defined(__PCLMUL__)) || defined(__INTEL_COMPILER) || CRYPTOPP_BOOL_AESNI_INTRINSICS_AVAILABLE)
- // Hypervisor = bit 31 of ECX of CPUID leaf 0x1
- // reference: http://artemonsecurity.com/vmde.pdf
- if (!bHasAESNI && (cpuid[2] & (1<<31)))
- {
- bHasAESNI = Detect_MS_HyperV_AES ();
- }
-#endif
- }
-
- return bHasAESNI;
-}
-
void DisableCPUExtendedFeatures ()
{
g_hasSSE2 = 0;