VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/Dlgcode.h
AgeCommit message (Collapse)AuthorFilesLines
2022-01-02Windows: Restore support of Windows 7, 8/8.1 by using single attestation ↵Mounir IDRASSI1-0/+3
signature for driver and add checks on needed KBs for Windows Vista and Windows 7. Add signed driver files. - Windows 7 needs KB3033929 or KB4474419 - Windows Vista needs KB4039648 or KB4474419
2021-12-04Windows: Implement TESTSIGNING build configuration that allows running under ↵Mounir IDRASSI1-0/+24
Windows Vista,7, 8 and 8.1.
2021-02-24Windows: Fix freeze when password dialog displayed in secure desktop and try ↵Mounir IDRASSI1-1/+3
to access token keyfiles protected by PIN
2021-01-02Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵Mounir IDRASSI1-0/+1
System encryption still not implemented on ARM64
2020-08-03Windows: Fix issue in UI for configuration autofix mechanism of bootloaderMounir IDRASSI1-0/+1
2020-07-21Windows: Implement detection of Hibernate and Fast Startup and disable them ↵Mounir IDRASSI1-0/+1
if RAM encryption is activated.
2020-07-06Windows: Support direct password drag-n-drop from external applications ↵Mounir IDRASSI1-0/+55
(e.g. KeePass) which is more secure than using clipboard.
2020-07-02Windows: Don't allow to encrypt the system drive if it is already encrypted ↵Mounir IDRASSI1-0/+8
by BitLocker
2020-06-26Windows: fix warning reported by static code analyzed by adding copy ↵Mounir IDRASSI1-0/+24
constructor to _TEXT_EDIT_DIALOG_PARAM and = operator to HostDevice
2020-01-21Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵Mounir IDRASSI1-0/+1
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536
2019-12-13Windows: check "TrueCrypt Mode" in password dialog when mounting a file ↵Mounir IDRASSI1-0/+1
container with .tc extension
2019-12-03Windows: Fix possible local privilege escalation vulnerability during ↵Mounir IDRASSI1-0/+1
execution of VeraCrypt Expander (CVE-2019-19501)
2019-11-27Windows: compatibility with multi-OS boot configuration by only setting ↵Mounir IDRASSI1-0/+2
VeraCrypt as first bootloader of the system if the current first bootloader is Windows one.
2019-10-20Windows: Add checks that the System Favorites service is running. Warn user ↵Mounir IDRASSI1-1/+1
if he enabled option to clear RAM encryption keys and the service is stopped.
2019-09-29Windows: Use periodic update of connected devices only if there is a ↵Mounir IDRASSI1-0/+3
Favorite that uses VolumeID. Add command option to disable the period update of devices.
2019-09-26Windows: Fix sporadic keyboard issue in Secure Desktop for password dialog ↵Mounir IDRASSI1-0/+1
by not using the trick to put it reliably in foreground. The trick is based on a emulation of ALT+TAB but sometimes ALT key would remain pressed in case of Secure Desktop making it impossible to type the password (a workaround was to press CTRL key which reset the state of ALT key)
2019-03-03Windows: Add option to use legacy maximum password length (64 characters) ↵Mounir IDRASSI1-0/+1
instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt.
2019-03-02Windows: mitigate some memory attacks by making VeraCrypt applications ↵Mounir IDRASSI1-0/+1
memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code (https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150)
2019-03-02Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵Mounir IDRASSI1-0/+3
especially Format and Expander
2019-02-04Automatically truncate passwords for TrueCrypt volumes and System Encryption ↵Mounir IDRASSI1-1/+1
to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version.
2018-09-03Windows: fix regression when language selected in the setup during fresh ↵Mounir IDRASSI1-0/+3
install and that caused VeraCrypt background task to be disabled.
2018-08-07Windows: Display a balloon tip warning or error message when the value ↵Mounir IDRASSI1-0/+1
pasted to password field is truncated or when there is no room for additional characters because of maximum password length reached
2018-05-03Windows: Support machines without "EFI\Boot" folder for EFI system ↵Mounir IDRASSI1-0/+1
encryption (e.g. Windows LTSB). Compatibility enhancements for EFI system encryption.
2018-04-23Windows: Don't start EFI system encryption process if SecureBoot is enabled ↵Mounir IDRASSI1-1/+1
and VeraCrypt-DCS custom keys were not loaded in the machine firmware.
2018-04-23Windows: implement compatibility for Windows 10 major updates using ↵Mounir IDRASSI1-0/+3
ReflectDrivers mechanism whose support started from Windows 10 version 1607.
2018-04-23Windows: implement internal verification of Authenticode digital signature ↵Mounir IDRASSI1-1/+1
for all modules to protect against simple binaries tampering.
2017-07-27Windows: when mounting system favorites using VolumeID feature, query all ↵Mounir IDRASSI1-2/+2
disks each time instead of caching previous call results. This is not efficient but it should fix rare cases where issues happen.
2017-07-23Windows: display notice about creating new Rescue Disk at first boot after ↵Mounir IDRASSI1-1/+4
upgrade.
2017-07-20Windows: in case of mounting system favorites, call driver to get list of ↵Mounir IDRASSI1-1/+1
drives instead of using SetupAPI in order to fix some rare issues where some disks were not detected at boot.
2017-07-09Windows: correctly initialize global critical sections in case if system ↵Mounir IDRASSI1-0/+2
favorites service.
2017-07-02Windows: when mounting multiple favorites, use PIM of previous favorite ↵Mounir IDRASSI1-1/+1
alongside its password if option "Include PIM when caching password" is selected alongside option "Temporarily cache password during Mount Favorite Volumes operations".
2017-06-23Update IDRIX copyright yearMounir IDRASSI1-1/+1
2017-06-11Windows: various fixes following Coverity analysis.Mounir IDRASSI1-0/+1
2017-06-08Windows: Validate XML format of EFI DcsProp after user editing and before ↵Mounir IDRASSI1-0/+1
writing it to disk. Enhance UI handling of DcsProp editing and PlatformInfo display.
2017-06-05Beta2 patch 1kavsrf1-0/+1
Edit DcsProp and PlatformInfo from System->Settings EFI loader updated
2017-06-05Windows: Correctly open online help when selected in menu. Remove unused ↵Mounir IDRASSI1-1/+1
parameters to function AppLink.
2017-06-01Windows: fix high CPU usage when a favorite is configured to mount using ↵Mounir IDRASSI1-3/+29
VolumeID when its host device is connected to the machine.
2017-05-17Windows: use IOCTL_DISK_GET_DRIVE_GEOMETRY_EX instead of the deprecated ↵Mounir IDRASSI1-1/+1
IOCTL_DISK_GET_DRIVE_GEOMETRY in order to get accurate disk size value.
2017-05-15Windows: Add HTML documentation to Windows installer.Mounir IDRASSI1-0/+5
2017-05-15Replace Codeplex links by ones on veracrypt.frMounir IDRASSI1-0/+1
2016-12-30Windows: Implement Secure Desktop for password entry. Add option and command ↵Mounir IDRASSI1-0/+4
line switch to activate it.
2016-10-17Windows: Remove VeraCrypt from EFI boot partition after decrypting the systemMounir IDRASSI1-0/+1
2016-10-17Windows: Perform Shutdown instead of Reboot during Pre-Test of UEFI system ↵Mounir IDRASSI1-1/+1
encryption in order to detect machines where changes to EFI boot don't persist after shutdown.
2016-08-15Windows: Implement support for EFI system encryption in Windows GUI.Mounir IDRASSI1-0/+3
2016-05-29Windows: better implementation for support of smart card PIN in command ↵Mounir IDRASSI1-0/+1
line. Supported now also on Format.
2016-05-10Remove trailing whitespaceDavid Foerster1-7/+7
2016-05-10Normalize all line terminatorsDavid Foerster1-593/+593
2016-05-05Windows: Add option and command line switch to hide waiting dialog when ↵Mounir IDRASSI1-0/+3
performing operations.
2016-04-14Windows: Finalize implementation of the new volume ID mechanism. Use SHA-256 ↵Mounir IDRASSI1-3/+7
instead of SHA-512 to compute volume ID to reduce string size and make more convenient to use.
2016-04-08Windows: start implementation of volume ID mechanism that will be used to ↵Mounir IDRASSI1-1/+5
identify VeraCrypt disk volumes instead of device name.