VeraCrypt 1.21

Milestone information

Project:
VeraCrypt
Series:
trunk
Version:
1.21
Released:
 
Registrant:
Mounir IDRASSI
Release registered:
Active:
No. Drivers cannot target bugs and blueprints to this milestone.  

Download RDF metadata

Activities

Assigned to you:
No blueprints or bugs assigned to you.
Assignees:
No users assigned to blueprints and bugs.
Blueprints:
No blueprints are targeted to this milestone.
Bugs:
No bugs are targeted to this milestone.

Download files for this release

After you've downloaded a file, you can verify its authenticity using its MD5 sum or signature. (How do I verify a download?)

File Description Downloads
download icon veracrypt-1.21-raspbian-setup.tar.bz2 (md5, sig) VeraCrypt 1.21 installer for Raspbian (Raspberry Pi ARMv7) 21,204
last downloaded 2 days ago
download icon VeraCrypt_1.21_Bundle.7z.checksums (md5) SHA256/SHA512 sums of VeraCrypt 1.21 Bundle 4,104
last downloaded 31 weeks ago
download icon VeraCrypt_1.21_Bundle.7z (md5, sig) VeraCrypt 1.21 Bundle (All files and their signatures) 12,841
last downloaded 20 weeks ago
download icon VeraCrypt_1.21_Windows_Symbols.zip (md5, sig) VeraCrypt 1.21 Debug Symbols for Windows 181
last downloaded 2 weeks ago
download icon VeraCrypt Setup 1.21.exe (md5, sig) VeraCrypt Windows Setup 1.21 865,584
last downloaded 24 hours ago
download icon VeraCrypt_1.21.dmg (md5, sig) VeraCrypt MacOSX Setup 1.21 101,797
last downloaded 6 days ago
download icon veracrypt-1.21-freebsd-setup.tar.bz2 (md5, sig) VeraCrypt FreeBSD Setup 1.21 4,782
last downloaded 9 days ago
download icon veracrypt-1.21-setup.tar.bz2 (md5, sig) VeraCrypt Linux Setup 1.21 189,506
last downloaded 8 days ago
download icon VeraCrypt User Guide.chm (md5, sig) VeraCrypt 1.21 user Guide 24,273
last downloaded today
download icon VeraCrypt_1.21_Source.zip (md5, sig) VeraCrypt 1.21 Source (Windows Format) 15,285
last downloaded 15 weeks ago
download icon VeraCrypt_1.21_Source.tar.bz2 (md5, sig) VeraCrypt 1.21 Source (UNIX Format) 7,480
last downloaded 15 weeks ago
download icon README.TXT (md5) VeraCrypt 1.21 Readme 14,574
last downloaded 31 weeks ago
download icon veracrypt-1.21-sha512sum.txt (md5) SHA512 sums for VeraCrypt 1.21 release files 9,776
last downloaded 31 weeks ago
download icon veracrypt-1.21-sha256sum.txt (md5) SHA256 sums for VeraCrypt 1.21 release files 14,184
last downloaded 9 days ago
download icon VeraCrypt-DCS-EFI-LGPL_1.21_Source.zip (md5, sig) VeraCrypt DCS EFI Bootloader 1.21 Source (LGPL) 3,220
last downloaded 30 weeks ago
Total downloads: 1,288,791

Release notes 

This release does not have release notes.

Changelog 

View the full changelog

Changes between 1.20 and 1.21 (9 July 2017) :
  - All OSes:
     * Fix 1.20 regression crash when running on CPU not supporting extended features.
  Windows:
     * Fix 1.20 regression that caused PIM value stored in favorites to be ignored during mount.
  * Fix 1.20 regression that causes system favorites not to mount in some cases.
     * Fix some cases of "Parameter Incorrect" error during EFI system encryption wizard.
  * Install PDF documents related to EFI system encryption configuration for advanced users;
    - disk_encryption_v1_2.pdf related to EFI hidden OS and full fisk encryption
    - dcs_tpm_owner_02.pdf related to TPM configuration for EFI system encryption.
  FreeBSD:
     * Add support for building on FreeBSD.

Changes between 1.19 and 1.20 (29 June 2017) :

  - All OSes:
     * Use 64-bit optimized assembly implementation of Twofish and Camellia by Jussi Kivilinna.
       - Camellia 2.5 faster when AES-NI supported by CPU. 30% faster without it.
     * Use optimized implementation for SHA-512/SHA256.
       - 33% speedup on 64-bit systems.
     * Deploy local HTML documentation instead of User Guide PDF.
     * Change links in UI from ones on Codeplex to ones hosted at veracrypt.fr
     * Security: build binaries with support for Address Space Layout Randomization (ASLR).

  - Windows:
     * Several fixes and modifications for EFI System Encryption:
       - Fix bug in decryption using EFI Rescue Disk
    - Add support for TPM 1.2 and TPM 2.0 (experimental) through DCS low level configuration.
      - https://dc5.sourceforge.io/docs/dcs_tpm_owner_02.pdf
    - Add Support for EFI full disk encryption and hidden OS using manual procedure (not exposed in UI).
      - https://dc5.sourceforge.io/docs/disk_encryption_v1_2.pdf
     * Enable using Secure Desktop for password entry. Add preferences option and
       command line switch (/secureDesktop) to activate it.
     * Use default mount parameters when mounting multiple favorites with password caching.
     * Enable specifying PRF and TrueCryptMode for favorites.
     * Preliminary driver changes to support EFI hidden OS functionality.
     * Fix Streebog not recognized by /hash command line.
     * Add support for ReFS filesystem on Windows 10 when creating normal volumes
     * Fix high CPU usage when favorite configured to mount with VolumeID on arrival.
     * Use CHM file for User Guide instead of PDF.
     * Fix false warning in case of EFI system encryption about Windows not installed on boot drive.
     * Enhancements to driver handling of various disk IOCTL.
     * Enhancements to EFI bootloader. Add possibility to manually edit EFI configuration file.
     * Driver Security: Use enhanced protection of NX pool under Windows 8 and later.
     * Reduce performance impact of internal check for disconnected network drives.
     * Minor fixes.

  - MacOSX:
     * OSX 10.7 or newer is required to run VeraCrypt.
     * Make VeraCrypt default handler of .hc & .tc files.
     * Add custom VeraCrypt icon to .hc and .tc files in Finder.
     * Check TrueCryptMode in password dialog when opening container file with .tc extension.

  - Linux:
     * Check TrueCryptMode in password dialog when opening container file with .tc extension.
     * Fix executable stack in resulting binary which was caused by crypto assembly files missing the GNU-stack note.

0 blueprints and 0 bugs targeted

There are no feature specifications or bug tasks targeted to this milestone. The project's maintainer, driver, or bug supervisor can target specifications and bug tasks to this milestone to track the things that are expected to be completed for the release.

This milestone contains Public information
Everyone can see this information.