Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2024-08-02 | Implement detection of volumes with vulnerable XTS master key. | Mounir IDRASSI | 1 | -0/+5 | |
If vulnerability detected, a warning message is displayed during mount or backup/restore header, and changing the password is disallowed since it will not change the master key. | |||||
2024-06-12 | Avoid conflict with C++17 features std::byte by using uint8 type instead of byte | Mounir IDRASSI | 1 | -108/+108 | |
2023-11-13 | wolfCrypt as crypto backend for VeraCrypt (#1227) | lealem47 | 1 | -7/+10 | |
* wolfCrypt as crypto backend for VeraCrypt * Refactor to use EncryptionModeWolfCryptXTS class | |||||
2023-10-10 | Windows: Fix writing wrong EFI configuration options to registry | Mounir IDRASSI | 1 | -1/+1 | |
2023-09-11 | Windows: replace CoInitialize calls with CoInitializeEx | Mounir IDRASSI | 1 | -1/+1 | |
2023-09-03 | Windows: remove legacy code (XP, Vista). Simplify code since Windows 7 is ↵ | Mounir IDRASSI | 1 | -32/+4 | |
now minimal OS version. | |||||
2023-08-05 | Windows: Fix false positive detection of new device insertion when clear ↵ | Mounir IDRASSI | 1 | -0/+28 | |
keys option is enable When this option is enabled, we first build the list of currently inserted devices then we start listening to insertion events. When a device insertion occurs, we check if this device is on our list and if yes, we ignore its insertion. We also ignore devices whose Device ID starts with "SWD\" and "ROOT\" since these are not real devices. | |||||
2023-07-22 | Windows: Remove TrueCrypt support. Increment version to 1.26.4. | Mounir IDRASSI | 1 | -2/+2 | |
2022-03-21 | Windows: Block upgrade of VeraCrypt is the system is encrypted using ↵ | Mounir IDRASSI | 1 | -0/+28 | |
RIPEMD-160 or GOST89 since they are not supported anymore. | |||||
2022-03-08 | Implement support of Blake2s-256 hash algorithm and remove deprecated ↵ | Mounir IDRASSI | 1 | -11/+7 | |
algorithms RIPEMD-160 and GOST89. | |||||
2021-12-04 | Windows: Implement TESTSIGNING build configuration that allows running under ↵ | Mounir IDRASSI | 1 | -4/+2 | |
Windows Vista,7, 8 and 8.1. | |||||
2021-01-02 | Revert "Windows: Don't check for availability of 32KB of free space for ↵ | Mounir IDRASSI | 1 | -1/+1 | |
bootloader in UEFI boot mode" More work is needed to reduce the 32KB free space requirement without creating regressions. | |||||
2021-01-02 | Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵ | Mounir IDRASSI | 1 | -2/+3 | |
System encryption still not implemented on ARM64 | |||||
2020-12-11 | Windows: Don't check for availability of 32KB of free space for bootloader ↵ | Mounir IDRASSI | 1 | -1/+1 | |
in UEFI boot mode since in this case bootloader will be stored in EFI partition and not in the unallocated space at the beginning of the drive | |||||
2020-08-03 | Windows: Use correct parameters for 2nd call to SetStartExec in ↵ | Mounir IDRASSI | 1 | -1/+1 | |
BootEncryption::InstallBootLoader | |||||
2020-07-22 | Windows: Warn about Fast Startup if it is enabled during system encryption ↵ | Mounir IDRASSI | 1 | -0/+10 | |
or volume creation and propose to disable it | |||||
2020-07-02 | Windows: Don't allow to encrypt the system drive if it is already encrypted ↵ | Mounir IDRASSI | 1 | -0/+6 | |
by BitLocker | |||||
2020-06-28 | Windows: remove unused code targeting Windows 2000. | Mounir IDRASSI | 1 | -4/+1 | |
2019-11-27 | Windows: compatibility with multi-OS boot configuration by only setting ↵ | Mounir IDRASSI | 1 | -2/+21 | |
VeraCrypt as first bootloader of the system if the current first bootloader is Windows one. | |||||
2019-11-27 | Windows: Don't restore MBR to VeraCrypt value if it is coming from a loader ↵ | Mounir IDRASSI | 1 | -2/+25 | |
different from us or different from Microsoft one. | |||||
2019-11-22 | Windows: Add new registry flags for SystemFavoritesService to control ↵ | Mounir IDRASSI | 1 | -19/+31 | |
updating of EFI BIOS boot menu on shutdown. This will help better manage multi-boot scenarios where we should not mess up with boot order (e.g. grub2 case) | |||||
2019-10-27 | Windows: fix failure to create rescue and thus to encrypt the system if the ↵ | Mounir IDRASSI | 1 | -6/+13 | |
Windows username contains a UNICODE non-ASCII character (cf https://github.com/veracrypt/VeraCrypt/issues/441) | |||||
2019-10-27 | Windows: code refactoring and convert NTSTATUS error code to WIN32 ↵ | Mounir IDRASSI | 1 | -38/+21 | |
equivalent before displaying error message. | |||||
2019-10-27 | Windows: Make EFI System Encryption PostOOBE code more robust to failure to ↵ | Mounir IDRASSI | 1 | -90/+101 | |
access "\\\\?\\GLOBALROOT" disk namespace | |||||
2019-10-27 | Windows: Update EFI NVRAM variable only if changed or doesn't exist and add ↵ | Mounir IDRASSI | 1 | -9/+19 | |
configuration to force setting EFI BootNext to veraCrypt bootloader before each shutdown | |||||
2019-10-26 | Windows: Restore veraCrypt boot meny entry for system encryption more often, ↵ | Mounir IDRASSI | 1 | -7/+16 | |
especially during PostOOBE calls, and handle additional corner cases. | |||||
2019-10-25 | Windows: Fix test of GetPrivateProfileString output since this function ↵ | Mounir IDRASSI | 1 | -1/+1 | |
discards double quotation marks | |||||
2019-10-25 | Windows: only update MBR first 512 bytes if they have changed and don't ↵ | Mounir IDRASSI | 1 | -30/+45 | |
update full MBR bootload in case of PostOOBE | |||||
2019-10-25 | Windows: Avoid unnecessarily update of system encryption SetupConfig related ↵ | Mounir IDRASSI | 1 | -4/+53 | |
files if there content didn't change | |||||
2019-10-20 | Windows: Avoid unnecessary write operations when copying/modifying EFI ↵ | Mounir IDRASSI | 1 | -6/+124 | |
bootloader files in order to avoid leaking modification timestamp | |||||
2019-10-20 | Windows: add more checks to correctly identify Microsoft original bootloader. | Mounir IDRASSI | 1 | -3/+24 | |
2019-10-20 | Windows: Add checks that the System Favorites service is running. Warn user ↵ | Mounir IDRASSI | 1 | -1/+39 | |
if he enabled option to clear RAM encryption keys and the service is stopped. | |||||
2019-10-18 | Windows: handle case of DcsProp configuration file for EFI system encryption ↵ | Mounir IDRASSI | 1 | -30/+91 | |
contains wrong "ActionSuccess" entry that points towards bootmgfw.efi which is now our bootloader and not Microsoft one. | |||||
2019-10-14 | Windows: Fix regression that causes system favorites not to mount if ↵ | Mounir IDRASSI | 1 | -1/+9 | |
VeraCrypt 1.24 is freshly installed and not updated. | |||||
2019-01-26 | Windows: Add a build configuration containing EFI bootloader signed with ↵ | Mounir IDRASSI | 1 | -1/+4 | |
custom SecureBoot key instead | |||||
2019-01-15 | Windows: enhancements to EFI system encryption, like handling of Multi-Boot ↵ | Mounir IDRASSI | 1 | -38/+71 | |
and better compatibility with Windows Upgrade process. | |||||
2019-01-14 | Windows: enhance support of new behavior of favorite service which is now ↵ | Mounir IDRASSI | 1 | -5/+6 | |
always running in case of system encryption | |||||
2019-01-14 | Windows: Implement feature that enables clearing of encryption keys when a ↵ | Mounir IDRASSI | 1 | -51/+23 | |
new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade). | |||||
2018-10-10 | Windows: zero TC_IOCTL_GET_SYSTEM_DRIVE_CONFIG input/output parameter as it ↵ | Mounir IDRASSI | 1 | -0/+2 | |
is done for other IOCTLs | |||||
2018-09-03 | Windows: handle case of inconsistencies in EFI system partition content ↵ | Mounir IDRASSI | 1 | -5/+32 | |
during system encryption wizard caused by older VeraCrypt system encryption not properly uninstalled (e.g. reinstall Windows without decryption first). | |||||
2018-09-03 | Windows: add define to support case of using EFI bootloader signed by ↵ | Mounir IDRASSI | 1 | -3/+24 | |
Microsoft (no check on custom keys in BIOS + removal of DcsBml EFI driver since it can not be signed). | |||||
2018-08-15 | Windows: Add various checks and replace STL code after Coverity report | Mounir IDRASSI | 1 | -1/+1 | |
2018-08-06 | Windows: Fix hidden OS boot after upgrade to version 1.23 by explicitly ↵ | Mounir IDRASSI | 1 | -3/+2 | |
specifying the new name for the bootloader to launch after password validation. | |||||
2018-05-03 | Windows: Support machines without "EFI\Boot" folder for EFI system ↵ | Mounir IDRASSI | 1 | -70/+105 | |
encryption (e.g. Windows LTSB). Compatibility enhancements for EFI system encryption. | |||||
2018-04-23 | Windows: Don't start EFI system encryption process if SecureBoot is enabled ↵ | Mounir IDRASSI | 1 | -5/+290 | |
and VeraCrypt-DCS custom keys were not loaded in the machine firmware. | |||||
2018-04-23 | Windows: Fix system encryption issues on machines that always force booting ↵ | Mounir IDRASSI | 1 | -6/+128 | |
on Microsoft bootloader (e.g. HP). | |||||
2018-04-23 | Windows: enhance ReflectDrivers mechanism by persisting it across major ↵ | Mounir IDRASSI | 1 | -3/+32 | |
Windows upgrades. | |||||
2018-04-23 | Windows: code refactoring | Mounir IDRASSI | 1 | -15/+10 | |
2018-04-23 | Windows: remove ending backslash from installation path written to ↵ | Mounir IDRASSI | 1 | -0/+7 | |
SetupConfig.ini | |||||
2018-04-23 | Windows: implement compatibility for Windows 10 major updates using ↵ | Mounir IDRASSI | 1 | -0/+59 | |
ReflectDrivers mechanism whose support started from Windows 10 version 1607. |