VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Driver/Ntdriver.c
AgeCommit message (Collapse)AuthorFilesLines
2016-05-10Normalize all line terminatorsDavid Foerster1-3563/+3563
2016-04-14Windows: Finalize implementation of the new volume ID mechanism. Use SHA-256 ↵Mounir IDRASSI1-7/+7
instead of SHA-512 to compute volume ID to reduce string size and make more convenient to use.
2016-04-08Windows: start implementation of volume ID mechanism that will be used to ↵Mounir IDRASSI1-29/+82
identify VeraCrypt disk volumes instead of device name.
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2016-01-04Windows: Enhance fix for dll hijacking vulnerability affecting installer ↵Mounir IDRASSI1-0/+3
(CVE-2016-1281)
2016-01-03Windows Driver: Remove unwanted ':' character at the end of volume device ↵Mounir IDRASSI1-2/+2
name. This was causing a crash in Kaspersky Internet Security 2016 when a program is run from a VeraCrypt volume.
2015-12-31Cryptography: Optimize Whirlpool implementation by using public domain ↵Mounir IDRASSI1-0/+3
assembly code developed by Wei Dai
2015-12-21Windows: Implement PIM caching, both for system encryption and for normal ↵Mounir IDRASSI1-1/+5
volumes. Add options to activate it in the Preferences and System Settings.
2015-11-26Windows Driver: solve compilation error in Debug build caused by a missing ↵Mounir IDRASSI1-0/+6
variable.
2015-10-05Windows Driver: Modify fix for CVE-2015-7358 to solve side effects on ↵Mounir IDRASSI1-13/+34
Windows mount manager while still making it hard to abuse drive letter handling.
2015-10-05Windows Driver: remove allocation of unused variablesMounir IDRASSI1-4/+2
2015-09-26Windows Driver: remove unnecessary variables declaration and use in ↵Mounir IDRASSI1-5/+0
MountManagerMount.
2015-09-26Windows Driver: Fix inherited TrueCrypt local elevation of privilege ↵Mounir IDRASSI1-2/+3
vulnerability caused by abusing the drive letter symbolic link creation facilities to remap the main system drive. Thanks to James Forshaw (Google) for reporting this issue and for helping implementing the fix.
2015-09-26Windows Driver: Fix inherited TrueCrypt local elevation of privilege ↵Mounir IDRASSI1-2/+10
vulnerability caused by incorrect impersonation token handling. Reported and fixed by James Forshaw (Google)
2015-09-16Windows: Add option to explicitly support extended disk IOCTLs and disable ↵Mounir IDRASSI1-45/+53
this support by default. This will avoid having issue with software that doesn't handle correctly partial IOCTL_STORAGE_QUERY_PROPERTY support.
2015-08-31Windows: Support setting volume label in Explorer through mount option. ↵Mounir IDRASSI1-0/+60
Support using favorite label as label in Explorer.
2015-08-31Windows Driver: Protect captured subject context during processing of user ↵Mounir IDRASSI1-0/+2
access token.
2015-08-14Windows Driver: support returning StorageDeviceProperty through ↵Mounir IDRASSI1-16/+37
IOCTL_STORAGE_QUERY_PROPERTY.
2015-08-09Windows: better error code when IOCTL_STORAGE_QUERY_PROPERTY type is not ↵Mounir IDRASSI1-1/+1
supported
2015-08-09Windows: Solve crash of TOR when run from VeraCrypt volume by explicitly ↵Mounir IDRASSI1-0/+4
returning error code when unsupported IOCTL_STORAGE_QUERY_PROPERTY parameter encountered.
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-7/+9
and TrueCrypt 3.0.
2015-07-29Windows: Implement Evil-Maid-Attack detection mechanism. Write the correct ↵Mounir IDRASSI1-1/+5
bootloader when changing the system encryption password: this enables to recover if an attack is detected.
2015-07-11Use Pim name for internal variables instead of the old name PinMounir IDRASSI1-4/+4
2015-06-07Windows: Add support for PIN in favorites. Several enhancements to GUI ↵Mounir IDRASSI1-0/+2
handling of Dynamic Mode.
2015-05-26Windows: first implementation of dynamic modeMounir IDRASSI1-0/+2
2015-05-10Windows Driver: fix wrongly reported bad sectors by chkdsk caused by a bug ↵Mounir IDRASSI1-1/+1
in IOCTL_DISK_VERIFY. There was no real issue in sectors.
2015-05-03Windows Driver: Implement querying physical sector size of veraCrypt volume ↵Mounir IDRASSI1-2/+38
through IOCTL_STORAGE_QUERY_PROPERTY
2015-02-09Static Code Analysis: in Windows Driver, avoid using uninitialized stack ↵Mounir IDRASSI1-1/+1
memory as random and use proper random value for wipe operation. Solve potential double-free issue.
2015-01-04Windows Driver: add TrueCrypt mode of mounted volumes to the output of ↵Mounir IDRASSI1-0/+1
TC_IOCTL_GET_MOUNTED_VOLUMES
2014-12-28Windows: support loading TrueCrypt volumes. Implement converting TrueCrypt ↵Mounir IDRASSI1-1/+4
volumes to VeraCrypt using the change password functionality.
2014-12-16Windows: Enhance performance by implementing the possibility to choose the ↵Mounir IDRASSI1-1/+5
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption.
2014-12-11Windows Driver: change inherited TrueCrypt constants in kernel objects tags ↵Mounir IDRASSI1-1/+1
by VeraCrypt specific values. These are used in crash dumps analysis and during debugging.
2014-11-08Windows vulnerability fix: correct some integer overflow issues using the ↵Mounir IDRASSI1-2/+13
IntSafe library. Detected by the Open Crypto Audit project
2014-11-08Windows vulnerability fix: correct checking device name to avoid possible ↵Mounir IDRASSI1-1/+17
bypass attack detected by the Open Crypto Audit project
2014-11-08Windows vulnerability fix : avoid kernel pointer disclosure through a call ↵Mounir IDRASSI1-1/+3
to TC_IOCTL_GET_SYSTEM_DRIVE_DUMP_CONFIG but restricting this call to Kernel Mode.
2014-11-08Static Code Analysis : Use Safe string functions inside VeraCrypt Device ↵Mounir IDRASSI1-31/+31
Driver to avoid potential security issues. Add many checks for NULL pointers to handle low memory use cases.
2014-11-08Change TrueCrypt to VeraCrypt in some commentsMounir IDRASSI1-4/+4
2014-11-08Replace TrueCrypt references in added sources and resources by VeraCrypt ones.Mounir IDRASSI1-1/+1
2014-11-08Modifications to remove all TrueCrypt references in names. generate new ↵Mounir IDRASSI1-3/+3
GUIDs for VeraCrypt. Replace "TRUE" by "VERA" in volume headers and driver magic word.
2014-11-08Add original TrueCrypt 7.1a sourcesMounir IDRASSI1-0/+3293