Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2019-10-25 | Windows: only update MBR first 512 bytes if they have changed and don't ↵ | Mounir IDRASSI | 1 | -30/+45 | |
update full MBR bootload in case of PostOOBE | |||||
2019-10-25 | Windows: Avoid unnecessarily update of system encryption SetupConfig related ↵ | Mounir IDRASSI | 1 | -4/+53 | |
files if there content didn't change | |||||
2019-10-24 | Increment version to 1.24-Hotfix1 | Mounir IDRASSI | 1 | -2/+2 | |
2019-10-20 | Increment version to 1.23-Hotfix1-Preview | Mounir IDRASSI | 1 | -2/+2 | |
2019-10-20 | Windows: Avoid unnecessary write operations when copying/modifying EFI ↵ | Mounir IDRASSI | 2 | -6/+126 | |
bootloader files in order to avoid leaking modification timestamp | |||||
2019-10-20 | Windows: add more checks to correctly identify Microsoft original bootloader. | Mounir IDRASSI | 1 | -3/+24 | |
2019-10-20 | Windows: Add checks that the System Favorites service is running. Warn user ↵ | Mounir IDRASSI | 4 | -3/+42 | |
if he enabled option to clear RAM encryption keys and the service is stopped. | |||||
2019-10-18 | Windows: handle case of DcsProp configuration file for EFI system encryption ↵ | Mounir IDRASSI | 2 | -30/+93 | |
contains wrong "ActionSuccess" entry that points towards bootmgfw.efi which is now our bootloader and not Microsoft one. | |||||
2019-10-14 | Windows: Fix regression that causes system favorites not to mount if ↵ | Mounir IDRASSI | 1 | -1/+9 | |
VeraCrypt 1.24 is freshly installed and not updated. | |||||
2019-10-06 | Increment version to 1.24 | Mounir IDRASSI | 1 | -2/+2 | |
2019-10-04 | Windows: Update libzip to version 1.5.2 | Mounir IDRASSI | 112 | -164/+247 | |
2019-10-03 | Windows: If Secure Desktop is started and random generator was not ↵ | Mounir IDRASSI | 1 | -53/+70 | |
initialized before us, then stop random generator after we finish in order to avoid consuming CPU because of periodic fast poll thread. Next time a critical operation that requires RNG is performed, it will be initialized again. We do this because since the addition of secure desktop support, every time secure desktop is displayed, the RNG fast poll thread was started even if the user will never perform any critical operation that requires random bytes. | |||||
2019-10-03 | Windows: Add function RandinitWithCheck to detect if random generator was ↵ | Mounir IDRASSI | 2 | -1/+14 | |
already initialized before our call or not | |||||
2019-10-03 | Windows: Use Jitterentropy RNG only in SlowPoll call and not in FastPoll ↵ | Mounir IDRASSI | 1 | -13/+0 | |
since the it consumes too much CPU and FastPoll requires fast and minimal entropy gathering | |||||
2019-10-03 | '#define VERSION_STRING XXX' must come before '#define VERSION_STRING_SUFFIX ↵ | El Mostafa Idrassi | 1 | -3/+3 | |
YYY' (#506) in order for 'export TC_VERSION := $(shell grep VERSION_STRING ../Common/Tcdefs.h | head -n 1 | cut -d'"' -f 2)' in 'src/Main/Main.make' to actually return the version rather than '-CustomEFI'. | |||||
2019-10-02 | Increment version to 1.24-Beta6 | Mounir IDRASSI | 1 | -3/+3 | |
2019-09-30 | Windows: when periodic update of device is disabled, use SetupAPI to list ↵ | Mounir IDRASSI | 1 | -1/+3 | |
disks on demand instead of testing all disks to reduce CPU usage. | |||||
2019-09-30 | Windows: resize VeraCrypt Format Wizard and Mount Options dialogs to fix ↵ | Mounir IDRASSI | 1 | -24/+25 | |
some text truncation issues with non-English languages. | |||||
2019-09-29 | Windows: Update the encoded hash of the code signing certificate used to ↵ | Mounir IDRASSI | 1 | -6/+6 | |
verify the integrity of binaries. | |||||
2019-09-29 | Windows: Use periodic update of connected devices only if there is a ↵ | Mounir IDRASSI | 2 | -1/+7 | |
Favorite that uses VolumeID. Add command option to disable the period update of devices. | |||||
2019-09-27 | Windows: fix another typo in code comment (hopefully last one!) | Mounir IDRASSI | 1 | -1/+1 | |
2019-09-27 | Windows: fix typo in code comment | Mounir IDRASSI | 1 | -1/+1 | |
2019-09-26 | Windows: Fix sporadic keyboard issue in Secure Desktop for password dialog ↵ | Mounir IDRASSI | 2 | -1/+6 | |
by not using the trick to put it reliably in foreground. The trick is based on a emulation of ALT+TAB but sometimes ALT key would remain pressed in case of Secure Desktop making it impossible to type the password (a workaround was to press CTRL key which reset the state of ALT key) | |||||
2019-09-25 | Windows: Add two missing UI strings to XML translation files so that they ↵ | Mounir IDRASSI | 2 | -1/+3 | |
can be localized correctly | |||||
2019-09-23 | Fix build error of UEFI bootloader caused by latest changes that introduced ↵ | Mounir IDRASSI | 2 | -1/+3 | |
ChaCha20 and T1HA algorithms and which are not present nor used in UEFI bootloader | |||||
2019-03-09 | Increment version to 1.24-Beta5 | Mounir IDRASSI | 1 | -2/+2 | |
2019-03-09 | Increment version to 1.24-Beta4 and update release notes to clarify that ↵ | Mounir IDRASSI | 1 | -2/+2 | |
password length increase applies only to non-system volumes. | |||||
2019-03-03 | Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt ↵ | Mounir IDRASSI | 1 | -0/+2 | |
driver | |||||
2019-03-03 | Fix formatting of credits in About dialog and documentation | Mounir IDRASSI | 1 | -1/+1 | |
2019-03-03 | Windows: Add missing UI string to XML language files. | Mounir IDRASSI | 1 | -0/+1 | |
2019-03-03 | Increment version to 1.24-Beta3. Update Release Notes. | Mounir IDRASSI | 1 | -3/+3 | |
2019-03-03 | Windows: Add option to use legacy maximum password length (64 characters) ↵ | Mounir IDRASSI | 4 | -6/+12 | |
instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt. | |||||
2019-03-02 | Windows: fix compilation error | Mounir IDRASSI | 1 | -1/+1 | |
2019-03-02 | Windows: mitigate some memory attacks by making VeraCrypt applications ↵ | Mounir IDRASSI | 2 | -0/+91 | |
memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code (https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150) | |||||
2019-03-02 | Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵ | Mounir IDRASSI | 8 | -4/+117 | |
especially Format and Expander | |||||
2019-03-01 | Windows: better debug messages for VcProtectKeys and VcUnprotectKeys functions | Mounir IDRASSI | 1 | -3/+11 | |
2019-03-01 | Windows Driver: Implement RAM encryption for cached passwords | Mounir IDRASSI | 3 | -11/+91 | |
2019-03-01 | Windows: Add some logs in functions for RAM encryption | Mounir IDRASSI | 1 | -0/+8 | |
2019-03-01 | Windows: use specific order for EFI boot arguments memory regions that ↵ | Mounir IDRASSI | 1 | -0/+8 | |
matches the one used by EFI bootloader. | |||||
2019-03-01 | Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵ | Mounir IDRASSI | 5 | -6/+279 | |
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha) | |||||
2019-02-15 | Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it ↵ | Mounir IDRASSI | 2 | -2/+2 | |
in Mount.c | |||||
2019-02-15 | Windows: Set CpuRngDisabled variable to TRUE for clarity even if it will be ↵ | Mounir IDRASSI | 1 | -1/+1 | |
set to TRUE anyway by default through EnableCpuRng calls | |||||
2019-02-12 | Add copyright and license information of JitterEntropy library by Stephan ↵ | Mounir IDRASSI | 1 | -2/+3 | |
Mueller | |||||
2019-02-12 | Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by ↵ | Mounir IDRASSI | 1 | -0/+27 | |
Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de) | |||||
2019-02-10 | Windows: Ensure that only one thread at a time can create a secure desktop | Mounir IDRASSI | 1 | -0/+8 | |
2019-02-10 | Fix typo in CPU RNG detection condition (Github issue #417) | Mounir IDRASSI | 1 | -1/+1 | |
2019-02-08 | Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵ | Mounir IDRASSI | 5 | -5/+39 | |
which is now disabled by default | |||||
2019-02-04 | Automatically truncate passwords for TrueCrypt volumes and System Encryption ↵ | Mounir IDRASSI | 2 | -2/+4 | |
to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version. | |||||
2019-02-01 | Update Release Notes and other files for 1.24-Beta2 release | Mounir IDRASSI | 1 | -1/+1 | |
2019-02-01 | Windows: use CPU RDRAND or RDSEED as an additional entropy source for our ↵ | Mounir IDRASSI | 1 | -5/+25 | |
random generator when available |