VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Driver
AgeCommit message (Collapse)AuthorFilesLines
2020-06-21Windows: Fix issue when RAM encryption used, AES selected and AES-NI not ↵Mounir IDRASSI1-0/+5
supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected by user.
2020-06-11Switch from auto_ptr to unique_ptr (#638)Christopher Bergqvist2-2/+2
2020-03-11Windows: Update signed Windows driver to version 1.24.15VeraCrypt_1.24-Update6Mounir IDRASSI1-2/+2
2020-02-11Increment version to 1.24-Update5 and update signed Windows drivers.Mounir IDRASSI1-2/+2
2020-02-10Windows: Implement support for processor groups in the driver and fix build ↵Mounir IDRASSI2-8/+60
issues caused by previous implementation
2019-12-10Increment version to 1.24-Update2Mounir IDRASSI1-2/+2
2019-12-09Windows Driver: Reduce memory usage of IOCTL_DISK_VERIFY handler. Now we ↵Mounir IDRASSI1-6/+22
reader disk by chunks of at most 64 KiB. Fix https://github.com/veracrypt/VeraCrypt/issues/562.
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI1-1/+33
especially for keyfiles.
2019-11-07Windows: Update signed driversMounir IDRASSI1-2/+2
2019-11-07Windows Driver: Fix strange crashes caused by probably by APC queue issues ↵Mounir IDRASSI2-80/+262
from calls to IoBuildDeviceIoControlRequest and ZwCreate (cf https://www.osr.com/blog/2018/02/14/beware-iobuilddeviceiocontrolrequest/)
2019-11-07Increment version to 1.24-Hotfix2Mounir IDRASSI1-2/+2
2019-10-02Increment version to 1.24-Beta6Mounir IDRASSI1-2/+2
2019-10-01Windows Driver: Disable Hibernation when RAM encryption is enabled since we ↵Mounir IDRASSI1-0/+6
can't resume from Hibernation without RAM encryption keys (a chicken and egg situation)
2019-03-09Increment version to 1.24-Beta5Mounir IDRASSI1-2/+2
2019-03-09Windows Driver: fix BSOD when mounting outer volume with hidden volume ↵Mounir IDRASSI1-1/+1
protection if RAM encryption is enabled
2019-03-09Increment version to 1.24-Beta4 and update release notes to clarify that ↵Mounir IDRASSI1-2/+2
password length increase applies only to non-system volumes.
2019-03-08Windows Driver: fix BSOD when mounting hidden volume if RAM encryption is ↵Mounir IDRASSI1-4/+5
enabled
2019-03-03Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt ↵Mounir IDRASSI1-0/+11
driver
2019-03-03Increment version to 1.24-Beta3. Update Release Notes.Mounir IDRASSI1-2/+2
2019-03-01Windows Driver: Enable RAM encryption only after its security parameters ↵Mounir IDRASSI1-6/+5
were created
2019-03-01Windows driver: call VcProtectKeys only when RAM encryption enabled although ↵Mounir IDRASSI1-2/+5
this function does nothing when RAM encryption is disabled.
2019-03-01Windows: use specific order for EFI boot arguments memory regions that ↵Mounir IDRASSI3-10/+53
matches the one used by EFI bootloader.
2019-03-01Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵Mounir IDRASSI6-8/+87
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
2019-02-12Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by ↵Mounir IDRASSI3-1/+19
Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de)
2019-02-08Windows: Add implementation of ChaCha20 based random generator. Use it for ↵Mounir IDRASSI5-33/+86
driver need of random bytes (currently only wipe bytes but more to come later).
2019-02-08Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵Mounir IDRASSI2-3/+5
which is now disabled by default
2019-02-01Update Release Notes and other files for 1.24-Beta2 releaseMounir IDRASSI1-2/+2
2019-02-01Windows driver: better randomness for wipe bytes by always using Whirlpool ↵Mounir IDRASSI3-19/+40
hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available.
2019-01-28Increment version to 1.24-Beta2Mounir IDRASSI1-2/+2
2019-01-28Increase password maximum length to 128 bytes from 64 bytesMounir IDRASSI1-5/+11
2019-01-28Windows Driver: force the input size for some IOCTLs to have a fixed valueMounir IDRASSI1-2/+28
2019-01-26Windows: Add a build configuration containing EFI bootloader signed with ↵Mounir IDRASSI1-1/+1
custom SecureBoot key instead
2019-01-22Windows: Increment driver version to 1.24.1.1Mounir IDRASSI1-1/+1
2019-01-21Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵Mounir IDRASSI2-4/+2
not needed after their key schedule is created
2019-01-21Windows: remove unused fields from CRYPTO_INFO structureMounir IDRASSI1-2/+1
2019-01-14Windows: Implement feature that enables clearing of encryption keys when a ↵Mounir IDRASSI1-0/+7
new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade).
2019-01-14Increment version to 1.24-Beta1Mounir IDRASSI1-2/+2
2019-01-09Windows driver: remove newly added volatile qualifier from CRYPT_INFO ↵Mounir IDRASSI3-3/+3
pointers to fix build issue until a better approach is devised
2019-01-09Windows Security: Add new entry point in driver that allows emergency ↵Mounir IDRASSI6-6/+74
clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected.
2019-01-09Windows Driver: erase system encryption keys from memory during ↵Mounir IDRASSI1-2/+2
shutdown/reboot to help mitigate some cold boot attacks
2018-12-19Windows: Increment driver version to 1.24.0.1Mounir IDRASSI1-4/+4
2018-12-19Windows Driver: Don't interact with the volume's filesystem if mount manager ↵Mounir IDRASSI1-1/+1
integration is disabled
2018-12-19Increment version to 1.24-Beta0Mounir IDRASSI1-4/+4
2018-12-19Windows: Add mount option that allows mounting a volume without attaching it ↵Mounir IDRASSI1-9/+11
to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX).
2018-10-10Increment version to 1.23-Hotfix-2Mounir IDRASSI1-4/+4
2018-10-10Windows Driver: fix regression that was causing BSOD.Mounir IDRASSI1-1/+1
2018-10-10Windows Driver: replace system functions ↵Mounir IDRASSI1-9/+41
RtlUpcaseUnicodeChar/RtlUnalignedStringCchLengthW by our own code for better clarity
2018-09-21Increment version to 1.23-Hotfix-1Mounir IDRASSI1-4/+4
2018-09-21Windows driver: add extra check for data read in TC_IOCTL_OPEN_TEST handlingMounir IDRASSI1-1/+31
2018-09-21Windows: fix low severity vulnerability in driver that allowed reading 3 ↵Mounir IDRASSI1-49/+82
bytes of kernel stack memory (with a rare possibility of 25 additional bytes). Reported by Tim Harrison.