Commit Graph

1182 Commits

Author SHA1 Message Date
Mounir IDRASSI
06e8fbace7
Windows: Disable the Keyfiles button in system encryption wizard since we don't support them yet. 2019-09-25 17:43:59 +02:00
Mounir IDRASSI
c8beacbdd7
Linux/OSX: make CLI switch --import-token-keyfiles compatible with Non-Interactive
mode by using keyfiles passed as arguments and check the Non-Interactive
mode switch.
2019-09-24 22:06:44 +02:00
Mounir IDRASSI
8021d44465
Windows: fix HourGlass cursor showing up in main UI after launching disk decryption wizard/ 2019-09-24 18:30:58 +02:00
Mounir IDRASSI
6b10f88e40
Fix build error of UEFI bootloader caused by latest changes that introduced ChaCha20 and T1HA algorithms and which are not present nor used in UEFI bootloader 2019-09-23 00:07:15 +02:00
Mounir IDRASSI
2ab57bcf70
Windows: fix compilation error of legacy MBR bootloader caused by missing intrin.h header 2019-08-26 00:50:25 +02:00
Alexander Karzhenkov
6f1ebacd39 Some cleanup related to "Invalid characters..." on mount issue. (#453)
* Revert previous commit

* Fix "Invalid characters..." issue by not using "foreach" macro

The "foreach" macro creates a copy of the container.
This copy is destroyed immediately after the iteration is completed.
C-strings pointers passed to the local array were invalidated
with destroying of "std::string"s contained in the copy.
2019-06-06 11:41:42 +02:00
Dany Shaanan
1973fd6d26 Fix password-only example in help text (pim missing) (#438) 2019-06-06 11:39:52 +02:00
Mounir IDRASSI
08a8a0ce30
Linux: Fix compilation error caused by wrong include of "intrin.h" 2019-03-21 18:52:14 +01:00
Mounir IDRASSI
69df92c81d
Increment version to 1.24-Beta5 2019-03-09 08:04:04 +01:00
Mounir IDRASSI
1bd3a6cc70
Windows Driver: fix BSOD when mounting outer volume with hidden volume protection if RAM encryption is enabled 2019-03-09 08:03:57 +01:00
Mounir IDRASSI
d6ce1db2a8
Increment version to 1.24-Beta4 and update release notes to clarify that password length increase applies only to non-system volumes. 2019-03-09 08:03:51 +01:00
Mounir IDRASSI
76c03c23a1
Windows: inform user that RAM encryption setting requires reboot to take effect 2019-03-08 01:03:04 +01:00
Mounir IDRASSI
f780011a86
Windows Driver: fix BSOD when mounting hidden volume if RAM encryption is enabled 2019-03-08 01:02:57 +01:00
Mounir IDRASSI
7701dfde07
Windows: Update signed drivers for 1.24-Beta3 2019-03-04 00:55:10 +01:00
Mounir IDRASSI
5c934d8122
Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt driver 2019-03-03 23:48:49 +01:00
Mounir IDRASSI
6d2cef1fd8
Fix formatting of credits in About dialog and documentation 2019-03-03 23:48:42 +01:00
Mounir IDRASSI
c7b23530f9
Windows: Add missing UI string to XML language files. 2019-03-03 23:48:35 +01:00
Mounir IDRASSI
8e39877054
Increment version to 1.24-Beta3. Update Release Notes. 2019-03-03 23:48:28 +01:00
Mounir IDRASSI
28b8bf5222
Windows: Add command line switch (/m noattach) that is equivalent to UI option "Only create virtual device without mounting on selected drive letter" 2019-03-03 23:48:06 +01:00
Mounir IDRASSI
d92e045b8d
Windows: replicate old behavior when handling passwords in UI when legacy password maximum length option selected 2019-03-03 23:47:58 +01:00
Mounir IDRASSI
453ef927ef
Windows: Add option to use legacy maximum password length (64 characters) instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt. 2019-03-03 00:20:49 +01:00
Mounir IDRASSI
ea88c6175c
Windows: fix compilation error 2019-03-02 14:50:22 +01:00
Mounir IDRASSI
f7bc58b38f
Windows: mitigate some memory attacks by making VeraCrypt applications memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code (https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150) 2019-03-02 14:45:38 +01:00
Mounir IDRASSI
321715202a
Windows: Generalize RAM encryption for keys to VeraCrypt binaries, especially Format and Expander 2019-03-02 10:23:39 +01:00
Mounir IDRASSI
edd1b00126
Windows Driver: Enable RAM encryption only after its security parameters were created 2019-03-01 00:35:54 +01:00
Mounir IDRASSI
3d6032d69e
Windows: better debug messages for VcProtectKeys and VcUnprotectKeys functions 2019-03-01 00:35:47 +01:00
Mounir IDRASSI
954bfd45d0
Windows Driver: Implement RAM encryption for cached passwords 2019-03-01 00:35:40 +01:00
Mounir IDRASSI
ae5eb73f93
Windows driver: call VcProtectKeys only when RAM encryption enabled although this function does nothing when RAM encryption is disabled. 2019-03-01 00:35:33 +01:00
Mounir IDRASSI
0391b8e550
Windows: Add some logs in functions for RAM encryption 2019-03-01 00:35:27 +01:00
Mounir IDRASSI
8d7a318795
Windows: use specific order for EFI boot arguments memory regions that matches the one used by EFI bootloader. 2019-03-01 00:35:20 +01:00
Mounir IDRASSI
cf48b532b4
Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha) 2019-03-01 00:35:13 +01:00
Mounir IDRASSI
29b749bdd9
Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it in Mount.c 2019-02-15 00:17:11 +01:00
Mounir IDRASSI
adf97533d3
Windows: Set CpuRngDisabled variable to TRUE for clarity even if it will be set to TRUE anyway by default through EnableCpuRng calls 2019-02-15 00:17:03 +01:00
Mounir IDRASSI
1b76823ea5
Add copyright and license information of JitterEntropy library by Stephan Mueller 2019-02-12 19:06:22 +01:00
Mounir IDRASSI
86f0fde6e7
Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de) 2019-02-12 19:06:14 +01:00
Mounir IDRASSI
2061b4c28c
Windows: Ensure that only one thread at a time can create a secure desktop 2019-02-10 22:54:45 +01:00
Mounir IDRASSI
3903fcc595
Windows: Avoid simultaneous calls of favorites mounting, for example if corresponding hotkey is pressed multiple times. 2019-02-10 22:54:37 +01:00
Mounir IDRASSI
97ccbaf0a3
Fix typo in CPU RNG detection condition (Github issue #417) 2019-02-10 17:28:38 +01:00
Mounir IDRASSI
ba5da0946c
Windows: Add implementation of ChaCha20 based random generator. Use it for driver need of random bytes (currently only wipe bytes but more to come later). 2019-02-08 01:50:12 +01:00
Mounir IDRASSI
e5b9cee868
Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy which is now disabled by default 2019-02-08 01:50:03 +01:00
Mounir IDRASSI
6bb1f24ed5
Automatically truncate passwords for TrueCrypt volumes and System Encryption to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version. 2019-02-04 11:39:47 +01:00
Mounir IDRASSI
5d3278bcf2
Update Release Notes and other files for 1.24-Beta2 release 2019-02-01 13:02:01 +01:00
Mounir IDRASSI
0b8e768721
Windows: Add latest 1.24 EFI bootloader files that are signed by Microsoft that come with several enhancements and fixes especially for Rescue Disk: - Implement better timeout mechanism for password input. Implement new actions "shutdown" and "reboot". Set default timeout value to 3 minutes and default timeout action to "shutdown" - Enhance Rescue Disk implementation of restoring VeraCrypt loader. - Fix ESC on password prompt during Pre-Test not starting Windows - Add menu entry in Rescue Disk that enables starting original Windows loader 2019-02-01 00:36:28 +01:00
Mounir IDRASSI
5571a8ba6b
Windows driver: better randomness for wipe bytes by always using Whirlpool hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available. 2019-02-01 00:36:19 +01:00
Mounir IDRASSI
61c1baa4bf
Windows: use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available 2019-02-01 00:35:50 +01:00
Mounir IDRASSI
915855f43b
Fix detection of CPU features AVX2 & BMI2. Add detection of RDRAND & RDSEED CPU features. Detect Hygon CPU as AMD one. 2019-02-01 00:35:42 +01:00
Mounir IDRASSI
3c18d54d1e
Windows driver: replace SHA512 by RIPEMD160 when calculating internal hash of master key to avoid calling KeSaveFloatingPointState/KeSaveExtendedProcessorState since SHA512 implementation uses SSE2/AVX and RIPEMD160 is pure C 2019-02-01 00:35:33 +01:00
Mounir IDRASSI
f02882ce60
Help compiler optimize some crypto code on 64-bit build since x64 capable CPUs always support SSE and SSE2 2019-01-30 00:46:10 +01:00
Mounir IDRASSI
b294cc2e1c
Increment version to 1.24-Beta2 2019-01-28 17:16:41 +01:00
Mounir IDRASSI
cdd1179c63
Increase password maximum length to 128 bytes from 64 bytes 2019-01-28 17:16:33 +01:00
Mounir IDRASSI
54e46c260c
Windows Driver: force the input size for some IOCTLs to have a fixed value 2019-01-28 17:16:23 +01:00
Mounir IDRASSI
a20b3083b0
Windows: Add a build configuration containing EFI bootloader signed with custom SecureBoot key instead 2019-01-26 01:20:51 +01:00
Mounir IDRASSI
7b95b375a0
Windows: fix building MBR bootloader following modification of Xts.c 2019-01-26 01:20:43 +01:00
Mounir IDRASSI
ce0a34941a
Linux/MacOSX crypto: report XTS optimization implemented previously on Windows
c
2019-01-25 19:23:13 +01:00
Mounir IDRASSI
d8d92357b0
Windows crypto: optimize XTS implementation for 64-bit builds using SSE2 thanks to simplification of storage of whitening values in memory (normal order instead of reverse order). 2019-01-25 19:23:03 +01:00
Mounir IDRASSI
d73b8bdf74
Windows: Increment driver version to 1.24.1.1 2019-01-22 09:53:32 +01:00
Mounir IDRASSI
ee0a2659da
Windows driver: remove volumes master keys from CRYPTO_INFO since they are not needed after their key schedule is created 2019-01-21 00:45:31 +01:00
Mounir IDRASSI
27b3fee02d
Windows: remove unused fields from CRYPTO_INFO structure 2019-01-21 00:45:23 +01:00
Mounir IDRASSI
2046347775
Windows: fix editor of EFI configuration file not accepting ENTER key for adding new lines. 2019-01-18 19:02:18 +01:00
Mounir IDRASSI
9eb36ba91f
MacOSX: update info.plist file to set priority at run-time to 64-bit version and to set minimum OSX version to 10.7. 2019-01-18 19:02:09 +01:00
Mounir IDRASSI
202caea3a9
Windows: enhancements to EFI system encryption, like handling of Multi-Boot and better compatibility with Windows Upgrade process. 2019-01-15 15:05:19 +01:00
Mounir IDRASSI
07fd2aa9a5
Update Release Notes and language files for version 1.24-Beta1. Add signed Windows drivers. 2019-01-14 10:49:22 +01:00
Mounir IDRASSI
07f6793bd2
Windows: enhance support of new behavior of favorite service which is now always running in case of system encryption 2019-01-14 10:49:13 +01:00
Mounir IDRASSI
d3e7ed96f3
Windows: Implement feature that enables clearing of encryption keys when a new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade). 2019-01-14 10:49:05 +01:00
Mounir IDRASSI
69cb0bea81
Windows: add a 10 seconds delay between signtool calls to avoid issues caused by antivirus software locking the newly signed files temporarily after they are signed. 2019-01-14 10:48:57 +01:00
Mounir IDRASSI
44b2215a7a
Windows: fix debug packaging script by copying missing driver .inf and .cat files from Release folder. 2019-01-14 10:48:50 +01:00
Mounir IDRASSI
406adce424
Increment version to 1.24-Beta1 2019-01-14 10:48:41 +01:00
Mounir IDRASSI
405883169c
Windows driver: remove newly added volatile qualifier from CRYPT_INFO pointers to fix build issue until a better approach is devised 2019-01-09 00:59:21 +01:00
Mounir IDRASSI
652e989d23
Windows Security: Add new entry point in driver that allows emergency clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected. 2019-01-09 00:30:12 +01:00
Mounir IDRASSI
7c2cf7889f
Windows Driver: erase system encryption keys from memory during shutdown/reboot to help mitigate some cold boot attacks 2019-01-09 00:30:05 +01:00
Mounir IDRASSI
11f0b99846
Windows driver: move newly added field in VOLUME_PROPERTIES_STRUCT to the end for compatibility with previous version. 2019-01-09 00:29:57 +01:00
Mounir IDRASSI
e516330775
Windows: Fix mount option to disable Windows Mount Manager can preserved when mount options dialog opened a second time. 2018-12-24 16:54:10 +01:00
Mounir IDRASSI
21587034d0
Windows: update signing script to use newly issued IDRIX EV code signing certificate. 2018-12-19 23:36:34 +01:00
Mounir IDRASSI
d5b14305e9
Windows: Increment driver version to 1.24.0.1 2018-12-19 14:56:35 +01:00
Mounir IDRASSI
3290ef4f75
Windows Driver: Don't interact with the volume's filesystem if mount manager integration is disabled 2018-12-19 12:41:49 +01:00
Mounir IDRASSI
800f081f1c
Increment version to 1.24-Beta0 2018-12-19 12:41:41 +01:00
Mounir IDRASSI
1967bd862e
Windows: Add mount option that allows mounting a volume without attaching it to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX). 2018-12-19 00:41:37 +01:00
Mounir IDRASSI
6abc59acd2
Windows MBR Bootloader: workaround for issue affecting creation of hidden OS on some SSD drives (Error 128 while writing MBR). This commit replace the 512 bytes write operations by a 4096 bytes write operation. 2018-12-19 00:41:30 +01:00
Mounir IDRASSI
7ef3d5e369
Windows: Enable selection of Quick Format for file containers. Separate Quick Format and Dynamic Volume options. 2018-12-19 00:41:23 +01:00
Mounir IDRASSI
0856b387f1
Windows: Update libzip to version 1.5.1 2018-12-03 00:51:49 +01:00
Mounir IDRASSI
e4e017a2ad
Windows: remove unused variable. 2018-12-03 00:51:42 +01:00
Mounir IDRASSI
a3783ea7b6
Windows: delete existing uninstall shortcut when performing upgrade/reinstall 2018-12-03 00:51:22 +01:00
Mounir IDRASSI
3e1460b618
MBR Bootloader: dynamically determine boot loader memory segment instead of hardcoded values (proposed by neos6464 at https://sourceforge.net/p/veracrypt/tickets/240/) 2018-12-03 00:51:08 +01:00
csware
e0049f601a Do not create uninstall shortcut in startmenu (#381)
Creating such a start menu entry is a leftover of the ancient Win 3.x time where there was no central control panel for removing programs.

Also see the Windows guidelines, where creating an uninstall shortcut is discouraged: https://msdn.microsoft.com/en-us/library/ms954377.aspx

Signed-off-by: Sven Strickroth <email@cs-ware.de>
2018-12-02 06:43:48 +01:00
Mounir IDRASSI
93dbed19c8
Increment version to 1.23-Hotfix-2 2018-10-10 09:32:02 +02:00
Mounir IDRASSI
162d3b5f64
Windows Driver: fix regression that was causing BSOD. 2018-10-10 09:31:41 +02:00
Mounir IDRASSI
0b5dc7910b
Windows Driver: replace system functions RtlUpcaseUnicodeChar/RtlUnalignedStringCchLengthW by our own code for better clarity 2018-10-10 09:31:40 +02:00
Mounir IDRASSI
4fea208958
Windows: zero TC_IOCTL_GET_SYSTEM_DRIVE_CONFIG input/output parameter as it is done for other IOCTLs 2018-10-10 09:31:38 +02:00
Mounir IDRASSI
0b8b50bde9
Increment version to 1.23-Hotfix-1 2018-09-21 10:39:24 +02:00
Mounir IDRASSI
0557cac9cf
Windows: don't use quick format by default when creating file containers using command line and add a switch to enable quick format explicitly in command line 2018-09-21 10:39:10 +02:00
Mounir IDRASSI
081287fc0a
Windows: add /nosizecheck switch to VeraCrypt Format that allows disabling check on file container size against available free space on target disk. This enables to workaround a bug in Microsoft Distributed File System (DFS) that report wrong free disk space (https://support.microsoft.com/en-us/help/177127/incorrect-disk-free-space-information-for-a-dfs-client-share) 2018-09-21 10:39:09 +02:00
Mounir IDRASSI
2455c03e0d
Windows driver: add extra check for data read in TC_IOCTL_OPEN_TEST handling 2018-09-21 10:39:08 +02:00
Mounir IDRASSI
f30f9339c9
Windows: fix low severity vulnerability in driver that allowed reading 3 bytes of kernel stack memory (with a rare possibility of 25 additional bytes). Reported by Tim Harrison. 2018-09-21 10:39:06 +02:00
Mounir IDRASSI
32e2791d4c
Set 1.23 release date to September 12th 2018 2018-09-12 17:45:22 +02:00
Mounir IDRASSI
74600364f2
Set 1.23 release date to September 10th 2018 2018-09-10 00:15:19 +02:00
Mounir IDRASSI
81f6d69261
Increment version to 1.23 2018-09-09 16:15:47 +02:00
Mounir IDRASSI
fda5880f90
Increment version to 1.23-BETA8 and update release notes. 2018-09-03 11:45:19 +02:00
Mounir IDRASSI
2730fa33a2
Windows: fix regression causing VeraCrypt UI to always be displayed upon logon 2018-09-03 11:45:09 +02:00
Mounir IDRASSI
8f47adfff1
Windows: handle case of inconsistencies in EFI system partition content during system encryption wizard caused by older VeraCrypt system encryption not properly uninstalled (e.g. reinstall Windows without decryption first). 2018-09-03 01:00:55 +02:00
Mounir IDRASSI
d3060a97b6
Windows: fix regression when language selected in the setup during fresh install and that caused VeraCrypt background task to be disabled. 2018-09-03 01:00:54 +02:00