Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2020-03-10 | Windows: Fix keyfiles path passed as CLI argument and set as default not ↵ | Mounir IDRASSI | 1 | -1/+3 | |
always cleared from RAM when VeraCrypt exits | |||||
2020-02-11 | Increment version to 1.24-Update5 and update signed Windows drivers. | Mounir IDRASSI | 1 | -3/+3 | |
2020-02-10 | Windows: Implement support for processor groups in the driver and fix build ↵ | Mounir IDRASSI | 2 | -54/+78 | |
issues caused by previous implementation | |||||
2020-02-10 | Windows: Fix warnings reported by Coverity static code analyzer | Mounir IDRASSI | 1 | -4/+7 | |
2020-01-29 | Adding Processor Groups support for more than 64 processors (#581) | techvintage | 1 | -3/+57 | |
* Adding Processor Groups support for more than 64 processors * Revert " Adding Processor Groups support for more than 64 processors" This reverts commit e1d5fe0a55f46a53549450972c5b5506a43ca94c. * Adding Processor Groups support for >64 logical processors | |||||
2020-01-22 | Windows: use fix for CVE-2019-19501 only when process elevated otherwise it ↵ | Mounir IDRASSI | 1 | -1/+22 | |
will not add any benefit compared to standard ShellExecute while at the same time potentially causing issue when opening links. | |||||
2020-01-22 | Increment version to 1.24-Update4 and update Release Notes | Mounir IDRASSI | 1 | -4/+4 | |
2020-01-22 | Windows: Fix regression in Expander and Format when RAM encryption is enable ↵ | Mounir IDRASSI | 2 | -2/+106 | |
that was causing volume headers to be corrupted. | |||||
2020-01-21 | Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵ | Mounir IDRASSI | 2 | -3/+2 | |
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536 | |||||
2020-01-21 | Windows: don't display mount/dismount examples in help dialog for command ↵ | Mounir IDRASSI | 1 | -2/+2 | |
line in Format and Expander | |||||
2019-12-22 | Increment version to 1.24-Update3 for Linux and update Release NotesVeraCrypt_1.24-Update3 | Mounir IDRASSI | 1 | -2/+2 | |
2019-12-16 | Update version information in preparation for 1.24-Update2 release | Mounir IDRASSI | 1 | -1/+1 | |
2019-12-13 | Windows: check "TrueCrypt Mode" in password dialog when mounting a file ↵ | Mounir IDRASSI | 2 | -0/+10 | |
container with .tc extension | |||||
2019-12-10 | Increment version to 1.24-Update2 | Mounir IDRASSI | 1 | -3/+3 | |
2019-12-10 | Windows: Add switch /FastCreateFile for VeraCrypt Format.exe to speedup ↵ | Mounir IDRASSI | 2 | -2/+24 | |
creation of large file container if quick format is selected. This switch comes with security issues since it will embed existing content on disk into the file container which may expose sensitive content to an attacker who has access to the file container. | |||||
2019-12-09 | Linux: fix NOASM compilation (#563) (#568) | alt3r 3go | 1 | -3/+3 | |
Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com> | |||||
2019-12-08 | Windows: use fix for CVE-2019-19501 only on Vista and above since it doesn't ↵ | Mounir IDRASSI | 1 | -1/+2 | |
make sens under XP. | |||||
2019-12-08 | Windows: enhancements to the mechanism preserving file timestamps, ↵ | Mounir IDRASSI | 4 | -54/+57 | |
especially for keyfiles. | |||||
2019-12-08 | Windows: Add missing defines in Tcdefs.h | Mounir IDRASSI | 1 | -0/+9 | |
2019-12-05 | Windows: Modify memory process protection when running with admin privileges ↵ | Mounir IDRASSI | 1 | -1/+12 | |
to allow calling functions needed for CVE-2019-19501 fix while still protecting against memory access by non-admin processes. | |||||
2019-12-05 | Windows: Enhancement to the fix for CVE-2019-19501 | Mounir IDRASSI | 1 | -3/+6 | |
2019-12-03 | Windows: Fix possible local privilege escalation vulnerability during ↵ | Mounir IDRASSI | 2 | -21/+231 | |
execution of VeraCrypt Expander (CVE-2019-19501) | |||||
2019-11-27 | Windows: compatibility with multi-OS boot configuration by only setting ↵ | Mounir IDRASSI | 3 | -9/+38 | |
VeraCrypt as first bootloader of the system if the current first bootloader is Windows one. | |||||
2019-11-27 | Windows: Don't restore MBR to VeraCrypt value if it is coming from a loader ↵ | Mounir IDRASSI | 1 | -2/+25 | |
different from us or different from Microsoft one. | |||||
2019-11-22 | Windows: Add new registry flags for SystemFavoritesService to control ↵ | Mounir IDRASSI | 2 | -21/+37 | |
updating of EFI BIOS boot menu on shutdown. This will help better manage multi-boot scenarios where we should not mess up with boot order (e.g. grub2 case) | |||||
2019-11-07 | Increment version to 1.24-Hotfix2 | Mounir IDRASSI | 1 | -3/+3 | |
2019-11-04 | Windows: Display error message when password is too long and legacy maximum ↵ | Mounir IDRASSI | 1 | -1/+1 | |
length used | |||||
2019-11-04 | Linux/MacOSX: Add switch to force the use of legacy maximum password length ↵ | Mounir IDRASSI | 1 | -0/+1 | |
(64 UTF8 bytes) The switch is --legacy-password-maxlength | |||||
2019-11-02 | Start following IEEE 1541 agreed naming of bytes (#532) | Meteor0id | 1 | -45/+45 | |
* Start following IEEE 1541 agreed naming of bytes This standard exists to prevent any confusion about the actual number of bytes. It has been agreed on by experts and is being used more widespead these day. Let's start properly naming the number of bytes, which is absolutely important in disk encryption software. * Update LanguageStrings.cpp * Update UserInterface.cpp * kibibyte instead of kilobyte * kibibyte instead of kilobyte * MiB instead of MB * undo accidental deletions Odd indeed that two random lines were deleted in a previous commit. Probably happened when using a keyboard shortcut while editing the file. This fixes the issue. * Mb to Mib | |||||
2019-10-27 | Windows: Update Release Notes and set 1.24-Hotfix1 release date to October 27th. | Mounir IDRASSI | 1 | -1/+1 | |
2019-10-27 | Windows: fix failure to create rescue and thus to encrypt the system if the ↵ | Mounir IDRASSI | 1 | -6/+13 | |
Windows username contains a UNICODE non-ASCII character (cf https://github.com/veracrypt/VeraCrypt/issues/441) | |||||
2019-10-27 | Windows: code refactoring and convert NTSTATUS error code to WIN32 ↵ | Mounir IDRASSI | 2 | -41/+26 | |
equivalent before displaying error message. | |||||
2019-10-27 | Windows: Make EFI System Encryption PostOOBE code more robust to failure to ↵ | Mounir IDRASSI | 2 | -92/+104 | |
access "\\\\?\\GLOBALROOT" disk namespace | |||||
2019-10-27 | Windows: Update EFI NVRAM variable only if changed or doesn't exist and add ↵ | Mounir IDRASSI | 2 | -11/+23 | |
configuration to force setting EFI BootNext to veraCrypt bootloader before each shutdown | |||||
2019-10-26 | Windows: Restore veraCrypt boot meny entry for system encryption more often, ↵ | Mounir IDRASSI | 1 | -7/+16 | |
especially during PostOOBE calls, and handle additional corner cases. | |||||
2019-10-25 | Set release date of 1.24-Hotfix1 to October 25th. | Mounir IDRASSI | 1 | -1/+1 | |
2019-10-25 | Windows: Fix test of GetPrivateProfileString output since this function ↵ | Mounir IDRASSI | 1 | -1/+1 | |
discards double quotation marks | |||||
2019-10-25 | Windows: only update MBR first 512 bytes if they have changed and don't ↵ | Mounir IDRASSI | 1 | -30/+45 | |
update full MBR bootload in case of PostOOBE | |||||
2019-10-25 | Windows: Avoid unnecessarily update of system encryption SetupConfig related ↵ | Mounir IDRASSI | 1 | -4/+53 | |
files if there content didn't change | |||||
2019-10-24 | Increment version to 1.24-Hotfix1 | Mounir IDRASSI | 1 | -2/+2 | |
2019-10-20 | Increment version to 1.23-Hotfix1-Preview | Mounir IDRASSI | 1 | -2/+2 | |
2019-10-20 | Windows: Avoid unnecessary write operations when copying/modifying EFI ↵ | Mounir IDRASSI | 2 | -6/+126 | |
bootloader files in order to avoid leaking modification timestamp | |||||
2019-10-20 | Windows: add more checks to correctly identify Microsoft original bootloader. | Mounir IDRASSI | 1 | -3/+24 | |
2019-10-20 | Windows: Add checks that the System Favorites service is running. Warn user ↵ | Mounir IDRASSI | 4 | -3/+42 | |
if he enabled option to clear RAM encryption keys and the service is stopped. | |||||
2019-10-18 | Windows: handle case of DcsProp configuration file for EFI system encryption ↵ | Mounir IDRASSI | 2 | -30/+93 | |
contains wrong "ActionSuccess" entry that points towards bootmgfw.efi which is now our bootloader and not Microsoft one. | |||||
2019-10-14 | Windows: Fix regression that causes system favorites not to mount if ↵ | Mounir IDRASSI | 1 | -1/+9 | |
VeraCrypt 1.24 is freshly installed and not updated. | |||||
2019-10-06 | Increment version to 1.24 | Mounir IDRASSI | 1 | -2/+2 | |
2019-10-04 | Windows: Update libzip to version 1.5.2 | Mounir IDRASSI | 112 | -164/+247 | |
2019-10-03 | Windows: If Secure Desktop is started and random generator was not ↵ | Mounir IDRASSI | 1 | -53/+70 | |
initialized before us, then stop random generator after we finish in order to avoid consuming CPU because of periodic fast poll thread. Next time a critical operation that requires RNG is performed, it will be initialized again. We do this because since the addition of secure desktop support, every time secure desktop is displayed, the RNG fast poll thread was started even if the user will never perform any critical operation that requires random bytes. | |||||
2019-10-03 | Windows: Add function RandinitWithCheck to detect if random generator was ↵ | Mounir IDRASSI | 2 | -1/+14 | |
already initialized before our call or not |