Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
44 hours | Windows: remove VS 2019 solution and project files since we migrated to VS 2022. | Mounir IDRASSI | 2 | -940/+0 | |
47 hours | Windows: move main project files and solution from VS 2010 to VS 2022. ↵ | Mounir IDRASSI | 4 | -826/+780 | |
Delete unused files. | |||||
2 days | Windows: Upgrade VS 2019 solution/projects to VS 2022. Remove Win32 ↵ | Mounir IDRASSI | 3 | -402/+423 | |
configuration for driver and binaries. Only setup remains 32-bit to be compatible with both x64 and arm64 Windows. | |||||
5 days | Windows: Remove support for 32-bit driver code. Set build target as Windows ↵ | Mounir IDRASSI | 7 | -324/+220 | |
10. Simplify code and fix all warnings in driver. | |||||
7 days | Add support for SHA-256 x86 instrinsic for enhance performance of ↵ | Mounir IDRASSI | 2 | -0/+9 | |
PBKDF2-HMAC-SHA256 | |||||
2024-09-08 | Windows: Add support for x86 and x64 build for driver and binaries using ↵ | Mounir IDRASSI | 2 | -76/+153 | |
Visual Studio 2019 We also enable Control Flow Guard and Spectre Mitigation | |||||
2024-08-02 | Increment version to 1.26.13. Update release notes. Update signed Windows ↵ | Mounir IDRASSI | 1 | -4/+4 | |
drivers. | |||||
2024-08-02 | Implement detection of volumes with vulnerable XTS master key. | Mounir IDRASSI | 2 | -1/+12 | |
If vulnerability detected, a warning message is displayed during mount or backup/restore header, and changing the password is disallowed since it will not change the master key. | |||||
2024-06-23 | MacOSX: Fix compiler warning | Mounir IDRASSI | 1 | -1/+1 | |
Update friend declaration in FuseService.h and refactor GetCharWidth to ComputeCharWidth in WaitDialog.h to avoif hiding GetCharWidth inherited from wxWindow | |||||
2024-06-22 | MacOSX: Add for using FUSE-T instead of MacFUSE | Mounir IDRASSI | 1 | -1/+1 | |
The build script build_veracrypt_macosx.h now accepts the argument -f to enable fuse-t support. It is also possible to set the environment variable VC_OSX_FUSET to 1 for FUSE-T support. A change was done in CoreUnix::GetMountedVolumes to add a waiting loop for control file to be accessible because when using FUSE-T there always a delay before control file can be serialized. | |||||
2024-06-12 | Avoid conflict with C++17 features std::byte by using uint8 type instead of byte | Mounir IDRASSI | 8 | -59/+59 | |
2023-11-09 | Increment version to 1.26.10. Update signed Windows drivers. | Mounir IDRASSI | 1 | -4/+4 | |
2023-11-08 | Windows: Fix failure to format some disks (e.g. VHDX) caused by partition ↵ | Mounir IDRASSI | 2 | -11/+10 | |
offset not 4K aligned Now we set offset to 1MB which is a typical values used for MBR disks. We also use a more standard way to calculate legacy number of cylinders | |||||
2023-10-11 | Increment version to 1.26.9 | Mounir IDRASSI | 1 | -4/+4 | |
2023-10-10 | Increment version to 1.26.8 | Mounir IDRASSI | 1 | -4/+4 | |
2023-09-30 | Increment version to 1.26.7. Set release date to October 1st. Update Windows ↵ | Mounir IDRASSI | 1 | -4/+4 | |
signed driver files. | |||||
2023-09-29 | Windows Driver: Use KeQueryInterruptTimePrecise on Windows 8.1 and newer as ↵ | Mounir IDRASSI | 1 | -2/+20 | |
better seed for internal RNG compared to KeQueryInterruptTime | |||||
2023-08-21 | Allow cross compilation. (#1182) | Unit 193 | 1 | -1/+1 | |
2023-08-14 | Increment version to 1.26.5. Update signed Windows drivers. | Mounir IDRASSI | 1 | -2/+2 | |
2023-08-13 | Windows: Implement support for mounting partially encrypted system partitions | Mounir IDRASSI | 4 | -5/+21 | |
For now, we force ReadOnly mounting for such partitions. | |||||
2023-07-22 | Windows: Remove TrueCrypt support. Increment version to 1.26.4. | Mounir IDRASSI | 4 | -25/+5 | |
2023-06-29 | EMV keyfile support: Overall code improvements and bug fixes | Mounir IDRASSI | 2 | -0/+144 | |
2023-05-18 | Fix compiler warnings (#1030) | David | 1 | -2/+2 | |
Fixing the following compiler warnings: FuseService.cpp: In function ‘int VeraCrypt::fuse_service_read(const char*, char*, size_t, off_t, fuse_file_info*)’: FuseService.cpp:233:12: warning: catching polymorphic type ‘struct VeraCrypt::MissingVolumeData’ by value [-Wcatch-value=] 233 | catch (MissingVolumeData) | ^~~~~~~~~~~~~~~~~ FuseService.cpp: In static member function ‘static int VeraCrypt::FuseService::ExceptionToErrorCode()’: FuseService.cpp:362:15: warning: catching polymorphic type ‘class std::bad_alloc’ by value [-Wcatch-value=] 362 | catch (std::bad_alloc) | ^~~~~~~~~ Apart from warnings, the current code creates unnecessary copies of the exception object in debug mode. (But not in -O3) | |||||
2022-03-21 | Increment version to 1.26 and update windows driver and MBR bootloader files | Mounir IDRASSI | 1 | -4/+4 | |
2022-03-08 | Implement support of Blake2s-256 hash algorithm and remove deprecated ↵ | Mounir IDRASSI | 4 | -23/+20 | |
algorithms RIPEMD-160 and GOST89. | |||||
2022-02-19 | Increment version to 1.25.9 and update Release Notes. | Mounir IDRASSI | 1 | -2/+2 | |
2022-02-16 | Increment version to 1.25.8.2 and update signed Windows drivers | Mounir IDRASSI | 1 | -2/+2 | |
2022-02-11 | Windows: Increment version to 1.25.8.1 and update signed Windows drivers | Mounir IDRASSI | 1 | -2/+2 | |
2022-02-10 | Windows Driver: Don't cache the password if outer volume mounting succeeds ↵ | Mounir IDRASSI | 1 | -2/+11 | |
but hidden volume mounting fails | |||||
2022-02-06 | Windows: Add registry setting to disable erasing encryption keys on Windows ↵ | Mounir IDRASSI | 4 | -2/+18 | |
shutdown/reboot. This helps solve BSOD during shutdown/reboot on some machines. Under "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt", create a REG_DWORD value named "VeraCryptEraseKeysShutdown" and set its value to 0. | |||||
2021-12-30 | Update Release Notes and add signed Windows driver. | Mounir IDRASSI | 1 | -2/+2 | |
2021-12-30 | Windows driver: Set maximum values for encryption queue parameters. Add ↵ | Mounir IDRASSI | 2 | -3/+18 | |
IOCTL code to read used values from user space maximum value for EncryptionFragmentSize is 2048 maximum value for EncryptionIoRequestCount is 8192 maximum value for EncryptionItemCount is (EncryptionIoRequestCount/2) | |||||
2021-12-30 | Windows Driver: Better code for EncryptionFragmentSize variable handling | Mounir IDRASSI | 1 | -4/+5 | |
2021-12-27 | Increment version to 1.25.6. Update Release Notes and add signed Windows driver. | Mounir IDRASSI | 1 | -2/+2 | |
2021-12-20 | Increment version to 1.25.5 and update release notes | Mounir IDRASSI | 1 | -2/+2 | |
2021-12-20 | Windows Driver: Add registry settings to control driver internal encryption ↵ | Mounir IDRASSI | 4 | -19/+130 | |
queue Under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt: - VeraCryptEncryptionFragmentSize (REG_DWORD): size of encryption data fragment in KiB. Default is 256. - VeraCryptEncryptionIoRequestCount (REG_DWORD): maximum number of parallel I/O requests. Default is 16. - VeraCryptEncryptionItemCount (REG_DWORD): maximum number of encryption queue items processed in parallel. Default is 8. | |||||
2021-11-30 | Increment version to 1.25.4 and set release date to December 3rd 2021 | Mounir IDRASSI | 1 | -2/+2 | |
2021-11-28 | Increment version to 1.25 (1.25.3) | Mounir IDRASSI | 1 | -2/+2 | |
2021-11-21 | Windows: Update signed Windows driver to version 1.25.2.0 | Mounir IDRASSI | 1 | -2/+2 | |
2021-11-21 | Increment version to 1.25-RC2 and update release notes | Mounir IDRASSI | 1 | -0/+134 | |
2021-08-30 | Increment version to 1.25 | Mounir IDRASSI | 1 | -4/+4 | |
2021-08-30 | Windows: Fix some VS static analyzed warnings | Mounir IDRASSI | 2 | -2/+2 | |
2021-08-24 | Windows Driver: Potential memory corruption caused by integer overflow in ↵ | Mounir IDRASSI | 1 | -21/+61 | |
IOCTL_STORAGE_MANAGE_DATA_SET_ATTRIBUTES (reported by I.V. Sprundel) | |||||
2021-08-15 | Windows: Increment version to 1.24.25.3 and update signed Windows driver | Mounir IDRASSI | 1 | -2/+2 | |
2021-08-02 | Windows: Increment version to 1.24.25.2 and update signed Windows driver | Mounir IDRASSI | 1 | -2/+2 | |
2021-07-14 | Add support for OpenBSD (#779) | kokokodak | 1 | -0/+13 | |
* OpenBSD: add basic support modified: Build/Include/Makefile.inc modified: Driver/Fuse/FuseService.cpp modified: Main/FatalErrorHandler.cpp modified: Makefile modified: Platform/Unix/File.cpp modified: Platform/Unix/FilesystemPath.cpp modified: Platform/Unix/SystemInfo.cpp * OpenBSD: some necessary files were missing new file: Core/Unix/OpenBSD/CoreOpenBSD.cpp new file: Core/Unix/OpenBSD/CoreOpenBSD.h new file: Core/Unix/OpenBSD/System.h | |||||
2021-07-13 | Windows: Update signed Windows driver to version 1.24.25.1 | Mounir IDRASSI | 1 | -2/+2 | |
2021-07-13 | Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure ↵ | Mounir IDRASSI | 1 | -2/+2 | |
equivalents This fixed failure to build driver for ARM64 with latest VS 2019 | |||||
2021-07-13 | Windows: Fix link error on ARM64 with latest VS2019 (undefined ↵ | Mounir IDRASSI | 1 | -2/+2 | |
__stdio_common_vswprintf symbol) | |||||
2021-02-27 | Windows: Block Windows from resizing system partition if it is encrypted. ↵ | Mounir IDRASSI | 3 | -18/+45 | |
This avoid issues during Windows Upgrade that sometimes resizes system partition which create problems if it is encrypted by VeraCrypt |