VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Driver/DriveFilter.c
AgeCommit message (Collapse)AuthorFilesLines
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-5/+9
and TrueCrypt 3.0.
2015-08-06Windows: Add extra checks for bootloader tampering.Mounir IDRASSI1-7/+30
2015-07-29Windows: Implement Evil-Maid-Attack detection mechanism. Write the correct ↵Mounir IDRASSI1-0/+97
bootloader when changing the system encryption password: this enables to recover if an attack is detected.
2015-07-11Use Pim name for internal variables instead of the old name PinMounir IDRASSI1-8/+8
2015-06-07Windows: Add support for PIN in favorites. Several enhancements to GUI ↵Mounir IDRASSI1-0/+2
handling of Dynamic Mode.
2015-05-26Windows: first implementation of dynamic modeMounir IDRASSI1-3/+7
2015-05-15Windows driver: avoid race condition by using ↵Mounir IDRASSI1-6/+10
IoAttachDeviceToDeviceStackSafe instead IoAttachDeviceToDeviceStack. Set BootArgs.CryptoInfoLength to 0 after clearing boot memory.
2015-02-09Static Code Analysis: in Windows Driver, avoid using uninitialized stack ↵Mounir IDRASSI1-0/+39
memory as random and use proper random value for wipe operation. Solve potential double-free issue.
2015-01-03Windows: change cascade encryption naming format to reflex mathematical ↵Mounir IDRASSI1-1/+1
composition of the encryption algorithm, thus being more clear. For example AES(Twofish(Serpent)) instead of AES-Twofish-Serpent.
2014-12-30Windows driver: don't fail if the PRF recovered from boot memory is not ↵Mounir IDRASSI1-7/+0
recognized in case we are dealing with a restored bootloader coming from a version prior to 1.0f.
2014-12-28Windows: support loading TrueCrypt volumes. Implement converting TrueCrypt ↵Mounir IDRASSI1-2/+2
volumes to VeraCrypt using the change password functionality.
2014-12-16Windows: Enhance performance by implementing the possibility to choose the ↵Mounir IDRASSI1-15/+38
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption.
2014-12-11Windows Driver: change inherited TrueCrypt constants in kernel objects tags ↵Mounir IDRASSI1-1/+1
by VeraCrypt specific values. These are used in crash dumps analysis and during debugging.
2014-11-08Windows Driver Sanity check: check that the password length passed from the ↵Mounir IDRASSI1-17/+21
bootloader is less than or equal to 64 before using it.
2014-11-08Implement support for creating and booting encrypted partition using ↵Mounir IDRASSI1-0/+1
SHA-256. Support SHA-256 for normal volumes as well.
2014-11-08Windows vulnerability fix: correct possible BSOD attack targeted towards ↵Mounir IDRASSI1-3/+17
GetWipePassCount() / WipeBuffer() found by the Open Crypto Audit Project.
2014-11-08Windows vulnerability fix : clear sensitive data in Windows kernel driver by ↵Mounir IDRASSI1-1/+1
using burjn instead of memset
2014-11-08Fix password memory leak inside the Device driver in boot encryption mode.Mounir IDRASSI1-1/+1
2014-11-08Remove some legacy code inherited from True and that doesn't apply to VeraCryptMounir IDRASSI1-10/+1
2014-11-08Modifications to remove all TrueCrypt references in names. generate new ↵Mounir IDRASSI1-1/+1
GUIDs for VeraCrypt. Replace "TRUE" by "VERA" in volume headers and driver magic word.
2014-11-08Add original TrueCrypt 7.1a sourcesMounir IDRASSI1-0/+1942