Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2024-11-23 | Windows Driver: Make max work items count configurable. Increase default to ↵ | Mounir IDRASSI | 1 | -0/+1 | |
1024. Queue write IRPs. - Made the maximum work items count configurable to allow flexibility based on system needs. - Increased the default value of max work items count to 1024 to better handle high-throughput scenarios. - Queue write IRPs in system worker thread to avoid potential deadlocks in write scenarios. | |||||
2024-06-12 | Avoid conflict with C++17 features std::byte by using uint8 type instead of byte | Mounir IDRASSI | 1 | -1/+1 | |
2022-02-06 | Windows: Add registry setting to disable erasing encryption keys on Windows ↵ | Mounir IDRASSI | 1 | -0/+1 | |
shutdown/reboot. This helps solve BSOD during shutdown/reboot on some machines. Under "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt", create a REG_DWORD value named "VeraCryptEraseKeysShutdown" and set its value to 0. | |||||
2021-12-20 | Windows Driver: Add registry settings to control driver internal encryption ↵ | Mounir IDRASSI | 1 | -0/+3 | |
queue Under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt: - VeraCryptEncryptionFragmentSize (REG_DWORD): size of encryption data fragment in KiB. Default is 256. - VeraCryptEncryptionIoRequestCount (REG_DWORD): maximum number of parallel I/O requests. Default is 16. - VeraCryptEncryptionItemCount (REG_DWORD): maximum number of encryption queue items processed in parallel. Default is 8. | |||||
2020-07-02 | Windows: Don't use API for Processor Groups support if there is only 1 CPU ↵ | Mounir IDRASSI | 1 | -1/+1 | |
group in the system. This can fix slowness issue observed on some PCs with AMD CPUs. | |||||
2020-02-10 | Windows: Implement support for processor groups in the driver and fix build ↵ | Mounir IDRASSI | 1 | -0/+2 | |
issues caused by previous implementation | |||||
2019-02-08 | Windows: Add implementation of ChaCha20 based random generator. Use it for ↵ | Mounir IDRASSI | 1 | -0/+1 | |
driver need of random bytes (currently only wipe bytes but more to come later). | |||||
2019-01-09 | Windows driver: remove newly added volatile qualifier from CRYPT_INFO ↵ | Mounir IDRASSI | 1 | -1/+1 | |
pointers to fix build issue until a better approach is devised | |||||
2019-01-09 | Windows Security: Add new entry point in driver that allows emergency ↵ | Mounir IDRASSI | 1 | -1/+2 | |
clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected. | |||||
2018-08-24 | Windows: implement a driver configuration option to explicitly allow ↵ | Mounir IDRASSI | 1 | -0/+1 | |
defragmenting non-système disques by Windows built-in defragmenter tool. | |||||
2018-08-18 | Windows: Implement workaround on Windows 10 to make VeraCrypt encrypted ↵ | Mounir IDRASSI | 1 | -0/+1 | |
disks visible to Windows defragmenter | |||||
2018-03-05 | Windows: Add option to block TRIM command on system encryption SSD drives. | Mounir IDRASSI | 1 | -1/+1 | |
2018-03-04 | Windows: Implement TRIM support for non-system SSD partitions/drives and add ↵ | Mounir IDRASSI | 1 | -0/+3 | |
driver option to enable it (TRIM is disabled by default for non-system SSD partitions/drives) | |||||
2017-06-23 | Update IDRIX copyright year | Mounir IDRASSI | 1 | -1/+1 | |
2017-05-25 | Windows: query extra host drive information using ↵ | Mounir IDRASSI | 1 | -0/+3 | |
IOCTL_STORAGE_QUERY_PROPERTY (StorageAdapterProperty) in both driver and user mode applications. | |||||
2017-05-25 | Windows Driver: remove unused variable. | Mounir IDRASSI | 1 | -1/+0 | |
2016-05-10 | Remove trailing whitespace | David Foerster | 1 | -5/+5 | |
2016-05-10 | Normalize all line terminators | David Foerster | 1 | -189/+189 | |
2016-04-14 | Windows: Finalize implementation of the new volume ID mechanism. Use SHA-256 ↵ | Mounir IDRASSI | 1 | -1/+1 | |
instead of SHA-512 to compute volume ID to reduce string size and make more convenient to use. | |||||
2016-04-08 | Windows: start implementation of volume ID mechanism that will be used to ↵ | Mounir IDRASSI | 1 | -0/+2 | |
identify VeraCrypt disk volumes instead of device name. | |||||
2016-01-20 | Copyright: update dates to include 2016. | Mounir IDRASSI | 1 | -1/+1 | |
2015-12-21 | Windows: Implement PIM caching, both for system encryption and for normal ↵ | Mounir IDRASSI | 1 | -0/+1 | |
volumes. Add options to activate it in the Preferences and System Settings. | |||||
2015-10-05 | Windows Driver: Modify fix for CVE-2015-7358 to solve side effects on ↵ | Mounir IDRASSI | 1 | -2/+7 | |
Windows mount manager while still making it hard to abuse drive letter handling. | |||||
2015-08-31 | Windows: Support setting volume label in Explorer through mount option. ↵ | Mounir IDRASSI | 1 | -0/+3 | |
Support using favorite label as label in Explorer. | |||||
2015-08-06 | Update license information to reflect the use of a dual license Apache 2.0 ↵ | Mounir IDRASSI | 1 | -7/+9 | |
and TrueCrypt 3.0. | |||||
2015-05-03 | Windows Driver: Implement querying physical sector size of veraCrypt volume ↵ | Mounir IDRASSI | 1 | -1/+3 | |
through IOCTL_STORAGE_QUERY_PROPERTY | |||||
2014-12-11 | Windows Driver: change inherited TrueCrypt constants in kernel objects tags ↵ | Mounir IDRASSI | 1 | -1/+1 | |
by VeraCrypt specific values. These are used in crash dumps analysis and during debugging. | |||||
2014-11-08 | Static Code Analysis : Use Safe string functions inside VeraCrypt Device ↵ | Mounir IDRASSI | 1 | -2/+2 | |
Driver to avoid potential security issues. Add many checks for NULL pointers to handle low memory use cases. | |||||
2014-11-08 | Add original TrueCrypt 7.1a sources | Mounir IDRASSI | 1 | -0/+174 | |