VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/Random.c
AgeCommit message (Collapse)AuthorFilesLines
2023-11-13wolfCrypt as crypto backend for VeraCrypt (#1227)lealem471-20/+25
* wolfCrypt as crypto backend for VeraCrypt * Refactor to use EncryptionModeWolfCryptXTS class
2022-08-25Windows: use newer MEMORYSTATUSEX structure in call to GlobalMemoryStatusExMounir IDRASSI1-3/+3
2022-08-25Minor bugfixes (#950)Wendigo1-1/+1
* Update Dlgcode.c minor bugfixes * GlobalMemoryStatus x64 bugfix GlobalMemoryStatus deprecated in x64
2022-03-08Implement support of Blake2s-256 hash algorithm and remove deprecated ↵Mounir IDRASSI1-9/+9
algorithms RIPEMD-160 and GOST89.
2021-02-24Windows: Fix failure to launch keyfile generator in secure desktop modeMounir IDRASSI1-2/+6
Hooking is not allowed if thread is running in secure desktop so we ignore SetWindowsHookEx failure in this case and random generator will be initialized using the other entropy sources from the system.
2019-10-03Windows: Add function RandinitWithCheck to detect if random generator was ↵Mounir IDRASSI1-1/+13
already initialized before our call or not
2019-10-03Windows: Use Jitterentropy RNG only in SlowPoll call and not in FastPoll ↵Mounir IDRASSI1-13/+0
since the it consumes too much CPU and FastPoll requires fast and minimal entropy gathering
2019-02-12Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by ↵Mounir IDRASSI1-0/+27
Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de)
2019-02-08Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵Mounir IDRASSI1-5/+7
which is now disabled by default
2019-02-01Windows: use CPU RDRAND or RDSEED as an additional entropy source for our ↵Mounir IDRASSI1-5/+25
random generator when available
2017-06-23Update IDRIX copyright yearMounir IDRASSI1-1/+1
2016-08-21Windows: fix crash caused by previous Streebog fix.Mounir IDRASSI1-1/+1
2016-08-20Windows: Fix crash on 32-bit machines when using Streebog on a CPU that ↵Mounir IDRASSI1-1/+1
supports SSE4.1.
2016-08-15Windows: Add support for Streebog (hash) and kuznyechik (encryption)Mounir IDRASSI1-0/+15
2016-07-25Windows: solve benchmark issue for Whirlpool which caused wrong numbers when ↵Mounir IDRASSI1-1/+1
a 1GB buffer is chosen.
2016-05-10Remove trailing whitespaceDavid Foerster1-25/+25
2016-05-10Normalize all line terminatorsDavid Foerster1-898/+898
2016-02-07Windows:Fix various issues and warnings reported by static code analysis ↵Mounir IDRASSI1-3/+3
tool Coverity.
2016-01-31Windows: Implement GUI indicator for entropy collected from mouse movements.Mounir IDRASSI1-1/+13
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2015-11-26Windows: Full UNICODE rewrite and implement support for UNICODE passwords.Mounir IDRASSI1-10/+10
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-7/+9
and TrueCrypt 3.0.
2015-07-06Windows: Display source location of errors in order to help diagnose issues ↵Mounir IDRASSI1-4/+8
reported by users
2015-05-22Windows: make random generator function compatible with 64-bit execution ↵Mounir IDRASSI1-15/+34
environment
2015-04-06Windows vulnerability fix: CryptAcquireContext vulnerability fix. Add checks ↵Mounir IDRASSI1-10/+48
to random generator to abort in case of error and display a diagnose message to the user.
2015-02-09Static Code Analysis: handle unused variables more properly. Catch STL ↵Mounir IDRASSI1-1/+1
exception. Add more checks. Add proper cast to arithmetic operations.
2014-12-27Windows: use the correct window handle for creating message boxes. This ↵Mounir IDRASSI1-6/+6
became important after the introduction of the wait dialog in order to avoid having message boxes behind the wait dialog.
2014-12-11Implement function RandgetBytesFull that enables generating random bytes of ↵Mounir IDRASSI1-21/+47
any length.
2014-12-11Windows: correct lock issue in RandgetBytes by releasing critical section in ↵Mounir IDRASSI1-0/+1
case of error.
2014-11-08Implement support for creating and booting encrypted partition using ↵Mounir IDRASSI1-0/+15
SHA-256. Support SHA-256 for normal volumes as well.
2014-11-08Static Code Analysis : Generalize the use of Safe String functions. Add some ↵Mounir IDRASSI1-3/+4
NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL.
2014-11-08Static Code Analysis : fix non-absolute DLL/process loads that can be ↵Mounir IDRASSI1-1/+9
hijacked (Microsoft Security Advisory 2269637).
2014-11-08Add original TrueCrypt 7.1a sourcesMounir IDRASSI1-0/+772