1
0
mirror of https://github.com/veracrypt/VeraCrypt.git synced 2025-11-11 11:08:02 -06:00
Commit Graph

88 Commits

Author SHA1 Message Date
Mounir IDRASSI
b7a21b8a76 Windows Driver: Fix strange crashes caused by probably by APC queue issues from calls to IoBuildDeviceIoControlRequest and ZwCreate (cf https://www.osr.com/blog/2018/02/14/beware-iobuilddeviceiocontrolrequest/) 2019-11-07 00:48:09 +01:00
Mounir IDRASSI
5c934d8122 Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt driver 2019-03-03 23:48:49 +01:00
Mounir IDRASSI
edd1b00126 Windows Driver: Enable RAM encryption only after its security parameters were created 2019-03-01 00:35:54 +01:00
Mounir IDRASSI
8d7a318795 Windows: use specific order for EFI boot arguments memory regions that matches the one used by EFI bootloader. 2019-03-01 00:35:20 +01:00
Mounir IDRASSI
cf48b532b4 Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha) 2019-03-01 00:35:13 +01:00
Mounir IDRASSI
86f0fde6e7 Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de) 2019-02-12 19:06:14 +01:00
Mounir IDRASSI
ba5da0946c Windows: Add implementation of ChaCha20 based random generator. Use it for driver need of random bytes (currently only wipe bytes but more to come later). 2019-02-08 01:50:12 +01:00
Mounir IDRASSI
e5b9cee868 Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy which is now disabled by default 2019-02-08 01:50:03 +01:00
Mounir IDRASSI
54e46c260c Windows Driver: force the input size for some IOCTLs to have a fixed value 2019-01-28 17:16:23 +01:00
Mounir IDRASSI
a20b3083b0 Windows: Add a build configuration containing EFI bootloader signed with custom SecureBoot key instead 2019-01-26 01:20:51 +01:00
Mounir IDRASSI
d3e7ed96f3 Windows: Implement feature that enables clearing of encryption keys when a new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade). 2019-01-14 10:49:05 +01:00
Mounir IDRASSI
652e989d23 Windows Security: Add new entry point in driver that allows emergency clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected. 2019-01-09 00:30:12 +01:00
Mounir IDRASSI
3290ef4f75 Windows Driver: Don't interact with the volume's filesystem if mount manager integration is disabled 2018-12-19 12:41:49 +01:00
Mounir IDRASSI
1967bd862e Windows: Add mount option that allows mounting a volume without attaching it to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX). 2018-12-19 00:41:37 +01:00
Mounir IDRASSI
162d3b5f64 Windows Driver: fix regression that was causing BSOD. 2018-10-10 09:31:41 +02:00
Mounir IDRASSI
0b5dc7910b Windows Driver: replace system functions RtlUpcaseUnicodeChar/RtlUnalignedStringCchLengthW by our own code for better clarity 2018-10-10 09:31:40 +02:00
Mounir IDRASSI
2455c03e0d Windows driver: add extra check for data read in TC_IOCTL_OPEN_TEST handling 2018-09-21 10:39:08 +02:00
Mounir IDRASSI
f30f9339c9 Windows: fix low severity vulnerability in driver that allowed reading 3 bytes of kernel stack memory (with a rare possibility of 25 additional bytes). Reported by Tim Harrison. 2018-09-21 10:39:06 +02:00
Mounir IDRASSI
09afb91c89 Windows: extended Windows defragmenter workaround to Windows 8.1 2018-09-01 01:15:32 +02:00
Mounir IDRASSI
7cbe6b71e5 Windows: implement a driver configuration option to explicitly allow defragmenting non-système disques by Windows built-in defragmenter tool. 2018-08-24 00:49:59 +02:00
Mounir IDRASSI
20889d4553 Windows: Implement workaround on Windows 10 to make VeraCrypt encrypted disks visible to Windows defragmenter 2018-08-18 16:47:23 +02:00
Mounir IDRASSI
6cdcbac305 WIndows driver: add check for failed memory allocation 2018-08-15 14:44:32 +02:00
Mounir IDRASSI
d907627f7e Windows: Add option to block TRIM command on system encryption SSD drives. 2018-03-05 19:35:07 +01:00
Mounir IDRASSI
cd59d5364f Windows: Implement TRIM support for non-system SSD partitions/drives and add driver option to enable it (TRIM is disabled by default for non-system SSD partitions/drives) 2018-03-04 18:50:23 +01:00
Mounir IDRASSI
c29ee8331a Windows driver: correctly handle IOCTL_DISK_GET_DRIVE_GEOMETRY_EX to fix issues with some disks. Implement IOCTL_STORAGE_GET_MEDIA_TYPES_EX. 2017-07-27 00:30:51 +02:00
Mounir IDRASSI
7cc2a3527d Windows Driver: make IOCTL_DISK_GET_DRIVE_GEOMETRY_EX support optional. Make disk size equal to partition size to avoid compatibility issues with existing software. 2017-07-23 14:52:12 +02:00
Mounir IDRASSI
1812449906 Windows Driver: add legacy handling for IOCTL_DISK_GET_DRIVE_LAYOUT_EX/IOCTL_DISK_GET_DRIVE_LAYOUT IOCTLs to fix issues with faulty applications and drivers that don't handle them correctly. 2017-07-23 14:52:11 +02:00
Mounir IDRASSI
6d6aafe58d Windows driver: only activate newly supported IOCTLs if the option to enable extended IOCTLs is enabled in VeraCrypt driver settings. 2017-07-20 23:23:20 +02:00
Mounir IDRASSI
ac77142949 Windows driver: fix IOCTL_DISK_GET_DRIVE_LAYOUT and IOCTL_DISK_GET_DRIVE_LAYOUT_EX output by using setting PartitionCount to 4 instead of 1 since this field must always be a multiple of 4 for MBR disks. 2017-07-20 23:23:20 +02:00
Mounir IDRASSI
384c5cc259 Windows Driver: correctly get KeRestoreExtendedProcessorState function pointer. 2017-07-05 16:21:35 +02:00
Mounir IDRASSI
88cc8a00f4 Windows: correctly handle SEH exceptions during self-tests in order to disable CPU extended features in such case. 2017-07-04 12:28:17 +02:00
Mounir IDRASSI
89efcdb8cd Windows Driver: correctly save and restore extended processor state when performing AVX operations on Windows 7 and later. Enhance readability of code handling save/restore of floating point state. 2017-07-04 02:26:24 +02:00
Mounir IDRASSI
0ebc26e125 Update IDRIX copyright year 2017-06-23 22:15:59 +02:00
Mounir IDRASSI
458bb091bb Windows Driver Security: Use enhanced protection of NX pool under Windows 8 and later. 2017-06-10 18:44:49 +02:00
Mounir IDRASSI
55aa098295 Windows: fix high CPU usage when a favorite is configured to mount using VolumeID when its host device is connected to the machine. 2017-06-01 01:56:13 +02:00
Mounir IDRASSI
0e2c129854 Windows Driver: enhance detection of FAT volumes. 2017-05-28 00:04:29 +02:00
Mounir IDRASSI
5046edb012 Windows Driver: Correctly detect FAT volumes created on Linux in TC_IOCTL_OPEN_TEST FileSystem detection 2017-05-26 00:38:31 +02:00
Mounir IDRASSI
8edd1560e5 Windows Driver: Add support for ReFS in TC_IOCTL_OPEN_TEST FileSystem detection 2017-05-26 00:38:30 +02:00
Mounir IDRASSI
a5035f812b Windows: remove IOCTL_STORAGE_GET_DEVICE_NUMBER support until a real device is implemented. 2017-05-25 01:15:19 +02:00
Mounir IDRASSI
f50bf2cf61 Windows Driver: implement some extra IOCTLs. Add more traces for debugging. 2017-05-25 01:15:18 +02:00
Mounir IDRASSI
9fdac9317b Windows Driver: enhance implementation of IOCTL_STORAGE_QUERY_PROPERTY 2017-05-25 01:15:17 +02:00
Mounir IDRASSI
feef2fee91 Windows Driver: remove unused variable. 2017-05-25 01:15:14 +02:00
Mounir IDRASSI
e484d0caae Windows Driver: Support new IOCTLS and correct implementation of existing ones to solve Windows 10 compatibility issues. 2017-05-21 01:07:50 +02:00
Mounir IDRASSI
5081929b60 Windows Driver: fix bug in new IOCTL VC_IOCTL_GET_DRIVE_GEOMETRY_EX 2017-05-21 01:07:49 +02:00
Mounir IDRASSI
74b82118d5 Windows: use IOCTL_DISK_GET_DRIVE_GEOMETRY_EX instead of the deprecated IOCTL_DISK_GET_DRIVE_GEOMETRY in order to get accurate disk size value. 2017-05-17 00:46:41 +02:00
Mounir IDRASSI
0ac4009720 Windows: Fix failure to access EFS data on VeraCrypt volumes under Windows 10 but supporting undocumented IOCTL. 2016-10-17 18:40:25 +02:00
Mounir IDRASSI
460f552a41 Windows Driver: Add extra traces and enable tracing in release build if DEBUG_TRACE defined. 2016-08-15 01:09:10 +02:00
David Foerster
11716ed2da Remove trailing whitespace 2016-05-10 22:18:34 +02:00
David Foerster
fc37cc4a02 Normalize all line terminators 2016-05-10 20:20:14 +02:00
Mounir IDRASSI
f5606a44a6 Windows: Finalize implementation of the new volume ID mechanism. Use SHA-256 instead of SHA-512 to compute volume ID to reduce string size and make more convenient to use. 2016-04-14 08:53:41 +02:00