VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common
AgeCommit message (Collapse)AuthorFilesLines
2019-03-02Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵Mounir IDRASSI8-4/+117
especially Format and Expander
2019-03-01Windows: better debug messages for VcProtectKeys and VcUnprotectKeys functionsMounir IDRASSI1-3/+11
2019-03-01Windows Driver: Implement RAM encryption for cached passwordsMounir IDRASSI3-11/+91
2019-03-01Windows: Add some logs in functions for RAM encryptionMounir IDRASSI1-0/+8
2019-03-01Windows: use specific order for EFI boot arguments memory regions that ↵Mounir IDRASSI1-0/+8
matches the one used by EFI bootloader.
2019-03-01Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵Mounir IDRASSI5-6/+279
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
2019-02-15Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it ↵Mounir IDRASSI2-2/+2
in Mount.c
2019-02-15Windows: Set CpuRngDisabled variable to TRUE for clarity even if it will be ↵Mounir IDRASSI1-1/+1
set to TRUE anyway by default through EnableCpuRng calls
2019-02-12Add copyright and license information of JitterEntropy library by Stephan ↵Mounir IDRASSI1-2/+3
Mueller
2019-02-12Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by ↵Mounir IDRASSI1-0/+27
Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de)
2019-02-10Windows: Ensure that only one thread at a time can create a secure desktopMounir IDRASSI1-0/+8
2019-02-10Fix typo in CPU RNG detection condition (Github issue #417)Mounir IDRASSI1-1/+1
2019-02-08Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵Mounir IDRASSI5-5/+39
which is now disabled by default
2019-02-04Automatically truncate passwords for TrueCrypt volumes and System Encryption ↵Mounir IDRASSI2-2/+4
to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version.
2019-02-01Update Release Notes and other files for 1.24-Beta2 releaseMounir IDRASSI1-1/+1
2019-02-01Windows: use CPU RDRAND or RDSEED as an additional entropy source for our ↵Mounir IDRASSI1-5/+25
random generator when available
2019-02-01Windows driver: replace SHA512 by RIPEMD160 when calculating internal hash ↵Mounir IDRASSI2-6/+7
of master key to avoid calling KeSaveFloatingPointState/KeSaveExtendedProcessorState since SHA512 implementation uses SSE2/AVX and RIPEMD160 is pure C
2019-01-28Increment version to 1.24-Beta2Mounir IDRASSI1-2/+2
2019-01-28Increase password maximum length to 128 bytes from 64 bytesMounir IDRASSI7-17/+50
2019-01-26Windows: Add a build configuration containing EFI bootloader signed with ↵Mounir IDRASSI5-4/+13
custom SecureBoot key instead
2019-01-26Windows: fix building MBR bootloader following modification of Xts.cMounir IDRASSI1-0/+2
2019-01-25Windows crypto: optimize XTS implementation for 64-bit builds using SSE2 ↵Mounir IDRASSI1-48/+122
thanks to simplification of storage of whitening values in memory (normal order instead of reverse order).
2019-01-22Windows: Increment driver version to 1.24.1.1Mounir IDRASSI1-1/+1
2019-01-21Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵Mounir IDRASSI7-51/+56
not needed after their key schedule is created
2019-01-21Windows: remove unused fields from CRYPTO_INFO structureMounir IDRASSI2-9/+3
2019-01-18Windows: fix editor of EFI configuration file not accepting ENTER key for ↵Mounir IDRASSI1-2/+2
adding new lines.
2019-01-15Windows: enhancements to EFI system encryption, like handling of Multi-Boot ↵Mounir IDRASSI4-40/+79
and better compatibility with Windows Upgrade process.
2019-01-14Update Release Notes and language files for version 1.24-Beta1. Add signed ↵Mounir IDRASSI1-1/+1
Windows drivers.
2019-01-14Windows: enhance support of new behavior of favorite service which is now ↵Mounir IDRASSI1-5/+6
always running in case of system encryption
2019-01-14Windows: Implement feature that enables clearing of encryption keys when a ↵Mounir IDRASSI4-56/+29
new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade).
2019-01-14Increment version to 1.24-Beta1Mounir IDRASSI1-4/+6
2019-01-09Windows Security: Add new entry point in driver that allows emergency ↵Mounir IDRASSI3-0/+13
clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected.
2019-01-09Windows driver: move newly added field in VOLUME_PROPERTIES_STRUCT to the ↵Mounir IDRASSI1-1/+1
end for compatibility with previous version.
2018-12-19Increment version to 1.24-Beta0Mounir IDRASSI1-4/+4
2018-12-19Windows: Add mount option that allows mounting a volume without attaching it ↵Mounir IDRASSI6-25/+31
to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX).
2018-12-03Windows: Update libzip to version 1.5.1Mounir IDRASSI3-2/+13
2018-10-10Increment version to 1.23-Hotfix-2Mounir IDRASSI1-3/+3
2018-10-10Windows: zero TC_IOCTL_GET_SYSTEM_DRIVE_CONFIG input/output parameter as it ↵Mounir IDRASSI1-0/+2
is done for other IOCTLs
2018-09-21Increment version to 1.23-Hotfix-1Mounir IDRASSI1-2/+2
2018-09-12Set 1.23 release date to September 12th 2018Mounir IDRASSI1-1/+1
2018-09-10Set 1.23 release date to September 10th 2018Mounir IDRASSI1-2/+2
2018-09-03Increment version to 1.23-BETA8 and update release notes.Mounir IDRASSI1-2/+2
2018-09-03Windows: handle case of inconsistencies in EFI system partition content ↵Mounir IDRASSI1-5/+32
during system encryption wizard caused by older VeraCrypt system encryption not properly uninstalled (e.g. reinstall Windows without decryption first).
2018-09-03Windows: fix regression when language selected in the setup during fresh ↵Mounir IDRASSI2-8/+10
install and that caused VeraCrypt background task to be disabled.
2018-09-03Windows: Don't include DcsBml.efi file in resources if custom configuration ↵Mounir IDRASSI1-0/+4
not enabled
2018-09-03Increment version to 1.23-BETA7 and update release notes.Mounir IDRASSI1-3/+3
2018-09-03Windows: add define to support case of using EFI bootloader signed by ↵Mounir IDRASSI1-3/+24
Microsoft (no check on custom keys in BIOS + removal of DcsBml EFI driver since it can not be signed).
2018-09-01Windows: handle case of some disk drivers not supporting ↵Mounir IDRASSI2-4/+78
IOCTL_DISK_GET_DRIVE_GEOMETRY_EX IOCTL.
2018-08-24Increment version to 1.23-BETA6Mounir IDRASSI1-2/+2
2018-08-24Windows: implement a driver configuration option to explicitly allow ↵Mounir IDRASSI2-3/+6
defragmenting non-système disques by Windows built-in defragmenter tool.