Mounir IDRASSI
|
5b151492bd
|
Windows: Remove Truecrypt name is error message.
|
2014-12-17 12:14:58 +01:00 |
|
Mounir IDRASSI
|
c27461572c
|
Windows: Enhance performance by implementing the possibility to choose the correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption.
|
2014-12-16 00:17:59 +01:00 |
|
Mounir IDRASSI
|
6349162303
|
Windows: display a wait dialog during the lengthy opening of a volume. There is still a freeze in the GUI even though the call to DeviceIoControl is done in a separate thread which can't be explained. Maybe if we had an asynchronous Device Driver call, things would better.
|
2014-12-16 00:17:57 +01:00 |
|
Mounir IDRASSI
|
134ef04140
|
Windows: always display random gathering dialog when UserEnrichRandomPool is called instead of once per application run. This is implemented through the call SetRandomPoolEnrichedByUserStatus(FALSE) at the begining of sensitive operations instead of changing UserEnrichRandomPool because in the same call there can be many calls to UserEnrichRandomPool which can result in displaying the dialog many times.
|
2014-12-11 18:31:39 +01:00 |
|
Mounir IDRASSI
|
520d885840
|
Correct XML syntax for symbols '<' and '>'
|
2014-12-11 18:31:34 +01:00 |
|
Mounir IDRASSI
|
eb9cb16aeb
|
Windows: Implement specifying the size of the generated keyfiles and also letting VeraCrypt choose random size values.
|
2014-12-11 18:31:32 +01:00 |
|
Mounir IDRASSI
|
32e72d1117
|
Implement function RandgetBytesFull that enables generating random bytes of any length.
|
2014-12-11 18:31:30 +01:00 |
|
Mounir IDRASSI
|
fd0e434087
|
Windows: correct lock issue in RandgetBytes by releasing critical section in case of error.
|
2014-12-11 18:31:29 +01:00 |
|
Mounir IDRASSI
|
84a279a83f
|
Windows Driver: change inherited TrueCrypt constants in kernel objects tags by VeraCrypt specific values. These are used in crash dumps analysis and during debugging.
|
2014-12-11 18:31:27 +01:00 |
|
Mounir IDRASSI
|
078614fbce
|
Windows: Implement creation of multiple keyfiles at once.
|
2014-12-07 22:40:25 +01:00 |
|
Mounir IDRASSI
|
ec327c006e
|
Windows: implement auto-dismount option when session is locked
|
2014-12-07 22:40:23 +01:00 |
|
Mounir IDRASSI
|
03afe1224a
|
Windows: correct issue in handling "More information on keyfiles" link that caused a crash on some machines
|
2014-12-04 13:47:37 +01:00 |
|
Mounir IDRASSI
|
a5df5d981a
|
Windows: correct issue in displaying PDF of User Guide.
|
2014-12-04 13:47:31 +01:00 |
|
Mounir IDRASSI
|
dfff927389
|
Windows: update URLs to points to the online documentation. Use a dedicated donation link.
|
2014-12-04 13:47:30 +01:00 |
|
Mounir IDRASSI
|
f31c7b3a88
|
Add test vectors for HMAC-SHA256 and PBKDF2-HMAC-SHA256
|
2014-12-01 00:34:13 +01:00 |
|
Mounir IDRASSI
|
bc9005968a
|
Windows: Avoid calling RegCloseKey on an invalid handle.
|
2014-11-11 19:25:05 +01:00 |
|
Mounir IDRASSI
|
b2438b5029
|
Windows: close file handle if the call to GetFileSize fails.
|
2014-11-10 23:11:12 +01:00 |
|
Mounir IDRASSI
|
65e4b3a91b
|
Remove unused functions from GfMul.c
|
2014-11-08 23:24:46 +01:00 |
|
Mounir IDRASSI
|
d7498fae01
|
Linux/MacOSX: add newline at the end of Pkcs5.c to remove gcc warning
|
2014-11-08 23:24:38 +01:00 |
|
Mounir IDRASSI
|
0a09314336
|
Correct typo in language XML file.
|
2014-11-08 23:24:33 +01:00 |
|
Mounir IDRASSI
|
3f2e20e339
|
Simplify code handling iterations count: in boot mode, we'll set the correct iterations count inside derive_u_sha256 and derive_u_ripemd160 depending in the value of the iterations parameter. On normal mode, we use normal values of iterations count. Removes the special test parameter from RIPEMD160 functions.
|
2014-11-08 23:24:25 +01:00 |
|
Mounir IDRASSI
|
714a2ce0ae
|
Bootloader: in function ReadVolumeHeader, arrays dk and masterKey have the same size and they are never needed at the same time. So, we can minimize stack memory usage by using only one array instead of two. At the end of the function, the array is erased securely.
|
2014-11-08 23:24:22 +01:00 |
|
Mounir IDRASSI
|
c1378f781a
|
Bootloader: optimize code size in single cipher mode by manually inlining EAInit, EAGetFirst and EAGetKeySize, and by removing the loop in ReadVolumeHeader that tests for encryption algorithms.
|
2014-11-08 23:24:19 +01:00 |
|
Mounir IDRASSI
|
c61f8c70de
|
Bootloader code optimization: remove code in HMAC implementation in case of boot compilation that is never called since passwords are always less than 64-byte length. We leave it in Windows compilation because it is used to check the implementation against test vectors.
|
2014-11-08 23:24:17 +01:00 |
|
Mounir IDRASSI
|
68f16dae24
|
Implement support for creating and booting encrypted partition using SHA-256. Support SHA-256 for normal volumes as well.
|
2014-11-08 23:23:53 +01:00 |
|
Mounir IDRASSI
|
f38cf0b694
|
Add support for SHA-256 in key derivation for bootloader encryption. Create separate bootloader images for SHA-256 and RIPEMD-160. Set SHA-256 as the default PRF for boot encryption and SHA-512 as default PRF for all other cases. Depricate RIPEMD-160.
|
2014-11-08 23:23:50 +01:00 |
|
Mounir IDRASSI
|
50ca9fe46f
|
Optimization to reduce code size of derive_u_ripemd160. Useful for boatloader.
|
2014-11-08 23:23:40 +01:00 |
|
Mounir IDRASSI
|
0178a6d33f
|
Optimize code space and solve the Serpent issue (https://sourceforge.net/p/veracrypt/discussion/technical/thread/fb09633a/#6406) by removing key length parameter from serpent_set_key and twofish_set_key
|
2014-11-08 23:23:37 +01:00 |
|
Mounir IDRASSI
|
411e8599f3
|
Call RegCloseKey only if handle is valid.
|
2014-11-08 23:23:34 +01:00 |
|
Mounir IDRASSI
|
8a028aca45
|
Use absolute path in ShellExecute call that was missed when the security fix for Microsoft Security Advisory 2269637 was implemented.
|
2014-11-08 23:23:28 +01:00 |
|
Mounir IDRASSI
|
f7d783dda8
|
Adapt certain functions in the case of Windows bootloader in order to make its size as small as possible.
|
2014-11-08 23:23:19 +01:00 |
|
Mounir IDRASSI
|
ccbc2cff0b
|
Increment version to 1.0e for the next release
|
2014-11-08 23:23:17 +01:00 |
|
Mounir IDRASSI
|
4fa4d6d227
|
Windows vulnerability fix: correct possible BSOD attack targeted towards GetWipePassCount() / WipeBuffer() found by the Open Crypto Audit Project.
|
2014-11-08 23:23:05 +01:00 |
|
Mounir IDRASSI
|
9083f95db0
|
Remove driver version test that is non application to VeraCrypt and that was wrongly inherited from TrueCrypt.
|
2014-11-08 23:22:49 +01:00 |
|
Mounir IDRASSI
|
03cf7cc566
|
Correctly handle dialogs from previous versions that used 'TRUE' instead of 'VERA' as a value for GWLP_USERDATA.
|
2014-11-08 23:22:46 +01:00 |
|
Mounir IDRASSI
|
4d8d59c23d
|
Add description string for the new wipe mode WIPE_MODE_256 in language files.
|
2014-11-08 23:21:46 +01:00 |
|
Mounir IDRASSI
|
1c11ee428d
|
Add option in select the number of passes for volume header over-writing. By default, it is set to 3 but it can be increased to 256 passes (which can lead to a delay of many hours for a single password change operation).
|
2014-11-08 23:21:43 +01:00 |
|
Mounir IDRASSI
|
97154aaf51
|
Lower number of times we overwrite volume header during the encryption of a partition if the user choose to wipe the driver. Latest studies show that even one pass is enough to make data irretrievable. A value of 3 is a conservative approach that enhance performance without scarifying security. http://www.infosecisland.com/blogview/16130-The-Urban-Legend-of-Multipass-Hard-Disk-Overwrite.html http://digital-forensics.sans.org/blog/2009/01/15/overwriting-hard-drive-data/
|
2014-11-08 23:21:40 +01:00 |
|
Mounir IDRASSI
|
a5c1978eef
|
Remove remaining legacy cryptographic algorithms that are never used by VeraCrypt.
|
2014-11-08 23:21:35 +01:00 |
|
Mounir IDRASSI
|
75f7808719
|
Remove deprecated/legacy cryptographic algorithms and encryption modes that are never used by VeraCrypt. This will speed up volumes opening in many cases.
|
2014-11-08 23:21:32 +01:00 |
|
Mounir IDRASSI
|
c220db0128
|
Static Code Analysis : Generalize the use of Safe String functions. Add some NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL.
|
2014-11-08 23:21:27 +01:00 |
|
Mounir IDRASSI
|
c01f392a7b
|
Static Code Analysis : Use Safe String function in Dlgcode.c. Add byte size parameter in various functions to help implement secure handling of strings.
|
2014-11-08 23:21:24 +01:00 |
|
Mounir IDRASSI
|
bbc738c490
|
Static Code Analysis : Add various NULL pointers checks
|
2014-11-08 23:21:21 +01:00 |
|
Mounir IDRASSI
|
8bf58486af
|
Static Code Analysis : Add NULL pointers checks on the result of ATL string conversion. Avoid some conversions by using UNICODE functions directly.
|
2014-11-08 23:21:18 +01:00 |
|
Mounir IDRASSI
|
ba733dd032
|
Use Safe String functions in Registry.c and add a unicode version of WriteLocalMachineRegistryDword function to avoid doing conversions when used.
|
2014-11-08 23:21:16 +01:00 |
|
Mounir IDRASSI
|
c7c8e28655
|
Disable crash handling until we put in place a dedicated URL for posting crash information.
|
2014-11-08 23:20:56 +01:00 |
|
Mounir IDRASSI
|
515495f2f3
|
Static Code Analysis : Correctly initialize member variable in HostDevice constructor
|
2014-11-08 23:20:51 +01:00 |
|
Mounir IDRASSI
|
7bb812af66
|
Static Code Analysis : Avoid using invalidate integer value received from GetFileSize.
|
2014-11-08 23:20:48 +01:00 |
|
Mounir IDRASSI
|
9d027b02b9
|
Static Code Analysis : fix usage of strncpy and sscanf.
|
2014-11-08 23:20:45 +01:00 |
|
Mounir IDRASSI
|
899a22b840
|
Static Code Analysis : fix various memory leaks.
|
2014-11-08 23:20:43 +01:00 |
|