VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Boot
AgeCommit message (Collapse)AuthorFilesLines
2016-08-15Windows EFI Bootloader: modifications to prepare EFI system encryption ↵Alex2-1/+109
support (common files with DcsBoot)
2016-06-17Windows: Use Visual C++ 2010 instead of Visual C++ 2008.Mounir IDRASSI3-0/+424
2016-06-02Crypto: Add support for Japanese encryption standard Camellia, including for ↵Mounir IDRASSI3-3/+12
system encryption.
2016-05-10Remove trailing whitespaceDavid Foerster25-96/+96
2016-05-10Normalize all line terminatorsDavid Foerster27-5110/+5110
2016-04-20Windows: Reduce memory usage of Rescue Disk for cascades by 1KB.Mounir IDRASSI1-5/+1
2016-04-20Windows: Add option to avoid PIM prompt in pre-boot authentication by ↵Mounir IDRASSI6-59/+86
storing PIM value unencrypted in MBR.
2016-02-22Windows bootloader: try to fix boot issues on some machines by increasing ↵Mounir IDRASSI1-5/+5
required memory by 1 KiB
2016-01-29Windows Bootloader: Always hide password/PIM values with '*' after ENTER is ↵Mounir IDRASSI1-15/+15
hit, even if F5 was pressed to display password/PIM.
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI25-25/+25
2015-12-05Windows Rescue Disk: when decryption paused/finished, display message to ↵Mounir IDRASSI1-0/+4
indicate that header is being updated
2015-11-26Windows Bootloader: Avoid displaying empty new line between password and PIM ↵Mounir IDRASSI1-1/+4
after filling password field with dummy '*'.
2015-10-15Windows Rescue Disk: compress bootloader for rescue disk in several more ↵Mounir IDRASSI1-2/+2
cases because of its growing size.
2015-10-15Windows Bootloader: Protect password/PIM length by filling the fields to ↵Mounir IDRASSI2-4/+22
their maximum length with '*' after ENTER is hit
2015-09-13Windows Bootloader: Fix Rescue Disk issue when Cascades and SHA256 used. It ↵Mounir IDRASSI3-2/+10
was caused by the bootloader becoming too big in this case with PIM implementation (larger than the limit of 31232 bytes). We also increase memory requirement for this case
2015-09-13Windows Bootloader: pass correct compressed data size to decompressor and ↵Mounir IDRASSI1-2/+3
use shorter string to keep a valid memory layout for boot sector.
2015-08-28Windows bootloader: Mask/unmask PIM value in bootloader the same way as the ↵Mounir IDRASSI1-2/+7
password
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI26-117/+217
and TrueCrypt 3.0.
2015-07-11Use Pim name for internal variables instead of the old name PinMounir IDRASSI2-15/+15
2015-06-08Windows: rename PIN to PIM to avoid confusion. Better error messages.Mounir IDRASSI1-4/+4
2015-05-26Windows: first implementation of dynamic modeMounir IDRASSI5-13/+80
2015-05-03Windows: enable showing/hiding password for system encryption in Windows UI ↵Mounir IDRASSI1-2/+9
and in the bootloader (F5 key). This will be helpful to diagnose issues with non-US versions of Windows.
2015-04-06Windows: Require upgrading rescue disk since we changed bootloader in 1.0f-2Mounir IDRASSI1-1/+1
2015-03-02Windows Bootloader: Display message after entering password to inform user ↵Mounir IDRASSI1-1/+5
that the password is being processed. Without this, users coming from TrueCrypt think that the system is freezed since they expect it to boot quickly.
2014-11-08Add support for SHA-256 in key derivation for bootloader encryption. Create ↵Mounir IDRASSI2-3/+18
separate bootloader images for SHA-256 and RIPEMD-160. Set SHA-256 as the default PRF for boot encryption and SHA-512 as default PRF for all other cases. Depricate RIPEMD-160.
2014-11-08Windows vulnerability fix : finally make bootloader decompressor more robust ↵Mounir IDRASSI3-411/+448
and secure by adding multiple checks and validation code. This solves the issue found by the Open Crypt Audit project. Note that we had to switch to the slow implementation of the function decode in order to keep the size of the decompressor code under 2K.
2014-11-08Revert previous modification on boad-loader decompressor because it ↵Mounir IDRASSI3-54/+18
increased its size and it became impossible to include it with the SERPENT version of bootloader. The decompressor and the compressed bootloader are copied twice (original and backup) in the 63 first sectors of the hard drive (32K), thus the size limitation. This reverts commit 154235d589222e3c31cda05aa53e73ab69a89a6e.
2014-11-08Windows vulnerability fix : make boot-loader decompressor more robust and ↵Mounir IDRASSI3-18/+54
secure by adding multiple checks and validation code. Note that we had to switch to the slow implementation of the function decode in order to keep the size of the decompressor code under 2K.
2014-11-08Static Code Analysis: Correctly initialize variables to avoid false-positive ↵Mounir IDRASSI2-3/+3
detection in the boot code.
2014-11-08Require to upgrade rescue disk if upgrading from version 1.0a of VeraCrypt ↵Mounir IDRASSI1-1/+1
instead of version 6.0a (left over from TrueCrypt). Does anyone still uses VeraCrypt 1.0a???
2014-11-08Detect correctly VeraCrypt rescue disk by looking for the little-endian ↵Mounir IDRASSI1-1/+1
encoding of "Vera" instead of "True".
2014-11-08Modifications to remove all TrueCrypt references in names. generate new ↵Mounir IDRASSI2-7/+7
GUIDs for VeraCrypt. Replace "TRUE" by "VERA" in volume headers and driver magic word.
2014-11-08Add original TrueCrypt 7.1a sourcesMounir IDRASSI27-0/+5225