VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/BootEncryption.h
AgeCommit message (Collapse)AuthorFilesLines
2019-11-22Windows: Add new registry flags for SystemFavoritesService to control ↵Mounir IDRASSI1-2/+6
updating of EFI BIOS boot menu on shutdown. This will help better manage multi-boot scenarios where we should not mess up with boot order (e.g. grub2 case)
2019-10-27Windows: code refactoring and convert NTSTATUS error code to WIN32 ↵Mounir IDRASSI1-3/+5
equivalent before displaying error message.
2019-10-27Windows: Make EFI System Encryption PostOOBE code more robust to failure to ↵Mounir IDRASSI1-2/+3
access "\\\\?\\GLOBALROOT" disk namespace
2019-10-27Windows: Update EFI NVRAM variable only if changed or doesn't exist and add ↵Mounir IDRASSI1-2/+4
configuration to force setting EFI BootNext to veraCrypt bootloader before each shutdown
2019-10-20Windows: Avoid unnecessary write operations when copying/modifying EFI ↵Mounir IDRASSI1-0/+2
bootloader files in order to avoid leaking modification timestamp
2019-10-20Windows: Add checks that the System Favorites service is running. Warn user ↵Mounir IDRASSI1-0/+1
if he enabled option to clear RAM encryption keys and the service is stopped.
2019-10-18Windows: handle case of DcsProp configuration file for EFI system encryption ↵Mounir IDRASSI1-0/+2
contains wrong "ActionSuccess" entry that points towards bootmgfw.efi which is now our bootloader and not Microsoft one.
2019-01-15Windows: enhancements to EFI system encryption, like handling of Multi-Boot ↵Mounir IDRASSI1-1/+6
and better compatibility with Windows Upgrade process.
2019-01-14Windows: Implement feature that enables clearing of encryption keys when a ↵Mounir IDRASSI1-5/+3
new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade).
2018-05-03Windows: Support machines without "EFI\Boot" folder for EFI system ↵Mounir IDRASSI1-1/+2
encryption (e.g. Windows LTSB). Compatibility enhancements for EFI system encryption.
2018-04-23Windows: Don't start EFI system encryption process if SecureBoot is enabled ↵Mounir IDRASSI1-0/+1
and VeraCrypt-DCS custom keys were not loaded in the machine firmware.
2018-04-23Windows: Fix system encryption issues on machines that always force booting ↵Mounir IDRASSI1-0/+3
on Microsoft bootloader (e.g. HP).
2018-04-23Windows: enhance ReflectDrivers mechanism by persisting it across major ↵Mounir IDRASSI1-1/+3
Windows upgrades.
2018-04-23Windows: implement compatibility for Windows 10 major updates using ↵Mounir IDRASSI1-1/+1
ReflectDrivers mechanism whose support started from Windows 10 version 1607.
2017-07-20Windows: better workaround for cases where ERROR_INVALID_PARAMETER is ↵Mounir IDRASSI1-1/+2
returned during system encryption which is due to 4096-bytes alignment of disk.
2017-07-03Windows: workaround for some cases where the system return ↵Mounir IDRASSI1-1/+1
ERROR_INVALID_PARAMETER when we try to write EFI bootloader files into ESP partition.
2017-06-23Update IDRIX copyright yearMounir IDRASSI1-1/+1
2017-06-21Windows EFI Bootloader: Add new attributes "DcsBmlDriver" and ↵Mounir IDRASSI1-0/+2
"DcsBmlLockFlags" to EFI configuration DcsProp. Set their values to 0 to disable DcsBml functionality.
2017-06-11Windows: Remove unused method ReadEfiConfigMounir IDRASSI1-1/+0
2017-06-11Windows: code refactoring for handling of ESP files (DcsProp and PlatformInfo).Mounir IDRASSI1-0/+2
2017-06-05Beta2 patch 1kavsrf1-2/+6
Edit DcsProp and PlatformInfo from System->Settings EFI loader updated
2017-06-05PlatformInfo read. (via ReadEfiConfig)kavsrf1-1/+1
It is displayed in System settings
2017-05-17Windows: use IOCTL_DISK_GET_DRIVE_GEOMETRY_EX instead of the deprecated ↵Mounir IDRASSI1-1/+1
IOCTL_DISK_GET_DRIVE_GEOMETRY in order to get accurate disk size value.
2016-10-17Windows: Remove VeraCrypt from EFI boot partition after decrypting the systemMounir IDRASSI1-7/+8
2016-10-17Windows: Perform Shutdown instead of Reboot during Pre-Test of UEFI system ↵Mounir IDRASSI1-1/+1
encryption in order to detect machines where changes to EFI boot don't persist after shutdown.
2016-10-17Windows: Replace XZip/XUnzip library with zlib and libzip and include the ↵Mounir IDRASSI1-0/+13
sources of these library into VeraCrypt source tree.
2016-08-15Windows: Implement Rescue Disk support for EFI system encryptionMounir IDRASSI1-1/+4
2016-08-15Windows: Implement support for EFI system encryption in Windows GUI.Mounir IDRASSI1-10/+87
2016-05-10Remove trailing whitespaceDavid Foerster1-1/+1
2016-05-10Normalize all line terminatorsDavid Foerster1-255/+255
2016-04-20Windows: Add option to avoid PIM prompt in pre-boot authentication by ↵Mounir IDRASSI1-2/+2
storing PIM value unencrypted in MBR.
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2016-01-03Windows: Fix Dll hijacking vulnerability affecting installer that allows ↵Mounir IDRASSI1-1/+0
arbitrary code execution with elevation of privilege (CVE-2016-1281)
2015-11-26Windows: Full UNICODE rewrite and implement support for UNICODE passwords.Mounir IDRASSI1-22/+22
2015-09-16Windows: Add functionality to verify Rescue Disk ISO image file.Mounir IDRASSI1-0/+1
2015-09-16Windows: Correctly detect presence of CD/DVD recorder during the creation of ↵Mounir IDRASSI1-1/+1
Rescue Disk. Check only CD/DVD drives and removable media when looking for rescue disk during its verification.
2015-09-06Windows Installer: better handling for updating system favorite service from ↵Mounir IDRASSI1-0/+1
1.0f-2 (solve Windows 10 issue) . Remove extra VeraCrypt files that may remain after uninstalling it.
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-5/+9
and TrueCrypt 3.0.
2015-07-29Windows: Implement Evil-Maid-Attack detection mechanism. Write the correct ↵Mounir IDRASSI1-0/+4
bootloader when changing the system encryption password: this enables to recover if an attack is detected.
2015-07-13Windows: on 64-bit Windows, more System favorite service from SysWoW64 to ↵Mounir IDRASSI1-0/+1
System32 since now all binaries are native 64-bit on 64-bit machines.
2015-07-11Use Pim name for internal variables instead of the old name PinMounir IDRASSI1-3/+3
2015-07-06Windows: Display source location of errors in order to help diagnose issues ↵Mounir IDRASSI1-1/+1
reported by users
2015-05-26Windows: first implementation of dynamic modeMounir IDRASSI1-3/+3
2015-02-09Static Code Analysis: Add more checks. Avoid unhandled ATL exceptions by ↵Mounir IDRASSI1-4/+7
checking memory allocation. Avoid throwing exception in File constructor and simplify code.
2014-12-27Windows: use the correct parent window when changing the password of the ↵Mounir IDRASSI1-1/+1
encrypted system partition.
2014-12-16Windows: Enhance performance by implementing the possibility to choose the ↵Mounir IDRASSI1-1/+1
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption.
2014-11-08Implement support for creating and booting encrypted partition using ↵Mounir IDRASSI1-0/+1
SHA-256. Support SHA-256 for normal volumes as well.
2014-11-08Add option in select the number of passes for volume header over-writing. By ↵Mounir IDRASSI1-1/+1
default, it is set to 3 but it can be increased to 256 passes (which can lead to a delay of many hours for a single password change operation).
2014-11-08Static Code Analysis : Correctly initialize member variables in various ↵Mounir IDRASSI1-1/+1
constructors
2014-11-08Change namespace from TrueCrypt to VeraCrypt. Rename method from Resources ↵Mounir IDRASSI1-1/+1
Resources::GetTrueCryptIcon to Resources::GetVeraCryptIcon.