Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2021-11-28 | Increment version to 1.25 (1.25.3) | Mounir IDRASSI | 1 | -2/+2 | |
2021-11-21 | Increment version to 1.25-RC2 and update release notes | Mounir IDRASSI | 1 | -2/+2 | |
2021-09-05 | Increment version to 1.25-RC1 | Mounir IDRASSI | 1 | -2/+2 | |
2021-08-30 | Increment version to 1.25 | Mounir IDRASSI | 1 | -4/+4 | |
2021-08-15 | Windows: Increment version to 1.24.25.3 and update signed Windows driver | Mounir IDRASSI | 1 | -2/+2 | |
2021-08-02 | Windows: Increment version to 1.24.25.2 and update signed Windows driver | Mounir IDRASSI | 1 | -2/+2 | |
2021-07-13 | Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure ↵ | Mounir IDRASSI | 1 | -1/+2 | |
equivalents This fixed failure to build driver for ARM64 with latest VS 2019 | |||||
2021-02-21 | interface: add keyboard shortcut to "TrueCrypt mode" in the mount dialog (#729) | alt3r 3go | 1 | -1/+1 | |
I've also updated all the relevant language files. Closes #95. Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com> | |||||
2021-01-02 | Increment version to 1.24-Update9 | Mounir IDRASSI | 1 | -4/+4 | |
2021-01-02 | Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵ | Mounir IDRASSI | 2 | -0/+1095 | |
System encryption still not implemented on ARM64 | |||||
2020-11-29 | Increment version to 1.24-Update8 | Mounir IDRASSI | 1 | -4/+4 | |
2020-08-06 | Increment internal version to 1.24.23 and update release notes | Mounir IDRASSI | 1 | -2/+2 | |
2020-08-06 | Increment internal version to 1.24.22 and update release notes | Mounir IDRASSI | 1 | -2/+2 | |
2020-08-03 | Increment internal version to 1.24.21 and update release notes | Mounir IDRASSI | 1 | -2/+2 | |
2020-07-22 | Increment internal version to 1.24.20 and update release notes | Mounir IDRASSI | 1 | -2/+2 | |
2020-07-06 | Windows: Support direct password drag-n-drop from external applications ↵ | Mounir IDRASSI | 1 | -0/+24 | |
(e.g. KeePass) which is more secure than using clipboard. | |||||
2020-07-04 | Increment internal version to 1.24.19 | Mounir IDRASSI | 1 | -2/+2 | |
2020-06-29 | Increment internal version to 1.24.18 and update signed Windows drivers. | Mounir IDRASSI | 1 | -2/+2 | |
2020-06-23 | Increment version to 1.24-Update7 | Mounir IDRASSI | 1 | -4/+4 | |
2020-06-21 | Windows: Fix issue when RAM encryption used, AES selected and AES-NI not ↵ | Mounir IDRASSI | 1 | -0/+5 | |
supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected by user. | |||||
2020-03-10 | Increment version to 1.24-Update6 | Mounir IDRASSI | 1 | -4/+4 | |
2020-02-11 | Increment version to 1.24-Update5 and update signed Windows drivers. | Mounir IDRASSI | 1 | -4/+4 | |
2020-02-10 | Windows: Fix warnings reported by Coverity static code analyzer | Mounir IDRASSI | 1 | -5/+6 | |
2020-01-22 | Increment version to 1.24-Update4 and update Release Notes | Mounir IDRASSI | 1 | -4/+4 | |
2020-01-22 | Windows: Fix regression in Expander and Format when RAM encryption is enable ↵ | Mounir IDRASSI | 2 | -0/+70 | |
that was causing volume headers to be corrupted. | |||||
2020-01-21 | Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵ | Mounir IDRASSI | 1 | -0/+69 | |
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536 | |||||
2019-12-16 | Update version information in preparation for 1.24-Update2 release | Mounir IDRASSI | 1 | -2/+2 | |
2019-12-10 | Increment version to 1.24-Update2 | Mounir IDRASSI | 1 | -4/+4 | |
2019-12-08 | Windows: enhancements to the mechanism preserving file timestamps, ↵ | Mounir IDRASSI | 1 | -14/+21 | |
especially for keyfiles. | |||||
2019-12-03 | Windows: Fix possible local privilege escalation vulnerability during ↵ | Mounir IDRASSI | 1 | -1/+1 | |
execution of VeraCrypt Expander (CVE-2019-19501) | |||||
2019-11-07 | Increment version to 1.24-Hotfix2 | Mounir IDRASSI | 1 | -4/+4 | |
2019-10-24 | Increment version to 1.24-Hotfix1 | Mounir IDRASSI | 1 | -4/+4 | |
2019-10-23 | Windows: A Quick Expand option to VeraCrypt Expander to allow quicker ↵ | Mounir IDRASSI | 5 | -12/+95 | |
expansion of file containers after warning about security issues associated with it. | |||||
2019-10-20 | Increment version to 1.23-Hotfix1-Preview | Mounir IDRASSI | 1 | -4/+4 | |
2019-10-18 | Windows: make VeraCrypt Expander able to resume expansion of volumes whose ↵ | Mounir IDRASSI | 2 | -7/+18 | |
previous expansion was aborted before it finishes | |||||
2019-10-06 | Increment version to 1.24 | Mounir IDRASSI | 1 | -2/+2 | |
2019-10-02 | Increment version to 1.24-Beta6 | Mounir IDRASSI | 1 | -4/+4 | |
2019-03-09 | Increment version to 1.24-Beta5 | Mounir IDRASSI | 1 | -4/+4 | |
2019-03-09 | Increment version to 1.24-Beta4 and update release notes to clarify that ↵ | Mounir IDRASSI | 1 | -4/+4 | |
password length increase applies only to non-system volumes. | |||||
2019-03-03 | Increment version to 1.24-Beta3. Update Release Notes. | Mounir IDRASSI | 1 | -4/+4 | |
2019-03-03 | Windows: replicate old behavior when handling passwords in UI when legacy ↵ | Mounir IDRASSI | 1 | -1/+4 | |
password maximum length option selected | |||||
2019-03-02 | Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵ | Mounir IDRASSI | 1 | -0/+7 | |
especially Format and Expander | |||||
2019-02-04 | Automatically truncate passwords for TrueCrypt volumes and System Encryption ↵ | Mounir IDRASSI | 1 | -2/+3 | |
to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version. | |||||
2019-01-28 | Increment version to 1.24-Beta2 | Mounir IDRASSI | 1 | -4/+4 | |
2019-01-26 | Windows: Add a build configuration containing EFI bootloader signed with ↵ | Mounir IDRASSI | 1 | -0/+147 | |
custom SecureBoot key instead | |||||
2019-01-21 | Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵ | Mounir IDRASSI | 1 | -2/+2 | |
not needed after their key schedule is created | |||||
2019-01-14 | Increment version to 1.24-Beta1 | Mounir IDRASSI | 1 | -4/+4 | |
2018-12-19 | Increment version to 1.24-Beta0 | Mounir IDRASSI | 1 | -4/+4 | |
2018-10-10 | Increment version to 1.23-Hotfix-2 | Mounir IDRASSI | 1 | -4/+4 | |
2018-09-21 | Increment version to 1.23-Hotfix-1 | Mounir IDRASSI | 1 | -4/+4 | |