VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/Volumes.c
AgeCommit message (Collapse)AuthorFilesLines
2019-01-21Windows: remove unused fields from CRYPTO_INFO structureMounir IDRASSI1-3/+2
2017-07-27Windows driver: correctly handle IOCTL_DISK_GET_DRIVE_GEOMETRY_EX to fix ↵Mounir IDRASSI1-12/+13
issues with some disks. Implement IOCTL_STORAGE_GET_MEDIA_TYPES_EX.
2017-06-23Update IDRIX copyright yearMounir IDRASSI1-1/+1
2017-05-17Windows: use IOCTL_DISK_GET_DRIVE_GEOMETRY_EX instead of the deprecated ↵Mounir IDRASSI1-12/+12
IOCTL_DISK_GET_DRIVE_GEOMETRY in order to get accurate disk size value.
2016-10-17Windows: Fix false-positive detection of Evil-Maid attack during creation ↵Mounir IDRASSI1-3/+0
process of hidden OS by excluding the configuration byte in the boot sector whose value changes depending on the content.
2016-10-17Windows: in function CreateVolumeHeaderInMemory, properly unlock and erase ↵Mounir IDRASSI1-8/+19
sensitive stack memory.
2016-10-17Securely erase and protect buffer holding decrypted volume header.Mounir IDRASSI1-0/+3
2016-09-11Windows: in case of In-Place encryption, encrypt random data instead of ↵Mounir IDRASSI1-7/+3
existing data when filling unused space like the other cases.
2016-08-15Windows: fix error caused by requesting large number of random bytes when ↵Mounir IDRASSI1-1/+1
writing randomly generated data to unused/reserved header areas.
2016-08-15Windows: fill unused/reserved header areas with the result of encryption of ↵Mounir IDRASSI1-1/+8
random data instead of the encryption of zeros for better entropy of resulting random data.
2016-08-15Windows EFI Bootloader: modifications to prepare EFI system encryption ↵Alex1-16/+42
support (common files with DcsBoot)
2016-08-15Windows: Add support for Streebog (hash) and kuznyechik (encryption)Mounir IDRASSI1-1/+9
2016-08-15Windows: Fix vulnerability inherited from TrueCrypt that allows an attacker ↵Mounir IDRASSI1-29/+70
to detect with high probability if a hidden volume is present. Vulnerability reported by Ivanov Alexey Mikhailovich.
2016-07-25Windows: solve benchmark issue for Whirlpool which caused wrong numbers when ↵Mounir IDRASSI1-4/+4
a 1GB buffer is chosen.
2016-06-02Crypto: Add support for Japanese encryption standard Camellia, including for ↵Mounir IDRASSI1-0/+8
system encryption.
2016-05-10Remove trailing whitespaceDavid Foerster1-26/+26
2016-05-10Normalize all line terminatorsDavid Foerster1-1270/+1270
2016-04-20Windows: Add option to avoid PIM prompt in pre-boot authentication by ↵Mounir IDRASSI1-2/+3
storing PIM value unencrypted in MBR.
2016-04-17Windows: fix keys parts not shown in system encryption wizard when the ↵Mounir IDRASSI1-1/+1
display keys checkbox is checked. This occurred when the "Display pool content" in the previous wizard page was unchecked before clicking Next.
2016-02-07Windows:Fix various issues and warnings reported by static code analysis ↵Mounir IDRASSI1-4/+4
tool Coverity.
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2016-01-03Cryptography: Set 16-byte alignment for KEY_INFO structure that is used as ↵Mounir IDRASSI1-2/+2
input for Whirlpool hash. This helps improve performance.
2015-12-21Windows: Implement PIM caching, both for system encryption and for normal ↵Mounir IDRASSI1-0/+8
volumes. Add options to activate it in the Preferences and System Settings.
2015-11-26Windows: solve GUI issues caused by using ANSI string instead of UNICODE ↵Mounir IDRASSI1-6/+6
ones. Remove Unused functions.
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-7/+9
and TrueCrypt 3.0.
2015-07-29Windows: Implement Evil-Maid-Attack detection mechanism. Write the correct ↵Mounir IDRASSI1-0/+37
bootloader when changing the system encryption password: this enables to recover if an attack is detected.
2015-07-11Use Pim name for internal variables instead of the old name PinMounir IDRASSI1-11/+11
2015-06-07Windows: Add support for PIN in favorites. Several enhancements to GUI ↵Mounir IDRASSI1-0/+4
handling of Dynamic Mode.
2015-05-26Windows: first implementation of dynamic modeMounir IDRASSI1-9/+12
2015-03-02Windows: if TrueCrypt volume created with a version prior to 6.0, display ↵Mounir IDRASSI1-1/+1
this version in the error message to help users understand why it is not working.
2015-01-04Windows: Add support for TrueCrypt 6.x since its format (v4) is identical to ↵Mounir IDRASSI1-1/+1
7.x apart from the sector size field which we already handle correctly.
2014-12-28Windows: support loading TrueCrypt volumes. Implement converting TrueCrypt ↵Mounir IDRASSI1-9/+36
volumes to VeraCrypt using the change password functionality.
2014-12-27Windows: use the correct window handle for creating message boxes. This ↵Mounir IDRASSI1-6/+6
became important after the introduction of the wait dialog in order to avoid having message boxes behind the wait dialog.
2014-12-16Windows: Enhance performance by implementing the possibility to choose the ↵Mounir IDRASSI1-4/+9
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption.
2014-11-08Simplify code handling iterations count: in boot mode, we'll set the correct ↵Mounir IDRASSI1-5/+5
iterations count inside derive_u_sha256 and derive_u_ripemd160 depending in the value of the iterations parameter. On normal mode, we use normal values of iterations count. Removes the special test parameter from RIPEMD160 functions.
2014-11-08Bootloader: in function ReadVolumeHeader, arrays dk and masterKey have the ↵Mounir IDRASSI1-12/+9
same size and they are never needed at the same time. So, we can minimize stack memory usage by using only one array instead of two. At the end of the function, the array is erased securely.
2014-11-08Bootloader: optimize code size in single cipher mode by manually inlining ↵Mounir IDRASSI1-2/+54
EAInit, EAGetFirst and EAGetKeySize, and by removing the loop in ReadVolumeHeader that tests for encryption algorithms.
2014-11-08Add support for SHA-256 in key derivation for bootloader encryption. Create ↵Mounir IDRASSI1-0/+24
separate bootloader images for SHA-256 and RIPEMD-160. Set SHA-256 as the default PRF for boot encryption and SHA-512 as default PRF for all other cases. Depricate RIPEMD-160.
2014-11-08Remove deprecated/legacy cryptographic algorithms and encryption modes that ↵Mounir IDRASSI1-80/+3
are never used by VeraCrypt. This will speed up volumes opening in many cases.
2014-11-08Static Code Analysis : Generalize the use of Safe String functions. Add some ↵Mounir IDRASSI1-4/+10
NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL.
2014-11-08Replace 'TRUE' by 'VERA' in some GUI constants and commentsMounir IDRASSI1-5/+5
2014-11-08Correct issue in handling hidden system partitions that made it impossible ↵Mounir IDRASSI1-2/+2
to verify their password.
2014-11-08Only position legacy flag if the first release of VeraCrypt is detectedMounir IDRASSI1-1/+1
2014-11-08Change the required version in volume header to the one of VeraCrypt (now 1.0)Mounir IDRASSI1-18/+1
2014-11-08Enhance security by rising the iterations used in PBKDF2 : 327670 instead of ↵Mounir IDRASSI1-4/+4
1000 when booting in encrypted system partition, and 2000000 instead of 2000 when using encrypted containers and partitions
2014-11-08Modifications to remove all TrueCrypt references in names. generate new ↵Mounir IDRASSI1-3/+3
GUIDs for VeraCrypt. Replace "TRUE" by "VERA" in volume headers and driver magic word.
2014-11-08Add original TrueCrypt 7.1a sourcesMounir IDRASSI1-0/+1198