Age | Commit message (Collapse) | Author | Files | Lines |
|
|
|
This reverts commit c0ff7a7c521b1d658316d9a177383ab0c403007a.
|
|
* New VeraCrypt interface (for system encryption) with improved usability
* System Encryption: translate password to US keyboard layout + improved new interface
* Windows: Fix build error following merge
* Windows: Remove unused variable
* Windows: Add missing string in Language.xml
* Windows: fix buffer overrun caused by wrong use of wmemset
* Do not delete password file
Since the file is only available in \Release\Setup Files\ it would be fully deleted after running this script the first time.
* Correct return code
Originally the function would have always returned the return-code 1 resulting that the user is not able to change the location for the rescue zip.
* Added hint for sysenc
Added a hint why the field for repeating the password is initially greyed out within the system encryption.
* Corrected spelling mistake
Corrected spelling mistake
* Removed not working copy job
The file to be copied was stored at the source location. Therefore the copyjob will not work. Instead the file is already in the target folder.
* Removed RIPEMD-160 from Product64.wxs
See commit from 21.03.2022
* Added german translation for new interface
* Fixed PIM bug
* Corrected translation file based on the guidelines within the pull request
* Fixing merge conflicts
* Fixed Compiling issues. Reverted keyboard translation
* Removed artifacts of password translation
* Corrected language.xml
* Fixed order within german language file
* Corrected positions
Co-authored-by: Bruna2803 <bruna.radeljak@hotmail.com>
Co-authored-by: felixreichmann <30237956+felixreichmann@users.noreply.github.com>
Co-authored-by: Mounir IDRASSI <mounir.idrassi@idrix.fr>
|
|
equivalents
This fixed failure to build driver for ARM64 with latest VS 2019
|
|
especially for keyfiles.
|
|
instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt.
|
|
IOCTL_DISK_GET_DRIVE_GEOMETRY_EX IOCTL.
|
|
to avoid failure with disk drivers that don't support returning only sizeof(DISK_GEOMETRY_EX).
|
|
calculation formula when EFI system encryption is using SHA-512 or Whirlpool. For historical reasons, if SHA-512 or Whirlpool is selected for EFI system encryption, then iterations = 15000 + (PIM x 1000) and not iterations = PIM x 2048 like the other algorithms.
|
|
|
|
IOCTL_DISK_GET_DRIVE_GEOMETRY in order to get accurate disk size value.
|
|
existing data when filling unused space like the other cases.
|
|
random data instead of the encryption of zeros for better entropy of resulting random data.
|
|
to detect with high probability if a hidden volume is present. Vulnerability reported by Ivanov Alexey Mikhailovich.
|
|
|
|
|
|
tool Coverity.
|
|
|
|
|
|
|
|
and TrueCrypt 3.0.
|
|
explicitly check "User PIM" to enable its use.
|
|
|
|
reported by users
|
|
|
|
|
|
|
|
to random generator to abort in case of error and display a diagnose message to the user.
|
|
exception. Add more checks. Add proper cast to arithmetic operations.
|
|
volumes to VeraCrypt using the change password functionality.
|
|
became important after the introduction of the wait dialog in order to avoid having message boxes behind the wait dialog.
|
|
hidden format because it was never functional and it was superseded by current hidden format.
|
|
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption.
|
|
called instead of once per application run. This is implemented through the call SetRandomPoolEnrichedByUserStatus(FALSE) at the begining of sensitive operations instead of changing UserEnrichRandomPool because in the same call there can be many calls to UserEnrichRandomPool which can result in displaying the dialog many times.
|
|
GetWipePassCount() / WipeBuffer() found by the Open Crypto Audit Project.
|
|
default, it is set to 3 but it can be increased to 256 passes (which can lead to a delay of many hours for a single password change operation).
|
|
|
|
|