VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)AuthorFilesLines
2019-02-01Update Release Notes and other files for 1.24-Beta2 releaseMounir IDRASSI7-4/+4
2019-02-01Windows: Add latest 1.24 EFI bootloader files that are signed by Microsoft ↵Mounir IDRASSI12-0/+0
that come with several enhancements and fixes especially for Rescue Disk: - Implement better timeout mechanism for password input. Implement new actions "shutdown" and "reboot". Set default timeout value to 3 minutes and default timeout action to "shutdown" - Enhance Rescue Disk implementation of restoring VeraCrypt loader. - Fix ESC on password prompt during Pre-Test not starting Windows - Add menu entry in Rescue Disk that enables starting original Windows loader
2019-02-01Windows driver: better randomness for wipe bytes by always using Whirlpool ↵Mounir IDRASSI3-19/+40
hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available.
2019-02-01Windows: use CPU RDRAND or RDSEED as an additional entropy source for our ↵Mounir IDRASSI8-5/+544
random generator when available
2019-02-01Fix detection of CPU features AVX2 & BMI2. Add detection of RDRAND & RDSEED ↵Mounir IDRASSI2-3/+41
CPU features. Detect Hygon CPU as AMD one.
2019-02-01Windows driver: replace SHA512 by RIPEMD160 when calculating internal hash ↵Mounir IDRASSI2-6/+7
of master key to avoid calling KeSaveFloatingPointState/KeSaveExtendedProcessorState since SHA512 implementation uses SSE2/AVX and RIPEMD160 is pure C
2019-01-30Help compiler optimize some crypto code on 64-bit build since x64 capable ↵Mounir IDRASSI1-0/+5
CPUs always support SSE and SSE2
2019-01-28Increment version to 1.24-Beta2Mounir IDRASSI17-31/+31
2019-01-28Increase password maximum length to 128 bytes from 64 bytesMounir IDRASSI12-27/+74
2019-01-28Windows Driver: force the input size for some IOCTLs to have a fixed valueMounir IDRASSI1-2/+28
2019-01-26Windows: Add a build configuration containing EFI bootloader signed with ↵Mounir IDRASSI16-11/+660
custom SecureBoot key instead
2019-01-26Windows: fix building MBR bootloader following modification of Xts.cMounir IDRASSI1-0/+2
2019-01-25Linux/MacOSX crypto: report XTS optimization implemented previously on WindowsMounir IDRASSI1-49/+90
c
2019-01-25Windows crypto: optimize XTS implementation for 64-bit builds using SSE2 ↵Mounir IDRASSI1-48/+122
thanks to simplification of storage of whitening values in memory (normal order instead of reverse order).
2019-01-22Windows: Increment driver version to 1.24.1.1Mounir IDRASSI7-3/+3
2019-01-21Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵Mounir IDRASSI11-59/+62
not needed after their key schedule is created
2019-01-21Windows: remove unused fields from CRYPTO_INFO structureMounir IDRASSI3-11/+4
2019-01-18Windows: fix editor of EFI configuration file not accepting ENTER key for ↵Mounir IDRASSI1-2/+2
adding new lines.
2019-01-18MacOSX: update info.plist file to set priority at run-time to 64-bit version ↵Mounir IDRASSI1-0/+9
and to set minimum OSX version to 10.7.
2019-01-15Windows: enhancements to EFI system encryption, like handling of Multi-Boot ↵Mounir IDRASSI7-90/+224
and better compatibility with Windows Upgrade process.
2019-01-14Update Release Notes and language files for version 1.24-Beta1. Add signed ↵Mounir IDRASSI8-5/+5
Windows drivers.
2019-01-14Windows: enhance support of new behavior of favorite service which is now ↵Mounir IDRASSI4-27/+46
always running in case of system encryption
2019-01-14Windows: Implement feature that enables clearing of encryption keys when a ↵Mounir IDRASSI8-77/+196
new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade).
2019-01-14Windows: add a 10 seconds delay between signtool calls to avoid issues ↵Mounir IDRASSI3-0/+13
caused by antivirus software locking the newly signed files temporarily after they are signed.
2019-01-14Windows: fix debug packaging script by copying missing driver .inf and .cat ↵Mounir IDRASSI1-0/+2
files from Release folder.
2019-01-14Increment version to 1.24-Beta1Mounir IDRASSI15-30/+32
2019-01-09Windows driver: remove newly added volatile qualifier from CRYPT_INFO ↵Mounir IDRASSI3-3/+3
pointers to fix build issue until a better approach is devised
2019-01-09Windows Security: Add new entry point in driver that allows emergency ↵Mounir IDRASSI9-6/+87
clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected.
2019-01-09Windows Driver: erase system encryption keys from memory during ↵Mounir IDRASSI1-2/+2
shutdown/reboot to help mitigate some cold boot attacks
2019-01-09Windows driver: move newly added field in VOLUME_PROPERTIES_STRUCT to the ↵Mounir IDRASSI1-1/+1
end for compatibility with previous version.
2018-12-24Windows: Fix mount option to disable Windows Mount Manager can preserved ↵Mounir IDRASSI1-3/+1
when mount options dialog opened a second time.
2018-12-19Windows: update signing script to use newly issued IDRIX EV code signing ↵Mounir IDRASSI2-3/+3
certificate.
2018-12-19Windows: Increment driver version to 1.24.0.1Mounir IDRASSI6-5/+5
2018-12-19Windows Driver: Don't interact with the volume's filesystem if mount manager ↵Mounir IDRASSI1-1/+1
integration is disabled
2018-12-19Increment version to 1.24-Beta0Mounir IDRASSI14-34/+34
2018-12-19Windows: Add mount option that allows mounting a volume without attaching it ↵Mounir IDRASSI8-39/+84
to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX).
2018-12-19Windows MBR Bootloader: workaround for issue affecting creation of hidden OS ↵Mounir IDRASSI1-1/+16
on some SSD drives (Error 128 while writing MBR). This commit replace the 512 bytes write operations by a 4096 bytes write operation.
2018-12-19Windows: Enable selection of Quick Format for file containers. Separate ↵Mounir IDRASSI3-27/+55
Quick Format and Dynamic Volume options.
2018-12-03Windows: Update libzip to version 1.5.1Mounir IDRASSI3-2/+13
2018-12-03Windows: remove unused variable.Mounir IDRASSI1-1/+1
2018-12-03Windows: delete existing uninstall shortcut when performing upgrade/reinstallMounir IDRASSI1-0/+3
2018-12-03MBR Bootloader: dynamically determine boot loader memory segment instead of ↵Mounir IDRASSI1-15/+16
hardcoded values (proposed by neos6464 at https://sourceforge.net/p/veracrypt/tickets/240/)
2018-12-02Do not create uninstall shortcut in startmenu (#381)csware1-18/+0
Creating such a start menu entry is a leftover of the ancient Win 3.x time where there was no central control panel for removing programs. Also see the Windows guidelines, where creating an uninstall shortcut is discouraged: https://msdn.microsoft.com/en-us/library/ms954377.aspx Signed-off-by: Sven Strickroth <email@cs-ware.de>
2018-10-10Increment version to 1.23-Hotfix-2Mounir IDRASSI14-33/+33
2018-10-10Windows Driver: fix regression that was causing BSOD.Mounir IDRASSI1-1/+1
2018-10-10Windows Driver: replace system functions ↵Mounir IDRASSI1-9/+41
RtlUpcaseUnicodeChar/RtlUnalignedStringCchLengthW by our own code for better clarity
2018-10-10Windows: zero TC_IOCTL_GET_SYSTEM_DRIVE_CONFIG input/output parameter as it ↵Mounir IDRASSI1-0/+2
is done for other IOCTLs
2018-09-21Increment version to 1.23-Hotfix-1Mounir IDRASSI17-33/+33
2018-09-21Windows: don't use quick format by default when creating file containers ↵Mounir IDRASSI1-1/+8
using command line and add a switch to enable quick format explicitly in command line
2018-09-21Windows: add /nosizecheck switch to VeraCrypt Format that allows disabling ↵Mounir IDRASSI1-1/+8
check on file container size against available free space on target disk. This enables to workaround a bug in Microsoft Distributed File System (DFS) that report wrong free disk space (https://support.microsoft.com/en-us/help/177127/incorrect-disk-free-space-information-for-a-dfs-client-share)