Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2024-11-16 | Windows: remove 32-bit logic from the code since we support only 64-bit. ↵ | Mounir IDRASSI | 1 | -22/+1 | |
remove 32-bit EFI bootloader files. We also fix intermediary files folder for Portable and Setup projects | |||||
2024-11-15 | Windows: Fix various compiler warnings | Mounir IDRASSI | 1 | -3/+3 | |
2024-11-13 | Windows: Remove support for 32-bit driver code. Set build target as Windows ↵ | Mounir IDRASSI | 1 | -9/+9 | |
10. Simplify code and fix all warnings in driver. | |||||
2024-06-12 | Avoid conflict with C++17 features std::byte by using uint8 type instead of byte | Mounir IDRASSI | 1 | -25/+25 | |
2023-10-13 | Windows: fallback to absolute positioning if relative positioning fails | Mounir IDRASSI | 1 | -10/+13 | |
This can serve as workaround if a disk rejects relative positioning for some reason. | |||||
2023-07-22 | Windows: Remove TrueCrypt support. Increment version to 1.26.4. | Mounir IDRASSI | 1 | -1/+1 | |
2023-06-04 | Windows: Possible workaround for logarithmic slowdown for Encrypt-In-Place ↵ | Mounir IDRASSI | 1 | -21/+51 | |
on large volumes (relates to #1063) We replace absolute file pointer moving by relative moving with respect to current position. This was implemented as a workaround to address the performance issues related to in-place encryption. When using SetFilePointerEx() with FILE_BEGIN as the reference point, reaching the end of large drives during in-place encryption can cause significant slowdowns. By moving the file pointer relatively, these performance issues are mitigated. | |||||
2022-03-26 | Windows: Add various checks to address Coverity reported issues. | Mounir IDRASSI | 1 | -0/+2 | |
2020-02-10 | Windows: Fix warnings reported by Coverity static code analyzer | Mounir IDRASSI | 1 | -8/+17 | |
2020-01-22 | Windows: Fix regression in Expander and Format when RAM encryption is enable ↵ | Mounir IDRASSI | 1 | -0/+41 | |
that was causing volume headers to be corrupted. | |||||
2019-03-02 | Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵ | Mounir IDRASSI | 1 | -2/+39 | |
especially Format and Expander | |||||
2017-07-27 | Windows: use large output buffer for IOCTL_DISK_GET_DRIVE_GEOMETRY_EX calls ↵ | Mounir IDRASSI | 1 | -9/+9 | |
to avoid failure with disk drivers that don't support returning only sizeof(DISK_GEOMETRY_EX). | |||||
2017-06-23 | Update IDRIX copyright year | Mounir IDRASSI | 1 | -1/+1 | |
2017-05-17 | Windows: use IOCTL_DISK_GET_DRIVE_GEOMETRY_EX instead of the deprecated ↵ | Mounir IDRASSI | 1 | -9/+9 | |
IOCTL_DISK_GET_DRIVE_GEOMETRY in order to get accurate disk size value. | |||||
2016-09-11 | Windows: in case of In-Place encryption, encrypt random data instead of ↵ | Mounir IDRASSI | 1 | -2/+2 | |
existing data when filling unused space like the other cases. | |||||
2016-08-15 | Windows: fill unused/reserved header areas with the result of encryption of ↵ | Mounir IDRASSI | 1 | -2/+2 | |
random data instead of the encryption of zeros for better entropy of resulting random data. | |||||
2016-08-15 | Windows: Fix vulnerability inherited from TrueCrypt that allows an attacker ↵ | Mounir IDRASSI | 1 | -0/+79 | |
to detect with high probability if a hidden volume is present. Vulnerability reported by Ivanov Alexey Mikhailovich. | |||||
2016-05-10 | Remove trailing whitespace | David Foerster | 1 | -47/+47 | |
2016-05-10 | Normalize all line terminators | David Foerster | 1 | -2293/+2293 | |
2016-02-16 | Windows: use buffer with known maximum length as input to FakeDosNameForDevice | Mounir IDRASSI | 1 | -4/+4 | |
2016-02-07 | Windows:Fix various issues and warnings reported by static code analysis ↵ | Mounir IDRASSI | 1 | -1/+11 | |
tool Coverity. | |||||
2016-01-20 | Copyright: update dates to include 2016. | Mounir IDRASSI | 1 | -1/+1 | |
2015-11-26 | Windows: Full UNICODE rewrite and implement support for UNICODE passwords. | Mounir IDRASSI | 1 | -35/+31 | |
2015-08-06 | Update license information to reflect the use of a dual license Apache 2.0 ↵ | Mounir IDRASSI | 1 | -5/+9 | |
and TrueCrypt 3.0. | |||||
2015-07-11 | Use Pim name for internal variables instead of the old name Pin | Mounir IDRASSI | 1 | -9/+9 | |
2015-07-06 | Windows: Display source location of errors in order to help diagnose issues ↵ | Mounir IDRASSI | 1 | -10/+10 | |
reported by users | |||||
2015-06-10 | Windows: solve installer issue on Windows 10 caused by failure to overwrite ↵ | Mounir IDRASSI | 1 | -2/+2 | |
VeraCrypt driver file. | |||||
2015-05-26 | Windows: first implementation of dynamic mode | Mounir IDRASSI | 1 | -5/+9 | |
2015-05-26 | Windows: solve 64-bit compilation warnings after checking that they are ↵ | Mounir IDRASSI | 1 | -2/+2 | |
harmless. | |||||
2015-05-17 | Windows: First implementation of non-system volumes decryption. | Mounir IDRASSI | 1 | -8/+570 | |
2015-02-09 | Static Code Analysis: Avoid over-flaw in arithmetic operations by adding ↵ | Mounir IDRASSI | 1 | -0/+12 | |
more checks. Add extra checks. Solve various issues. | |||||
2014-12-28 | Windows: support loading TrueCrypt volumes. Implement converting TrueCrypt ↵ | Mounir IDRASSI | 1 | -1/+1 | |
volumes to VeraCrypt using the change password functionality. | |||||
2014-12-27 | Windows: use the correct window handle for creating message boxes. This ↵ | Mounir IDRASSI | 1 | -49/+51 | |
became important after the introduction of the wait dialog in order to avoid having message boxes behind the wait dialog. | |||||
2014-12-16 | Windows: Enhance performance by implementing the possibility to choose the ↵ | Mounir IDRASSI | 1 | -4/+5 | |
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption. | |||||
2014-11-08 | Windows vulnerability fix: correct possible BSOD attack targeted towards ↵ | Mounir IDRASSI | 1 | -1/+9 | |
GetWipePassCount() / WipeBuffer() found by the Open Crypto Audit Project. | |||||
2014-11-08 | Lower number of times we overwrite volume header during the encryption of a ↵ | Mounir IDRASSI | 1 | -4/+4 | |
partition if the user choose to wipe the driver. Latest studies show that even one pass is enough to make data irretrievable. A value of 3 is a conservative approach that enhance performance without scarifying security. http://www.infosecisland.com/blogview/16130-The-Urban-Legend-of-Multipass-Hard-Disk-Overwrite.html http://digital-forensics.sans.org/blog/2009/01/15/overwriting-hard-drive-data/ | |||||
2014-11-08 | Static Code Analysis : Generalize the use of Safe String functions. Add some ↵ | Mounir IDRASSI | 1 | -16/+18 | |
NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL. | |||||
2014-11-08 | Change namespace from TrueCrypt to VeraCrypt. Rename method from Resources ↵ | Mounir IDRASSI | 1 | -1/+1 | |
Resources::GetTrueCryptIcon to Resources::GetVeraCryptIcon. | |||||
2014-11-08 | Modifications to remove all TrueCrypt references in names. generate new ↵ | Mounir IDRASSI | 1 | -1/+1 | |
GUIDs for VeraCrypt. Replace "TRUE" by "VERA" in volume headers and driver magic word. | |||||
2014-11-08 | Add original TrueCrypt 7.1a sources | Mounir IDRASSI | 1 | -0/+1692 | |