Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2019-01-09 | Windows Security: Add new entry point in driver that allows emergency ↵ | Mounir IDRASSI | 1 | -0/+5 | |
clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected. | |||||
2018-12-19 | Windows Driver: Don't interact with the volume's filesystem if mount manager ↵ | Mounir IDRASSI | 1 | -1/+1 | |
integration is disabled | |||||
2018-12-19 | Windows: Add mount option that allows mounting a volume without attaching it ↵ | Mounir IDRASSI | 1 | -9/+11 | |
to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX). | |||||
2018-10-10 | Windows Driver: fix regression that was causing BSOD. | Mounir IDRASSI | 1 | -1/+1 | |
2018-10-10 | Windows Driver: replace system functions ↵ | Mounir IDRASSI | 1 | -9/+41 | |
RtlUpcaseUnicodeChar/RtlUnalignedStringCchLengthW by our own code for better clarity | |||||
2018-09-21 | Windows driver: add extra check for data read in TC_IOCTL_OPEN_TEST handling | Mounir IDRASSI | 1 | -1/+31 | |
2018-09-21 | Windows: fix low severity vulnerability in driver that allowed reading 3 ↵ | Mounir IDRASSI | 1 | -49/+82 | |
bytes of kernel stack memory (with a rare possibility of 25 additional bytes). Reported by Tim Harrison. | |||||
2018-09-01 | Windows: extended Windows defragmenter workaround to Windows 8.1 | Mounir IDRASSI | 1 | -3/+3 | |
2018-08-24 | Windows: implement a driver configuration option to explicitly allow ↵ | Mounir IDRASSI | 1 | -1/+3 | |
defragmenting non-système disques by Windows built-in defragmenter tool. | |||||
2018-08-18 | Windows: Implement workaround on Windows 10 to make VeraCrypt encrypted ↵ | Mounir IDRASSI | 1 | -5/+21 | |
disks visible to Windows defragmenter | |||||
2018-08-15 | WIndows driver: add check for failed memory allocation | Mounir IDRASSI | 1 | -8/+11 | |
2018-03-05 | Windows: Add option to block TRIM command on system encryption SSD drives. | Mounir IDRASSI | 1 | -0/+4 | |
2018-03-04 | Windows: Implement TRIM support for non-system SSD partitions/drives and add ↵ | Mounir IDRASSI | 1 | -32/+290 | |
driver option to enable it (TRIM is disabled by default for non-system SSD partitions/drives) | |||||
2017-07-27 | Windows driver: correctly handle IOCTL_DISK_GET_DRIVE_GEOMETRY_EX to fix ↵ | Mounir IDRASSI | 1 | -29/+151 | |
issues with some disks. Implement IOCTL_STORAGE_GET_MEDIA_TYPES_EX. | |||||
2017-07-23 | Windows Driver: make IOCTL_DISK_GET_DRIVE_GEOMETRY_EX support optional. Make ↵ | Mounir IDRASSI | 1 | -15/+19 | |
disk size equal to partition size to avoid compatibility issues with existing software. | |||||
2017-07-23 | Windows Driver: add legacy handling for ↵ | Mounir IDRASSI | 1 | -23/+42 | |
IOCTL_DISK_GET_DRIVE_LAYOUT_EX/IOCTL_DISK_GET_DRIVE_LAYOUT IOCTLs to fix issues with faulty applications and drivers that don't handle them correctly. | |||||
2017-07-20 | Windows driver: only activate newly supported IOCTLs if the option to enable ↵ | Mounir IDRASSI | 1 | -43/+83 | |
extended IOCTLs is enabled in VeraCrypt driver settings. | |||||
2017-07-20 | Windows driver: fix IOCTL_DISK_GET_DRIVE_LAYOUT and ↵ | Mounir IDRASSI | 1 | -2/+2 | |
IOCTL_DISK_GET_DRIVE_LAYOUT_EX output by using setting PartitionCount to 4 instead of 1 since this field must always be a multiple of 4 for MBR disks. | |||||
2017-07-05 | Windows Driver: correctly get KeRestoreExtendedProcessorState function pointer. | Mounir IDRASSI | 1 | -4/+5 | |
2017-07-04 | Windows: correctly handle SEH exceptions during self-tests in order to ↵ | Mounir IDRASSI | 1 | -1/+10 | |
disable CPU extended features in such case. | |||||
2017-07-04 | Windows Driver: correctly save and restore extended processor state when ↵ | Mounir IDRASSI | 1 | -0/+41 | |
performing AVX operations on Windows 7 and later. Enhance readability of code handling save/restore of floating point state. | |||||
2017-06-23 | Update IDRIX copyright year | Mounir IDRASSI | 1 | -1/+1 | |
2017-06-10 | Windows Driver Security: Use enhanced protection of NX pool under Windows 8 ↵ | Mounir IDRASSI | 1 | -0/+10 | |
and later. | |||||
2017-06-01 | Windows: fix high CPU usage when a favorite is configured to mount using ↵ | Mounir IDRASSI | 1 | -22/+31 | |
VolumeID when its host device is connected to the machine. | |||||
2017-05-28 | Windows Driver: enhance detection of FAT volumes. | Mounir IDRASSI | 1 | -3/+5 | |
2017-05-26 | Windows Driver: Correctly detect FAT volumes created on Linux in ↵ | Mounir IDRASSI | 1 | -0/+2 | |
TC_IOCTL_OPEN_TEST FileSystem detection | |||||
2017-05-26 | Windows Driver: Add support for ReFS in TC_IOCTL_OPEN_TEST FileSystem detection | Mounir IDRASSI | 1 | -1/+1 | |
2017-05-25 | Windows: remove IOCTL_STORAGE_GET_DEVICE_NUMBER support until a real device ↵ | Mounir IDRASSI | 1 | -2/+3 | |
is implemented. | |||||
2017-05-25 | Windows Driver: implement some extra IOCTLs. Add more traces for debugging. | Mounir IDRASSI | 1 | -0/+112 | |
2017-05-25 | Windows Driver: enhance implementation of IOCTL_STORAGE_QUERY_PROPERTY | Mounir IDRASSI | 1 | -9/+106 | |
2017-05-25 | Windows Driver: remove unused variable. | Mounir IDRASSI | 1 | -1/+0 | |
2017-05-21 | Windows Driver: Support new IOCTLS and correct implementation of existing ↵ | Mounir IDRASSI | 1 | -3/+111 | |
ones to solve Windows 10 compatibility issues. | |||||
2017-05-21 | Windows Driver: fix bug in new IOCTL VC_IOCTL_GET_DRIVE_GEOMETRY_EX | Mounir IDRASSI | 1 | -2/+0 | |
2017-05-17 | Windows: use IOCTL_DISK_GET_DRIVE_GEOMETRY_EX instead of the deprecated ↵ | Mounir IDRASSI | 1 | -3/+32 | |
IOCTL_DISK_GET_DRIVE_GEOMETRY in order to get accurate disk size value. | |||||
2016-10-17 | Windows: Fix failure to access EFS data on VeraCrypt volumes under Windows ↵ | Mounir IDRASSI | 1 | -2/+11 | |
10 but supporting undocumented IOCTL. | |||||
2016-08-15 | Windows Driver: Add extra traces and enable tracing in release build if ↵ | Mounir IDRASSI | 1 | -6/+29 | |
DEBUG_TRACE defined. | |||||
2016-05-10 | Remove trailing whitespace | David Foerster | 1 | -45/+45 | |
2016-05-10 | Normalize all line terminators | David Foerster | 1 | -3563/+3563 | |
2016-04-14 | Windows: Finalize implementation of the new volume ID mechanism. Use SHA-256 ↵ | Mounir IDRASSI | 1 | -7/+7 | |
instead of SHA-512 to compute volume ID to reduce string size and make more convenient to use. | |||||
2016-04-08 | Windows: start implementation of volume ID mechanism that will be used to ↵ | Mounir IDRASSI | 1 | -29/+82 | |
identify VeraCrypt disk volumes instead of device name. | |||||
2016-01-20 | Copyright: update dates to include 2016. | Mounir IDRASSI | 1 | -1/+1 | |
2016-01-04 | Windows: Enhance fix for dll hijacking vulnerability affecting installer ↵ | Mounir IDRASSI | 1 | -0/+3 | |
(CVE-2016-1281) | |||||
2016-01-03 | Windows Driver: Remove unwanted ':' character at the end of volume device ↵ | Mounir IDRASSI | 1 | -2/+2 | |
name. This was causing a crash in Kaspersky Internet Security 2016 when a program is run from a VeraCrypt volume. | |||||
2015-12-31 | Cryptography: Optimize Whirlpool implementation by using public domain ↵ | Mounir IDRASSI | 1 | -0/+3 | |
assembly code developed by Wei Dai | |||||
2015-12-21 | Windows: Implement PIM caching, both for system encryption and for normal ↵ | Mounir IDRASSI | 1 | -1/+5 | |
volumes. Add options to activate it in the Preferences and System Settings. | |||||
2015-11-26 | Windows Driver: solve compilation error in Debug build caused by a missing ↵ | Mounir IDRASSI | 1 | -0/+6 | |
variable. | |||||
2015-10-05 | Windows Driver: Modify fix for CVE-2015-7358 to solve side effects on ↵ | Mounir IDRASSI | 1 | -13/+34 | |
Windows mount manager while still making it hard to abuse drive letter handling. | |||||
2015-10-05 | Windows Driver: remove allocation of unused variables | Mounir IDRASSI | 1 | -4/+2 | |
2015-09-26 | Windows Driver: remove unnecessary variables declaration and use in ↵ | Mounir IDRASSI | 1 | -5/+0 | |
MountManagerMount. | |||||
2015-09-26 | Windows Driver: Fix inherited TrueCrypt local elevation of privilege ↵ | Mounir IDRASSI | 1 | -2/+3 | |
vulnerability caused by abusing the drive letter symbolic link creation facilities to remap the main system drive. Thanks to James Forshaw (Google) for reporting this issue and for helping implementing the fix. |