1
0
mirror of https://github.com/veracrypt/VeraCrypt.git synced 2026-04-27 00:49:19 -05:00
Commit Graph

2163 Commits

Author SHA1 Message Date
Mounir IDRASSI 8d7a318795 Windows: use specific order for EFI boot arguments memory regions that matches the one used by EFI bootloader. 2019-03-01 00:35:20 +01:00
Mounir IDRASSI cf48b532b4 Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha) 2019-03-01 00:35:13 +01:00
Mounir IDRASSI 29b749bdd9 Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it in Mount.c 2019-02-15 00:17:11 +01:00
Mounir IDRASSI adf97533d3 Windows: Set CpuRngDisabled variable to TRUE for clarity even if it will be set to TRUE anyway by default through EnableCpuRng calls 2019-02-15 00:17:03 +01:00
Mounir IDRASSI 863a3a07b8 XML Language files: update Chinese translation 2019-02-15 00:16:53 +01:00
Mounir IDRASSI 1b76823ea5 Add copyright and license information of JitterEntropy library by Stephan Mueller 2019-02-12 19:06:22 +01:00
Mounir IDRASSI 86f0fde6e7 Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de) 2019-02-12 19:06:14 +01:00
Mounir IDRASSI a5943c07fb Language XML files: update Czech translation (contributed by Lagardere) 2019-02-12 19:06:04 +01:00
Mounir IDRASSI fc72eb04f5 Add missing string from Estonian language file. 2019-02-12 19:05:57 +01:00
Mounir IDRASSI 2061b4c28c Windows: Ensure that only one thread at a time can create a secure desktop 2019-02-10 22:54:45 +01:00
Mounir IDRASSI 3903fcc595 Windows: Avoid simultaneous calls of favorites mounting, for example if corresponding hotkey is pressed multiple times. 2019-02-10 22:54:37 +01:00
Mounir IDRASSI 97ccbaf0a3 Fix typo in CPU RNG detection condition (Github issue #417) 2019-02-10 17:28:38 +01:00
Mounir IDRASSI 2bb1fdf232 XML Language files: update Chinese translation 2019-02-10 17:24:00 +01:00
Ettore Atalan cbfd9ba1d1 Update german translation (#416)
Translate newly added string.
2019-02-10 17:20:57 +01:00
Mounir IDRASSI ba5da0946c Windows: Add implementation of ChaCha20 based random generator. Use it for driver need of random bytes (currently only wipe bytes but more to come later). 2019-02-08 01:50:12 +01:00
Mounir IDRASSI e5b9cee868 Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy which is now disabled by default 2019-02-08 01:50:03 +01:00
Mounir IDRASSI 6bb1f24ed5 Automatically truncate passwords for TrueCrypt volumes and System Encryption to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version. 2019-02-04 11:39:47 +01:00
Mounir IDRASSI 5d3278bcf2 Update Release Notes and other files for 1.24-Beta2 release 2019-02-01 13:02:01 +01:00
Mounir IDRASSI 0b8e768721 Windows: Add latest 1.24 EFI bootloader files that are signed by Microsoft that come with several enhancements and fixes especially for Rescue Disk: - Implement better timeout mechanism for password input. Implement new actions "shutdown" and "reboot". Set default timeout value to 3 minutes and default timeout action to "shutdown" - Enhance Rescue Disk implementation of restoring VeraCrypt loader. - Fix ESC on password prompt during Pre-Test not starting Windows - Add menu entry in Rescue Disk that enables starting original Windows loader 2019-02-01 00:36:28 +01:00
Mounir IDRASSI 5571a8ba6b Windows driver: better randomness for wipe bytes by always using Whirlpool hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available. 2019-02-01 00:36:19 +01:00
Mounir IDRASSI 61c1baa4bf Windows: use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available 2019-02-01 00:35:50 +01:00
Mounir IDRASSI 915855f43b Fix detection of CPU features AVX2 & BMI2. Add detection of RDRAND & RDSEED CPU features. Detect Hygon CPU as AMD one. 2019-02-01 00:35:42 +01:00
Mounir IDRASSI 3c18d54d1e Windows driver: replace SHA512 by RIPEMD160 when calculating internal hash of master key to avoid calling KeSaveFloatingPointState/KeSaveExtendedProcessorState since SHA512 implementation uses SSE2/AVX and RIPEMD160 is pure C 2019-02-01 00:35:33 +01:00
Mounir IDRASSI f02882ce60 Help compiler optimize some crypto code on 64-bit build since x64 capable CPUs always support SSE and SSE2 2019-01-30 00:46:10 +01:00
Mounir IDRASSI b294cc2e1c Increment version to 1.24-Beta2 2019-01-28 17:16:41 +01:00
Mounir IDRASSI cdd1179c63 Increase password maximum length to 128 bytes from 64 bytes 2019-01-28 17:16:33 +01:00
Mounir IDRASSI 54e46c260c Windows Driver: force the input size for some IOCTLs to have a fixed value 2019-01-28 17:16:23 +01:00
Mounir IDRASSI a20b3083b0 Windows: Add a build configuration containing EFI bootloader signed with custom SecureBoot key instead 2019-01-26 01:20:51 +01:00
Mounir IDRASSI 7b95b375a0 Windows: fix building MBR bootloader following modification of Xts.c 2019-01-26 01:20:43 +01:00
Mounir IDRASSI ce0a34941a Linux/MacOSX crypto: report XTS optimization implemented previously on Windows
c
2019-01-25 19:23:13 +01:00
Mounir IDRASSI d8d92357b0 Windows crypto: optimize XTS implementation for 64-bit builds using SSE2 thanks to simplification of storage of whitening values in memory (normal order instead of reverse order). 2019-01-25 19:23:03 +01:00
Mounir IDRASSI f3a98fda03 Update release notes for 1.24-Beta1 2019-01-22 12:55:32 +01:00
Ettore Atalan 6084c5606a Update german translation (#403)
Translated all newly added strings.
2019-01-22 09:55:40 +01:00
Mounir IDRASSI d73b8bdf74 Windows: Increment driver version to 1.24.1.1 2019-01-22 09:53:32 +01:00
Mounir IDRASSI ee0a2659da Windows driver: remove volumes master keys from CRYPTO_INFO since they are not needed after their key schedule is created 2019-01-21 00:45:31 +01:00
Mounir IDRASSI 27b3fee02d Windows: remove unused fields from CRYPTO_INFO structure 2019-01-21 00:45:23 +01:00
Mounir IDRASSI 2046347775 Windows: fix editor of EFI configuration file not accepting ENTER key for adding new lines. 2019-01-18 19:02:18 +01:00
Mounir IDRASSI 9eb36ba91f MacOSX: update info.plist file to set priority at run-time to 64-bit version and to set minimum OSX version to 10.7. 2019-01-18 19:02:09 +01:00
Mounir IDRASSI 4155e912ee XML Language files: update Chinese translation 2019-01-15 20:38:14 +01:00
Mounir IDRASSI 202caea3a9 Windows: enhancements to EFI system encryption, like handling of Multi-Boot and better compatibility with Windows Upgrade process. 2019-01-15 15:05:19 +01:00
Mounir IDRASSI 07fd2aa9a5 Update Release Notes and language files for version 1.24-Beta1. Add signed Windows drivers. 2019-01-14 10:49:22 +01:00
Mounir IDRASSI 07f6793bd2 Windows: enhance support of new behavior of favorite service which is now always running in case of system encryption 2019-01-14 10:49:13 +01:00
Mounir IDRASSI d3e7ed96f3 Windows: Implement feature that enables clearing of encryption keys when a new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade). 2019-01-14 10:49:05 +01:00
Mounir IDRASSI 69cb0bea81 Windows: add a 10 seconds delay between signtool calls to avoid issues caused by antivirus software locking the newly signed files temporarily after they are signed. 2019-01-14 10:48:57 +01:00
Mounir IDRASSI 44b2215a7a Windows: fix debug packaging script by copying missing driver .inf and .cat files from Release folder. 2019-01-14 10:48:50 +01:00
Mounir IDRASSI 406adce424 Increment version to 1.24-Beta1 2019-01-14 10:48:41 +01:00
Mounir IDRASSI 405883169c Windows driver: remove newly added volatile qualifier from CRYPT_INFO pointers to fix build issue until a better approach is devised 2019-01-09 00:59:21 +01:00
Mounir IDRASSI 652e989d23 Windows Security: Add new entry point in driver that allows emergency clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected. 2019-01-09 00:30:12 +01:00
Mounir IDRASSI 7c2cf7889f Windows Driver: erase system encryption keys from memory during shutdown/reboot to help mitigate some cold boot attacks 2019-01-09 00:30:05 +01:00
Mounir IDRASSI 11f0b99846 Windows driver: move newly added field in VOLUME_PROPERTIES_STRUCT to the end for compatibility with previous version. 2019-01-09 00:29:57 +01:00