VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Driver/Ntdriver.h
AgeCommit message (Collapse)AuthorFilesLines
2024-11-23Windows Driver: Make max work items count configurable. Increase default to ↵Mounir IDRASSI1-0/+1
1024. Queue write IRPs. - Made the maximum work items count configurable to allow flexibility based on system needs. - Increased the default value of max work items count to 1024 to better handle high-throughput scenarios. - Queue write IRPs in system worker thread to avoid potential deadlocks in write scenarios.
2024-06-12Avoid conflict with C++17 features std::byte by using uint8 type instead of byteMounir IDRASSI1-1/+1
2022-02-06Windows: Add registry setting to disable erasing encryption keys on Windows ↵Mounir IDRASSI1-0/+1
shutdown/reboot. This helps solve BSOD during shutdown/reboot on some machines. Under "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt", create a REG_DWORD value named "VeraCryptEraseKeysShutdown" and set its value to 0.
2021-12-20Windows Driver: Add registry settings to control driver internal encryption ↵Mounir IDRASSI1-0/+3
queue Under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt: - VeraCryptEncryptionFragmentSize (REG_DWORD): size of encryption data fragment in KiB. Default is 256. - VeraCryptEncryptionIoRequestCount (REG_DWORD): maximum number of parallel I/O requests. Default is 16. - VeraCryptEncryptionItemCount (REG_DWORD): maximum number of encryption queue items processed in parallel. Default is 8.
2020-07-02Windows: Don't use API for Processor Groups support if there is only 1 CPU ↵Mounir IDRASSI1-1/+1
group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
2020-02-10Windows: Implement support for processor groups in the driver and fix build ↵Mounir IDRASSI1-0/+2
issues caused by previous implementation
2019-02-08Windows: Add implementation of ChaCha20 based random generator. Use it for ↵Mounir IDRASSI1-0/+1
driver need of random bytes (currently only wipe bytes but more to come later).
2019-01-09Windows driver: remove newly added volatile qualifier from CRYPT_INFO ↵Mounir IDRASSI1-1/+1
pointers to fix build issue until a better approach is devised
2019-01-09Windows Security: Add new entry point in driver that allows emergency ↵Mounir IDRASSI1-1/+2
clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected.
2018-08-24Windows: implement a driver configuration option to explicitly allow ↵Mounir IDRASSI1-0/+1
defragmenting non-système disques by Windows built-in defragmenter tool.
2018-08-18Windows: Implement workaround on Windows 10 to make VeraCrypt encrypted ↵Mounir IDRASSI1-0/+1
disks visible to Windows defragmenter
2018-03-05Windows: Add option to block TRIM command on system encryption SSD drives.Mounir IDRASSI1-1/+1
2018-03-04Windows: Implement TRIM support for non-system SSD partitions/drives and add ↵Mounir IDRASSI1-0/+3
driver option to enable it (TRIM is disabled by default for non-system SSD partitions/drives)
2017-06-23Update IDRIX copyright yearMounir IDRASSI1-1/+1
2017-05-25Windows: query extra host drive information using ↵Mounir IDRASSI1-0/+3
IOCTL_STORAGE_QUERY_PROPERTY (StorageAdapterProperty) in both driver and user mode applications.
2017-05-25Windows Driver: remove unused variable.Mounir IDRASSI1-1/+0
2016-05-10Remove trailing whitespaceDavid Foerster1-5/+5
2016-05-10Normalize all line terminatorsDavid Foerster1-189/+189
2016-04-14Windows: Finalize implementation of the new volume ID mechanism. Use SHA-256 ↵Mounir IDRASSI1-1/+1
instead of SHA-512 to compute volume ID to reduce string size and make more convenient to use.
2016-04-08Windows: start implementation of volume ID mechanism that will be used to ↵Mounir IDRASSI1-0/+2
identify VeraCrypt disk volumes instead of device name.
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2015-12-21Windows: Implement PIM caching, both for system encryption and for normal ↵Mounir IDRASSI1-0/+1
volumes. Add options to activate it in the Preferences and System Settings.
2015-10-05Windows Driver: Modify fix for CVE-2015-7358 to solve side effects on ↵Mounir IDRASSI1-2/+7
Windows mount manager while still making it hard to abuse drive letter handling.
2015-08-31Windows: Support setting volume label in Explorer through mount option. ↵Mounir IDRASSI1-0/+3
Support using favorite label as label in Explorer.
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-7/+9
and TrueCrypt 3.0.
2015-05-03Windows Driver: Implement querying physical sector size of veraCrypt volume ↵Mounir IDRASSI1-1/+3
through IOCTL_STORAGE_QUERY_PROPERTY
2014-12-11Windows Driver: change inherited TrueCrypt constants in kernel objects tags ↵Mounir IDRASSI1-1/+1
by VeraCrypt specific values. These are used in crash dumps analysis and during debugging.
2014-11-08Static Code Analysis : Use Safe string functions inside VeraCrypt Device ↵Mounir IDRASSI1-2/+2
Driver to avoid potential security issues. Add many checks for NULL pointers to handle low memory use cases.
2014-11-08Add original TrueCrypt 7.1a sourcesMounir IDRASSI1-0/+174