Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2024-09-29 | Windows: Exclude Argon2 for System Encryption and from automatic detection | Mounir IDRASSI | 1 | -1/+2 | |
Bootloader doesn't support Argon2 yet. We don't want to add overhead to automatic detection for now. | |||||
2024-09-29 | Windows: Implement foundations for Argon2 support as a KDF in addition to PBKDF2 | Mounir IDRASSI | 1 | -2/+4 | |
2023-11-13 | wolfCrypt as crypto backend for VeraCrypt (#1227) | lealem47 | 1 | -20/+25 | |
* wolfCrypt as crypto backend for VeraCrypt * Refactor to use EncryptionModeWolfCryptXTS class | |||||
2022-08-25 | Windows: use newer MEMORYSTATUSEX structure in call to GlobalMemoryStatusEx | Mounir IDRASSI | 1 | -3/+3 | |
2022-08-25 | Minor bugfixes (#950) | Wendigo | 1 | -1/+1 | |
* Update Dlgcode.c minor bugfixes * GlobalMemoryStatus x64 bugfix GlobalMemoryStatus deprecated in x64 | |||||
2022-03-08 | Implement support of Blake2s-256 hash algorithm and remove deprecated ↵ | Mounir IDRASSI | 1 | -9/+9 | |
algorithms RIPEMD-160 and GOST89. | |||||
2021-02-24 | Windows: Fix failure to launch keyfile generator in secure desktop mode | Mounir IDRASSI | 1 | -2/+6 | |
Hooking is not allowed if thread is running in secure desktop so we ignore SetWindowsHookEx failure in this case and random generator will be initialized using the other entropy sources from the system. | |||||
2019-10-03 | Windows: Add function RandinitWithCheck to detect if random generator was ↵ | Mounir IDRASSI | 1 | -1/+13 | |
already initialized before our call or not | |||||
2019-10-03 | Windows: Use Jitterentropy RNG only in SlowPoll call and not in FastPoll ↵ | Mounir IDRASSI | 1 | -13/+0 | |
since the it consumes too much CPU and FastPoll requires fast and minimal entropy gathering | |||||
2019-02-12 | Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by ↵ | Mounir IDRASSI | 1 | -0/+27 | |
Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de) | |||||
2019-02-08 | Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵ | Mounir IDRASSI | 1 | -5/+7 | |
which is now disabled by default | |||||
2019-02-01 | Windows: use CPU RDRAND or RDSEED as an additional entropy source for our ↵ | Mounir IDRASSI | 1 | -5/+25 | |
random generator when available | |||||
2017-06-23 | Update IDRIX copyright year | Mounir IDRASSI | 1 | -1/+1 | |
2016-08-21 | Windows: fix crash caused by previous Streebog fix. | Mounir IDRASSI | 1 | -1/+1 | |
2016-08-20 | Windows: Fix crash on 32-bit machines when using Streebog on a CPU that ↵ | Mounir IDRASSI | 1 | -1/+1 | |
supports SSE4.1. | |||||
2016-08-15 | Windows: Add support for Streebog (hash) and kuznyechik (encryption) | Mounir IDRASSI | 1 | -0/+15 | |
2016-07-25 | Windows: solve benchmark issue for Whirlpool which caused wrong numbers when ↵ | Mounir IDRASSI | 1 | -1/+1 | |
a 1GB buffer is chosen. | |||||
2016-05-10 | Remove trailing whitespace | David Foerster | 1 | -25/+25 | |
2016-05-10 | Normalize all line terminators | David Foerster | 1 | -898/+898 | |
2016-02-07 | Windows:Fix various issues and warnings reported by static code analysis ↵ | Mounir IDRASSI | 1 | -3/+3 | |
tool Coverity. | |||||
2016-01-31 | Windows: Implement GUI indicator for entropy collected from mouse movements. | Mounir IDRASSI | 1 | -1/+13 | |
2016-01-20 | Copyright: update dates to include 2016. | Mounir IDRASSI | 1 | -1/+1 | |
2015-11-26 | Windows: Full UNICODE rewrite and implement support for UNICODE passwords. | Mounir IDRASSI | 1 | -10/+10 | |
2015-08-06 | Update license information to reflect the use of a dual license Apache 2.0 ↵ | Mounir IDRASSI | 1 | -7/+9 | |
and TrueCrypt 3.0. | |||||
2015-07-06 | Windows: Display source location of errors in order to help diagnose issues ↵ | Mounir IDRASSI | 1 | -4/+8 | |
reported by users | |||||
2015-05-22 | Windows: make random generator function compatible with 64-bit execution ↵ | Mounir IDRASSI | 1 | -15/+34 | |
environment | |||||
2015-04-06 | Windows vulnerability fix: CryptAcquireContext vulnerability fix. Add checks ↵ | Mounir IDRASSI | 1 | -10/+48 | |
to random generator to abort in case of error and display a diagnose message to the user. | |||||
2015-02-09 | Static Code Analysis: handle unused variables more properly. Catch STL ↵ | Mounir IDRASSI | 1 | -1/+1 | |
exception. Add more checks. Add proper cast to arithmetic operations. | |||||
2014-12-27 | Windows: use the correct window handle for creating message boxes. This ↵ | Mounir IDRASSI | 1 | -6/+6 | |
became important after the introduction of the wait dialog in order to avoid having message boxes behind the wait dialog. | |||||
2014-12-11 | Implement function RandgetBytesFull that enables generating random bytes of ↵ | Mounir IDRASSI | 1 | -21/+47 | |
any length. | |||||
2014-12-11 | Windows: correct lock issue in RandgetBytes by releasing critical section in ↵ | Mounir IDRASSI | 1 | -0/+1 | |
case of error. | |||||
2014-11-08 | Implement support for creating and booting encrypted partition using ↵ | Mounir IDRASSI | 1 | -0/+15 | |
SHA-256. Support SHA-256 for normal volumes as well. | |||||
2014-11-08 | Static Code Analysis : Generalize the use of Safe String functions. Add some ↵ | Mounir IDRASSI | 1 | -3/+4 | |
NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL. | |||||
2014-11-08 | Static Code Analysis : fix non-absolute DLL/process loads that can be ↵ | Mounir IDRASSI | 1 | -1/+9 | |
hijacked (Microsoft Security Advisory 2269637). | |||||
2014-11-08 | Add original TrueCrypt 7.1a sources | Mounir IDRASSI | 1 | -0/+772 | |