VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/Crypto.c
AgeCommit message (Collapse)AuthorFilesLines
2019-03-02Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵Mounir IDRASSI1-2/+8
especially Format and Expander
2019-03-01Windows: better debug messages for VcProtectKeys and VcUnprotectKeys functionsMounir IDRASSI1-3/+11
2019-03-01Windows Driver: Implement RAM encryption for cached passwordsMounir IDRASSI1-2/+2
2019-03-01Windows: Add some logs in functions for RAM encryptionMounir IDRASSI1-0/+8
2019-03-01Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵Mounir IDRASSI1-0/+209
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
2019-02-15Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it ↵Mounir IDRASSI1-1/+1
in Mount.c
2019-02-15Windows: Set CpuRngDisabled variable to TRUE for clarity even if it will be ↵Mounir IDRASSI1-1/+1
set to TRUE anyway by default through EnableCpuRng calls
2019-02-10Fix typo in CPU RNG detection condition (Github issue #417)Mounir IDRASSI1-1/+1
2019-02-08Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵Mounir IDRASSI1-0/+26
which is now disabled by default
2019-01-21Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵Mounir IDRASSI1-2/+6
not needed after their key schedule is created
2019-01-09Windows Security: Add new entry point in driver that allows emergency ↵Mounir IDRASSI1-0/+10
clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected.
2018-03-27Crypto: Add support for 5 new cascades of cipher algorithms ↵Mounir IDRASSI1-0/+5
(Camellia-Kuznyechik, Camellia-Serpent, Kuznyechik-AES, Kuznyechik-Serpent-Camellia and Kuznyechik-Twofish)
2017-11-27SIMD speed optimization for Kuznyechik cipher implementation (up to 2x ↵Mounir IDRASSI1-0/+29
speedup). Based on https://github.com/aprelev/libgost15.
2017-07-22Windows: reduce size of MBR bootloader by removing unused functions in each ↵Mounir IDRASSI1-44/+24
build type.
2017-07-04Windows: correctly handle SEH exceptions during self-tests in order to ↵Mounir IDRASSI1-4/+4
disable CPU extended features in such case.
2017-06-23Update IDRIX copyright yearMounir IDRASSI1-1/+1
2017-06-21Crypto: Add optimized Camellia assembly implementation for x86_64 based on ↵Mounir IDRASSI1-0/+7
work by Jussi Kivilinna (https://github.com/jkivilin/supercop-blockciphers). This improve speed by a factor of 2.5 when AES-NI supported by CPU and by 30% if AES-NI not supported.
2017-01-12Windows: Fix Streebog not recognized by /hash command line switch but making ↵Mounir IDRASSI1-2/+3
hash names matching more generic.
2016-12-26Windows: Enable Twofish optimized 64-bit assembly for UEFI bootloader since ↵Mounir IDRASSI1-3/+3
a pre-compiled object file was included to its build system.
2016-12-07Windows: Don't use Twofish x64 assembly implementation for UEFI bootloader ↵Mounir IDRASSI1-3/+3
(for now, yasm is not integrated in EDKII framework).
2016-12-07Crypto: Add optimized Twofish assembly implementation for x86_64.Mounir IDRASSI1-0/+13
2016-10-17Windows EFI: don't use optimized Serpent implementation for EFI bootloader ↵Mounir IDRASSI1-3/+3
because lack of C++ support in EDKII framework
2016-10-17Crypto: Use SIMD optimized Serpent implementation from Botan. 2.5x speed ↵Mounir IDRASSI1-2/+36
gain factor. Update credits and copyrights notice.
2016-10-17Add test vectors for Kuznyechik and GOST89 (the later is deprecated)Mounir IDRASSI1-1/+1
2016-10-17Crypto: deprecate GOST89 so that it can't be used to create new volumes. ↵Mounir IDRASSI1-1/+1
Keep only for existing volumes.
2016-08-17Linux: fix various compilation issues under Linux.Mounir IDRASSI1-1/+1
2016-08-15Windows: Show only supported encryption algorithm in the system encryption ↵Mounir IDRASSI1-13/+19
wizard for MBR
2016-08-15Windows EFI Bootloader: modifications to prepare EFI system encryption ↵Alex1-40/+46
support (common files with DcsBoot)
2016-08-15Windows: Add support for Streebog (hash) and kuznyechik (encryption)Mounir IDRASSI1-0/+8
2016-08-15Windows: Add Magma cipher (GOST-89)Mounir IDRASSI1-1/+35
2016-07-24Crypto: Workaround for AES-NI issue under Hyper-V on Windows Server 2008 R2 ↵Mounir IDRASSI1-0/+5
which masks AES-NI from applications although it is available.
2016-06-02Crypto: Add support for Japanese encryption standard Camellia, including for ↵Mounir IDRASSI1-1/+19
system encryption.
2016-05-10Remove trailing whitespaceDavid Foerster1-19/+19
2016-05-10Normalize all line terminatorsDavid Foerster1-1058/+1058
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2016-01-03Cryptography: Set 16-byte alignment for KEY_INFO structure that is used as ↵Mounir IDRASSI1-0/+2
input for Whirlpool hash. This helps improve performance.
2015-11-26Windows: Full UNICODE rewrite and implement support for UNICODE passwords.Mounir IDRASSI1-46/+38
2015-09-16Windows: first implementation of CLI support for creating volumes.Mounir IDRASSI1-2/+2
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-7/+9
and TrueCrypt 3.0.
2015-01-03Windows: change cascade encryption naming format to reflex mathematical ↵Mounir IDRASSI1-8/+24
composition of the encryption algorithm, thus being more clear. For example AES(Twofish(Serpent)) instead of AES-Twofish-Serpent.
2014-11-08Bootloader: optimize code size in single cipher mode by manually inlining ↵Mounir IDRASSI1-24/+3
EAInit, EAGetFirst and EAGetKeySize, and by removing the loop in ReadVolumeHeader that tests for encryption algorithms.
2014-11-08Add support for SHA-256 in key derivation for bootloader encryption. Create ↵Mounir IDRASSI1-16/+31
separate bootloader images for SHA-256 and RIPEMD-160. Set SHA-256 as the default PRF for boot encryption and SHA-512 as default PRF for all other cases. Depricate RIPEMD-160.
2014-11-08Optimize code space and solve the Serpent issue ↵Mounir IDRASSI1-4/+4
(https://sourceforge.net/p/veracrypt/discussion/technical/thread/fb09633a/#6406) by removing key length parameter from serpent_set_key and twofish_set_key
2014-11-08Adapt certain functions in the case of Windows bootloader in order to make ↵Mounir IDRASSI1-3/+32
its size as small as possible.
2014-11-08Remove deprecated/legacy cryptographic algorithms and encryption modes that ↵Mounir IDRASSI1-864/+10
are never used by VeraCrypt. This will speed up volumes opening in many cases.
2014-11-08Static Code Analysis : Add various NULL pointers checksMounir IDRASSI1-8/+14
2014-11-08Add original TrueCrypt 7.1a sourcesMounir IDRASSI1-0/+1871