VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Driver
AgeCommit message (Collapse)AuthorFilesLines
2023-05-18Fix compiler warnings (#1030)David1-2/+2
Fixing the following compiler warnings: FuseService.cpp: In function ‘int VeraCrypt::fuse_service_read(const char*, char*, size_t, off_t, fuse_file_info*)’: FuseService.cpp:233:12: warning: catching polymorphic type ‘struct VeraCrypt::MissingVolumeData’ by value [-Wcatch-value=] 233 | catch (MissingVolumeData) | ^~~~~~~~~~~~~~~~~ FuseService.cpp: In static member function ‘static int VeraCrypt::FuseService::ExceptionToErrorCode()’: FuseService.cpp:362:15: warning: catching polymorphic type ‘class std::bad_alloc’ by value [-Wcatch-value=] 362 | catch (std::bad_alloc) | ^~~~~~~~~ Apart from warnings, the current code creates unnecessary copies of the exception object in debug mode. (But not in -O3)
2022-03-21Increment version to 1.26 and update windows driver and MBR bootloader filesMounir IDRASSI1-4/+4
2022-03-08Implement support of Blake2s-256 hash algorithm and remove deprecated ↵Mounir IDRASSI4-23/+20
algorithms RIPEMD-160 and GOST89.
2022-02-19Increment version to 1.25.9 and update Release Notes.Mounir IDRASSI1-2/+2
2022-02-16Increment version to 1.25.8.2 and update signed Windows driversMounir IDRASSI1-2/+2
2022-02-11Windows: Increment version to 1.25.8.1 and update signed Windows driversMounir IDRASSI1-2/+2
2022-02-10Windows Driver: Don't cache the password if outer volume mounting succeeds ↵Mounir IDRASSI1-2/+11
but hidden volume mounting fails
2022-02-06Windows: Add registry setting to disable erasing encryption keys on Windows ↵Mounir IDRASSI4-2/+18
shutdown/reboot. This helps solve BSOD during shutdown/reboot on some machines. Under "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt", create a REG_DWORD value named "VeraCryptEraseKeysShutdown" and set its value to 0.
2021-12-30Update Release Notes and add signed Windows driver.Mounir IDRASSI1-2/+2
2021-12-30Windows driver: Set maximum values for encryption queue parameters. Add ↵Mounir IDRASSI2-3/+18
IOCTL code to read used values from user space maximum value for EncryptionFragmentSize is 2048 maximum value for EncryptionIoRequestCount is 8192 maximum value for EncryptionItemCount is (EncryptionIoRequestCount/2)
2021-12-30Windows Driver: Better code for EncryptionFragmentSize variable handlingMounir IDRASSI1-4/+5
2021-12-27Increment version to 1.25.6. Update Release Notes and add signed Windows driver.Mounir IDRASSI1-2/+2
2021-12-20Increment version to 1.25.5 and update release notesMounir IDRASSI1-2/+2
2021-12-20Windows Driver: Add registry settings to control driver internal encryption ↵Mounir IDRASSI4-19/+130
queue Under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt: - VeraCryptEncryptionFragmentSize (REG_DWORD): size of encryption data fragment in KiB. Default is 256. - VeraCryptEncryptionIoRequestCount (REG_DWORD): maximum number of parallel I/O requests. Default is 16. - VeraCryptEncryptionItemCount (REG_DWORD): maximum number of encryption queue items processed in parallel. Default is 8.
2021-11-30Increment version to 1.25.4 and set release date to December 3rd 2021Mounir IDRASSI1-2/+2
2021-11-28Increment version to 1.25 (1.25.3)Mounir IDRASSI1-2/+2
2021-11-21Windows: Update signed Windows driver to version 1.25.2.0Mounir IDRASSI1-2/+2
2021-11-21Increment version to 1.25-RC2 and update release notesMounir IDRASSI1-0/+134
2021-08-30Increment version to 1.25Mounir IDRASSI1-4/+4
2021-08-30Windows: Fix some VS static analyzed warningsMounir IDRASSI2-2/+2
2021-08-24Windows Driver: Potential memory corruption caused by integer overflow in ↵Mounir IDRASSI1-21/+61
IOCTL_STORAGE_MANAGE_DATA_SET_ATTRIBUTES (reported by I.V. Sprundel)
2021-08-15Windows: Increment version to 1.24.25.3 and update signed Windows driverMounir IDRASSI1-2/+2
2021-08-02Windows: Increment version to 1.24.25.2 and update signed Windows driverMounir IDRASSI1-2/+2
2021-07-14Add support for OpenBSD (#779)kokokodak1-0/+13
* OpenBSD: add basic support modified: Build/Include/Makefile.inc modified: Driver/Fuse/FuseService.cpp modified: Main/FatalErrorHandler.cpp modified: Makefile modified: Platform/Unix/File.cpp modified: Platform/Unix/FilesystemPath.cpp modified: Platform/Unix/SystemInfo.cpp * OpenBSD: some necessary files were missing new file: Core/Unix/OpenBSD/CoreOpenBSD.cpp new file: Core/Unix/OpenBSD/CoreOpenBSD.h new file: Core/Unix/OpenBSD/System.h
2021-07-13Windows: Update signed Windows driver to version 1.24.25.1Mounir IDRASSI1-2/+2
2021-07-13Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure ↵Mounir IDRASSI1-2/+2
equivalents This fixed failure to build driver for ARM64 with latest VS 2019
2021-07-13Windows: Fix link error on ARM64 with latest VS2019 (undefined ↵Mounir IDRASSI1-2/+2
__stdio_common_vswprintf symbol)
2021-02-27Windows: Block Windows from resizing system partition if it is encrypted. ↵Mounir IDRASSI3-18/+45
This avoid issues during Windows Upgrade that sometimes resizes system partition which create problems if it is encrypted by VeraCrypt
2021-01-02Increment version to 1.24-Update9Mounir IDRASSI1-2/+2
2021-01-02Windows: Fix various warningsMounir IDRASSI3-5/+5
2021-01-02Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵Mounir IDRASSI2-0/+661
System encryption still not implemented on ARM64
2020-12-13Windows: Update signed drivers to version 1.24.24Mounir IDRASSI1-2/+2
2020-12-11Windows: Fix various compiler warningsMounir IDRASSI4-6/+8
2020-12-11Windows Driver: Fix build error using Windows 10 WDK caused by name conflict ↵Mounir IDRASSI2-4/+4
for KeSaveExtendedProcessorState/KeRestoreExtendedProcessorState functions
2020-07-22Increment internal version to 1.24.20 and update release notesMounir IDRASSI1-2/+2
2020-07-04Increment internal version to 1.24.19Mounir IDRASSI1-2/+2
2020-07-02Windows: Don't use API for Processor Groups support if there is only 1 CPU ↵Mounir IDRASSI2-2/+8
group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
2020-06-29Increment internal version to 1.24.18 and update signed Windows drivers.Mounir IDRASSI1-2/+2
2020-06-28Windows: remove unused code targeting Windows 2000.Mounir IDRASSI2-23/+13
2020-06-26Windows: Update signed driver to version 1.24.17Mounir IDRASSI1-2/+2
2020-06-23Increment version to 1.24-Update7Mounir IDRASSI1-2/+2
2020-06-21Windows Driver: Use real disk sector size instead of generic 512 bytes value ↵Mounir IDRASSI1-4/+9
when probing disk real size
2020-06-21Windows: Fix issue when RAM encryption used, AES selected and AES-NI not ↵Mounir IDRASSI1-0/+5
supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected by user.
2020-06-11Switch from auto_ptr to unique_ptr (#638)Christopher Bergqvist2-2/+2
2020-03-11Windows: Update signed Windows driver to version 1.24.15VeraCrypt_1.24-Update6Mounir IDRASSI1-2/+2
2020-02-11Increment version to 1.24-Update5 and update signed Windows drivers.Mounir IDRASSI1-2/+2
2020-02-10Windows: Implement support for processor groups in the driver and fix build ↵Mounir IDRASSI2-8/+60
issues caused by previous implementation
2019-12-10Increment version to 1.24-Update2Mounir IDRASSI1-2/+2
2019-12-09Windows Driver: Reduce memory usage of IOCTL_DISK_VERIFY handler. Now we ↵Mounir IDRASSI1-6/+22
reader disk by chunks of at most 64 KiB. Fix https://github.com/veracrypt/VeraCrypt/issues/562.
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI1-1/+33
especially for keyfiles.