VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Driver
AgeCommit message (Collapse)AuthorFilesLines
2019-02-08Windows: Add implementation of ChaCha20 based random generator. Use it for ↵Mounir IDRASSI5-33/+86
driver need of random bytes (currently only wipe bytes but more to come later).
2019-02-08Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵Mounir IDRASSI2-3/+5
which is now disabled by default
2019-02-01Update Release Notes and other files for 1.24-Beta2 releaseMounir IDRASSI1-2/+2
2019-02-01Windows driver: better randomness for wipe bytes by always using Whirlpool ↵Mounir IDRASSI3-19/+40
hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available.
2019-01-28Increment version to 1.24-Beta2Mounir IDRASSI1-2/+2
2019-01-28Increase password maximum length to 128 bytes from 64 bytesMounir IDRASSI1-5/+11
2019-01-28Windows Driver: force the input size for some IOCTLs to have a fixed valueMounir IDRASSI1-2/+28
2019-01-26Windows: Add a build configuration containing EFI bootloader signed with ↵Mounir IDRASSI1-1/+1
custom SecureBoot key instead
2019-01-22Windows: Increment driver version to 1.24.1.1Mounir IDRASSI1-1/+1
2019-01-21Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵Mounir IDRASSI2-4/+2
not needed after their key schedule is created
2019-01-21Windows: remove unused fields from CRYPTO_INFO structureMounir IDRASSI1-2/+1
2019-01-14Windows: Implement feature that enables clearing of encryption keys when a ↵Mounir IDRASSI1-0/+7
new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade).
2019-01-14Increment version to 1.24-Beta1Mounir IDRASSI1-2/+2
2019-01-09Windows driver: remove newly added volatile qualifier from CRYPT_INFO ↵Mounir IDRASSI3-3/+3
pointers to fix build issue until a better approach is devised
2019-01-09Windows Security: Add new entry point in driver that allows emergency ↵Mounir IDRASSI6-6/+74
clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected.
2019-01-09Windows Driver: erase system encryption keys from memory during ↵Mounir IDRASSI1-2/+2
shutdown/reboot to help mitigate some cold boot attacks
2018-12-19Windows: Increment driver version to 1.24.0.1Mounir IDRASSI1-4/+4
2018-12-19Windows Driver: Don't interact with the volume's filesystem if mount manager ↵Mounir IDRASSI1-1/+1
integration is disabled
2018-12-19Increment version to 1.24-Beta0Mounir IDRASSI1-4/+4
2018-12-19Windows: Add mount option that allows mounting a volume without attaching it ↵Mounir IDRASSI1-9/+11
to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX).
2018-10-10Increment version to 1.23-Hotfix-2Mounir IDRASSI1-4/+4
2018-10-10Windows Driver: fix regression that was causing BSOD.Mounir IDRASSI1-1/+1
2018-10-10Windows Driver: replace system functions ↵Mounir IDRASSI1-9/+41
RtlUpcaseUnicodeChar/RtlUnalignedStringCchLengthW by our own code for better clarity
2018-09-21Increment version to 1.23-Hotfix-1Mounir IDRASSI1-4/+4
2018-09-21Windows driver: add extra check for data read in TC_IOCTL_OPEN_TEST handlingMounir IDRASSI1-1/+31
2018-09-21Windows: fix low severity vulnerability in driver that allowed reading 3 ↵Mounir IDRASSI1-49/+82
bytes of kernel stack memory (with a rare possibility of 25 additional bytes). Reported by Tim Harrison.
2018-09-03Increment version to 1.23-BETA8 and update release notes.Mounir IDRASSI1-2/+2
2018-09-03Increment version to 1.23-BETA7 and update release notes.Mounir IDRASSI1-2/+2
2018-09-01Windows: extended Windows defragmenter workaround to Windows 8.1Mounir IDRASSI1-3/+3
2018-08-24Increment version to 1.23-BETA6Mounir IDRASSI1-4/+4
2018-08-24Windows: implement a driver configuration option to explicitly allow ↵Mounir IDRASSI2-1/+4
defragmenting non-système disques by Windows built-in defragmenter tool.
2018-08-18Increment version to 1.23-BETA5 and update release notesMounir IDRASSI1-2/+2
2018-08-18Windows: Implement workaround on Windows 10 to make VeraCrypt encrypted ↵Mounir IDRASSI3-5/+32
disks visible to Windows defragmenter
2018-08-16Increment version to 1.23-BETA4 and update release notes.Mounir IDRASSI1-2/+2
2018-08-15WIndows driver: add check for failed memory allocationMounir IDRASSI1-8/+11
2018-08-12Increment version to 1.23-BETA3 and update release notes.Mounir IDRASSI1-2/+2
2018-07-05Increment version to 1.23-BETA2Mounir IDRASSI1-2/+2
2018-05-03Increment version to 1.23-BETA1Mounir IDRASSI1-2/+2
2018-04-23Increment version to 1.23-BETA0 (1.23.0)Mounir IDRASSI1-4/+4
2018-03-30Increment version to 1.22 (1.22.9)Mounir IDRASSI1-2/+2
2018-03-28Increment version to 1.22-BETA8 (1.22.8)Mounir IDRASSI1-2/+2
2018-03-27Increment version to 1.22-BETA7 (1.22.7)Mounir IDRASSI1-2/+2
2018-03-25Increment version to 1.22-BETA6 (1.22.6)Mounir IDRASSI1-2/+2
2018-03-22Increment version to 1.22-BETA5 (1.22.5)Mounir IDRASSI1-2/+2
2018-03-05Windows: Add option to block TRIM command on system encryption SSD drives.Mounir IDRASSI3-1/+48
2018-03-04Windows: Implement TRIM support for non-system SSD partitions/drives and add ↵Mounir IDRASSI3-32/+321
driver option to enable it (TRIM is disabled by default for non-system SSD partitions/drives)
2017-12-09Increment version to 1.22-BETA4 (1.22.4)Mounir IDRASSI1-2/+2
2017-08-02Windows: Increment version to 1.22-BETA3Mounir IDRASSI1-2/+2
2017-07-29Windows: increment version to 1.22-BETA2-Build6Mounir IDRASSI1-2/+2
2017-07-29Windows Driver: avoid allocating memory for some ↵Mounir IDRASSI1-37/+16
IOCTL_STORAGE_QUERY_PROPERTY calls that always return fixed size structures.