Commit Graph

32 Commits

Author SHA1 Message Date
Mounir IDRASSI
42373efcfd
Windows: Use Visual C++ 2010 instead of Visual C++ 2008. 2016-06-17 15:50:47 +02:00
Mounir IDRASSI
76d3bc631e
Crypto: Add support for Japanese encryption standard Camellia, including for system encryption. 2016-06-02 00:12:00 +02:00
David Foerster
11716ed2da Remove trailing whitespace 2016-05-10 22:18:34 +02:00
David Foerster
fc37cc4a02 Normalize all line terminators 2016-05-10 20:20:14 +02:00
Mounir IDRASSI
0163dfdcab Windows: Reduce memory usage of Rescue Disk for cascades by 1KB. 2016-04-20 00:48:30 +02:00
Mounir IDRASSI
1396269d57 Windows: Add option to avoid PIM prompt in pre-boot authentication by storing PIM value unencrypted in MBR. 2016-04-20 00:48:20 +02:00
Mounir IDRASSI
50f85b4512 Windows bootloader: try to fix boot issues on some machines by increasing required memory by 1 KiB 2016-02-22 00:34:33 +01:00
Mounir IDRASSI
926721d54e Windows Bootloader: Always hide password/PIM values with '*' after ENTER is hit, even if F5 was pressed to display password/PIM. 2016-01-29 00:50:27 +01:00
Mounir IDRASSI
bda7a1d0bd Copyright: update dates to include 2016. 2016-01-20 00:53:24 +01:00
Mounir IDRASSI
8e56e138cc Windows Rescue Disk: when decryption paused/finished, display message to indicate that header is being updated 2015-12-05 19:35:45 +01:00
Mounir IDRASSI
ec7d96fcb7 Windows Bootloader: Avoid displaying empty new line between password and PIM after filling password field with dummy '*'. 2015-11-26 01:44:46 +01:00
Mounir IDRASSI
8342d0d616 Windows Rescue Disk: compress bootloader for rescue disk in several more cases because of its growing size. 2015-10-15 01:36:12 +02:00
Mounir IDRASSI
19483d2097 Windows Bootloader: Protect password/PIM length by filling the fields to their maximum length with '*' after ENTER is hit 2015-10-15 01:36:10 +02:00
Mounir IDRASSI
7e73208e62 Windows Bootloader: Fix Rescue Disk issue when Cascades and SHA256 used. It was caused by the bootloader becoming too big in this case with PIM implementation (larger than the limit of 31232 bytes). We also increase memory requirement for this case 2015-09-13 01:15:13 +02:00
Mounir IDRASSI
22152878f8 Windows Bootloader: pass correct compressed data size to decompressor and use shorter string to keep a valid memory layout for boot sector. 2015-09-13 01:14:17 +02:00
Mounir IDRASSI
8dc1dd2fb4 Windows bootloader: Mask/unmask PIM value in bootloader the same way as the password 2015-08-28 19:32:29 +02:00
Mounir IDRASSI
041024fbb9 Update license information to reflect the use of a dual license Apache 2.0 and TrueCrypt 3.0. 2015-08-06 00:04:25 +02:00
Mounir IDRASSI
6ef41abdd2 Use Pim name for internal variables instead of the old name Pin 2015-07-11 01:58:34 +02:00
Mounir IDRASSI
a7a8d57bca Windows: rename PIN to PIM to avoid confusion. Better error messages. 2015-06-08 01:16:34 +02:00
Mounir IDRASSI
8ebf5ac605 Windows: first implementation of dynamic mode 2015-05-26 01:38:15 +02:00
Mounir IDRASSI
0f2d32f011 Windows: enable showing/hiding password for system encryption in Windows UI and in the bootloader (F5 key). This will be helpful to diagnose issues with non-US versions of Windows. 2015-05-03 15:47:25 +02:00
Mounir IDRASSI
b68fec97ea Windows: Require upgrading rescue disk since we changed bootloader in 1.0f-2 2015-04-06 00:22:42 +02:00
Mounir IDRASSI
f09f8e3a31 Windows Bootloader: Display message after entering password to inform user that the password is being processed. Without this, users coming from TrueCrypt think that the system is freezed since they expect it to boot quickly. 2015-03-02 00:23:55 +01:00
Mounir IDRASSI
f38cf0b694 Add support for SHA-256 in key derivation for bootloader encryption. Create separate bootloader images for SHA-256 and RIPEMD-160. Set SHA-256 as the default PRF for boot encryption and SHA-512 as default PRF for all other cases. Depricate RIPEMD-160. 2014-11-08 23:23:50 +01:00
Mounir IDRASSI
effb5c7c1e Windows vulnerability fix : finally make bootloader decompressor more robust and secure by adding multiple checks and validation code. This solves the issue found by the Open Crypt Audit project. Note that we had to switch to the slow implementation of the function decode in order to keep the size of the decompressor code under 2K. 2014-11-08 23:23:42 +01:00
Mounir IDRASSI
e0efb36f33 Revert previous modification on boad-loader decompressor because it increased its size and it became impossible to include it with the SERPENT version of bootloader. The decompressor and the compressed bootloader are copied twice (original and backup) in the 63 first sectors of the hard drive (32K), thus the size limitation.
This reverts commit 154235d589222e3c31cda05aa53e73ab69a89a6e.
2014-11-08 23:23:02 +01:00
Mounir IDRASSI
ef4355acf8 Windows vulnerability fix : make boot-loader decompressor more robust and secure by adding multiple checks and validation code. Note that we had to switch to the slow implementation of the function decode in order to keep the size of the decompressor code under 2K. 2014-11-08 23:22:59 +01:00
Mounir IDRASSI
f3625a080f Static Code Analysis: Correctly initialize variables to avoid false-positive detection in the boot code. 2014-11-08 23:21:07 +01:00
Mounir IDRASSI
b9e34c30e8 Require to upgrade rescue disk if upgrading from version 1.0a of VeraCrypt instead of version 6.0a (left over from TrueCrypt). Does anyone still uses VeraCrypt 1.0a??? 2014-11-08 23:19:58 +01:00
Mounir IDRASSI
f34d894f6e Detect correctly VeraCrypt rescue disk by looking for the little-endian encoding of "Vera" instead of "True". 2014-11-08 23:19:44 +01:00
Mounir IDRASSI
03867fbf56 Modifications to remove all TrueCrypt references in names. generate new GUIDs for VeraCrypt. Replace "TRUE" by "VERA" in volume headers and driver magic word. 2014-11-08 23:18:19 +01:00
Mounir IDRASSI
c606f0866c Add original TrueCrypt 7.1a sources 2014-11-08 23:18:07 +01:00