1
0
mirror of https://github.com/veracrypt/VeraCrypt.git synced 2025-11-12 03:18:26 -06:00
Commit Graph

197 Commits

Author SHA1 Message Date
Mounir IDRASSI
fa3d4c79c9 Increment version to 1.24-Beta6 2019-10-02 11:40:08 +02:00
Mounir IDRASSI
3923d11c7b Windows Driver: Disable Hibernation when RAM encryption is enabled since we can't resume from Hibernation without RAM encryption keys (a chicken and egg situation) 2019-10-01 15:09:35 +02:00
Mounir IDRASSI
69df92c81d Increment version to 1.24-Beta5 2019-03-09 08:04:04 +01:00
Mounir IDRASSI
1bd3a6cc70 Windows Driver: fix BSOD when mounting outer volume with hidden volume protection if RAM encryption is enabled 2019-03-09 08:03:57 +01:00
Mounir IDRASSI
d6ce1db2a8 Increment version to 1.24-Beta4 and update release notes to clarify that password length increase applies only to non-system volumes. 2019-03-09 08:03:51 +01:00
Mounir IDRASSI
f780011a86 Windows Driver: fix BSOD when mounting hidden volume if RAM encryption is enabled 2019-03-08 01:02:57 +01:00
Mounir IDRASSI
5c934d8122 Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt driver 2019-03-03 23:48:49 +01:00
Mounir IDRASSI
8e39877054 Increment version to 1.24-Beta3. Update Release Notes. 2019-03-03 23:48:28 +01:00
Mounir IDRASSI
edd1b00126 Windows Driver: Enable RAM encryption only after its security parameters were created 2019-03-01 00:35:54 +01:00
Mounir IDRASSI
ae5eb73f93 Windows driver: call VcProtectKeys only when RAM encryption enabled although this function does nothing when RAM encryption is disabled. 2019-03-01 00:35:33 +01:00
Mounir IDRASSI
8d7a318795 Windows: use specific order for EFI boot arguments memory regions that matches the one used by EFI bootloader. 2019-03-01 00:35:20 +01:00
Mounir IDRASSI
cf48b532b4 Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha) 2019-03-01 00:35:13 +01:00
Mounir IDRASSI
86f0fde6e7 Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de) 2019-02-12 19:06:14 +01:00
Mounir IDRASSI
ba5da0946c Windows: Add implementation of ChaCha20 based random generator. Use it for driver need of random bytes (currently only wipe bytes but more to come later). 2019-02-08 01:50:12 +01:00
Mounir IDRASSI
e5b9cee868 Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy which is now disabled by default 2019-02-08 01:50:03 +01:00
Mounir IDRASSI
5d3278bcf2 Update Release Notes and other files for 1.24-Beta2 release 2019-02-01 13:02:01 +01:00
Mounir IDRASSI
5571a8ba6b Windows driver: better randomness for wipe bytes by always using Whirlpool hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available. 2019-02-01 00:36:19 +01:00
Mounir IDRASSI
b294cc2e1c Increment version to 1.24-Beta2 2019-01-28 17:16:41 +01:00
Mounir IDRASSI
cdd1179c63 Increase password maximum length to 128 bytes from 64 bytes 2019-01-28 17:16:33 +01:00
Mounir IDRASSI
54e46c260c Windows Driver: force the input size for some IOCTLs to have a fixed value 2019-01-28 17:16:23 +01:00
Mounir IDRASSI
a20b3083b0 Windows: Add a build configuration containing EFI bootloader signed with custom SecureBoot key instead 2019-01-26 01:20:51 +01:00
Mounir IDRASSI
d73b8bdf74 Windows: Increment driver version to 1.24.1.1 2019-01-22 09:53:32 +01:00
Mounir IDRASSI
ee0a2659da Windows driver: remove volumes master keys from CRYPTO_INFO since they are not needed after their key schedule is created 2019-01-21 00:45:31 +01:00
Mounir IDRASSI
27b3fee02d Windows: remove unused fields from CRYPTO_INFO structure 2019-01-21 00:45:23 +01:00
Mounir IDRASSI
d3e7ed96f3 Windows: Implement feature that enables clearing of encryption keys when a new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade). 2019-01-14 10:49:05 +01:00
Mounir IDRASSI
406adce424 Increment version to 1.24-Beta1 2019-01-14 10:48:41 +01:00
Mounir IDRASSI
405883169c Windows driver: remove newly added volatile qualifier from CRYPT_INFO pointers to fix build issue until a better approach is devised 2019-01-09 00:59:21 +01:00
Mounir IDRASSI
652e989d23 Windows Security: Add new entry point in driver that allows emergency clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected. 2019-01-09 00:30:12 +01:00
Mounir IDRASSI
7c2cf7889f Windows Driver: erase system encryption keys from memory during shutdown/reboot to help mitigate some cold boot attacks 2019-01-09 00:30:05 +01:00
Mounir IDRASSI
d5b14305e9 Windows: Increment driver version to 1.24.0.1 2018-12-19 14:56:35 +01:00
Mounir IDRASSI
3290ef4f75 Windows Driver: Don't interact with the volume's filesystem if mount manager integration is disabled 2018-12-19 12:41:49 +01:00
Mounir IDRASSI
800f081f1c Increment version to 1.24-Beta0 2018-12-19 12:41:41 +01:00
Mounir IDRASSI
1967bd862e Windows: Add mount option that allows mounting a volume without attaching it to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX). 2018-12-19 00:41:37 +01:00
Mounir IDRASSI
93dbed19c8 Increment version to 1.23-Hotfix-2 2018-10-10 09:32:02 +02:00
Mounir IDRASSI
162d3b5f64 Windows Driver: fix regression that was causing BSOD. 2018-10-10 09:31:41 +02:00
Mounir IDRASSI
0b5dc7910b Windows Driver: replace system functions RtlUpcaseUnicodeChar/RtlUnalignedStringCchLengthW by our own code for better clarity 2018-10-10 09:31:40 +02:00
Mounir IDRASSI
0b8b50bde9 Increment version to 1.23-Hotfix-1 2018-09-21 10:39:24 +02:00
Mounir IDRASSI
2455c03e0d Windows driver: add extra check for data read in TC_IOCTL_OPEN_TEST handling 2018-09-21 10:39:08 +02:00
Mounir IDRASSI
f30f9339c9 Windows: fix low severity vulnerability in driver that allowed reading 3 bytes of kernel stack memory (with a rare possibility of 25 additional bytes). Reported by Tim Harrison. 2018-09-21 10:39:06 +02:00
Mounir IDRASSI
fda5880f90 Increment version to 1.23-BETA8 and update release notes. 2018-09-03 11:45:19 +02:00
Mounir IDRASSI
6ee1af6a95 Increment version to 1.23-BETA7 and update release notes. 2018-09-03 01:00:52 +02:00
Mounir IDRASSI
09afb91c89 Windows: extended Windows defragmenter workaround to Windows 8.1 2018-09-01 01:15:32 +02:00
Mounir IDRASSI
e22676d336 Increment version to 1.23-BETA6 2018-08-24 00:50:09 +02:00
Mounir IDRASSI
7cbe6b71e5 Windows: implement a driver configuration option to explicitly allow defragmenting non-système disques by Windows built-in defragmenter tool. 2018-08-24 00:49:59 +02:00
Mounir IDRASSI
6f1047d46b Increment version to 1.23-BETA5 and update release notes 2018-08-18 16:47:31 +02:00
Mounir IDRASSI
20889d4553 Windows: Implement workaround on Windows 10 to make VeraCrypt encrypted disks visible to Windows defragmenter 2018-08-18 16:47:23 +02:00
Mounir IDRASSI
2fea18c3f5 Increment version to 1.23-BETA4 and update release notes. 2018-08-16 01:12:55 +02:00
Mounir IDRASSI
6cdcbac305 WIndows driver: add check for failed memory allocation 2018-08-15 14:44:32 +02:00
Mounir IDRASSI
920b029e02 Increment version to 1.23-BETA3 and update release notes. 2018-08-12 18:30:29 +02:00
Mounir IDRASSI
6fffe709df Increment version to 1.23-BETA2 2018-07-05 18:08:44 +02:00