Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2020-08-03 | Windows: Fix issue in UI for configuration autofix mechanism of bootloader | Mounir IDRASSI | 1 | -0/+10 | |
2020-08-02 | Windows: use fix for CVE-2019-19501 only if standard Windows Shell is ↵ | Mounir IDRASSI | 1 | -2/+4 | |
running since we rely on it for the implementation of the fix. If Windows Shell has been modified or is not running, then we can't really protect the user is such non standard environment | |||||
2020-07-29 | Windows: Don't use HRESULT macros SUCCEEDED to check if WinVerifyTrust ↵ | Mounir IDRASSI | 1 | -1/+1 | |
succeeded. Instead, check the return value for equality to zero. | |||||
2020-07-22 | Windows: Add possibility to sign binaries using SHA256 only. This fixes ↵ | Mounir IDRASSI | 1 | -1/+13 | |
Windows Smart Screen warning when launching installer | |||||
2020-07-21 | Windows: Implement detection of Hibernate and Fast Startup and disable them ↵ | Mounir IDRASSI | 1 | -0/+73 | |
if RAM encryption is activated. | |||||
2020-07-06 | Windows: Support direct password drag-n-drop from external applications ↵ | Mounir IDRASSI | 1 | -0/+422 | |
(e.g. KeePass) which is more secure than using clipboard. | |||||
2020-07-02 | Windows: Don't allow to encrypt the system drive if it is already encrypted ↵ | Mounir IDRASSI | 1 | -0/+102 | |
by BitLocker | |||||
2020-07-02 | Windows: Replace GetSystemInfo calls by more reliable function to get number ↵ | Mounir IDRASSI | 1 | -9/+6 | |
of CPUs active on the PC. | |||||
2020-06-28 | Windows: remove unused code targeting Windows 2000. | Mounir IDRASSI | 1 | -6/+0 | |
2020-06-26 | Windows: fix warning reported by static code analyzed by adding copy ↵ | Mounir IDRASSI | 1 | -4/+8 | |
constructor to _TEXT_EDIT_DIALOG_PARAM and = operator to HostDevice | |||||
2020-06-21 | Windows: call VcProtectKeys in benchmark warm-up when RAM encryption is ↵ | Mounir IDRASSI | 1 | -0/+4 | |
enabled in order to be follow the same execution path as the result of benchmark calculations. | |||||
2020-06-19 | Windows: Fix wrong results in benchmark of encryption algorithms when RAM ↵ | Mounir IDRASSI | 1 | -0/+5 | |
encryption is enabled | |||||
2020-06-19 | Windows: remove duplicated function to detect AES-NI support in CPU | Mounir IDRASSI | 1 | -1/+1 | |
2020-06-12 | Windows: Update IDRIX SHA-1 code signing certificate to latest one. | Mounir IDRASSI | 1 | -6/+6 | |
2020-06-11 | Switch from auto_ptr to unique_ptr (#638) | Christopher Bergqvist | 1 | -1/+1 | |
2020-03-10 | Update copyright year in creditsVeraCrypt_1.24-Update5 | Mounir IDRASSI | 1 | -3/+3 | |
2020-03-10 | Windows: Fix compilation error caused by previous keyfile commit | Mounir IDRASSI | 1 | -0/+2 | |
2020-03-10 | Windows: Fix keyfiles path passed as CLI argument and set as default not ↵ | Mounir IDRASSI | 1 | -1/+3 | |
always cleared from RAM when VeraCrypt exits | |||||
2020-02-10 | Windows: Fix warnings reported by Coverity static code analyzer | Mounir IDRASSI | 1 | -4/+7 | |
2020-01-22 | Windows: use fix for CVE-2019-19501 only when process elevated otherwise it ↵ | Mounir IDRASSI | 1 | -1/+22 | |
will not add any benefit compared to standard ShellExecute while at the same time potentially causing issue when opening links. | |||||
2020-01-21 | Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵ | Mounir IDRASSI | 1 | -3/+1 | |
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536 | |||||
2019-12-13 | Windows: check "TrueCrypt Mode" in password dialog when mounting a file ↵ | Mounir IDRASSI | 1 | -0/+9 | |
container with .tc extension | |||||
2019-12-08 | Windows: use fix for CVE-2019-19501 only on Vista and above since it doesn't ↵ | Mounir IDRASSI | 1 | -1/+2 | |
make sens under XP. | |||||
2019-12-08 | Windows: enhancements to the mechanism preserving file timestamps, ↵ | Mounir IDRASSI | 1 | -3/+8 | |
especially for keyfiles. | |||||
2019-12-05 | Windows: Modify memory process protection when running with admin privileges ↵ | Mounir IDRASSI | 1 | -1/+12 | |
to allow calling functions needed for CVE-2019-19501 fix while still protecting against memory access by non-admin processes. | |||||
2019-12-05 | Windows: Enhancement to the fix for CVE-2019-19501 | Mounir IDRASSI | 1 | -3/+6 | |
2019-12-03 | Windows: Fix possible local privilege escalation vulnerability during ↵ | Mounir IDRASSI | 1 | -21/+230 | |
execution of VeraCrypt Expander (CVE-2019-19501) | |||||
2019-11-27 | Windows: compatibility with multi-OS boot configuration by only setting ↵ | Mounir IDRASSI | 1 | -7/+15 | |
VeraCrypt as first bootloader of the system if the current first bootloader is Windows one. | |||||
2019-11-04 | Windows: Display error message when password is too long and legacy maximum ↵ | Mounir IDRASSI | 1 | -1/+1 | |
length used | |||||
2019-10-20 | Windows: Add checks that the System Favorites service is running. Warn user ↵ | Mounir IDRASSI | 1 | -1/+1 | |
if he enabled option to clear RAM encryption keys and the service is stopped. | |||||
2019-10-03 | Windows: If Secure Desktop is started and random generator was not ↵ | Mounir IDRASSI | 1 | -53/+70 | |
initialized before us, then stop random generator after we finish in order to avoid consuming CPU because of periodic fast poll thread. Next time a critical operation that requires RNG is performed, it will be initialized again. We do this because since the addition of secure desktop support, every time secure desktop is displayed, the RNG fast poll thread was started even if the user will never perform any critical operation that requires random bytes. | |||||
2019-09-30 | Windows: when periodic update of device is disabled, use SetupAPI to list ↵ | Mounir IDRASSI | 1 | -1/+3 | |
disks on demand instead of testing all disks to reduce CPU usage. | |||||
2019-09-29 | Windows: Update the encoded hash of the code signing certificate used to ↵ | Mounir IDRASSI | 1 | -6/+6 | |
verify the integrity of binaries. | |||||
2019-09-29 | Windows: Use periodic update of connected devices only if there is a ↵ | Mounir IDRASSI | 1 | -1/+4 | |
Favorite that uses VolumeID. Add command option to disable the period update of devices. | |||||
2019-09-27 | Windows: fix another typo in code comment (hopefully last one!) | Mounir IDRASSI | 1 | -1/+1 | |
2019-09-27 | Windows: fix typo in code comment | Mounir IDRASSI | 1 | -1/+1 | |
2019-09-26 | Windows: Fix sporadic keyboard issue in Secure Desktop for password dialog ↵ | Mounir IDRASSI | 1 | -1/+5 | |
by not using the trick to put it reliably in foreground. The trick is based on a emulation of ALT+TAB but sometimes ALT key would remain pressed in case of Secure Desktop making it impossible to type the password (a workaround was to press CTRL key which reset the state of ALT key) | |||||
2019-03-03 | Fix formatting of credits in About dialog and documentation | Mounir IDRASSI | 1 | -1/+1 | |
2019-03-03 | Windows: Add option to use legacy maximum password length (64 characters) ↵ | Mounir IDRASSI | 1 | -5/+9 | |
instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt. | |||||
2019-03-02 | Windows: fix compilation error | Mounir IDRASSI | 1 | -1/+1 | |
2019-03-02 | Windows: mitigate some memory attacks by making VeraCrypt applications ↵ | Mounir IDRASSI | 1 | -0/+90 | |
memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code (https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150) | |||||
2019-03-02 | Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵ | Mounir IDRASSI | 1 | -0/+82 | |
especially Format and Expander | |||||
2019-02-12 | Add copyright and license information of JitterEntropy library by Stephan ↵ | Mounir IDRASSI | 1 | -2/+3 | |
Mueller | |||||
2019-02-10 | Windows: Ensure that only one thread at a time can create a secure desktop | Mounir IDRASSI | 1 | -0/+8 | |
2019-02-04 | Automatically truncate passwords for TrueCrypt volumes and System Encryption ↵ | Mounir IDRASSI | 1 | -1/+3 | |
to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version. | |||||
2019-01-28 | Increase password maximum length to 128 bytes from 64 bytes | Mounir IDRASSI | 1 | -0/+3 | |
2019-01-26 | Windows: Add a build configuration containing EFI bootloader signed with ↵ | Mounir IDRASSI | 1 | -1/+1 | |
custom SecureBoot key instead | |||||
2019-01-21 | Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵ | Mounir IDRASSI | 1 | -3/+3 | |
not needed after their key schedule is created | |||||
2018-12-19 | Windows: Add mount option that allows mounting a volume without attaching it ↵ | Mounir IDRASSI | 1 | -6/+5 | |
to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX). | |||||
2018-09-03 | Windows: fix regression when language selected in the setup during fresh ↵ | Mounir IDRASSI | 1 | -8/+7 | |
install and that caused VeraCrypt background task to be disabled. |