VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common
AgeCommit message (Collapse)AuthorFilesLines
2019-10-03Windows: Add function RandinitWithCheck to detect if random generator was ↵Mounir IDRASSI2-1/+14
already initialized before our call or not
2019-10-03Windows: Use Jitterentropy RNG only in SlowPoll call and not in FastPoll ↵Mounir IDRASSI1-13/+0
since the it consumes too much CPU and FastPoll requires fast and minimal entropy gathering
2019-10-03'#define VERSION_STRING XXX' must come before '#define VERSION_STRING_SUFFIX ↵El Mostafa Idrassi1-3/+3
YYY' (#506) in order for 'export TC_VERSION := $(shell grep VERSION_STRING ../Common/Tcdefs.h | head -n 1 | cut -d'"' -f 2)' in 'src/Main/Main.make' to actually return the version rather than '-CustomEFI'.
2019-10-02Increment version to 1.24-Beta6Mounir IDRASSI1-3/+3
2019-09-30Windows: when periodic update of device is disabled, use SetupAPI to list ↵Mounir IDRASSI1-1/+3
disks on demand instead of testing all disks to reduce CPU usage.
2019-09-30Windows: resize VeraCrypt Format Wizard and Mount Options dialogs to fix ↵Mounir IDRASSI1-24/+25
some text truncation issues with non-English languages.
2019-09-29Windows: Update the encoded hash of the code signing certificate used to ↵Mounir IDRASSI1-6/+6
verify the integrity of binaries.
2019-09-29Windows: Use periodic update of connected devices only if there is a ↵Mounir IDRASSI2-1/+7
Favorite that uses VolumeID. Add command option to disable the period update of devices.
2019-09-27Windows: fix another typo in code comment (hopefully last one!)Mounir IDRASSI1-1/+1
2019-09-27Windows: fix typo in code commentMounir IDRASSI1-1/+1
2019-09-26Windows: Fix sporadic keyboard issue in Secure Desktop for password dialog ↵Mounir IDRASSI2-1/+6
by not using the trick to put it reliably in foreground. The trick is based on a emulation of ALT+TAB but sometimes ALT key would remain pressed in case of Secure Desktop making it impossible to type the password (a workaround was to press CTRL key which reset the state of ALT key)
2019-09-25Windows: Add two missing UI strings to XML translation files so that they ↵Mounir IDRASSI2-1/+3
can be localized correctly
2019-09-23Fix build error of UEFI bootloader caused by latest changes that introduced ↵Mounir IDRASSI2-1/+3
ChaCha20 and T1HA algorithms and which are not present nor used in UEFI bootloader
2019-03-09Increment version to 1.24-Beta5Mounir IDRASSI1-2/+2
2019-03-09Increment version to 1.24-Beta4 and update release notes to clarify that ↵Mounir IDRASSI1-2/+2
password length increase applies only to non-system volumes.
2019-03-03Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt ↵Mounir IDRASSI1-0/+2
driver
2019-03-03Fix formatting of credits in About dialog and documentationMounir IDRASSI1-1/+1
2019-03-03Windows: Add missing UI string to XML language files.Mounir IDRASSI1-0/+1
2019-03-03Increment version to 1.24-Beta3. Update Release Notes.Mounir IDRASSI1-3/+3
2019-03-03Windows: Add option to use legacy maximum password length (64 characters) ↵Mounir IDRASSI4-6/+12
instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt.
2019-03-02Windows: fix compilation errorMounir IDRASSI1-1/+1
2019-03-02Windows: mitigate some memory attacks by making VeraCrypt applications ↵Mounir IDRASSI2-0/+91
memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code (https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150)
2019-03-02Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵Mounir IDRASSI8-4/+117
especially Format and Expander
2019-03-01Windows: better debug messages for VcProtectKeys and VcUnprotectKeys functionsMounir IDRASSI1-3/+11
2019-03-01Windows Driver: Implement RAM encryption for cached passwordsMounir IDRASSI3-11/+91
2019-03-01Windows: Add some logs in functions for RAM encryptionMounir IDRASSI1-0/+8
2019-03-01Windows: use specific order for EFI boot arguments memory regions that ↵Mounir IDRASSI1-0/+8
matches the one used by EFI bootloader.
2019-03-01Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵Mounir IDRASSI5-6/+279
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
2019-02-15Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it ↵Mounir IDRASSI2-2/+2
in Mount.c
2019-02-15Windows: Set CpuRngDisabled variable to TRUE for clarity even if it will be ↵Mounir IDRASSI1-1/+1
set to TRUE anyway by default through EnableCpuRng calls
2019-02-12Add copyright and license information of JitterEntropy library by Stephan ↵Mounir IDRASSI1-2/+3
Mueller
2019-02-12Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by ↵Mounir IDRASSI1-0/+27
Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de)
2019-02-10Windows: Ensure that only one thread at a time can create a secure desktopMounir IDRASSI1-0/+8
2019-02-10Fix typo in CPU RNG detection condition (Github issue #417)Mounir IDRASSI1-1/+1
2019-02-08Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵Mounir IDRASSI5-5/+39
which is now disabled by default
2019-02-04Automatically truncate passwords for TrueCrypt volumes and System Encryption ↵Mounir IDRASSI2-2/+4
to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version.
2019-02-01Update Release Notes and other files for 1.24-Beta2 releaseMounir IDRASSI1-1/+1
2019-02-01Windows: use CPU RDRAND or RDSEED as an additional entropy source for our ↵Mounir IDRASSI1-5/+25
random generator when available
2019-02-01Windows driver: replace SHA512 by RIPEMD160 when calculating internal hash ↵Mounir IDRASSI2-6/+7
of master key to avoid calling KeSaveFloatingPointState/KeSaveExtendedProcessorState since SHA512 implementation uses SSE2/AVX and RIPEMD160 is pure C
2019-01-28Increment version to 1.24-Beta2Mounir IDRASSI1-2/+2
2019-01-28Increase password maximum length to 128 bytes from 64 bytesMounir IDRASSI7-17/+50
2019-01-26Windows: Add a build configuration containing EFI bootloader signed with ↵Mounir IDRASSI5-4/+13
custom SecureBoot key instead
2019-01-26Windows: fix building MBR bootloader following modification of Xts.cMounir IDRASSI1-0/+2
2019-01-25Windows crypto: optimize XTS implementation for 64-bit builds using SSE2 ↵Mounir IDRASSI1-48/+122
thanks to simplification of storage of whitening values in memory (normal order instead of reverse order).
2019-01-22Windows: Increment driver version to 1.24.1.1Mounir IDRASSI1-1/+1
2019-01-21Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵Mounir IDRASSI7-51/+56
not needed after their key schedule is created
2019-01-21Windows: remove unused fields from CRYPTO_INFO structureMounir IDRASSI2-9/+3
2019-01-18Windows: fix editor of EFI configuration file not accepting ENTER key for ↵Mounir IDRASSI1-2/+2
adding new lines.
2019-01-15Windows: enhancements to EFI system encryption, like handling of Multi-Boot ↵Mounir IDRASSI4-40/+79
and better compatibility with Windows Upgrade process.
2019-01-14Update Release Notes and language files for version 1.24-Beta1. Add signed ↵Mounir IDRASSI1-1/+1
Windows drivers.