VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common
AgeCommit message (Collapse)AuthorFilesLines
2022-01-07Windows: Update IDRIX SHA-256 code signing certificate to latest oneMounir IDRASSI1-6/+6
2022-01-07Windows: Fix text truncation in setup wizard and modaless waiting dialogMounir IDRASSI1-1/+1
2022-01-02Update documentation and Release Notes for restored Windows 7 support. Set ↵Mounir IDRASSI1-1/+1
1.25.6 release date at January 3rd 2022
2022-01-02Windows: Restore support of Windows 7, 8/8.1 by using single attestation ↵Mounir IDRASSI2-4/+233
signature for driver and add checks on needed KBs for Windows Vista and Windows 7. Add signed driver files. - Windows 7 needs KB3033929 or KB4474419 - Windows Vista needs KB4039648 or KB4474419
2022-01-02Set 1.25.6 release date to January 1st 2022Mounir IDRASSI1-3/+3
2022-01-02Update copyright year to 2022Mounir IDRASSI1-2/+2
2021-12-30Update Release Notes and add signed Windows driver.Mounir IDRASSI1-1/+1
2021-12-30Windows driver: Set maximum values for encryption queue parameters. Add ↵Mounir IDRASSI1-0/+9
IOCTL code to read used values from user space maximum value for EncryptionFragmentSize is 2048 maximum value for EncryptionIoRequestCount is 8192 maximum value for EncryptionItemCount is (EncryptionIoRequestCount/2)
2021-12-27Increment version to 1.25.6. Update Release Notes and add signed Windows driver.Mounir IDRASSI1-2/+2
2021-12-24MacOSX: Increment version to 1.24.5 and update release notes.Mounir IDRASSI1-1/+1
2021-12-20Increment version to 1.25.5 and update release notesMounir IDRASSI1-2/+2
2021-12-20Windows Driver: Add registry settings to control driver internal encryption ↵Mounir IDRASSI1-0/+4
queue Under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt: - VeraCryptEncryptionFragmentSize (REG_DWORD): size of encryption data fragment in KiB. Default is 256. - VeraCryptEncryptionIoRequestCount (REG_DWORD): maximum number of parallel I/O requests. Default is 16. - VeraCryptEncryptionItemCount (REG_DWORD): maximum number of encryption queue items processed in parallel. Default is 8.
2021-12-04Windows: Don't use version string suffix in language files version check. It ↵Mounir IDRASSI1-1/+1
is empty by default and for special build we want to use the same language files as standard build
2021-12-04Windows: Implement TESTSIGNING build configuration that allows running under ↵Mounir IDRASSI5-16/+80
Windows Vista,7, 8 and 8.1.
2021-11-30Increment version to 1.25.4 and set release date to December 3rd 2021Mounir IDRASSI1-3/+3
2021-11-28Language XML files: Fix wrong reference to VeraCrypt 6.0 which actually ↵Mounir IDRASSI1-1/+1
should be TrueCrypt 6.0
2021-11-28Increment version to 1.25 (1.25.3)Mounir IDRASSI1-2/+2
2021-11-21Increment version to 1.25-RC2 and update release notesMounir IDRASSI1-3/+3
2021-11-21Windows: Restrict supported Windows versions to XP, 10 and 11 because of new ↵Mounir IDRASSI1-22/+7
requirement on driver code signing. For now, we are not able to put in place HCK/WLK certification of VeraCrypt driver that is needed for Windows 7, 8 and 8.1.
2021-09-21Linux/macOS: Add CLI switch (--size=max) and UI option to give a file ↵Mounir IDRASSI1-0/+1
container all available free space. This commit also makes --size switch accept KiB/MiB/GiB/TiB prefixes and adds TiB choice in UI.
2021-09-05Increment version to 1.25-RC1Mounir IDRASSI1-3/+3
2021-09-05Windows: Block installation with exe installer if VeraCrypt was already ↵Mounir IDRASSI1-0/+1
installed using MSI package
2021-09-02Windows: Implement a new way to detect Windows version to overcome MSI ↵Mounir IDRASSI1-0/+53
limitation
2021-08-30Increment version to 1.25Mounir IDRASSI1-3/+3
2021-08-30Windows: Fix some VS static analyzed warningsMounir IDRASSI1-1/+1
2021-08-30Windows Driver: use functions from ntstrsafe.h instead of strsafe.h since ↵Mounir IDRASSI1-0/+6
they are destined for kernel mode
2021-08-30Windows: Set minimal supported version to Windows 8 since our driver is now ↵Mounir IDRASSI1-2/+2
signed only SHA256
2021-08-30Update copyright year to 2021Mounir IDRASSI1-2/+2
2021-08-30Windows: Update IDRIX SHA-256 code signing certificate to latest oneMounir IDRASSI1-6/+6
2021-08-21Language XML files: remove duplicated entry and fix MOUNT_POINT entryMounir IDRASSI1-1/+0
2021-08-21Language.xml: remove wrong character from MOUNT_POINT entryMounir IDRASSI1-1/+1
2021-08-16Increment version to 1.24-Update9-Beta-21-08-15Mounir IDRASSI1-2/+2
2021-08-15Windows: Increment version to 1.24.25.3 and update signed Windows driverMounir IDRASSI1-2/+2
2021-08-07Windows: Better implementation of PRF autodetection optimization.Mounir IDRASSI3-54/+80
2021-08-07Windows Driver: fix BSOD during mounting caused by commit for PRF ↵Mounir IDRASSI1-2/+0
auto-detection speedup
2021-08-02Windows: Fix wrong detection of ARM architectureMounir IDRASSI1-1/+1
2021-08-02Windows: Increment version to 1.24.25.2 and update signed Windows driverMounir IDRASSI1-2/+2
2021-08-02Windows: clear DeriveKeyWork work item only if they have correct typeMounir IDRASSI1-3/+6
2021-07-15Windows: Avoid leaking sensitive values in work item of threads poolMounir IDRASSI1-0/+14
2021-07-14Windows: Reduce time of mount with PRF auto-detectionMounir IDRASSI3-29/+112
2021-07-14Windows: Fix compilation error of bootloader caused by introduction of ↵Mounir IDRASSI1-1/+1
strsafe.h in crypto.c
2021-07-14Windows: Use only SHA256 certificate for code signature verification since ↵Mounir IDRASSI1-12/+1
SHA1 certificate is not used anymore.
2021-07-13Windows: Update signed Windows driver to version 1.24.25.1Mounir IDRASSI1-2/+2
2021-07-13Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure ↵Mounir IDRASSI7-29/+42
equivalents This fixed failure to build driver for ARM64 with latest VS 2019
2021-03-22Windows: first implementation of MSI installer for silent mode deployment ↵Mounir IDRASSI1-4/+39
(ACCEPTLICENSE=YES must be set in msiexec command line)
2021-02-27Windows: Load UrlUnescapeW dynamically from Shlwapi.dll and use safe URL ↵Mounir IDRASSI1-5/+14
opening starting from Vista only since security mechanism doesn't apply to Windows XP.
2021-02-24Windows: Fix failure to launch keyfile generator in secure desktop modeMounir IDRASSI1-2/+6
Hooking is not allowed if thread is running in secure desktop so we ignore SetWindowsHookEx failure in this case and random generator will be initialized using the other entropy sources from the system.
2021-02-24Windows: Fix freeze when password dialog displayed in secure desktop and try ↵Mounir IDRASSI2-3/+39
to access token keyfiles protected by PIN
2021-02-21Windows: Fix failure to load local HTML documentation if application running ↵Mounir IDRASSI1-6/+24
with administrative privileges In this case, FileExists was called on a path with format "file:///..." and containing escape sequences, which was not recognized.
2021-02-21interface: add keyboard shortcut to "TrueCrypt mode" in the mount dialog (#729)alt3r 3go1-1/+1
I've also updated all the relevant language files. Closes #95. Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com>