Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2019-03-03 | Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt ↵ | Mounir IDRASSI | 1 | -0/+2 | |
driver | |||||
2019-03-03 | Fix formatting of credits in About dialog and documentation | Mounir IDRASSI | 1 | -1/+1 | |
2019-03-03 | Windows: Add missing UI string to XML language files. | Mounir IDRASSI | 1 | -0/+1 | |
2019-03-03 | Increment version to 1.24-Beta3. Update Release Notes. | Mounir IDRASSI | 1 | -3/+3 | |
2019-03-03 | Windows: Add option to use legacy maximum password length (64 characters) ↵ | Mounir IDRASSI | 4 | -6/+12 | |
instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt. | |||||
2019-03-02 | Windows: fix compilation error | Mounir IDRASSI | 1 | -1/+1 | |
2019-03-02 | Windows: mitigate some memory attacks by making VeraCrypt applications ↵ | Mounir IDRASSI | 2 | -0/+91 | |
memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code (https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150) | |||||
2019-03-02 | Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵ | Mounir IDRASSI | 8 | -4/+117 | |
especially Format and Expander | |||||
2019-03-01 | Windows: better debug messages for VcProtectKeys and VcUnprotectKeys functions | Mounir IDRASSI | 1 | -3/+11 | |
2019-03-01 | Windows Driver: Implement RAM encryption for cached passwords | Mounir IDRASSI | 3 | -11/+91 | |
2019-03-01 | Windows: Add some logs in functions for RAM encryption | Mounir IDRASSI | 1 | -0/+8 | |
2019-03-01 | Windows: use specific order for EFI boot arguments memory regions that ↵ | Mounir IDRASSI | 1 | -0/+8 | |
matches the one used by EFI bootloader. | |||||
2019-03-01 | Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵ | Mounir IDRASSI | 5 | -6/+279 | |
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha) | |||||
2019-02-15 | Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it ↵ | Mounir IDRASSI | 2 | -2/+2 | |
in Mount.c | |||||
2019-02-15 | Windows: Set CpuRngDisabled variable to TRUE for clarity even if it will be ↵ | Mounir IDRASSI | 1 | -1/+1 | |
set to TRUE anyway by default through EnableCpuRng calls | |||||
2019-02-12 | Add copyright and license information of JitterEntropy library by Stephan ↵ | Mounir IDRASSI | 1 | -2/+3 | |
Mueller | |||||
2019-02-12 | Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by ↵ | Mounir IDRASSI | 1 | -0/+27 | |
Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de) | |||||
2019-02-10 | Windows: Ensure that only one thread at a time can create a secure desktop | Mounir IDRASSI | 1 | -0/+8 | |
2019-02-10 | Fix typo in CPU RNG detection condition (Github issue #417) | Mounir IDRASSI | 1 | -1/+1 | |
2019-02-08 | Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵ | Mounir IDRASSI | 5 | -5/+39 | |
which is now disabled by default | |||||
2019-02-04 | Automatically truncate passwords for TrueCrypt volumes and System Encryption ↵ | Mounir IDRASSI | 2 | -2/+4 | |
to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version. | |||||
2019-02-01 | Update Release Notes and other files for 1.24-Beta2 release | Mounir IDRASSI | 1 | -1/+1 | |
2019-02-01 | Windows: use CPU RDRAND or RDSEED as an additional entropy source for our ↵ | Mounir IDRASSI | 1 | -5/+25 | |
random generator when available | |||||
2019-02-01 | Windows driver: replace SHA512 by RIPEMD160 when calculating internal hash ↵ | Mounir IDRASSI | 2 | -6/+7 | |
of master key to avoid calling KeSaveFloatingPointState/KeSaveExtendedProcessorState since SHA512 implementation uses SSE2/AVX and RIPEMD160 is pure C | |||||
2019-01-28 | Increment version to 1.24-Beta2 | Mounir IDRASSI | 1 | -2/+2 | |
2019-01-28 | Increase password maximum length to 128 bytes from 64 bytes | Mounir IDRASSI | 7 | -17/+50 | |
2019-01-26 | Windows: Add a build configuration containing EFI bootloader signed with ↵ | Mounir IDRASSI | 5 | -4/+13 | |
custom SecureBoot key instead | |||||
2019-01-26 | Windows: fix building MBR bootloader following modification of Xts.c | Mounir IDRASSI | 1 | -0/+2 | |
2019-01-25 | Windows crypto: optimize XTS implementation for 64-bit builds using SSE2 ↵ | Mounir IDRASSI | 1 | -48/+122 | |
thanks to simplification of storage of whitening values in memory (normal order instead of reverse order). | |||||
2019-01-22 | Windows: Increment driver version to 1.24.1.1 | Mounir IDRASSI | 1 | -1/+1 | |
2019-01-21 | Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵ | Mounir IDRASSI | 7 | -51/+56 | |
not needed after their key schedule is created | |||||
2019-01-21 | Windows: remove unused fields from CRYPTO_INFO structure | Mounir IDRASSI | 2 | -9/+3 | |
2019-01-18 | Windows: fix editor of EFI configuration file not accepting ENTER key for ↵ | Mounir IDRASSI | 1 | -2/+2 | |
adding new lines. | |||||
2019-01-15 | Windows: enhancements to EFI system encryption, like handling of Multi-Boot ↵ | Mounir IDRASSI | 4 | -40/+79 | |
and better compatibility with Windows Upgrade process. | |||||
2019-01-14 | Update Release Notes and language files for version 1.24-Beta1. Add signed ↵ | Mounir IDRASSI | 1 | -1/+1 | |
Windows drivers. | |||||
2019-01-14 | Windows: enhance support of new behavior of favorite service which is now ↵ | Mounir IDRASSI | 1 | -5/+6 | |
always running in case of system encryption | |||||
2019-01-14 | Windows: Implement feature that enables clearing of encryption keys when a ↵ | Mounir IDRASSI | 4 | -56/+29 | |
new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade). | |||||
2019-01-14 | Increment version to 1.24-Beta1 | Mounir IDRASSI | 1 | -4/+6 | |
2019-01-09 | Windows Security: Add new entry point in driver that allows emergency ↵ | Mounir IDRASSI | 3 | -0/+13 | |
clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected. | |||||
2019-01-09 | Windows driver: move newly added field in VOLUME_PROPERTIES_STRUCT to the ↵ | Mounir IDRASSI | 1 | -1/+1 | |
end for compatibility with previous version. | |||||
2018-12-19 | Increment version to 1.24-Beta0 | Mounir IDRASSI | 1 | -4/+4 | |
2018-12-19 | Windows: Add mount option that allows mounting a volume without attaching it ↵ | Mounir IDRASSI | 6 | -25/+31 | |
to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX). | |||||
2018-12-03 | Windows: Update libzip to version 1.5.1 | Mounir IDRASSI | 3 | -2/+13 | |
2018-10-10 | Increment version to 1.23-Hotfix-2 | Mounir IDRASSI | 1 | -3/+3 | |
2018-10-10 | Windows: zero TC_IOCTL_GET_SYSTEM_DRIVE_CONFIG input/output parameter as it ↵ | Mounir IDRASSI | 1 | -0/+2 | |
is done for other IOCTLs | |||||
2018-09-21 | Increment version to 1.23-Hotfix-1 | Mounir IDRASSI | 1 | -2/+2 | |
2018-09-12 | Set 1.23 release date to September 12th 2018 | Mounir IDRASSI | 1 | -1/+1 | |
2018-09-10 | Set 1.23 release date to September 10th 2018 | Mounir IDRASSI | 1 | -2/+2 | |
2018-09-03 | Increment version to 1.23-BETA8 and update release notes. | Mounir IDRASSI | 1 | -2/+2 | |
2018-09-03 | Windows: handle case of inconsistencies in EFI system partition content ↵ | Mounir IDRASSI | 1 | -5/+32 | |
during system encryption wizard caused by older VeraCrypt system encryption not properly uninstalled (e.g. reinstall Windows without decryption first). |