VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Driver
AgeCommit message (Collapse)AuthorFilesLines
2021-08-30Windows: Fix some VS static analyzed warningsMounir IDRASSI2-2/+2
2021-08-24Windows Driver: Potential memory corruption caused by integer overflow in ↵Mounir IDRASSI1-21/+61
IOCTL_STORAGE_MANAGE_DATA_SET_ATTRIBUTES (reported by I.V. Sprundel)
2021-08-15Windows: Increment version to 1.24.25.3 and update signed Windows driverMounir IDRASSI1-2/+2
2021-08-02Windows: Increment version to 1.24.25.2 and update signed Windows driverMounir IDRASSI1-2/+2
2021-07-14Add support for OpenBSD (#779)kokokodak1-0/+13
* OpenBSD: add basic support modified: Build/Include/Makefile.inc modified: Driver/Fuse/FuseService.cpp modified: Main/FatalErrorHandler.cpp modified: Makefile modified: Platform/Unix/File.cpp modified: Platform/Unix/FilesystemPath.cpp modified: Platform/Unix/SystemInfo.cpp * OpenBSD: some necessary files were missing new file: Core/Unix/OpenBSD/CoreOpenBSD.cpp new file: Core/Unix/OpenBSD/CoreOpenBSD.h new file: Core/Unix/OpenBSD/System.h
2021-07-13Windows: Update signed Windows driver to version 1.24.25.1Mounir IDRASSI1-2/+2
2021-07-13Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure ↵Mounir IDRASSI1-2/+2
equivalents This fixed failure to build driver for ARM64 with latest VS 2019
2021-07-13Windows: Fix link error on ARM64 with latest VS2019 (undefined ↵Mounir IDRASSI1-2/+2
__stdio_common_vswprintf symbol)
2021-02-27Windows: Block Windows from resizing system partition if it is encrypted. ↵Mounir IDRASSI3-18/+45
This avoid issues during Windows Upgrade that sometimes resizes system partition which create problems if it is encrypted by VeraCrypt
2021-01-02Increment version to 1.24-Update9Mounir IDRASSI1-2/+2
2021-01-02Windows: Fix various warningsMounir IDRASSI3-5/+5
2021-01-02Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵Mounir IDRASSI2-0/+661
System encryption still not implemented on ARM64
2020-12-13Windows: Update signed drivers to version 1.24.24Mounir IDRASSI1-2/+2
2020-12-11Windows: Fix various compiler warningsMounir IDRASSI4-6/+8
2020-12-11Windows Driver: Fix build error using Windows 10 WDK caused by name conflict ↵Mounir IDRASSI2-4/+4
for KeSaveExtendedProcessorState/KeRestoreExtendedProcessorState functions
2020-07-22Increment internal version to 1.24.20 and update release notesMounir IDRASSI1-2/+2
2020-07-04Increment internal version to 1.24.19Mounir IDRASSI1-2/+2
2020-07-02Windows: Don't use API for Processor Groups support if there is only 1 CPU ↵Mounir IDRASSI2-2/+8
group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
2020-06-29Increment internal version to 1.24.18 and update signed Windows drivers.Mounir IDRASSI1-2/+2
2020-06-28Windows: remove unused code targeting Windows 2000.Mounir IDRASSI2-23/+13
2020-06-26Windows: Update signed driver to version 1.24.17Mounir IDRASSI1-2/+2
2020-06-23Increment version to 1.24-Update7Mounir IDRASSI1-2/+2
2020-06-21Windows Driver: Use real disk sector size instead of generic 512 bytes value ↵Mounir IDRASSI1-4/+9
when probing disk real size
2020-06-21Windows: Fix issue when RAM encryption used, AES selected and AES-NI not ↵Mounir IDRASSI1-0/+5
supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected by user.
2020-06-11Switch from auto_ptr to unique_ptr (#638)Christopher Bergqvist2-2/+2
2020-03-11Windows: Update signed Windows driver to version 1.24.15VeraCrypt_1.24-Update6Mounir IDRASSI1-2/+2
2020-02-11Increment version to 1.24-Update5 and update signed Windows drivers.Mounir IDRASSI1-2/+2
2020-02-10Windows: Implement support for processor groups in the driver and fix build ↵Mounir IDRASSI2-8/+60
issues caused by previous implementation
2019-12-10Increment version to 1.24-Update2Mounir IDRASSI1-2/+2
2019-12-09Windows Driver: Reduce memory usage of IOCTL_DISK_VERIFY handler. Now we ↵Mounir IDRASSI1-6/+22
reader disk by chunks of at most 64 KiB. Fix https://github.com/veracrypt/VeraCrypt/issues/562.
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI1-1/+33
especially for keyfiles.
2019-11-07Windows: Update signed driversMounir IDRASSI1-2/+2
2019-11-07Windows Driver: Fix strange crashes caused by probably by APC queue issues ↵Mounir IDRASSI2-80/+262
from calls to IoBuildDeviceIoControlRequest and ZwCreate (cf https://www.osr.com/blog/2018/02/14/beware-iobuilddeviceiocontrolrequest/)
2019-11-07Increment version to 1.24-Hotfix2Mounir IDRASSI1-2/+2
2019-10-02Increment version to 1.24-Beta6Mounir IDRASSI1-2/+2
2019-10-01Windows Driver: Disable Hibernation when RAM encryption is enabled since we ↵Mounir IDRASSI1-0/+6
can't resume from Hibernation without RAM encryption keys (a chicken and egg situation)
2019-03-09Increment version to 1.24-Beta5Mounir IDRASSI1-2/+2
2019-03-09Windows Driver: fix BSOD when mounting outer volume with hidden volume ↵Mounir IDRASSI1-1/+1
protection if RAM encryption is enabled
2019-03-09Increment version to 1.24-Beta4 and update release notes to clarify that ↵Mounir IDRASSI1-2/+2
password length increase applies only to non-system volumes.
2019-03-08Windows Driver: fix BSOD when mounting hidden volume if RAM encryption is ↵Mounir IDRASSI1-4/+5
enabled
2019-03-03Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt ↵Mounir IDRASSI1-0/+11
driver
2019-03-03Increment version to 1.24-Beta3. Update Release Notes.Mounir IDRASSI1-2/+2
2019-03-01Windows Driver: Enable RAM encryption only after its security parameters ↵Mounir IDRASSI1-6/+5
were created
2019-03-01Windows driver: call VcProtectKeys only when RAM encryption enabled although ↵Mounir IDRASSI1-2/+5
this function does nothing when RAM encryption is disabled.
2019-03-01Windows: use specific order for EFI boot arguments memory regions that ↵Mounir IDRASSI3-10/+53
matches the one used by EFI bootloader.
2019-03-01Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵Mounir IDRASSI6-8/+87
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
2019-02-12Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by ↵Mounir IDRASSI3-1/+19
Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de)
2019-02-08Windows: Add implementation of ChaCha20 based random generator. Use it for ↵Mounir IDRASSI5-33/+86
driver need of random bytes (currently only wipe bytes but more to come later).
2019-02-08Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵Mounir IDRASSI2-3/+5
which is now disabled by default
2019-02-01Update Release Notes and other files for 1.24-Beta2 releaseMounir IDRASSI1-2/+2