Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2019-03-01 | Windows Driver: Implement RAM encryption for cached passwords | Mounir IDRASSI | 1 | -0/+1 | |
2019-03-01 | Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵ | Mounir IDRASSI | 1 | -0/+21 | |
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha) | |||||
2019-02-15 | Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it ↵ | Mounir IDRASSI | 1 | -1/+1 | |
in Mount.c | |||||
2019-02-08 | Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵ | Mounir IDRASSI | 1 | -0/+4 | |
which is now disabled by default | |||||
2019-02-01 | Windows driver: replace SHA512 by RIPEMD160 when calculating internal hash ↵ | Mounir IDRASSI | 1 | -1/+1 | |
of master key to avoid calling KeSaveFloatingPointState/KeSaveExtendedProcessorState since SHA512 implementation uses SSE2/AVX and RIPEMD160 is pure C | |||||
2019-01-21 | Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵ | Mounir IDRASSI | 1 | -1/+5 | |
not needed after their key schedule is created | |||||
2019-01-21 | Windows: remove unused fields from CRYPTO_INFO structure | Mounir IDRASSI | 1 | -6/+1 | |
2019-01-09 | Windows Security: Add new entry point in driver that allows emergency ↵ | Mounir IDRASSI | 1 | -0/+1 | |
clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected. | |||||
2018-03-27 | Crypto: Add support for 5 new cascades of cipher algorithms ↵ | Mounir IDRASSI | 1 | -1/+1 | |
(Camellia-Kuznyechik, Camellia-Serpent, Kuznyechik-AES, Kuznyechik-Serpent-Camellia and Kuznyechik-Twofish) | |||||
2017-07-22 | Windows: reduce size of MBR bootloader by removing unused functions in each ↵ | Mounir IDRASSI | 1 | -1/+1 | |
build type. | |||||
2017-06-23 | Update IDRIX copyright year | Mounir IDRASSI | 1 | -1/+1 | |
2017-01-12 | Windows: Fix Streebog not recognized by /hash command line switch but making ↵ | Mounir IDRASSI | 1 | -1/+3 | |
hash names matching more generic. | |||||
2016-10-17 | Windows EFI: don't use optimized Serpent implementation for EFI bootloader ↵ | Mounir IDRASSI | 1 | -1/+1 | |
because lack of C++ support in EDKII framework | |||||
2016-10-17 | Crypto: Use SIMD optimized Serpent implementation from Botan. 2.5x speed ↵ | Mounir IDRASSI | 1 | -1/+5 | |
gain factor. Update credits and copyrights notice. | |||||
2016-08-17 | Linux: fix various compilation issues under Linux. | Mounir IDRASSI | 1 | -2/+2 | |
2016-08-15 | Windows: Show only supported encryption algorithm in the system encryption ↵ | Mounir IDRASSI | 1 | -0/+6 | |
wizard for MBR | |||||
2016-08-15 | Windows EFI Bootloader: modifications to prepare EFI system encryption ↵ | Alex | 1 | -12/+12 | |
support (common files with DcsBoot) | |||||
2016-08-15 | Windows: Add support for Streebog (hash) and kuznyechik (encryption) | Mounir IDRASSI | 1 | -7/+16 | |
2016-08-15 | Windows: Add Magma cipher (GOST-89) | Mounir IDRASSI | 1 | -3/+5 | |
2016-06-02 | Crypto: Add support for Japanese encryption standard Camellia, including for ↵ | Mounir IDRASSI | 1 | -1/+7 | |
system encryption. | |||||
2016-05-10 | Remove trailing whitespace | David Foerster | 1 | -11/+11 | |
2016-05-10 | Normalize all line terminators | David Foerster | 1 | -363/+363 | |
2016-01-20 | Copyright: update dates to include 2016. | Mounir IDRASSI | 1 | -1/+1 | |
2016-01-03 | Cryptography: Set 16-byte alignment for KEY_INFO structure that is used as ↵ | Mounir IDRASSI | 1 | -1/+10 | |
input for Whirlpool hash. This helps improve performance. | |||||
2015-11-26 | Windows: Full UNICODE rewrite and implement support for UNICODE passwords. | Mounir IDRASSI | 1 | -11/+17 | |
2015-08-06 | Update license information to reflect the use of a dual license Apache 2.0 ↵ | Mounir IDRASSI | 1 | -7/+9 | |
and TrueCrypt 3.0. | |||||
2015-07-11 | Use Pim name for internal variables instead of the old name Pin | Mounir IDRASSI | 1 | -1/+1 | |
2015-06-07 | Windows: Add support for PIN in favorites. Several enhancements to GUI ↵ | Mounir IDRASSI | 1 | -0/+1 | |
handling of Dynamic Mode. | |||||
2015-05-26 | Windows: first implementation of dynamic mode | Mounir IDRASSI | 1 | -0/+1 | |
2015-01-03 | Windows: change cascade encryption naming format to reflex mathematical ↵ | Mounir IDRASSI | 1 | -1/+1 | |
composition of the encryption algorithm, thus being more clear. For example AES(Twofish(Serpent)) instead of AES-Twofish-Serpent. | |||||
2014-12-28 | Windows: support loading TrueCrypt volumes. Implement converting TrueCrypt ↵ | Mounir IDRASSI | 1 | -0/+1 | |
volumes to VeraCrypt using the change password functionality. | |||||
2014-12-16 | Windows: Enhance performance by implementing the possibility to choose the ↵ | Mounir IDRASSI | 1 | -1/+19 | |
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption. | |||||
2014-11-08 | Bootloader: optimize code size in single cipher mode by manually inlining ↵ | Mounir IDRASSI | 1 | -0/+4 | |
EAInit, EAGetFirst and EAGetKeySize, and by removing the loop in ReadVolumeHeader that tests for encryption algorithms. | |||||
2014-11-08 | Add support for SHA-256 in key derivation for bootloader encryption. Create ↵ | Mounir IDRASSI | 1 | -8/+15 | |
separate bootloader images for SHA-256 and RIPEMD-160. Set SHA-256 as the default PRF for boot encryption and SHA-512 as default PRF for all other cases. Depricate RIPEMD-160. | |||||
2014-11-08 | Adapt certain functions in the case of Windows bootloader in order to make ↵ | Mounir IDRASSI | 1 | -2/+10 | |
its size as small as possible. | |||||
2014-11-08 | Lower number of times we overwrite volume header during the encryption of a ↵ | Mounir IDRASSI | 1 | -0/+3 | |
partition if the user choose to wipe the driver. Latest studies show that even one pass is enough to make data irretrievable. A value of 3 is a conservative approach that enhance performance without scarifying security. http://www.infosecisland.com/blogview/16130-The-Urban-Legend-of-Multipass-Hard-Disk-Overwrite.html http://digital-forensics.sans.org/blog/2009/01/15/overwriting-hard-drive-data/ | |||||
2014-11-08 | Remove remaining legacy cryptographic algorithms that are never used by ↵ | Mounir IDRASSI | 1 | -3/+0 | |
VeraCrypt. | |||||
2014-11-08 | Remove deprecated/legacy cryptographic algorithms and encryption modes that ↵ | Mounir IDRASSI | 1 | -27/+1 | |
are never used by VeraCrypt. This will speed up volumes opening in many cases. | |||||
2014-11-08 | Static Code Analysis : Add various NULL pointers checks | Mounir IDRASSI | 1 | -2/+2 | |
2014-11-08 | Add original TrueCrypt 7.1a sources | Mounir IDRASSI | 1 | -0/+332 | |