Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2020-07-04 | Increment internal version to 1.24.19 | Mounir IDRASSI | 1 | -2/+2 | |
2020-07-02 | Windows: Use native Windows format program first to perform formatting since ↵ | Mounir IDRASSI | 1 | -7/+6 | |
it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue. | |||||
2020-07-02 | Windows: Hide the console windows of the native Windows format tool when we ↵ | Mounir IDRASSI | 1 | -1/+2 | |
call it to perform formatting | |||||
2020-07-02 | Windows: Don't allow to encrypt the system drive if it is already encrypted ↵ | Mounir IDRASSI | 4 | -0/+117 | |
by BitLocker | |||||
2020-07-02 | Windows: Replace GetSystemInfo calls by more reliable function to get number ↵ | Mounir IDRASSI | 1 | -9/+6 | |
of CPUs active on the PC. | |||||
2020-07-02 | Windows: Don't use API for Processor Groups support if there is only 1 CPU ↵ | Mounir IDRASSI | 2 | -37/+76 | |
group in the system. This can fix slowness issue observed on some PCs with AMD CPUs. | |||||
2020-06-29 | Windows: Fallback to Windows native formatting tool if we fail to format a ↵ | Mounir IDRASSI | 2 | -2/+153 | |
volume as NTFS/exFAT/ReFS using FormatEx function from fmifs.dll | |||||
2020-06-29 | Windows: Avoid displaying waiting dialog when /silent specified for ↵ | Mounir IDRASSI | 1 | -1/+1 | |
"VeraCrypt Format" during creating of file container using /create switch and a filesystem other than FAT (fixes Github issue #648) | |||||
2020-06-28 | Linux/MacOSX: Erase sensitive memory explicitly instead of relying on the ↵ | Mounir IDRASSI | 1 | -4/+0 | |
compiler not optimizing calls to method Memory::Erase | |||||
2020-06-28 | Windows: Fix build error because of missing definition of the macro move_ptr | Mounir IDRASSI | 1 | -0/+4 | |
2020-06-28 | Windows: remove unused code targeting Windows 2000. | Mounir IDRASSI | 2 | -10/+1 | |
2020-06-26 | Update Language.xml (#645) | Thomas De Rocker | 1 | -1/+1 | |
fix typo | |||||
2020-06-26 | Linux/MacOSX: use standard std::shared_ptr instead of our custom ↵ | Mounir IDRASSI | 1 | -2/+2 | |
implementation which is kept for compatibility with older compilers. We also introduce compatibility code for old compilers that don't define std::unique_ptr | |||||
2020-06-26 | Windows: fix warning reported by static code analyzed by adding copy ↵ | Mounir IDRASSI | 2 | -4/+32 | |
constructor to _TEXT_EDIT_DIALOG_PARAM and = operator to HostDevice | |||||
2020-06-23 | Increment version to 1.24-Update7 | Mounir IDRASSI | 1 | -3/+3 | |
2020-06-23 | Windows: Don't allow Hidden volume to have the same password, PIM and ↵ | Mounir IDRASSI | 1 | -0/+1 | |
keyfiles as Outer volume | |||||
2020-06-21 | Windows: support RAM encryption only if t1ha2 algorithm self test succeeds | Mounir IDRASSI | 1 | -1/+4 | |
2020-06-21 | Windows: Fix issue when RAM encryption used, AES selected and AES-NI not ↵ | Mounir IDRASSI | 2 | -0/+10 | |
supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected by user. | |||||
2020-06-21 | Windows: call VcProtectKeys in benchmark warm-up when RAM encryption is ↵ | Mounir IDRASSI | 1 | -0/+4 | |
enabled in order to be follow the same execution path as the result of benchmark calculations. | |||||
2020-06-19 | Windows: Fix wrong results in benchmark of encryption algorithms when RAM ↵ | Mounir IDRASSI | 1 | -0/+5 | |
encryption is enabled | |||||
2020-06-19 | Windows: remove duplicated function to detect AES-NI support in CPU | Mounir IDRASSI | 1 | -1/+1 | |
2020-06-12 | Windows: Update IDRIX SHA-1 code signing certificate to latest one. | Mounir IDRASSI | 1 | -6/+6 | |
2020-06-11 | Switch from auto_ptr to unique_ptr (#638) | Christopher Bergqvist | 4 | -13/+13 | |
2020-03-10 | Increment version to 1.24-Update6 | Mounir IDRASSI | 1 | -2/+2 | |
2020-03-10 | Windows setup: Fix wrong language used in installer if we select a language ↵ | Mounir IDRASSI | 1 | -0/+1 | |
in the language selection dialog and then select English followed by OK. | |||||
2020-03-10 | Update copyright year in creditsVeraCrypt_1.24-Update5 | Mounir IDRASSI | 1 | -3/+3 | |
2020-03-10 | Windows: Add missing libzip file to the build project | Mounir IDRASSI | 2 | -0/+4 | |
2020-03-10 | Set release date of 1.24-Update5 and update release notes | Mounir IDRASSI | 1 | -2/+2 | |
2020-03-10 | Windows: Update libzip to 1.6.1 | Mounir IDRASSI | 112 | -266/+585 | |
2020-03-10 | Windows: Fix compilation error caused by previous keyfile commit | Mounir IDRASSI | 1 | -0/+2 | |
2020-03-10 | Windows: Fix keyfiles path passed as CLI argument and set as default not ↵ | Mounir IDRASSI | 1 | -1/+3 | |
always cleared from RAM when VeraCrypt exits | |||||
2020-02-11 | Increment version to 1.24-Update5 and update signed Windows drivers. | Mounir IDRASSI | 1 | -3/+3 | |
2020-02-10 | Windows: Implement support for processor groups in the driver and fix build ↵ | Mounir IDRASSI | 2 | -54/+78 | |
issues caused by previous implementation | |||||
2020-02-10 | Windows: Fix warnings reported by Coverity static code analyzer | Mounir IDRASSI | 1 | -4/+7 | |
2020-01-29 | Adding Processor Groups support for more than 64 processors (#581) | techvintage | 1 | -3/+57 | |
* Adding Processor Groups support for more than 64 processors * Revert " Adding Processor Groups support for more than 64 processors" This reverts commit e1d5fe0a55f46a53549450972c5b5506a43ca94c. * Adding Processor Groups support for >64 logical processors | |||||
2020-01-22 | Windows: use fix for CVE-2019-19501 only when process elevated otherwise it ↵ | Mounir IDRASSI | 1 | -1/+22 | |
will not add any benefit compared to standard ShellExecute while at the same time potentially causing issue when opening links. | |||||
2020-01-22 | Increment version to 1.24-Update4 and update Release Notes | Mounir IDRASSI | 1 | -4/+4 | |
2020-01-22 | Windows: Fix regression in Expander and Format when RAM encryption is enable ↵ | Mounir IDRASSI | 2 | -2/+106 | |
that was causing volume headers to be corrupted. | |||||
2020-01-21 | Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵ | Mounir IDRASSI | 2 | -3/+2 | |
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536 | |||||
2020-01-21 | Windows: don't display mount/dismount examples in help dialog for command ↵ | Mounir IDRASSI | 1 | -2/+2 | |
line in Format and Expander | |||||
2019-12-22 | Increment version to 1.24-Update3 for Linux and update Release NotesVeraCrypt_1.24-Update3 | Mounir IDRASSI | 1 | -2/+2 | |
2019-12-16 | Update version information in preparation for 1.24-Update2 release | Mounir IDRASSI | 1 | -1/+1 | |
2019-12-13 | Windows: check "TrueCrypt Mode" in password dialog when mounting a file ↵ | Mounir IDRASSI | 2 | -0/+10 | |
container with .tc extension | |||||
2019-12-10 | Increment version to 1.24-Update2 | Mounir IDRASSI | 1 | -3/+3 | |
2019-12-10 | Windows: Add switch /FastCreateFile for VeraCrypt Format.exe to speedup ↵ | Mounir IDRASSI | 2 | -2/+24 | |
creation of large file container if quick format is selected. This switch comes with security issues since it will embed existing content on disk into the file container which may expose sensitive content to an attacker who has access to the file container. | |||||
2019-12-09 | Linux: fix NOASM compilation (#563) (#568) | alt3r 3go | 1 | -3/+3 | |
Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com> | |||||
2019-12-08 | Windows: use fix for CVE-2019-19501 only on Vista and above since it doesn't ↵ | Mounir IDRASSI | 1 | -1/+2 | |
make sens under XP. | |||||
2019-12-08 | Windows: enhancements to the mechanism preserving file timestamps, ↵ | Mounir IDRASSI | 4 | -54/+57 | |
especially for keyfiles. | |||||
2019-12-08 | Windows: Add missing defines in Tcdefs.h | Mounir IDRASSI | 1 | -0/+9 | |
2019-12-05 | Windows: Modify memory process protection when running with admin privileges ↵ | Mounir IDRASSI | 1 | -1/+12 | |
to allow calling functions needed for CVE-2019-19501 fix while still protecting against memory access by non-admin processes. |