Ettore Atalan
|
7c28ae7e45
|
Fix spelling mistake in German translation (#452)
|
2019-06-06 11:40:32 +02:00 |
|
Dany Shaanan
|
1973fd6d26
|
Fix password-only example in help text (pim missing) (#438)
|
2019-06-06 11:39:52 +02:00 |
|
Mounir IDRASSI
|
08a8a0ce30
|
Linux: Fix compilation error caused by wrong include of "intrin.h"
|
2019-03-21 18:52:14 +01:00 |
|
Mounir IDRASSI
|
69df92c81d
|
Increment version to 1.24-Beta5
|
2019-03-09 08:04:04 +01:00 |
|
Mounir IDRASSI
|
1bd3a6cc70
|
Windows Driver: fix BSOD when mounting outer volume with hidden volume protection if RAM encryption is enabled
|
2019-03-09 08:03:57 +01:00 |
|
Mounir IDRASSI
|
d6ce1db2a8
|
Increment version to 1.24-Beta4 and update release notes to clarify that password length increase applies only to non-system volumes.
|
2019-03-09 08:03:51 +01:00 |
|
Mounir IDRASSI
|
76c03c23a1
|
Windows: inform user that RAM encryption setting requires reboot to take effect
|
2019-03-08 01:03:04 +01:00 |
|
Mounir IDRASSI
|
f780011a86
|
Windows Driver: fix BSOD when mounting hidden volume if RAM encryption is enabled
|
2019-03-08 01:02:57 +01:00 |
|
Ettore Atalan
|
9a76ecfc55
|
Update german translation (#433)
Translated recently added strings.
|
2019-03-08 00:58:35 +01:00 |
|
Mounir IDRASSI
|
7f394d0a08
|
XML Language files: update Chinese translation
|
2019-03-04 23:49:11 +01:00 |
|
Mounir IDRASSI
|
08f09861e1
|
Language Files: update polish translation
|
2019-03-04 23:49:04 +01:00 |
|
Mounir IDRASSI
|
7701dfde07
|
Windows: Update signed drivers for 1.24-Beta3
|
2019-03-04 00:55:10 +01:00 |
|
Mounir IDRASSI
|
5c934d8122
|
Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt driver
|
2019-03-03 23:48:49 +01:00 |
|
Mounir IDRASSI
|
6d2cef1fd8
|
Fix formatting of credits in About dialog and documentation
|
2019-03-03 23:48:42 +01:00 |
|
Mounir IDRASSI
|
c7b23530f9
|
Windows: Add missing UI string to XML language files.
|
2019-03-03 23:48:35 +01:00 |
|
Mounir IDRASSI
|
8e39877054
|
Increment version to 1.24-Beta3. Update Release Notes.
|
2019-03-03 23:48:28 +01:00 |
|
Mounir IDRASSI
|
f6274642f0
|
Windows: Update documentation for command line usage
|
2019-03-03 23:48:20 +01:00 |
|
Mounir IDRASSI
|
2117490500
|
Windows: Add documentation for new switch (/m noattach)
|
2019-03-03 23:48:13 +01:00 |
|
Mounir IDRASSI
|
28b8bf5222
|
Windows: Add command line switch (/m noattach) that is equivalent to UI option "Only create virtual device without mounting on selected drive letter"
|
2019-03-03 23:48:06 +01:00 |
|
Mounir IDRASSI
|
d92e045b8d
|
Windows: replicate old behavior when handling passwords in UI when legacy password maximum length option selected
|
2019-03-03 23:47:58 +01:00 |
|
Mounir IDRASSI
|
453ef927ef
|
Windows: Add option to use legacy maximum password length (64 characters) instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt.
|
2019-03-03 00:20:49 +01:00 |
|
Mounir IDRASSI
|
ea88c6175c
|
Windows: fix compilation error
|
2019-03-02 14:50:22 +01:00 |
|
Mounir IDRASSI
|
f7bc58b38f
|
Windows: mitigate some memory attacks by making VeraCrypt applications memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code (https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150)
|
2019-03-02 14:45:38 +01:00 |
|
Mounir IDRASSI
|
321715202a
|
Windows: Generalize RAM encryption for keys to VeraCrypt binaries, especially Format and Expander
|
2019-03-02 10:23:39 +01:00 |
|
Mounir IDRASSI
|
edd1b00126
|
Windows Driver: Enable RAM encryption only after its security parameters were created
|
2019-03-01 00:35:54 +01:00 |
|
Mounir IDRASSI
|
3d6032d69e
|
Windows: better debug messages for VcProtectKeys and VcUnprotectKeys functions
|
2019-03-01 00:35:47 +01:00 |
|
Mounir IDRASSI
|
954bfd45d0
|
Windows Driver: Implement RAM encryption for cached passwords
|
2019-03-01 00:35:40 +01:00 |
|
Mounir IDRASSI
|
ae5eb73f93
|
Windows driver: call VcProtectKeys only when RAM encryption enabled although this function does nothing when RAM encryption is disabled.
|
2019-03-01 00:35:33 +01:00 |
|
Mounir IDRASSI
|
0391b8e550
|
Windows: Add some logs in functions for RAM encryption
|
2019-03-01 00:35:27 +01:00 |
|
Mounir IDRASSI
|
8d7a318795
|
Windows: use specific order for EFI boot arguments memory regions that matches the one used by EFI bootloader.
|
2019-03-01 00:35:20 +01:00 |
|
Mounir IDRASSI
|
cf48b532b4
|
Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
|
2019-03-01 00:35:13 +01:00 |
|
Mounir IDRASSI
|
29b749bdd9
|
Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it in Mount.c
|
2019-02-15 00:17:11 +01:00 |
|
Mounir IDRASSI
|
adf97533d3
|
Windows: Set CpuRngDisabled variable to TRUE for clarity even if it will be set to TRUE anyway by default through EnableCpuRng calls
|
2019-02-15 00:17:03 +01:00 |
|
Mounir IDRASSI
|
863a3a07b8
|
XML Language files: update Chinese translation
|
2019-02-15 00:16:53 +01:00 |
|
Mounir IDRASSI
|
1b76823ea5
|
Add copyright and license information of JitterEntropy library by Stephan Mueller
|
2019-02-12 19:06:22 +01:00 |
|
Mounir IDRASSI
|
86f0fde6e7
|
Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de)
|
2019-02-12 19:06:14 +01:00 |
|
Mounir IDRASSI
|
a5943c07fb
|
Language XML files: update Czech translation (contributed by Lagardere)
|
2019-02-12 19:06:04 +01:00 |
|
Mounir IDRASSI
|
fc72eb04f5
|
Add missing string from Estonian language file.
|
2019-02-12 19:05:57 +01:00 |
|
Mounir IDRASSI
|
2061b4c28c
|
Windows: Ensure that only one thread at a time can create a secure desktop
|
2019-02-10 22:54:45 +01:00 |
|
Mounir IDRASSI
|
3903fcc595
|
Windows: Avoid simultaneous calls of favorites mounting, for example if corresponding hotkey is pressed multiple times.
|
2019-02-10 22:54:37 +01:00 |
|
Mounir IDRASSI
|
97ccbaf0a3
|
Fix typo in CPU RNG detection condition (Github issue #417)
|
2019-02-10 17:28:38 +01:00 |
|
Mounir IDRASSI
|
2bb1fdf232
|
XML Language files: update Chinese translation
|
2019-02-10 17:24:00 +01:00 |
|
Ettore Atalan
|
cbfd9ba1d1
|
Update german translation (#416)
Translate newly added string.
|
2019-02-10 17:20:57 +01:00 |
|
Mounir IDRASSI
|
ba5da0946c
|
Windows: Add implementation of ChaCha20 based random generator. Use it for driver need of random bytes (currently only wipe bytes but more to come later).
|
2019-02-08 01:50:12 +01:00 |
|
Mounir IDRASSI
|
e5b9cee868
|
Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy which is now disabled by default
|
2019-02-08 01:50:03 +01:00 |
|
Mounir IDRASSI
|
6bb1f24ed5
|
Automatically truncate passwords for TrueCrypt volumes and System Encryption to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version.
|
2019-02-04 11:39:47 +01:00 |
|
Mounir IDRASSI
|
5d3278bcf2
|
Update Release Notes and other files for 1.24-Beta2 release
|
2019-02-01 13:02:01 +01:00 |
|
Mounir IDRASSI
|
0b8e768721
|
Windows: Add latest 1.24 EFI bootloader files that are signed by Microsoft that come with several enhancements and fixes especially for Rescue Disk: - Implement better timeout mechanism for password input. Implement new actions "shutdown" and "reboot". Set default timeout value to 3 minutes and default timeout action to "shutdown" - Enhance Rescue Disk implementation of restoring VeraCrypt loader. - Fix ESC on password prompt during Pre-Test not starting Windows - Add menu entry in Rescue Disk that enables starting original Windows loader
|
2019-02-01 00:36:28 +01:00 |
|
Mounir IDRASSI
|
5571a8ba6b
|
Windows driver: better randomness for wipe bytes by always using Whirlpool hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available.
|
2019-02-01 00:36:19 +01:00 |
|
Mounir IDRASSI
|
61c1baa4bf
|
Windows: use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available
|
2019-02-01 00:35:50 +01:00 |
|