Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2023-09-03 | Windows: remove legacy code (XP, Vista). Simplify code since Windows 7 is ↵ | Mounir IDRASSI | 1 | -1/+1 | |
now minimal OS version. | |||||
2023-08-13 | Windows: Better way to enable required privileges for FastCreate Options | Mounir IDRASSI | 1 | -8/+51 | |
If we can set required privilege, we ask the user using UAC to enable them. | |||||
2023-07-22 | Windows: Remove TrueCrypt support. Increment version to 1.26.4. | Mounir IDRASSI | 1 | -1/+1 | |
2023-07-16 | Windows: fix issue with fastCreate by requesting SE_MANAGE_VOLUME_NAME ↵ | Mounir IDRASSI | 1 | -26/+28 | |
privilege before calling CreateFile This ensures that the returned handle inherits the privilege | |||||
2023-07-01 | Windows: Make API formatting fallback to format.com in case of elevation. ↵ | Mounir IDRASSI | 1 | -51/+12 | |
remove dead code from ExternalFormatFs We also modify UacFormatNtfs/UacFormatFs to return actual error code in case of failure | |||||
2023-07-01 | Windows: Fix formatting issue during volume creation by using /Y for ↵ | Mounir IDRASSI | 1 | -28/+76 | |
format.com and specifying removal parameter in FormatEx The usage of /Y parameter in format.com simplifies the logic and makes the code robust since we don't need to send \n to the format.com process. Specifying RemovableMedia parameter to FormatEx fixes its failure in Windows 10 and later to perform quick format. This is also more adequate since we are mounting the volume as removable media for the formatting process. We also add better error management in order to display adequate error message to the user in case of failure | |||||
2023-06-28 | Windows: Better handling of quick format for file container | Mounir IDRASSI | 1 | -8/+48 | |
We write a zeroed sector every 128 MiB, leaving other sectors untouched This helps users visualize the progress of actual file creation while forcing Windows to allocate the disk space of each 128 MiB chunk immediately, otherwise, Windows would delay the allocation until we write the backup header at the end of the volume which would make the user think that the format process has stalled after progress bar reaches 100%. | |||||
2023-06-23 | Windows: if /fastCreateFile set, request SE_MANAGE_VOLUME_NAME privileges ↵ | Mounir IDRASSI | 1 | -6/+23 | |
(credits: @xnoreq) Display a warning if request failed and allow to continue without fast creation | |||||
2022-03-26 | Windows: check result of WriteFile and don't block if it is failing (Coverity) | Mounir IDRASSI | 1 | -4/+10 | |
2020-07-02 | Windows: Use native Windows format program first to perform formatting since ↵ | Mounir IDRASSI | 1 | -7/+6 | |
it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue. | |||||
2020-07-02 | Windows: Hide the console windows of the native Windows format tool when we ↵ | Mounir IDRASSI | 1 | -1/+2 | |
call it to perform formatting | |||||
2020-06-29 | Windows: Fallback to Windows native formatting tool if we fail to format a ↵ | Mounir IDRASSI | 1 | -2/+152 | |
volume as NTFS/exFAT/ReFS using FormatEx function from fmifs.dll | |||||
2020-06-29 | Windows: Avoid displaying waiting dialog when /silent specified for ↵ | Mounir IDRASSI | 1 | -1/+1 | |
"VeraCrypt Format" during creating of file container using /create switch and a filesystem other than FAT (fixes Github issue #648) | |||||
2020-06-21 | Windows: Fix issue when RAM encryption used, AES selected and AES-NI not ↵ | Mounir IDRASSI | 1 | -0/+5 | |
supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected by user. | |||||
2020-01-22 | Windows: Fix regression in Expander and Format when RAM encryption is enable ↵ | Mounir IDRASSI | 1 | -0/+72 | |
that was causing volume headers to be corrupted. | |||||
2019-12-10 | Windows: Add switch /FastCreateFile for VeraCrypt Format.exe to speedup ↵ | Mounir IDRASSI | 1 | -2/+23 | |
creation of large file container if quick format is selected. This switch comes with security issues since it will embed existing content on disk into the file container which may expose sensitive content to an attacker who has access to the file container. | |||||
2019-12-08 | Windows: enhancements to the mechanism preserving file timestamps, ↵ | Mounir IDRASSI | 1 | -8/+13 | |
especially for keyfiles. | |||||
2019-03-02 | Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵ | Mounir IDRASSI | 1 | -0/+7 | |
especially Format and Expander | |||||
2019-01-21 | Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵ | Mounir IDRASSI | 1 | -2/+2 | |
not needed after their key schedule is created | |||||
2017-06-23 | Update IDRIX copyright year | Mounir IDRASSI | 1 | -1/+1 | |
2017-06-11 | Windows: various fixes following Coverity analysis. | Mounir IDRASSI | 1 | -2/+3 | |
2017-06-02 | Windows: fix compilation error cause by extra '&&' in if statement | Mounir IDRASSI | 1 | -1/+1 | |
2017-05-28 | Windows: add support for ReFS on Windows 10 when creating normal volumes. | Mounir IDRASSI | 1 | -3/+7 | |
2016-09-11 | Windows: in case of In-Place encryption, encrypt random data instead of ↵ | Mounir IDRASSI | 1 | -1/+1 | |
existing data when filling unused space like the other cases. | |||||
2016-08-15 | Windows: fill unused/reserved header areas with the result of encryption of ↵ | Mounir IDRASSI | 1 | -1/+1 | |
random data instead of the encryption of zeros for better entropy of resulting random data. | |||||
2016-08-15 | Windows: align buffers used for keys to avoid issues when SSE used. | Mounir IDRASSI | 1 | -2/+2 | |
2016-08-15 | Windows: Fix vulnerability inherited from TrueCrypt that allows an attacker ↵ | Mounir IDRASSI | 1 | -0/+53 | |
to detect with high probability if a hidden volume is present. Vulnerability reported by Ivanov Alexey Mikhailovich. | |||||
2016-05-10 | Remove trailing whitespace | David Foerster | 1 | -41/+41 | |
2016-05-10 | Normalize all line terminators | David Foerster | 1 | -1054/+1054 | |
2016-02-07 | Windows:Fix various issues and warnings reported by static code analysis ↵ | Mounir IDRASSI | 1 | -6/+6 | |
tool Coverity. | |||||
2016-01-27 | Windows/Linux: Implement exFAT support. | Mounir IDRASSI | 1 | -6/+26 | |
2016-01-20 | Copyright: update dates to include 2016. | Mounir IDRASSI | 1 | -1/+1 | |
2015-12-21 | Windows: Implement PIM caching, both for system encryption and for normal ↵ | Mounir IDRASSI | 1 | -1/+1 | |
volumes. Add options to activate it in the Preferences and System Settings. | |||||
2015-11-26 | Windows: Full UNICODE rewrite and implement support for UNICODE passwords. | Mounir IDRASSI | 1 | -14/+13 | |
2015-09-16 | Windows: first implementation of CLI support for creating volumes. | Mounir IDRASSI | 1 | -9/+15 | |
2015-08-06 | Update license information to reflect the use of a dual license Apache 2.0 ↵ | Mounir IDRASSI | 1 | -7/+9 | |
and TrueCrypt 3.0. | |||||
2015-07-11 | Use Pim name for internal variables instead of the old name Pin | Mounir IDRASSI | 1 | -3/+3 | |
2015-07-06 | Windows: better logic for FormatEx function call. To be replaced in the ↵ | Mounir IDRASSI | 1 | -9/+61 | |
future by Microsoft COM interfaces. | |||||
2015-07-06 | Windows: Display source location of errors in order to help diagnose issues ↵ | Mounir IDRASSI | 1 | -3/+7 | |
reported by users | |||||
2015-05-29 | Windows: workaround FormatEx keeping references on formatted volume by ↵ | Mounir IDRASSI | 1 | -3/+3 | |
adding extra delays. | |||||
2015-05-26 | Windows: first implementation of dynamic mode | Mounir IDRASSI | 1 | -1/+3 | |
2014-12-28 | Windows: support loading TrueCrypt volumes. Implement converting TrueCrypt ↵ | Mounir IDRASSI | 1 | -1/+1 | |
volumes to VeraCrypt using the change password functionality. | |||||
2014-12-27 | Windows: use the correct window handle for creating message boxes. This ↵ | Mounir IDRASSI | 1 | -14/+15 | |
became important after the introduction of the wait dialog in order to avoid having message boxes behind the wait dialog. | |||||
2014-12-16 | Windows: Enhance performance by implementing the possibility to choose the ↵ | Mounir IDRASSI | 1 | -1/+1 | |
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption. | |||||
2014-11-08 | Static Code Analysis : Generalize the use of Safe String functions. Add some ↵ | Mounir IDRASSI | 1 | -6/+8 | |
NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL. | |||||
2014-11-08 | Static Code Analysis : fix non-absolute DLL/process loads that can be ↵ | Mounir IDRASSI | 1 | -1/+11 | |
hijacked (Microsoft Security Advisory 2269637). | |||||
2014-11-08 | Add original TrueCrypt 7.1a sources | Mounir IDRASSI | 1 | -0/+1010 | |