Age | Commit message (Collapse) | Author | Files | Lines |
|
identify VeraCrypt disk volumes instead of device name.
|
|
when VeraCrypt running as elevated process.
|
|
(/tokenpin switch) when explicitly mounting a volume.
|
|
|
|
tool Coverity.
|
|
keyfile are specified in the command line.
|
|
|
|
the correct window handle to get some GUI fields content. Some code cleanup.
|
|
drives. Add option to make them available for mounting if needed.
|
|
arbitrary code execution with elevation of privilege (CVE-2016-1281)
|
|
assembly code developed by Wei Dai
|
|
volumes. Add options to activate it in the Preferences and System Settings.
|
|
|
|
ones. Remove Unused functions.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
helpful for users who have software running the modifies the bootloader, like FLEXnet.
|
|
configured or keyfile specified in command line. Add option in default keyfiles dialog to restore the old behavior.
|
|
custom PIM used or PRF different from default one. Also default PRF is correct set in password dialog for restore operation.
|
|
|
|
correctly) by using Unicode API for dialogs and window message handling.
|
|
|
|
|
|
|
|
this support by default. This will avoid having issue with software that doesn't handle correctly partial IOCTL_STORAGE_QUERY_PROPERTY support.
|
|
|
|
when having lengthy driver calls (like mounting)
|
|
|
|
GUI when dismounting takes long time.
|
|
default one unless VeraCrypt is in portable mode.
|
|
target directory through Browse button. Use Unicode functions for handling the creation files.
|
|
binaries with the same architecture.
|
|
operations.
|
|
64-bit executable binaries.
|
|
history is enabled.
|
|
Support using favorite label as label in Explorer.
|
|
password" is checked.
|
|
when showing it then hiding it.
|
|
Normalizing path names to never use '/' but always '\'.
|
|
Keyfiles and Remove All Keyfiles
|
|
unless a preference is changed. Code refactoring.
|
|
startup, making it always disabled unless a mount is attempted.
|
|
and TrueCrypt 3.0.
|
|
bootloader when changing the system encryption password: this enables to recover if an attack is detected.
|
|
underlying drive takes long time to be recognized by Windows.
|
|
explicitly check "User PIM" to enable its use.
|