1
0
mirror of https://github.com/veracrypt/VeraCrypt.git synced 2025-11-12 11:28:26 -06:00
Commit Graph

556 Commits

Author SHA1 Message Date
El Mostafa Idrassi
be09fa8a53 '#define VERSION_STRING XXX' must come before '#define VERSION_STRING_SUFFIX YYY' (#506)
in order for 'export TC_VERSION := $(shell grep VERSION_STRING ../Common/Tcdefs.h | head -n 1 | cut -d'"' -f 2)'
in 'src/Main/Main.make' to actually return the version rather than '-CustomEFI'.
2019-10-03 16:34:43 +02:00
Mounir IDRASSI
fa3d4c79c9 Increment version to 1.24-Beta6 2019-10-02 11:40:08 +02:00
Mounir IDRASSI
9b804137e0 Windows: when periodic update of device is disabled, use SetupAPI to list disks on demand instead of testing all disks to reduce CPU usage. 2019-09-30 22:27:55 +02:00
Mounir IDRASSI
e3afa296c7 Windows: resize VeraCrypt Format Wizard and Mount Options dialogs to fix some text truncation issues with non-English languages. 2019-09-30 22:27:48 +02:00
Mounir IDRASSI
128234c066 Windows: Update the encoded hash of the code signing certificate used to verify the integrity of binaries. 2019-09-29 16:07:49 +02:00
Mounir IDRASSI
909255d55f Windows: Use periodic update of connected devices only if there is a Favorite that uses VolumeID. Add command option to disable the period update of devices. 2019-09-29 16:07:28 +02:00
Mounir IDRASSI
7d88577c61 Windows: fix another typo in code comment (hopefully last one!) 2019-09-27 18:23:32 +02:00
Mounir IDRASSI
d8ac0f7ec7 Windows: fix typo in code comment 2019-09-27 00:33:22 +02:00
Mounir IDRASSI
684259b438 Windows: Fix sporadic keyboard issue in Secure Desktop for password dialog by not using the trick to put it reliably in foreground. The trick is based on a emulation of ALT+TAB but sometimes ALT key would remain pressed in case of Secure Desktop making it impossible to type the password (a workaround was to press CTRL key which reset the state of ALT key) 2019-09-26 23:01:46 +02:00
Mounir IDRASSI
2a652b842f Windows: Add two missing UI strings to XML translation files so that they can be localized correctly 2019-09-25 17:44:08 +02:00
Mounir IDRASSI
6b10f88e40 Fix build error of UEFI bootloader caused by latest changes that introduced ChaCha20 and T1HA algorithms and which are not present nor used in UEFI bootloader 2019-09-23 00:07:15 +02:00
Mounir IDRASSI
69df92c81d Increment version to 1.24-Beta5 2019-03-09 08:04:04 +01:00
Mounir IDRASSI
d6ce1db2a8 Increment version to 1.24-Beta4 and update release notes to clarify that password length increase applies only to non-system volumes. 2019-03-09 08:03:51 +01:00
Mounir IDRASSI
5c934d8122 Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt driver 2019-03-03 23:48:49 +01:00
Mounir IDRASSI
6d2cef1fd8 Fix formatting of credits in About dialog and documentation 2019-03-03 23:48:42 +01:00
Mounir IDRASSI
c7b23530f9 Windows: Add missing UI string to XML language files. 2019-03-03 23:48:35 +01:00
Mounir IDRASSI
8e39877054 Increment version to 1.24-Beta3. Update Release Notes. 2019-03-03 23:48:28 +01:00
Mounir IDRASSI
453ef927ef Windows: Add option to use legacy maximum password length (64 characters) instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt. 2019-03-03 00:20:49 +01:00
Mounir IDRASSI
ea88c6175c Windows: fix compilation error 2019-03-02 14:50:22 +01:00
Mounir IDRASSI
f7bc58b38f Windows: mitigate some memory attacks by making VeraCrypt applications memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code (https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150) 2019-03-02 14:45:38 +01:00
Mounir IDRASSI
321715202a Windows: Generalize RAM encryption for keys to VeraCrypt binaries, especially Format and Expander 2019-03-02 10:23:39 +01:00
Mounir IDRASSI
3d6032d69e Windows: better debug messages for VcProtectKeys and VcUnprotectKeys functions 2019-03-01 00:35:47 +01:00
Mounir IDRASSI
954bfd45d0 Windows Driver: Implement RAM encryption for cached passwords 2019-03-01 00:35:40 +01:00
Mounir IDRASSI
0391b8e550 Windows: Add some logs in functions for RAM encryption 2019-03-01 00:35:27 +01:00
Mounir IDRASSI
8d7a318795 Windows: use specific order for EFI boot arguments memory regions that matches the one used by EFI bootloader. 2019-03-01 00:35:20 +01:00
Mounir IDRASSI
cf48b532b4 Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha) 2019-03-01 00:35:13 +01:00
Mounir IDRASSI
29b749bdd9 Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it in Mount.c 2019-02-15 00:17:11 +01:00
Mounir IDRASSI
adf97533d3 Windows: Set CpuRngDisabled variable to TRUE for clarity even if it will be set to TRUE anyway by default through EnableCpuRng calls 2019-02-15 00:17:03 +01:00
Mounir IDRASSI
1b76823ea5 Add copyright and license information of JitterEntropy library by Stephan Mueller 2019-02-12 19:06:22 +01:00
Mounir IDRASSI
86f0fde6e7 Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de) 2019-02-12 19:06:14 +01:00
Mounir IDRASSI
2061b4c28c Windows: Ensure that only one thread at a time can create a secure desktop 2019-02-10 22:54:45 +01:00
Mounir IDRASSI
97ccbaf0a3 Fix typo in CPU RNG detection condition (Github issue #417) 2019-02-10 17:28:38 +01:00
Mounir IDRASSI
e5b9cee868 Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy which is now disabled by default 2019-02-08 01:50:03 +01:00
Mounir IDRASSI
6bb1f24ed5 Automatically truncate passwords for TrueCrypt volumes and System Encryption to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version. 2019-02-04 11:39:47 +01:00
Mounir IDRASSI
5d3278bcf2 Update Release Notes and other files for 1.24-Beta2 release 2019-02-01 13:02:01 +01:00
Mounir IDRASSI
61c1baa4bf Windows: use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available 2019-02-01 00:35:50 +01:00
Mounir IDRASSI
3c18d54d1e Windows driver: replace SHA512 by RIPEMD160 when calculating internal hash of master key to avoid calling KeSaveFloatingPointState/KeSaveExtendedProcessorState since SHA512 implementation uses SSE2/AVX and RIPEMD160 is pure C 2019-02-01 00:35:33 +01:00
Mounir IDRASSI
b294cc2e1c Increment version to 1.24-Beta2 2019-01-28 17:16:41 +01:00
Mounir IDRASSI
cdd1179c63 Increase password maximum length to 128 bytes from 64 bytes 2019-01-28 17:16:33 +01:00
Mounir IDRASSI
a20b3083b0 Windows: Add a build configuration containing EFI bootloader signed with custom SecureBoot key instead 2019-01-26 01:20:51 +01:00
Mounir IDRASSI
7b95b375a0 Windows: fix building MBR bootloader following modification of Xts.c 2019-01-26 01:20:43 +01:00
Mounir IDRASSI
d8d92357b0 Windows crypto: optimize XTS implementation for 64-bit builds using SSE2 thanks to simplification of storage of whitening values in memory (normal order instead of reverse order). 2019-01-25 19:23:03 +01:00
Mounir IDRASSI
d73b8bdf74 Windows: Increment driver version to 1.24.1.1 2019-01-22 09:53:32 +01:00
Mounir IDRASSI
ee0a2659da Windows driver: remove volumes master keys from CRYPTO_INFO since they are not needed after their key schedule is created 2019-01-21 00:45:31 +01:00
Mounir IDRASSI
27b3fee02d Windows: remove unused fields from CRYPTO_INFO structure 2019-01-21 00:45:23 +01:00
Mounir IDRASSI
2046347775 Windows: fix editor of EFI configuration file not accepting ENTER key for adding new lines. 2019-01-18 19:02:18 +01:00
Mounir IDRASSI
202caea3a9 Windows: enhancements to EFI system encryption, like handling of Multi-Boot and better compatibility with Windows Upgrade process. 2019-01-15 15:05:19 +01:00
Mounir IDRASSI
07fd2aa9a5 Update Release Notes and language files for version 1.24-Beta1. Add signed Windows drivers. 2019-01-14 10:49:22 +01:00
Mounir IDRASSI
07f6793bd2 Windows: enhance support of new behavior of favorite service which is now always running in case of system encryption 2019-01-14 10:49:13 +01:00
Mounir IDRASSI
d3e7ed96f3 Windows: Implement feature that enables clearing of encryption keys when a new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade). 2019-01-14 10:49:05 +01:00