VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/Dlgcode.c
AgeCommit message (Collapse)AuthorFilesLines
2022-08-25Minor bugfixes (#950)Wendigo1-5/+11
* Update Dlgcode.c minor bugfixes * GlobalMemoryStatus x64 bugfix GlobalMemoryStatus deprecated in x64
2022-03-26Windows: Add various checks to address Coverity reported issues.Mounir IDRASSI1-3/+7
2022-03-08Implement support of Blake2s-256 hash algorithm and remove deprecated ↵Mounir IDRASSI1-11/+8
algorithms RIPEMD-160 and GOST89.
2022-02-11Update copyrights following integration of LZMA SDKMounir IDRASSI1-1/+2
2022-02-10Windows: Make Travel Disk contains 32-bit and arm64 binaries when VeraCrypt ↵Mounir IDRASSI1-934/+950
installed using MSI
2022-02-02Windows: Fix failure to verify driver file signature since it is signed by ↵Mounir IDRASSI1-1/+12
Microsoft not us. This caused a failure when creating Traveler Disk
2022-02-01Windows: Make MSI installer compatible with System Encryption by leveraging ↵Mounir IDRASSI1-4/+14
VeraCrypt service capabilities
2022-01-30Windows: Fix wrong check on IUnknown_QueryService function pointerMounir IDRASSI1-1/+1
2022-01-30Windows: Enhancement to CVE-2019-19501 fix to using ↵Mounir IDRASSI1-4/+119
IShellDispatch2::ShellExecuteW if RunAsDesktopUser fails. Also we don't use the fix if UAC is disabled since in this case the Shell Explorer.exe will be elevated anyway so we can't use to reduce elevation.
2022-01-07Windows: Update IDRIX SHA-256 code signing certificate to latest oneMounir IDRASSI1-6/+6
2022-01-02Windows: Restore support of Windows 7, 8/8.1 by using single attestation ↵Mounir IDRASSI1-4/+230
signature for driver and add checks on needed KBs for Windows Vista and Windows 7. Add signed driver files. - Windows 7 needs KB3033929 or KB4474419 - Windows Vista needs KB4039648 or KB4474419
2022-01-02Update copyright year to 2022Mounir IDRASSI1-2/+2
2021-12-04Windows: Implement TESTSIGNING build configuration that allows running under ↵Mounir IDRASSI1-2/+52
Windows Vista,7, 8 and 8.1.
2021-11-21Windows: Restrict supported Windows versions to XP, 10 and 11 because of new ↵Mounir IDRASSI1-22/+7
requirement on driver code signing. For now, we are not able to put in place HCK/WLK certification of VeraCrypt driver that is needed for Windows 7, 8 and 8.1.
2021-09-02Windows: Implement a new way to detect Windows version to overcome MSI ↵Mounir IDRASSI1-0/+53
limitation
2021-08-30Windows: Set minimal supported version to Windows 8 since our driver is now ↵Mounir IDRASSI1-2/+2
signed only SHA256
2021-08-30Update copyright year to 2021Mounir IDRASSI1-2/+2
2021-08-30Windows: Update IDRIX SHA-256 code signing certificate to latest oneMounir IDRASSI1-6/+6
2021-08-02Windows: Fix wrong detection of ARM architectureMounir IDRASSI1-1/+1
2021-07-14Windows: Use only SHA256 certificate for code signature verification since ↵Mounir IDRASSI1-12/+1
SHA1 certificate is not used anymore.
2021-07-13Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure ↵Mounir IDRASSI1-2/+2
equivalents This fixed failure to build driver for ARM64 with latest VS 2019
2021-03-22Windows: first implementation of MSI installer for silent mode deployment ↵Mounir IDRASSI1-4/+39
(ACCEPTLICENSE=YES must be set in msiexec command line)
2021-02-27Windows: Load UrlUnescapeW dynamically from Shlwapi.dll and use safe URL ↵Mounir IDRASSI1-5/+14
opening starting from Vista only since security mechanism doesn't apply to Windows XP.
2021-02-24Windows: Fix freeze when password dialog displayed in secure desktop and try ↵Mounir IDRASSI1-2/+36
to access token keyfiles protected by PIN
2021-02-21Windows: Fix failure to load local HTML documentation if application running ↵Mounir IDRASSI1-6/+24
with administrative privileges In this case, FileExists was called on a path with format "file:///..." and containing escape sequences, which was not recognized.
2021-01-02Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵Mounir IDRASSI1-11/+88
System encryption still not implemented on ARM64
2020-08-06Windows: Fix wrong error message when UTF-8 encoding of entered password ↵Mounir IDRASSI1-1/+1
exceeds the maximum supported length.
2020-08-06Windows: Display a warning during system encryption wizard when typed ↵Mounir IDRASSI1-36/+42
password reaches maximum length and inform user that no more characters are allowed and that they are ignored.
2020-08-06Windows: Display warning message with correct maximum length value when ↵Mounir IDRASSI1-5/+39
password is truncated
2020-08-03Windows: Fix issue in UI for configuration autofix mechanism of bootloaderMounir IDRASSI1-0/+10
2020-08-02Windows: use fix for CVE-2019-19501 only if standard Windows Shell is ↵Mounir IDRASSI1-2/+4
running since we rely on it for the implementation of the fix. If Windows Shell has been modified or is not running, then we can't really protect the user is such non standard environment
2020-07-29Windows: Don't use HRESULT macros SUCCEEDED to check if WinVerifyTrust ↵Mounir IDRASSI1-1/+1
succeeded. Instead, check the return value for equality to zero.
2020-07-22Windows: Add possibility to sign binaries using SHA256 only. This fixes ↵Mounir IDRASSI1-1/+13
Windows Smart Screen warning when launching installer
2020-07-21Windows: Implement detection of Hibernate and Fast Startup and disable them ↵Mounir IDRASSI1-0/+73
if RAM encryption is activated.
2020-07-06Windows: Support direct password drag-n-drop from external applications ↵Mounir IDRASSI1-0/+422
(e.g. KeePass) which is more secure than using clipboard.
2020-07-02Windows: Don't allow to encrypt the system drive if it is already encrypted ↵Mounir IDRASSI1-0/+102
by BitLocker
2020-07-02Windows: Replace GetSystemInfo calls by more reliable function to get number ↵Mounir IDRASSI1-9/+6
of CPUs active on the PC.
2020-06-28Windows: remove unused code targeting Windows 2000.Mounir IDRASSI1-6/+0
2020-06-26Windows: fix warning reported by static code analyzed by adding copy ↵Mounir IDRASSI1-4/+8
constructor to _TEXT_EDIT_DIALOG_PARAM and = operator to HostDevice
2020-06-21Windows: call VcProtectKeys in benchmark warm-up when RAM encryption is ↵Mounir IDRASSI1-0/+4
enabled in order to be follow the same execution path as the result of benchmark calculations.
2020-06-19Windows: Fix wrong results in benchmark of encryption algorithms when RAM ↵Mounir IDRASSI1-0/+5
encryption is enabled
2020-06-19Windows: remove duplicated function to detect AES-NI support in CPUMounir IDRASSI1-1/+1
2020-06-12Windows: Update IDRIX SHA-1 code signing certificate to latest one.Mounir IDRASSI1-6/+6
2020-06-11Switch from auto_ptr to unique_ptr (#638)Christopher Bergqvist1-1/+1
2020-03-10Update copyright year in creditsVeraCrypt_1.24-Update5Mounir IDRASSI1-3/+3
2020-03-10Windows: Fix compilation error caused by previous keyfile commitMounir IDRASSI1-0/+2
2020-03-10Windows: Fix keyfiles path passed as CLI argument and set as default not ↵Mounir IDRASSI1-1/+3
always cleared from RAM when VeraCrypt exits
2020-02-10Windows: Fix warnings reported by Coverity static code analyzerMounir IDRASSI1-4/+7
2020-01-22Windows: use fix for CVE-2019-19501 only when process elevated otherwise it ↵Mounir IDRASSI1-1/+22
will not add any benefit compared to standard ShellExecute while at the same time potentially causing issue when opening links.
2020-01-21Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵Mounir IDRASSI1-3/+1
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536