VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Driver
AgeCommit message (Collapse)AuthorFilesLines
2021-01-02Increment version to 1.24-Update9Mounir IDRASSI1-2/+2
2021-01-02Windows: Fix various warningsMounir IDRASSI3-5/+5
2021-01-02Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵Mounir IDRASSI2-0/+661
System encryption still not implemented on ARM64
2020-12-13Windows: Update signed drivers to version 1.24.24Mounir IDRASSI1-2/+2
2020-12-11Windows: Fix various compiler warningsMounir IDRASSI4-6/+8
2020-12-11Windows Driver: Fix build error using Windows 10 WDK caused by name conflict ↵Mounir IDRASSI2-4/+4
for KeSaveExtendedProcessorState/KeRestoreExtendedProcessorState functions
2020-07-22Increment internal version to 1.24.20 and update release notesMounir IDRASSI1-2/+2
2020-07-03Increment internal version to 1.24.19Mounir IDRASSI1-2/+2
2020-07-02Windows: Don't use API for Processor Groups support if there is only 1 CPU ↵Mounir IDRASSI2-2/+8
group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
2020-06-28Increment internal version to 1.24.18 and update signed Windows drivers.Mounir IDRASSI1-2/+2
2020-06-27Windows: remove unused code targeting Windows 2000.Mounir IDRASSI2-23/+13
2020-06-26Windows: Update signed driver to version 1.24.17Mounir IDRASSI1-2/+2
2020-06-23Increment version to 1.24-Update7Mounir IDRASSI1-2/+2
2020-06-21Windows Driver: Use real disk sector size instead of generic 512 bytes value ↵Mounir IDRASSI1-4/+9
when probing disk real size
2020-06-20Windows: Fix issue when RAM encryption used, AES selected and AES-NI not ↵Mounir IDRASSI1-0/+5
supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected by user.
2020-06-11Switch from auto_ptr to unique_ptr (#638)Christopher Bergqvist2-2/+2
2020-03-11Windows: Update signed Windows driver to version 1.24.15VeraCrypt_1.24-Update6Mounir IDRASSI1-2/+2
2020-02-11Increment version to 1.24-Update5 and update signed Windows drivers.Mounir IDRASSI1-2/+2
2020-02-10Windows: Implement support for processor groups in the driver and fix build ↵Mounir IDRASSI2-8/+60
issues caused by previous implementation
2019-12-10Increment version to 1.24-Update2Mounir IDRASSI1-2/+2
2019-12-09Windows Driver: Reduce memory usage of IOCTL_DISK_VERIFY handler. Now we ↵Mounir IDRASSI1-6/+22
reader disk by chunks of at most 64 KiB. Fix https://github.com/veracrypt/VeraCrypt/issues/562.
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI1-1/+33
especially for keyfiles.
2019-11-06Windows: Update signed driversMounir IDRASSI1-2/+2
2019-11-06Windows Driver: Fix strange crashes caused by probably by APC queue issues ↵Mounir IDRASSI2-80/+262
from calls to IoBuildDeviceIoControlRequest and ZwCreate (cf https://www.osr.com/blog/2018/02/14/beware-iobuilddeviceiocontrolrequest/)
2019-11-06Increment version to 1.24-Hotfix2Mounir IDRASSI1-2/+2
2019-10-02Increment version to 1.24-Beta6Mounir IDRASSI1-2/+2
2019-10-01Windows Driver: Disable Hibernation when RAM encryption is enabled since we ↵Mounir IDRASSI1-0/+6
can't resume from Hibernation without RAM encryption keys (a chicken and egg situation)
2019-03-09Increment version to 1.24-Beta5Mounir IDRASSI1-2/+2
2019-03-09Windows Driver: fix BSOD when mounting outer volume with hidden volume ↵Mounir IDRASSI1-1/+1
protection if RAM encryption is enabled
2019-03-09Increment version to 1.24-Beta4 and update release notes to clarify that ↵Mounir IDRASSI1-2/+2
password length increase applies only to non-system volumes.
2019-03-08Windows Driver: fix BSOD when mounting hidden volume if RAM encryption is ↵Mounir IDRASSI1-4/+5
enabled
2019-03-03Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt ↵Mounir IDRASSI1-0/+11
driver
2019-03-03Increment version to 1.24-Beta3. Update Release Notes.Mounir IDRASSI1-2/+2
2019-02-28Windows Driver: Enable RAM encryption only after its security parameters ↵Mounir IDRASSI1-6/+5
were created
2019-02-28Windows driver: call VcProtectKeys only when RAM encryption enabled although ↵Mounir IDRASSI1-2/+5
this function does nothing when RAM encryption is disabled.
2019-02-28Windows: use specific order for EFI boot arguments memory regions that ↵Mounir IDRASSI3-10/+53
matches the one used by EFI bootloader.
2019-02-28Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵Mounir IDRASSI6-8/+87
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
2019-02-12Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by ↵Mounir IDRASSI3-1/+19
Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de)
2019-02-08Windows: Add implementation of ChaCha20 based random generator. Use it for ↵Mounir IDRASSI5-33/+86
driver need of random bytes (currently only wipe bytes but more to come later).
2019-02-08Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵Mounir IDRASSI2-3/+5
which is now disabled by default
2019-02-01Update Release Notes and other files for 1.24-Beta2 releaseMounir IDRASSI1-2/+2
2019-01-31Windows driver: better randomness for wipe bytes by always using Whirlpool ↵Mounir IDRASSI3-19/+40
hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available.
2019-01-28Increment version to 1.24-Beta2Mounir IDRASSI1-2/+2
2019-01-28Increase password maximum length to 128 bytes from 64 bytesMounir IDRASSI1-5/+11
2019-01-28Windows Driver: force the input size for some IOCTLs to have a fixed valueMounir IDRASSI1-2/+28
2019-01-26Windows: Add a build configuration containing EFI bootloader signed with ↵Mounir IDRASSI1-1/+1
custom SecureBoot key instead
2019-01-22Windows: Increment driver version to 1.24.1.1Mounir IDRASSI1-1/+1
2019-01-20Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵Mounir IDRASSI2-4/+2
not needed after their key schedule is created
2019-01-20Windows: remove unused fields from CRYPTO_INFO structureMounir IDRASSI1-2/+1
2019-01-14Windows: Implement feature that enables clearing of encryption keys when a ↵Mounir IDRASSI1-0/+7
new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade).