Mounir IDRASSI
|
cf48b532b4
|
Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
|
2019-03-01 00:35:13 +01:00 |
|
Mounir IDRASSI
|
29b749bdd9
|
Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it in Mount.c
|
2019-02-15 00:17:11 +01:00 |
|
Mounir IDRASSI
|
adf97533d3
|
Windows: Set CpuRngDisabled variable to TRUE for clarity even if it will be set to TRUE anyway by default through EnableCpuRng calls
|
2019-02-15 00:17:03 +01:00 |
|
Mounir IDRASSI
|
863a3a07b8
|
XML Language files: update Chinese translation
|
2019-02-15 00:16:53 +01:00 |
|
Mounir IDRASSI
|
1b76823ea5
|
Add copyright and license information of JitterEntropy library by Stephan Mueller
|
2019-02-12 19:06:22 +01:00 |
|
Mounir IDRASSI
|
86f0fde6e7
|
Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de)
|
2019-02-12 19:06:14 +01:00 |
|
Mounir IDRASSI
|
a5943c07fb
|
Language XML files: update Czech translation (contributed by Lagardere)
|
2019-02-12 19:06:04 +01:00 |
|
Mounir IDRASSI
|
fc72eb04f5
|
Add missing string from Estonian language file.
|
2019-02-12 19:05:57 +01:00 |
|
Mounir IDRASSI
|
2061b4c28c
|
Windows: Ensure that only one thread at a time can create a secure desktop
|
2019-02-10 22:54:45 +01:00 |
|
Mounir IDRASSI
|
3903fcc595
|
Windows: Avoid simultaneous calls of favorites mounting, for example if corresponding hotkey is pressed multiple times.
|
2019-02-10 22:54:37 +01:00 |
|
Mounir IDRASSI
|
97ccbaf0a3
|
Fix typo in CPU RNG detection condition (Github issue #417)
|
2019-02-10 17:28:38 +01:00 |
|
Mounir IDRASSI
|
2bb1fdf232
|
XML Language files: update Chinese translation
|
2019-02-10 17:24:00 +01:00 |
|
Ettore Atalan
|
cbfd9ba1d1
|
Update german translation (#416)
Translate newly added string.
|
2019-02-10 17:20:57 +01:00 |
|
Mounir IDRASSI
|
ba5da0946c
|
Windows: Add implementation of ChaCha20 based random generator. Use it for driver need of random bytes (currently only wipe bytes but more to come later).
|
2019-02-08 01:50:12 +01:00 |
|
Mounir IDRASSI
|
e5b9cee868
|
Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy which is now disabled by default
|
2019-02-08 01:50:03 +01:00 |
|
Mounir IDRASSI
|
6bb1f24ed5
|
Automatically truncate passwords for TrueCrypt volumes and System Encryption to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version.
|
2019-02-04 11:39:47 +01:00 |
|
Mounir IDRASSI
|
5d3278bcf2
|
Update Release Notes and other files for 1.24-Beta2 release
|
2019-02-01 13:02:01 +01:00 |
|
Mounir IDRASSI
|
0b8e768721
|
Windows: Add latest 1.24 EFI bootloader files that are signed by Microsoft that come with several enhancements and fixes especially for Rescue Disk: - Implement better timeout mechanism for password input. Implement new actions "shutdown" and "reboot". Set default timeout value to 3 minutes and default timeout action to "shutdown" - Enhance Rescue Disk implementation of restoring VeraCrypt loader. - Fix ESC on password prompt during Pre-Test not starting Windows - Add menu entry in Rescue Disk that enables starting original Windows loader
|
2019-02-01 00:36:28 +01:00 |
|
Mounir IDRASSI
|
5571a8ba6b
|
Windows driver: better randomness for wipe bytes by always using Whirlpool hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available.
|
2019-02-01 00:36:19 +01:00 |
|
Mounir IDRASSI
|
61c1baa4bf
|
Windows: use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available
|
2019-02-01 00:35:50 +01:00 |
|
Mounir IDRASSI
|
915855f43b
|
Fix detection of CPU features AVX2 & BMI2. Add detection of RDRAND & RDSEED CPU features. Detect Hygon CPU as AMD one.
|
2019-02-01 00:35:42 +01:00 |
|
Mounir IDRASSI
|
3c18d54d1e
|
Windows driver: replace SHA512 by RIPEMD160 when calculating internal hash of master key to avoid calling KeSaveFloatingPointState/KeSaveExtendedProcessorState since SHA512 implementation uses SSE2/AVX and RIPEMD160 is pure C
|
2019-02-01 00:35:33 +01:00 |
|
Mounir IDRASSI
|
f02882ce60
|
Help compiler optimize some crypto code on 64-bit build since x64 capable CPUs always support SSE and SSE2
|
2019-01-30 00:46:10 +01:00 |
|
Mounir IDRASSI
|
b294cc2e1c
|
Increment version to 1.24-Beta2
|
2019-01-28 17:16:41 +01:00 |
|
Mounir IDRASSI
|
cdd1179c63
|
Increase password maximum length to 128 bytes from 64 bytes
|
2019-01-28 17:16:33 +01:00 |
|
Mounir IDRASSI
|
54e46c260c
|
Windows Driver: force the input size for some IOCTLs to have a fixed value
|
2019-01-28 17:16:23 +01:00 |
|
Mounir IDRASSI
|
a20b3083b0
|
Windows: Add a build configuration containing EFI bootloader signed with custom SecureBoot key instead
|
2019-01-26 01:20:51 +01:00 |
|
Mounir IDRASSI
|
7b95b375a0
|
Windows: fix building MBR bootloader following modification of Xts.c
|
2019-01-26 01:20:43 +01:00 |
|
Mounir IDRASSI
|
ce0a34941a
|
Linux/MacOSX crypto: report XTS optimization implemented previously on Windows
c
|
2019-01-25 19:23:13 +01:00 |
|
Mounir IDRASSI
|
d8d92357b0
|
Windows crypto: optimize XTS implementation for 64-bit builds using SSE2 thanks to simplification of storage of whitening values in memory (normal order instead of reverse order).
|
2019-01-25 19:23:03 +01:00 |
|
Mounir IDRASSI
|
f3a98fda03
|
Update release notes for 1.24-Beta1
|
2019-01-22 12:55:32 +01:00 |
|
Ettore Atalan
|
6084c5606a
|
Update german translation (#403)
Translated all newly added strings.
|
2019-01-22 09:55:40 +01:00 |
|
Mounir IDRASSI
|
d73b8bdf74
|
Windows: Increment driver version to 1.24.1.1
|
2019-01-22 09:53:32 +01:00 |
|
Mounir IDRASSI
|
ee0a2659da
|
Windows driver: remove volumes master keys from CRYPTO_INFO since they are not needed after their key schedule is created
|
2019-01-21 00:45:31 +01:00 |
|
Mounir IDRASSI
|
27b3fee02d
|
Windows: remove unused fields from CRYPTO_INFO structure
|
2019-01-21 00:45:23 +01:00 |
|
Mounir IDRASSI
|
2046347775
|
Windows: fix editor of EFI configuration file not accepting ENTER key for adding new lines.
|
2019-01-18 19:02:18 +01:00 |
|
Mounir IDRASSI
|
9eb36ba91f
|
MacOSX: update info.plist file to set priority at run-time to 64-bit version and to set minimum OSX version to 10.7.
|
2019-01-18 19:02:09 +01:00 |
|
Mounir IDRASSI
|
4155e912ee
|
XML Language files: update Chinese translation
|
2019-01-15 20:38:14 +01:00 |
|
Mounir IDRASSI
|
202caea3a9
|
Windows: enhancements to EFI system encryption, like handling of Multi-Boot and better compatibility with Windows Upgrade process.
|
2019-01-15 15:05:19 +01:00 |
|
Mounir IDRASSI
|
07fd2aa9a5
|
Update Release Notes and language files for version 1.24-Beta1. Add signed Windows drivers.
|
2019-01-14 10:49:22 +01:00 |
|
Mounir IDRASSI
|
07f6793bd2
|
Windows: enhance support of new behavior of favorite service which is now always running in case of system encryption
|
2019-01-14 10:49:13 +01:00 |
|
Mounir IDRASSI
|
d3e7ed96f3
|
Windows: Implement feature that enables clearing of encryption keys when a new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade).
|
2019-01-14 10:49:05 +01:00 |
|
Mounir IDRASSI
|
69cb0bea81
|
Windows: add a 10 seconds delay between signtool calls to avoid issues caused by antivirus software locking the newly signed files temporarily after they are signed.
|
2019-01-14 10:48:57 +01:00 |
|
Mounir IDRASSI
|
44b2215a7a
|
Windows: fix debug packaging script by copying missing driver .inf and .cat files from Release folder.
|
2019-01-14 10:48:50 +01:00 |
|
Mounir IDRASSI
|
406adce424
|
Increment version to 1.24-Beta1
|
2019-01-14 10:48:41 +01:00 |
|
Mounir IDRASSI
|
405883169c
|
Windows driver: remove newly added volatile qualifier from CRYPT_INFO pointers to fix build issue until a better approach is devised
|
2019-01-09 00:59:21 +01:00 |
|
Mounir IDRASSI
|
652e989d23
|
Windows Security: Add new entry point in driver that allows emergency clearing of all encryption keys from memory. This entry point requires administrative privileges and it will caused BSDO when system encryption is active. It can be useful for example to applications that monitors physical access to the machine and which need to erase sensitive key material from RAM when unauthorized access is detected.
|
2019-01-09 00:30:12 +01:00 |
|
Mounir IDRASSI
|
7c2cf7889f
|
Windows Driver: erase system encryption keys from memory during shutdown/reboot to help mitigate some cold boot attacks
|
2019-01-09 00:30:05 +01:00 |
|
Mounir IDRASSI
|
11f0b99846
|
Windows driver: move newly added field in VOLUME_PROPERTIES_STRUCT to the end for compatibility with previous version.
|
2019-01-09 00:29:57 +01:00 |
|
Mounir IDRASSI
|
2e2d3e9596
|
XML Language files: update Chinese translation
|
2018-12-24 17:09:35 +01:00 |
|