VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Mount/Mount.c
AgeCommit message (Collapse)AuthorFilesLines
2020-03-10Windows: Fix keyfiles path passed as CLI argument and set as default not ↵Mounir IDRASSI1-3/+6
always cleared from RAM when VeraCrypt exits
2020-02-10Windows: Fix warnings reported by Coverity static code analyzerMounir IDRASSI1-0/+7
2020-01-21Windows: Support notifying WAITFOR.EXE Windows command when VeraCrypt.exe ↵Mounir IDRASSI1-0/+54
exits if /q was specified in CLI. This done using the new switch "/signalExit" who must have a string parameter that must be the same as the one that will be specified for WAITFOR.EXE command.
2020-01-21Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵Mounir IDRASSI1-0/+14
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536
2019-12-13Windows: check "TrueCrypt Mode" in password dialog when mounting a file ↵Mounir IDRASSI1-1/+1
container with .tc extension
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI1-9/+15
especially for keyfiles.
2019-11-28Windows: Don't write extra 0x00 byte at the end of DcsProp file when ↵Mounir IDRASSI1-3/+4
modifying it through UI
2019-11-22Windows: Add new registry flags for SystemFavoritesService to control ↵Mounir IDRASSI1-2/+9
updating of EFI BIOS boot menu on shutdown. This will help better manage multi-boot scenarios where we should not mess up with boot order (e.g. grub2 case)
2019-11-12Windows: Allow system encrypted devices to be mounted from WindowsPE - even ↵csware1-4/+9
if changing the keyboard layout failed (#539) When my system broke and I had to use WindowsPE to rescue some files the password dialog always closed immediately. There was no chance to mount the system device using the GUI. It took me a while to realize that I could try using the CLI by passing the password as a parameter (which might not be so obvious for not advanced users). Signed-off-by: Sven Strickroth <email@cs-ware.de>
2019-10-27Windows: use strcmp to compare effective content of std::string since == ↵VeraCrypt_1.24-Hotfix1Mounir IDRASSI1-1/+1
operator may return false if one of the strins has an extra \0 at the end.
2019-10-27Windows: Only update boot configuration on disk if the user actually changed ↵Mounir IDRASSI1-25/+29
something in the UI
2019-10-27Windows: Update EFI NVRAM variable only if changed or doesn't exist and add ↵Mounir IDRASSI1-1/+4
configuration to force setting EFI BootNext to veraCrypt bootloader before each shutdown
2019-10-25Windows: for system encryption case, also perform automatic fix of boot ↵Mounir IDRASSI1-14/+10
configuration if MBR boot used and not only EFI.
2019-10-20Windows: Add checks that the System Favorites service is running. Warn user ↵Mounir IDRASSI1-1/+31
if he enabled option to clear RAM encryption keys and the service is stopped.
2019-09-29Windows: Use periodic update of connected devices only if there is a ↵Mounir IDRASSI1-8/+15
Favorite that uses VolumeID. Add command option to disable the period update of devices.
2019-09-26Windows: Fix sporadic keyboard issue in Secure Desktop for password dialog ↵Mounir IDRASSI1-1/+6
by not using the trick to put it reliably in foreground. The trick is based on a emulation of ALT+TAB but sometimes ALT key would remain pressed in case of Secure Desktop making it impossible to type the password (a workaround was to press CTRL key which reset the state of ALT key)
2019-09-24Windows: fix HourGlass cursor showing up in main UI after launching disk ↵Mounir IDRASSI1-4/+0
decryption wizard/
2019-03-08Windows: inform user that RAM encryption setting requires reboot to take effectMounir IDRASSI1-1/+23
2019-03-03Windows: Add command line switch (/m noattach) that is equivalent to UI ↵Mounir IDRASSI1-0/+4
option "Only create virtual device without mounting on selected drive letter"
2019-03-03Windows: replicate old behavior when handling passwords in UI when legacy ↵Mounir IDRASSI1-4/+7
password maximum length option selected
2019-03-03Windows: Add option to use legacy maximum password length (64 characters) ↵Mounir IDRASSI1-0/+13
instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt.
2019-03-01Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵Mounir IDRASSI1-0/+13
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
2019-02-15Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it ↵Mounir IDRASSI1-1/+1
in Mount.c
2019-02-10Windows: Avoid simultaneous calls of favorites mounting, for example if ↵Mounir IDRASSI1-13/+26
corresponding hotkey is pressed multiple times.
2019-02-08Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵Mounir IDRASSI1-0/+16
which is now disabled by default
2019-02-04Automatically truncate passwords for TrueCrypt volumes and System Encryption ↵Mounir IDRASSI1-9/+34
to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version.
2019-01-21Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵Mounir IDRASSI1-2/+2
not needed after their key schedule is created
2019-01-15Windows: enhancements to EFI system encryption, like handling of Multi-Boot ↵Mounir IDRASSI1-38/+48
and better compatibility with Windows Upgrade process.
2019-01-14Windows: enhance support of new behavior of favorite service which is now ↵Mounir IDRASSI1-11/+6
always running in case of system encryption
2019-01-14Windows: Implement feature that enables clearing of encryption keys when a ↵Mounir IDRASSI1-7/+141
new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade).
2018-12-24Windows: Fix mount option to disable Windows Mount Manager can preserved ↵Mounir IDRASSI1-3/+1
when mount options dialog opened a second time.
2018-12-19Windows: Add mount option that allows mounting a volume without attaching it ↵Mounir IDRASSI1-5/+42
to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX).
2018-09-03Windows: fix regression causing VeraCrypt UI to always be displayed upon logonMounir IDRASSI1-1/+1
2018-09-03Windows: fix regression when language selected in the setup during fresh ↵Mounir IDRASSI1-0/+6
install and that caused VeraCrypt background task to be disabled.
2018-09-01Windows: extended Windows defragmenter workaround to Windows 8.1Mounir IDRASSI1-4/+4
2018-09-01Windows: handle case of some disk drivers not supporting ↵Mounir IDRASSI1-2/+27
IOCTL_DISK_GET_DRIVE_GEOMETRY_EX IOCTL.
2018-08-28Windows: Fix buttons at the bottom not shown when user sets a large system ↵Mounir IDRASSI1-0/+15
font under Window 7
2018-08-24Windows: implement a driver configuration option to explicitly allow ↵Mounir IDRASSI1-0/+21
defragmenting non-système disques by Windows built-in defragmenter tool.
2018-08-15Windows: Add various checks and replace STL code after Coverity reportMounir IDRASSI1-1/+5
2018-08-07Windows: Display a balloon tip warning or error message when the value ↵Mounir IDRASSI1-5/+5
pasted to password field is truncated or when there is no room for additional characters because of maximum password length reached
2018-05-03Windows: Support machines without "EFI\Boot" folder for EFI system ↵Mounir IDRASSI1-1/+10
encryption (e.g. Windows LTSB). Compatibility enhancements for EFI system encryption.
2018-04-23Windows: enhance ReflectDrivers mechanism by persisting it across major ↵Mounir IDRASSI1-0/+7
Windows upgrades.
2018-04-23Windows: modify travel disk creation to get binaries from within setup exe ↵Mounir IDRASSI1-87/+145
files instead of copying existing binaries. This is needed since now we only install binaries of the current architecture.
2018-04-23Windows: implement internal verification of Authenticode digital signature ↵Mounir IDRASSI1-9/+53
for all modules to protect against simple binaries tampering.
2018-04-05Windows: when Secure Desktop is enabled, use it for Mount Options dialog if ↵Mounir IDRASSI1-3/+3
it is displayed before password dialog (e.g. using menu Volumes > Mount Volume with Options) since it may contains the password for hidden volume.
2018-03-30Windows: workaround for cases where password dialog is not able to get focus.Mounir IDRASSI1-1/+16
2018-03-13Windows: when /silent specified in command line, avoid performing any WIN32 ↵Mounir IDRASSI1-70/+101
UI calls. This fixes issue of current application losing focus when VeraCrypt is run with /quit /silent (cf https://github.com/veracrypt/VeraCrypt/issues/274)
2018-03-12Windows: make TRIM blocking option grayed in System -> Settings UI under ↵Mounir IDRASSI1-2/+11
hidden OS since TRIM commands are always blocked in this case.
2018-03-05Windows: Add option to block TRIM command on system encryption SSD drives.Mounir IDRASSI1-0/+4
2018-03-04Windows: Implement TRIM support for non-system SSD partitions/drives and add ↵Mounir IDRASSI1-0/+3
driver option to enable it (TRIM is disabled by default for non-system SSD partitions/drives)