Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2020-06-26 | Linux/MacOSX: use standard std::shared_ptr instead of our custom ↵ | Mounir IDRASSI | 1 | -2/+2 | |
implementation which is kept for compatibility with older compilers. We also introduce compatibility code for old compilers that don't define std::unique_ptr | |||||
2020-06-26 | Windows: fix warning reported by static code analyzed by adding copy ↵ | Mounir IDRASSI | 2 | -4/+32 | |
constructor to _TEXT_EDIT_DIALOG_PARAM and = operator to HostDevice | |||||
2020-06-23 | Increment version to 1.24-Update7 | Mounir IDRASSI | 1 | -3/+3 | |
2020-06-23 | Windows: Don't allow Hidden volume to have the same password, PIM and ↵ | Mounir IDRASSI | 1 | -0/+1 | |
keyfiles as Outer volume | |||||
2020-06-21 | Windows: support RAM encryption only if t1ha2 algorithm self test succeeds | Mounir IDRASSI | 1 | -1/+4 | |
2020-06-21 | Windows: Fix issue when RAM encryption used, AES selected and AES-NI not ↵ | Mounir IDRASSI | 2 | -0/+10 | |
supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected by user. | |||||
2020-06-21 | Windows: call VcProtectKeys in benchmark warm-up when RAM encryption is ↵ | Mounir IDRASSI | 1 | -0/+4 | |
enabled in order to be follow the same execution path as the result of benchmark calculations. | |||||
2020-06-19 | Windows: Fix wrong results in benchmark of encryption algorithms when RAM ↵ | Mounir IDRASSI | 1 | -0/+5 | |
encryption is enabled | |||||
2020-06-19 | Windows: remove duplicated function to detect AES-NI support in CPU | Mounir IDRASSI | 1 | -1/+1 | |
2020-06-12 | Windows: Update IDRIX SHA-1 code signing certificate to latest one. | Mounir IDRASSI | 1 | -6/+6 | |
2020-06-11 | Switch from auto_ptr to unique_ptr (#638) | Christopher Bergqvist | 4 | -13/+13 | |
2020-03-10 | Increment version to 1.24-Update6 | Mounir IDRASSI | 1 | -2/+2 | |
2020-03-10 | Windows setup: Fix wrong language used in installer if we select a language ↵ | Mounir IDRASSI | 1 | -0/+1 | |
in the language selection dialog and then select English followed by OK. | |||||
2020-03-10 | Update copyright year in creditsVeraCrypt_1.24-Update5 | Mounir IDRASSI | 1 | -3/+3 | |
2020-03-10 | Windows: Add missing libzip file to the build project | Mounir IDRASSI | 2 | -0/+4 | |
2020-03-10 | Set release date of 1.24-Update5 and update release notes | Mounir IDRASSI | 1 | -2/+2 | |
2020-03-10 | Windows: Update libzip to 1.6.1 | Mounir IDRASSI | 112 | -266/+585 | |
2020-03-10 | Windows: Fix compilation error caused by previous keyfile commit | Mounir IDRASSI | 1 | -0/+2 | |
2020-03-10 | Windows: Fix keyfiles path passed as CLI argument and set as default not ↵ | Mounir IDRASSI | 1 | -1/+3 | |
always cleared from RAM when VeraCrypt exits | |||||
2020-02-11 | Increment version to 1.24-Update5 and update signed Windows drivers. | Mounir IDRASSI | 1 | -3/+3 | |
2020-02-10 | Windows: Implement support for processor groups in the driver and fix build ↵ | Mounir IDRASSI | 2 | -54/+78 | |
issues caused by previous implementation | |||||
2020-02-10 | Windows: Fix warnings reported by Coverity static code analyzer | Mounir IDRASSI | 1 | -4/+7 | |
2020-01-29 | Adding Processor Groups support for more than 64 processors (#581) | techvintage | 1 | -3/+57 | |
* Adding Processor Groups support for more than 64 processors * Revert " Adding Processor Groups support for more than 64 processors" This reverts commit e1d5fe0a55f46a53549450972c5b5506a43ca94c. * Adding Processor Groups support for >64 logical processors | |||||
2020-01-22 | Windows: use fix for CVE-2019-19501 only when process elevated otherwise it ↵ | Mounir IDRASSI | 1 | -1/+22 | |
will not add any benefit compared to standard ShellExecute while at the same time potentially causing issue when opening links. | |||||
2020-01-22 | Increment version to 1.24-Update4 and update Release Notes | Mounir IDRASSI | 1 | -4/+4 | |
2020-01-22 | Windows: Fix regression in Expander and Format when RAM encryption is enable ↵ | Mounir IDRASSI | 2 | -2/+106 | |
that was causing volume headers to be corrupted. | |||||
2020-01-21 | Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵ | Mounir IDRASSI | 2 | -3/+2 | |
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536 | |||||
2020-01-21 | Windows: don't display mount/dismount examples in help dialog for command ↵ | Mounir IDRASSI | 1 | -2/+2 | |
line in Format and Expander | |||||
2019-12-22 | Increment version to 1.24-Update3 for Linux and update Release NotesVeraCrypt_1.24-Update3 | Mounir IDRASSI | 1 | -2/+2 | |
2019-12-16 | Update version information in preparation for 1.24-Update2 release | Mounir IDRASSI | 1 | -1/+1 | |
2019-12-13 | Windows: check "TrueCrypt Mode" in password dialog when mounting a file ↵ | Mounir IDRASSI | 2 | -0/+10 | |
container with .tc extension | |||||
2019-12-10 | Increment version to 1.24-Update2 | Mounir IDRASSI | 1 | -3/+3 | |
2019-12-10 | Windows: Add switch /FastCreateFile for VeraCrypt Format.exe to speedup ↵ | Mounir IDRASSI | 2 | -2/+24 | |
creation of large file container if quick format is selected. This switch comes with security issues since it will embed existing content on disk into the file container which may expose sensitive content to an attacker who has access to the file container. | |||||
2019-12-09 | Linux: fix NOASM compilation (#563) (#568) | alt3r 3go | 1 | -3/+3 | |
Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com> | |||||
2019-12-08 | Windows: use fix for CVE-2019-19501 only on Vista and above since it doesn't ↵ | Mounir IDRASSI | 1 | -1/+2 | |
make sens under XP. | |||||
2019-12-08 | Windows: enhancements to the mechanism preserving file timestamps, ↵ | Mounir IDRASSI | 4 | -54/+57 | |
especially for keyfiles. | |||||
2019-12-08 | Windows: Add missing defines in Tcdefs.h | Mounir IDRASSI | 1 | -0/+9 | |
2019-12-05 | Windows: Modify memory process protection when running with admin privileges ↵ | Mounir IDRASSI | 1 | -1/+12 | |
to allow calling functions needed for CVE-2019-19501 fix while still protecting against memory access by non-admin processes. | |||||
2019-12-05 | Windows: Enhancement to the fix for CVE-2019-19501 | Mounir IDRASSI | 1 | -3/+6 | |
2019-12-03 | Windows: Fix possible local privilege escalation vulnerability during ↵ | Mounir IDRASSI | 2 | -21/+231 | |
execution of VeraCrypt Expander (CVE-2019-19501) | |||||
2019-11-27 | Windows: compatibility with multi-OS boot configuration by only setting ↵ | Mounir IDRASSI | 3 | -9/+38 | |
VeraCrypt as first bootloader of the system if the current first bootloader is Windows one. | |||||
2019-11-27 | Windows: Don't restore MBR to VeraCrypt value if it is coming from a loader ↵ | Mounir IDRASSI | 1 | -2/+25 | |
different from us or different from Microsoft one. | |||||
2019-11-22 | Windows: Add new registry flags for SystemFavoritesService to control ↵ | Mounir IDRASSI | 2 | -21/+37 | |
updating of EFI BIOS boot menu on shutdown. This will help better manage multi-boot scenarios where we should not mess up with boot order (e.g. grub2 case) | |||||
2019-11-07 | Increment version to 1.24-Hotfix2 | Mounir IDRASSI | 1 | -3/+3 | |
2019-11-04 | Windows: Display error message when password is too long and legacy maximum ↵ | Mounir IDRASSI | 1 | -1/+1 | |
length used | |||||
2019-11-04 | Linux/MacOSX: Add switch to force the use of legacy maximum password length ↵ | Mounir IDRASSI | 1 | -0/+1 | |
(64 UTF8 bytes) The switch is --legacy-password-maxlength | |||||
2019-11-02 | Start following IEEE 1541 agreed naming of bytes (#532) | Meteor0id | 1 | -45/+45 | |
* Start following IEEE 1541 agreed naming of bytes This standard exists to prevent any confusion about the actual number of bytes. It has been agreed on by experts and is being used more widespead these day. Let's start properly naming the number of bytes, which is absolutely important in disk encryption software. * Update LanguageStrings.cpp * Update UserInterface.cpp * kibibyte instead of kilobyte * kibibyte instead of kilobyte * MiB instead of MB * undo accidental deletions Odd indeed that two random lines were deleted in a previous commit. Probably happened when using a keyboard shortcut while editing the file. This fixes the issue. * Mb to Mib | |||||
2019-10-27 | Windows: Update Release Notes and set 1.24-Hotfix1 release date to October 27th. | Mounir IDRASSI | 1 | -1/+1 | |
2019-10-27 | Windows: fix failure to create rescue and thus to encrypt the system if the ↵ | Mounir IDRASSI | 1 | -6/+13 | |
Windows username contains a UNICODE non-ASCII character (cf https://github.com/veracrypt/VeraCrypt/issues/441) | |||||
2019-10-27 | Windows: code refactoring and convert NTSTATUS error code to WIN32 ↵ | Mounir IDRASSI | 2 | -41/+26 | |
equivalent before displaying error message. |