Mounir IDRASSI
|
fa3d4c79c9
|
Increment version to 1.24-Beta6
|
2019-10-02 11:40:08 +02:00 |
|
Mounir IDRASSI
|
3923d11c7b
|
Windows Driver: Disable Hibernation when RAM encryption is enabled since we can't resume from Hibernation without RAM encryption keys (a chicken and egg situation)
|
2019-10-01 15:09:35 +02:00 |
|
Mounir IDRASSI
|
69df92c81d
|
Increment version to 1.24-Beta5
|
2019-03-09 08:04:04 +01:00 |
|
Mounir IDRASSI
|
1bd3a6cc70
|
Windows Driver: fix BSOD when mounting outer volume with hidden volume protection if RAM encryption is enabled
|
2019-03-09 08:03:57 +01:00 |
|
Mounir IDRASSI
|
d6ce1db2a8
|
Increment version to 1.24-Beta4 and update release notes to clarify that password length increase applies only to non-system volumes.
|
2019-03-09 08:03:51 +01:00 |
|
Mounir IDRASSI
|
f780011a86
|
Windows Driver: fix BSOD when mounting hidden volume if RAM encryption is enabled
|
2019-03-08 01:02:57 +01:00 |
|
Mounir IDRASSI
|
5c934d8122
|
Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt driver
|
2019-03-03 23:48:49 +01:00 |
|
Mounir IDRASSI
|
8e39877054
|
Increment version to 1.24-Beta3. Update Release Notes.
|
2019-03-03 23:48:28 +01:00 |
|
Mounir IDRASSI
|
edd1b00126
|
Windows Driver: Enable RAM encryption only after its security parameters were created
|
2019-03-01 00:35:54 +01:00 |
|
Mounir IDRASSI
|
ae5eb73f93
|
Windows driver: call VcProtectKeys only when RAM encryption enabled although this function does nothing when RAM encryption is disabled.
|
2019-03-01 00:35:33 +01:00 |
|
Mounir IDRASSI
|
8d7a318795
|
Windows: use specific order for EFI boot arguments memory regions that matches the one used by EFI bootloader.
|
2019-03-01 00:35:20 +01:00 |
|
Mounir IDRASSI
|
cf48b532b4
|
Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
|
2019-03-01 00:35:13 +01:00 |
|
Mounir IDRASSI
|
86f0fde6e7
|
Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de)
|
2019-02-12 19:06:14 +01:00 |
|
Mounir IDRASSI
|
ba5da0946c
|
Windows: Add implementation of ChaCha20 based random generator. Use it for driver need of random bytes (currently only wipe bytes but more to come later).
|
2019-02-08 01:50:12 +01:00 |
|
Mounir IDRASSI
|
e5b9cee868
|
Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy which is now disabled by default
|
2019-02-08 01:50:03 +01:00 |
|
Mounir IDRASSI
|
5d3278bcf2
|
Update Release Notes and other files for 1.24-Beta2 release
|
2019-02-01 13:02:01 +01:00 |
|
Mounir IDRASSI
|
5571a8ba6b
|
Windows driver: better randomness for wipe bytes by always using Whirlpool hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available.
|
2019-02-01 00:36:19 +01:00 |
|
Mounir IDRASSI
|
b294cc2e1c
|
Increment version to 1.24-Beta2
|
2019-01-28 17:16:41 +01:00 |
|
Mounir IDRASSI
|
cdd1179c63
|
Increase password maximum length to 128 bytes from 64 bytes
|
2019-01-28 17:16:33 +01:00 |
|
Mounir IDRASSI
|
54e46c260c
|
Windows Driver: force the input size for some IOCTLs to have a fixed value
|
2019-01-28 17:16:23 +01:00 |
|
Mounir IDRASSI
|
a20b3083b0
|
Windows: Add a build configuration containing EFI bootloader signed with custom SecureBoot key instead
|
2019-01-26 01:20:51 +01:00 |
|
Mounir IDRASSI
|
d73b8bdf74
|
Windows: Increment driver version to 1.24.1.1
|
2019-01-22 09:53:32 +01:00 |
|
Mounir IDRASSI
|
ee0a2659da
|
Windows driver: remove volumes master keys from CRYPTO_INFO since they are not needed after their key schedule is created
|
2019-01-21 00:45:31 +01:00 |
|
Mounir IDRASSI
|
27b3fee02d
|
Windows: remove unused fields from CRYPTO_INFO structure
|
2019-01-21 00:45:23 +01:00 |
|
Mounir IDRASSI
|
d3e7ed96f3
|
Windows: Implement feature that enables clearing of encryption keys when a new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade).
|
2019-01-14 10:49:05 +01:00 |
|
Mounir IDRASSI
|
406adce424
|
Increment version to 1.24-Beta1
|
2019-01-14 10:48:41 +01:00 |
|
Mounir IDRASSI
|
405883169c
|
Windows driver: remove newly added volatile qualifier from CRYPT_INFO pointers to fix build issue until a better approach is devised
|
2019-01-09 00:59:21 +01:00 |
|
Mounir IDRASSI
|
652e989d23
|
Windows Security: Add new entry point in driver that allows emergency clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected.
|
2019-01-09 00:30:12 +01:00 |
|
Mounir IDRASSI
|
7c2cf7889f
|
Windows Driver: erase system encryption keys from memory during shutdown/reboot to help mitigate some cold boot attacks
|
2019-01-09 00:30:05 +01:00 |
|
Mounir IDRASSI
|
d5b14305e9
|
Windows: Increment driver version to 1.24.0.1
|
2018-12-19 14:56:35 +01:00 |
|
Mounir IDRASSI
|
3290ef4f75
|
Windows Driver: Don't interact with the volume's filesystem if mount manager integration is disabled
|
2018-12-19 12:41:49 +01:00 |
|
Mounir IDRASSI
|
800f081f1c
|
Increment version to 1.24-Beta0
|
2018-12-19 12:41:41 +01:00 |
|
Mounir IDRASSI
|
1967bd862e
|
Windows: Add mount option that allows mounting a volume without attaching it to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX).
|
2018-12-19 00:41:37 +01:00 |
|
Mounir IDRASSI
|
93dbed19c8
|
Increment version to 1.23-Hotfix-2
|
2018-10-10 09:32:02 +02:00 |
|
Mounir IDRASSI
|
162d3b5f64
|
Windows Driver: fix regression that was causing BSOD.
|
2018-10-10 09:31:41 +02:00 |
|
Mounir IDRASSI
|
0b5dc7910b
|
Windows Driver: replace system functions RtlUpcaseUnicodeChar/RtlUnalignedStringCchLengthW by our own code for better clarity
|
2018-10-10 09:31:40 +02:00 |
|
Mounir IDRASSI
|
0b8b50bde9
|
Increment version to 1.23-Hotfix-1
|
2018-09-21 10:39:24 +02:00 |
|
Mounir IDRASSI
|
2455c03e0d
|
Windows driver: add extra check for data read in TC_IOCTL_OPEN_TEST handling
|
2018-09-21 10:39:08 +02:00 |
|
Mounir IDRASSI
|
f30f9339c9
|
Windows: fix low severity vulnerability in driver that allowed reading 3 bytes of kernel stack memory (with a rare possibility of 25 additional bytes). Reported by Tim Harrison.
|
2018-09-21 10:39:06 +02:00 |
|
Mounir IDRASSI
|
fda5880f90
|
Increment version to 1.23-BETA8 and update release notes.
|
2018-09-03 11:45:19 +02:00 |
|
Mounir IDRASSI
|
6ee1af6a95
|
Increment version to 1.23-BETA7 and update release notes.
|
2018-09-03 01:00:52 +02:00 |
|
Mounir IDRASSI
|
09afb91c89
|
Windows: extended Windows defragmenter workaround to Windows 8.1
|
2018-09-01 01:15:32 +02:00 |
|
Mounir IDRASSI
|
e22676d336
|
Increment version to 1.23-BETA6
|
2018-08-24 00:50:09 +02:00 |
|
Mounir IDRASSI
|
7cbe6b71e5
|
Windows: implement a driver configuration option to explicitly allow defragmenting non-système disques by Windows built-in defragmenter tool.
|
2018-08-24 00:49:59 +02:00 |
|
Mounir IDRASSI
|
6f1047d46b
|
Increment version to 1.23-BETA5 and update release notes
|
2018-08-18 16:47:31 +02:00 |
|
Mounir IDRASSI
|
20889d4553
|
Windows: Implement workaround on Windows 10 to make VeraCrypt encrypted disks visible to Windows defragmenter
|
2018-08-18 16:47:23 +02:00 |
|
Mounir IDRASSI
|
2fea18c3f5
|
Increment version to 1.23-BETA4 and update release notes.
|
2018-08-16 01:12:55 +02:00 |
|
Mounir IDRASSI
|
6cdcbac305
|
WIndows driver: add check for failed memory allocation
|
2018-08-15 14:44:32 +02:00 |
|
Mounir IDRASSI
|
920b029e02
|
Increment version to 1.23-BETA3 and update release notes.
|
2018-08-12 18:30:29 +02:00 |
|
Mounir IDRASSI
|
6fffe709df
|
Increment version to 1.23-BETA2
|
2018-07-05 18:08:44 +02:00 |
|