Commit Graph

1786 Commits

Author SHA1 Message Date
Mounir IDRASSI
76c03c23a1
Windows: inform user that RAM encryption setting requires reboot to take effect 2019-03-08 01:03:04 +01:00
Mounir IDRASSI
f780011a86
Windows Driver: fix BSOD when mounting hidden volume if RAM encryption is enabled 2019-03-08 01:02:57 +01:00
Ettore Atalan
9a76ecfc55 Update german translation (#433)
Translated recently added strings.
2019-03-08 00:58:35 +01:00
Mounir IDRASSI
7f394d0a08
XML Language files: update Chinese translation 2019-03-04 23:49:11 +01:00
Mounir IDRASSI
08f09861e1
Language Files: update polish translation 2019-03-04 23:49:04 +01:00
Mounir IDRASSI
7701dfde07
Windows: Update signed drivers for 1.24-Beta3 2019-03-04 00:55:10 +01:00
Mounir IDRASSI
5c934d8122
Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt driver 2019-03-03 23:48:49 +01:00
Mounir IDRASSI
6d2cef1fd8
Fix formatting of credits in About dialog and documentation 2019-03-03 23:48:42 +01:00
Mounir IDRASSI
c7b23530f9
Windows: Add missing UI string to XML language files. 2019-03-03 23:48:35 +01:00
Mounir IDRASSI
8e39877054
Increment version to 1.24-Beta3. Update Release Notes. 2019-03-03 23:48:28 +01:00
Mounir IDRASSI
f6274642f0
Windows: Update documentation for command line usage 2019-03-03 23:48:20 +01:00
Mounir IDRASSI
2117490500
Windows: Add documentation for new switch (/m noattach) 2019-03-03 23:48:13 +01:00
Mounir IDRASSI
28b8bf5222
Windows: Add command line switch (/m noattach) that is equivalent to UI option "Only create virtual device without mounting on selected drive letter" 2019-03-03 23:48:06 +01:00
Mounir IDRASSI
d92e045b8d
Windows: replicate old behavior when handling passwords in UI when legacy password maximum length option selected 2019-03-03 23:47:58 +01:00
Mounir IDRASSI
453ef927ef
Windows: Add option to use legacy maximum password length (64 characters) instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt. 2019-03-03 00:20:49 +01:00
Mounir IDRASSI
ea88c6175c
Windows: fix compilation error 2019-03-02 14:50:22 +01:00
Mounir IDRASSI
f7bc58b38f
Windows: mitigate some memory attacks by making VeraCrypt applications memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code (https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150) 2019-03-02 14:45:38 +01:00
Mounir IDRASSI
321715202a
Windows: Generalize RAM encryption for keys to VeraCrypt binaries, especially Format and Expander 2019-03-02 10:23:39 +01:00
Mounir IDRASSI
edd1b00126
Windows Driver: Enable RAM encryption only after its security parameters were created 2019-03-01 00:35:54 +01:00
Mounir IDRASSI
3d6032d69e
Windows: better debug messages for VcProtectKeys and VcUnprotectKeys functions 2019-03-01 00:35:47 +01:00
Mounir IDRASSI
954bfd45d0
Windows Driver: Implement RAM encryption for cached passwords 2019-03-01 00:35:40 +01:00
Mounir IDRASSI
ae5eb73f93
Windows driver: call VcProtectKeys only when RAM encryption enabled although this function does nothing when RAM encryption is disabled. 2019-03-01 00:35:33 +01:00
Mounir IDRASSI
0391b8e550
Windows: Add some logs in functions for RAM encryption 2019-03-01 00:35:27 +01:00
Mounir IDRASSI
8d7a318795
Windows: use specific order for EFI boot arguments memory regions that matches the one used by EFI bootloader. 2019-03-01 00:35:20 +01:00
Mounir IDRASSI
cf48b532b4
Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha) 2019-03-01 00:35:13 +01:00
Mounir IDRASSI
29b749bdd9
Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it in Mount.c 2019-02-15 00:17:11 +01:00
Mounir IDRASSI
adf97533d3
Windows: Set CpuRngDisabled variable to TRUE for clarity even if it will be set to TRUE anyway by default through EnableCpuRng calls 2019-02-15 00:17:03 +01:00
Mounir IDRASSI
863a3a07b8
XML Language files: update Chinese translation 2019-02-15 00:16:53 +01:00
Mounir IDRASSI
1b76823ea5
Add copyright and license information of JitterEntropy library by Stephan Mueller 2019-02-12 19:06:22 +01:00
Mounir IDRASSI
86f0fde6e7
Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de) 2019-02-12 19:06:14 +01:00
Mounir IDRASSI
a5943c07fb
Language XML files: update Czech translation (contributed by Lagardere) 2019-02-12 19:06:04 +01:00
Mounir IDRASSI
fc72eb04f5
Add missing string from Estonian language file. 2019-02-12 19:05:57 +01:00
Mounir IDRASSI
2061b4c28c
Windows: Ensure that only one thread at a time can create a secure desktop 2019-02-10 22:54:45 +01:00
Mounir IDRASSI
3903fcc595
Windows: Avoid simultaneous calls of favorites mounting, for example if corresponding hotkey is pressed multiple times. 2019-02-10 22:54:37 +01:00
Mounir IDRASSI
97ccbaf0a3
Fix typo in CPU RNG detection condition (Github issue #417) 2019-02-10 17:28:38 +01:00
Mounir IDRASSI
2bb1fdf232
XML Language files: update Chinese translation 2019-02-10 17:24:00 +01:00
Ettore Atalan
cbfd9ba1d1 Update german translation (#416)
Translate newly added string.
2019-02-10 17:20:57 +01:00
Mounir IDRASSI
ba5da0946c
Windows: Add implementation of ChaCha20 based random generator. Use it for driver need of random bytes (currently only wipe bytes but more to come later). 2019-02-08 01:50:12 +01:00
Mounir IDRASSI
e5b9cee868
Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy which is now disabled by default 2019-02-08 01:50:03 +01:00
Mounir IDRASSI
6bb1f24ed5
Automatically truncate passwords for TrueCrypt volumes and System Encryption to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version. 2019-02-04 11:39:47 +01:00
Mounir IDRASSI
5d3278bcf2
Update Release Notes and other files for 1.24-Beta2 release 2019-02-01 13:02:01 +01:00
Mounir IDRASSI
0b8e768721
Windows: Add latest 1.24 EFI bootloader files that are signed by Microsoft that come with several enhancements and fixes especially for Rescue Disk: - Implement better timeout mechanism for password input. Implement new actions "shutdown" and "reboot". Set default timeout value to 3 minutes and default timeout action to "shutdown" - Enhance Rescue Disk implementation of restoring VeraCrypt loader. - Fix ESC on password prompt during Pre-Test not starting Windows - Add menu entry in Rescue Disk that enables starting original Windows loader 2019-02-01 00:36:28 +01:00
Mounir IDRASSI
5571a8ba6b
Windows driver: better randomness for wipe bytes by always using Whirlpool hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available. 2019-02-01 00:36:19 +01:00
Mounir IDRASSI
61c1baa4bf
Windows: use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available 2019-02-01 00:35:50 +01:00
Mounir IDRASSI
915855f43b
Fix detection of CPU features AVX2 & BMI2. Add detection of RDRAND & RDSEED CPU features. Detect Hygon CPU as AMD one. 2019-02-01 00:35:42 +01:00
Mounir IDRASSI
3c18d54d1e
Windows driver: replace SHA512 by RIPEMD160 when calculating internal hash of master key to avoid calling KeSaveFloatingPointState/KeSaveExtendedProcessorState since SHA512 implementation uses SSE2/AVX and RIPEMD160 is pure C 2019-02-01 00:35:33 +01:00
Mounir IDRASSI
f02882ce60
Help compiler optimize some crypto code on 64-bit build since x64 capable CPUs always support SSE and SSE2 2019-01-30 00:46:10 +01:00
Mounir IDRASSI
b294cc2e1c
Increment version to 1.24-Beta2 2019-01-28 17:16:41 +01:00
Mounir IDRASSI
cdd1179c63
Increase password maximum length to 128 bytes from 64 bytes 2019-01-28 17:16:33 +01:00
Mounir IDRASSI
54e46c260c
Windows Driver: force the input size for some IOCTLs to have a fixed value 2019-01-28 17:16:23 +01:00