VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/Dlgcode.c
AgeCommit message (Collapse)AuthorFilesLines
2015-05-29Windows: workaround FormatEx keeping references on formatted volume by ↵Mounir IDRASSI1-4/+14
adding extra delays.
2015-05-27Windows: GUI modifications around PIN fieldMounir IDRASSI1-0/+18
2015-05-26Windows: first implementation of dynamic modeMounir IDRASSI1-8/+31
2015-05-26Windows: solve 64-bit compilation warnings after checking that they are ↵Mounir IDRASSI1-35/+36
harmless.
2015-05-22Windows: Modifications to build 64-bit versions of VeraCrypt.exe & ↵Mounir IDRASSI1-4/+4
"VeraCrypt Format.exe".
2015-05-17Windows: First implementation of non-system volumes decryption.Mounir IDRASSI1-6/+102
2015-05-06Windows: Solve detection issue when resuming encryption. Add separate logic ↵Mounir IDRASSI1-6/+42
for manual selection of device and display error message in case of failure.
2015-05-03Windows Driver: Implement querying physical sector size of veraCrypt volume ↵Mounir IDRASSI1-0/+78
through IOCTL_STORAGE_QUERY_PROPERTY
2015-05-03Windows: Modify custom window class names to less generic value in order to ↵Mounir IDRASSI1-5/+5
avoid collision with existing class names.
2015-04-27Windows: Support A: and B: as driver letters for mounting volumes.Mounir IDRASSI1-2/+2
2015-04-06Windows vulnerability fix: CryptAcquireContext vulnerability fix. Add checks ↵Mounir IDRASSI1-5/+31
to random generator to abort in case of error and display a diagnose message to the user.
2015-03-19Windows: correctly handle WIN32 LastError when mounting. Harmonize file ↵Mounir IDRASSI1-2/+19
access checks between GUI and console. Skip ERROR_SHARING_VIOLATION in primary check in order to let the driver handle it more thoroughly.
2015-03-02Windows: if TrueCrypt volume created with a version prior to 6.0, display ↵Mounir IDRASSI1-2/+3
this version in the error message to help users understand why it is not working.
2015-02-09Windows: Solve PIN blocked issue when trying to mount a volume right after ↵Mounir IDRASSI1-2/+8
configuring the PKCS#11 module. Always ensure that we are using a valid window handle as a parent.
2015-02-09Static Code Analysis: Correct memory leaks. Add more checks.Mounir IDRASSI1-18/+76
2015-02-08Windows: retry UAC prompt operation in case of failure. This avoids cancel ↵Mounir IDRASSI1-0/+5
the whole operation if the user is not in front of the machine during UAC prompt (this happens ofter during in-place encryption of big NTFS partitions).
2015-01-04Windows: better display of volume information and benchmark results.Mounir IDRASSI1-0/+2
2015-01-03Windows: change cascade encryption naming format to reflex mathematical ↵Mounir IDRASSI1-2/+2
composition of the encryption algorithm, thus being more clear. For example AES(Twofish(Serpent)) instead of AES-Twofish-Serpent.
2014-12-28Windows: support loading TrueCrypt volumes. Implement converting TrueCrypt ↵Mounir IDRASSI1-6/+15
volumes to VeraCrypt using the change password functionality.
2014-12-28Windows: implement wait dialog for benchmark operation.Mounir IDRASSI1-7/+30
2014-12-28Windows: Add possibility to choose 1-pass wipe mode in all cases without ↵Mounir IDRASSI1-4/+2
changing the default wipe mode.
2014-12-27Windows: use the correct window handle for creating message boxes. This ↵Mounir IDRASSI1-147/+151
became important after the introduction of the wait dialog in order to avoid having message boxes behind the wait dialog.
2014-12-27Windows: make the wait dialog mechanism more generic in order to reuse it ↵Mounir IDRASSI1-29/+61
more widely across VeraCrypt.
2014-12-26Windows: workaround freezing of waiting dialog but setting its parent to the ↵Mounir IDRASSI1-2/+2
desktop and making all mount calls in a separate thread. DeviceIoControl is making our like hard because it doesn't behave as a normal system call and it blocks our window message loop even when called from a separate thread.
2014-12-22Windows: Solve issue of some dialogs not showing up and that was caused by ↵Mounir IDRASSI1-98/+99
wrong handling of WM_NOTIFY messages. This behavior appeared after switching to Windows visual styles.
2014-12-20Reduce time for reporting wrong password by removing support for legacy ↵Mounir IDRASSI1-12/+0
hidden format because it was never functional and it was superseded by current hidden format.
2014-12-17Windows: in silent mode, don't show the wait dialog during mount operationMounir IDRASSI1-9/+17
2014-12-16Windows: Enhance performance by implementing the possibility to choose the ↵Mounir IDRASSI1-2/+15
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption.
2014-12-16Windows: display a wait dialog during the lengthy opening of a volume. There ↵Mounir IDRASSI1-2/+83
is still a freeze in the GUI even though the call to DeviceIoControl is done in a separate thread which can't be explained. Maybe if we had an asynchronous Device Driver call, things would better.
2014-12-11Windows: Implement specifying the size of the generated keyfiles and also ↵Mounir IDRASSI1-12/+61
letting VeraCrypt choose random size values.
2014-12-07Windows: Implement creation of multiple keyfiles at once.Mounir IDRASSI1-19/+167
2014-12-04Windows: correct issue in displaying PDF of User Guide.Mounir IDRASSI1-2/+2
2014-12-04Windows: update URLs to points to the online documentation. Use a dedicated ↵Mounir IDRASSI1-3/+103
donation link.
2014-11-11Windows: Avoid calling RegCloseKey on an invalid handle.Mounir IDRASSI1-6/+7
2014-11-10Windows: close file handle if the call to GetFileSize fails.Mounir IDRASSI1-0/+3
2014-11-08Simplify code handling iterations count: in boot mode, we'll set the correct ↵Mounir IDRASSI1-1/+1
iterations count inside derive_u_sha256 and derive_u_ripemd160 depending in the value of the iterations parameter. On normal mode, we use normal values of iterations count. Removes the special test parameter from RIPEMD160 functions.
2014-11-08Implement support for creating and booting encrypted partition using ↵Mounir IDRASSI1-0/+12
SHA-256. Support SHA-256 for normal volumes as well.
2014-11-08Use absolute path in ShellExecute call that was missed when the security fix ↵Mounir IDRASSI1-1/+1
for Microsoft Security Advisory 2269637 was implemented.
2014-11-08Remove driver version test that is non application to VeraCrypt and that was ↵Mounir IDRASSI1-3/+0
wrongly inherited from TrueCrypt.
2014-11-08Correctly handle dialogs from previous versions that used 'TRUE' instead of ↵Mounir IDRASSI1-2/+4
'VERA' as a value for GWLP_USERDATA.
2014-11-08Add option in select the number of passes for volume header over-writing. By ↵Mounir IDRASSI1-5/+14
default, it is set to 3 but it can be increased to 256 passes (which can lead to a delay of many hours for a single password change operation).
2014-11-08Remove remaining legacy cryptographic algorithms that are never used by ↵Mounir IDRASSI1-10/+0
VeraCrypt.
2014-11-08Remove deprecated/legacy cryptographic algorithms and encryption modes that ↵Mounir IDRASSI1-53/+0
are never used by VeraCrypt. This will speed up volumes opening in many cases.
2014-11-08Static Code Analysis : Use Safe String function in Dlgcode.c. Add byte size ↵Mounir IDRASSI1-262/+328
parameter in various functions to help implement secure handling of strings.
2014-11-08Disable crash handling until we put in place a dedicated URL for posting ↵Mounir IDRASSI1-14/+14
crash information.
2014-11-08Static Code Analysis : Avoid using invalidate integer value received from ↵Mounir IDRASSI1-1/+5
GetFileSize.
2014-11-08Static Code Analysis : fix various memory leaks.Mounir IDRASSI1-0/+4
2014-11-08Static Code Analysis : fix resource leakage by ensuring that all Windows ↵Mounir IDRASSI1-8/+20
handles are released properly
2014-11-08Static Code Analysis : fix non-absolute DLL/process loads that can be ↵Mounir IDRASSI1-7/+37
hijacked (Microsoft Security Advisory 2269637).
2014-11-08Change namespace from TrueCrypt to VeraCrypt. Rename method from Resources ↵Mounir IDRASSI1-1/+1
Resources::GetTrueCryptIcon to Resources::GetVeraCryptIcon.