Mounir IDRASSI
|
5c934d8122
|
Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt driver
|
2019-03-03 23:48:49 +01:00 |
|
Mounir IDRASSI
|
6d2cef1fd8
|
Fix formatting of credits in About dialog and documentation
|
2019-03-03 23:48:42 +01:00 |
|
Mounir IDRASSI
|
c7b23530f9
|
Windows: Add missing UI string to XML language files.
|
2019-03-03 23:48:35 +01:00 |
|
Mounir IDRASSI
|
8e39877054
|
Increment version to 1.24-Beta3. Update Release Notes.
|
2019-03-03 23:48:28 +01:00 |
|
Mounir IDRASSI
|
453ef927ef
|
Windows: Add option to use legacy maximum password length (64 characters) instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt.
|
2019-03-03 00:20:49 +01:00 |
|
Mounir IDRASSI
|
ea88c6175c
|
Windows: fix compilation error
|
2019-03-02 14:50:22 +01:00 |
|
Mounir IDRASSI
|
f7bc58b38f
|
Windows: mitigate some memory attacks by making VeraCrypt applications memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code (https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150)
|
2019-03-02 14:45:38 +01:00 |
|
Mounir IDRASSI
|
321715202a
|
Windows: Generalize RAM encryption for keys to VeraCrypt binaries, especially Format and Expander
|
2019-03-02 10:23:39 +01:00 |
|
Mounir IDRASSI
|
3d6032d69e
|
Windows: better debug messages for VcProtectKeys and VcUnprotectKeys functions
|
2019-03-01 00:35:47 +01:00 |
|
Mounir IDRASSI
|
954bfd45d0
|
Windows Driver: Implement RAM encryption for cached passwords
|
2019-03-01 00:35:40 +01:00 |
|
Mounir IDRASSI
|
0391b8e550
|
Windows: Add some logs in functions for RAM encryption
|
2019-03-01 00:35:27 +01:00 |
|
Mounir IDRASSI
|
8d7a318795
|
Windows: use specific order for EFI boot arguments memory regions that matches the one used by EFI bootloader.
|
2019-03-01 00:35:20 +01:00 |
|
Mounir IDRASSI
|
cf48b532b4
|
Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
|
2019-03-01 00:35:13 +01:00 |
|
Mounir IDRASSI
|
29b749bdd9
|
Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it in Mount.c
|
2019-02-15 00:17:11 +01:00 |
|
Mounir IDRASSI
|
adf97533d3
|
Windows: Set CpuRngDisabled variable to TRUE for clarity even if it will be set to TRUE anyway by default through EnableCpuRng calls
|
2019-02-15 00:17:03 +01:00 |
|
Mounir IDRASSI
|
1b76823ea5
|
Add copyright and license information of JitterEntropy library by Stephan Mueller
|
2019-02-12 19:06:22 +01:00 |
|
Mounir IDRASSI
|
86f0fde6e7
|
Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de)
|
2019-02-12 19:06:14 +01:00 |
|
Mounir IDRASSI
|
2061b4c28c
|
Windows: Ensure that only one thread at a time can create a secure desktop
|
2019-02-10 22:54:45 +01:00 |
|
Mounir IDRASSI
|
97ccbaf0a3
|
Fix typo in CPU RNG detection condition (Github issue #417)
|
2019-02-10 17:28:38 +01:00 |
|
Mounir IDRASSI
|
e5b9cee868
|
Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy which is now disabled by default
|
2019-02-08 01:50:03 +01:00 |
|
Mounir IDRASSI
|
6bb1f24ed5
|
Automatically truncate passwords for TrueCrypt volumes and System Encryption to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version.
|
2019-02-04 11:39:47 +01:00 |
|
Mounir IDRASSI
|
5d3278bcf2
|
Update Release Notes and other files for 1.24-Beta2 release
|
2019-02-01 13:02:01 +01:00 |
|
Mounir IDRASSI
|
61c1baa4bf
|
Windows: use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available
|
2019-02-01 00:35:50 +01:00 |
|
Mounir IDRASSI
|
3c18d54d1e
|
Windows driver: replace SHA512 by RIPEMD160 when calculating internal hash of master key to avoid calling KeSaveFloatingPointState/KeSaveExtendedProcessorState since SHA512 implementation uses SSE2/AVX and RIPEMD160 is pure C
|
2019-02-01 00:35:33 +01:00 |
|
Mounir IDRASSI
|
b294cc2e1c
|
Increment version to 1.24-Beta2
|
2019-01-28 17:16:41 +01:00 |
|
Mounir IDRASSI
|
cdd1179c63
|
Increase password maximum length to 128 bytes from 64 bytes
|
2019-01-28 17:16:33 +01:00 |
|
Mounir IDRASSI
|
a20b3083b0
|
Windows: Add a build configuration containing EFI bootloader signed with custom SecureBoot key instead
|
2019-01-26 01:20:51 +01:00 |
|
Mounir IDRASSI
|
7b95b375a0
|
Windows: fix building MBR bootloader following modification of Xts.c
|
2019-01-26 01:20:43 +01:00 |
|
Mounir IDRASSI
|
d8d92357b0
|
Windows crypto: optimize XTS implementation for 64-bit builds using SSE2 thanks to simplification of storage of whitening values in memory (normal order instead of reverse order).
|
2019-01-25 19:23:03 +01:00 |
|
Mounir IDRASSI
|
d73b8bdf74
|
Windows: Increment driver version to 1.24.1.1
|
2019-01-22 09:53:32 +01:00 |
|
Mounir IDRASSI
|
ee0a2659da
|
Windows driver: remove volumes master keys from CRYPTO_INFO since they are not needed after their key schedule is created
|
2019-01-21 00:45:31 +01:00 |
|
Mounir IDRASSI
|
27b3fee02d
|
Windows: remove unused fields from CRYPTO_INFO structure
|
2019-01-21 00:45:23 +01:00 |
|
Mounir IDRASSI
|
2046347775
|
Windows: fix editor of EFI configuration file not accepting ENTER key for adding new lines.
|
2019-01-18 19:02:18 +01:00 |
|
Mounir IDRASSI
|
202caea3a9
|
Windows: enhancements to EFI system encryption, like handling of Multi-Boot and better compatibility with Windows Upgrade process.
|
2019-01-15 15:05:19 +01:00 |
|
Mounir IDRASSI
|
07fd2aa9a5
|
Update Release Notes and language files for version 1.24-Beta1. Add signed Windows drivers.
|
2019-01-14 10:49:22 +01:00 |
|
Mounir IDRASSI
|
07f6793bd2
|
Windows: enhance support of new behavior of favorite service which is now always running in case of system encryption
|
2019-01-14 10:49:13 +01:00 |
|
Mounir IDRASSI
|
d3e7ed96f3
|
Windows: Implement feature that enables clearing of encryption keys when a new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade).
|
2019-01-14 10:49:05 +01:00 |
|
Mounir IDRASSI
|
406adce424
|
Increment version to 1.24-Beta1
|
2019-01-14 10:48:41 +01:00 |
|
Mounir IDRASSI
|
652e989d23
|
Windows Security: Add new entry point in driver that allows emergency clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected.
|
2019-01-09 00:30:12 +01:00 |
|
Mounir IDRASSI
|
11f0b99846
|
Windows driver: move newly added field in VOLUME_PROPERTIES_STRUCT to the end for compatibility with previous version.
|
2019-01-09 00:29:57 +01:00 |
|
Mounir IDRASSI
|
800f081f1c
|
Increment version to 1.24-Beta0
|
2018-12-19 12:41:41 +01:00 |
|
Mounir IDRASSI
|
1967bd862e
|
Windows: Add mount option that allows mounting a volume without attaching it to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX).
|
2018-12-19 00:41:37 +01:00 |
|
Mounir IDRASSI
|
0856b387f1
|
Windows: Update libzip to version 1.5.1
|
2018-12-03 00:51:49 +01:00 |
|
Mounir IDRASSI
|
93dbed19c8
|
Increment version to 1.23-Hotfix-2
|
2018-10-10 09:32:02 +02:00 |
|
Mounir IDRASSI
|
4fea208958
|
Windows: zero TC_IOCTL_GET_SYSTEM_DRIVE_CONFIG input/output parameter as it is done for other IOCTLs
|
2018-10-10 09:31:38 +02:00 |
|
Mounir IDRASSI
|
0b8b50bde9
|
Increment version to 1.23-Hotfix-1
|
2018-09-21 10:39:24 +02:00 |
|
Mounir IDRASSI
|
32e2791d4c
|
Set 1.23 release date to September 12th 2018
|
2018-09-12 17:45:22 +02:00 |
|
Mounir IDRASSI
|
74600364f2
|
Set 1.23 release date to September 10th 2018
|
2018-09-10 00:15:19 +02:00 |
|
Mounir IDRASSI
|
fda5880f90
|
Increment version to 1.23-BETA8 and update release notes.
|
2018-09-03 11:45:19 +02:00 |
|
Mounir IDRASSI
|
8f47adfff1
|
Windows: handle case of inconsistencies in EFI system partition content during system encryption wizard caused by older VeraCrypt system encryption not properly uninstalled (e.g. reinstall Windows without decryption first).
|
2018-09-03 01:00:55 +02:00 |
|