Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2022-03-26 | Windows: Add various checks to address Coverity reported issues. | Mounir IDRASSI | 1 | -1/+9 | |
2022-03-08 | Implement support of Blake2s-256 hash algorithm and remove deprecated ↵ | Mounir IDRASSI | 1 | -2/+2 | |
algorithms RIPEMD-160 and GOST89. | |||||
2022-02-10 | Windows: Make Travel Disk contains 32-bit and arm64 binaries when VeraCrypt ↵ | Mounir IDRASSI | 1 | -89/+91 | |
installed using MSI | |||||
2022-02-02 | Windows: Fix failure to create Traveler Disk when VeraCrypt is installed ↵ | Mounir IDRASSI | 1 | -59/+129 | |
using MSI | |||||
2022-02-01 | Windows: Make MSI installer compatible with System Encryption by leveraging ↵ | Mounir IDRASSI | 1 | -16/+40 | |
VeraCrypt service capabilities | |||||
2021-11-29 | Windows: Try to workaround Windows Updates issues by fixing of bootloader ↵ | Mounir IDRASSI | 1 | -27/+51 | |
and SetupConfig.ini when session logged in/unlocked or system resumes | |||||
2021-07-14 | Windows: Copy ARM64 binaries when creating Traveler Disk and when VeraCrypt ↵ | Mounir IDRASSI | 1 | -0/+16 | |
is installed | |||||
2021-07-13 | Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure ↵ | Mounir IDRASSI | 1 | -6/+6 | |
equivalents This fixed failure to build driver for ARM64 with latest VS 2019 | |||||
2021-01-02 | Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵ | Mounir IDRASSI | 1 | -0/+56 | |
System encryption still not implemented on ARM64 | |||||
2020-08-03 | Windows: Fix issue in UI for configuration autofix mechanism of bootloader | Mounir IDRASSI | 1 | -29/+24 | |
2020-08-02 | Windows: Fix UI for blocking TRIM in system encryption not working in MBR ↵ | Mounir IDRASSI | 1 | -5/+8 | |
boot mode | |||||
2020-07-21 | Windows: Implement detection of Hibernate and Fast Startup and disable them ↵ | Mounir IDRASSI | 1 | -0/+37 | |
if RAM encryption is activated. | |||||
2020-07-08 | Windows: Add UI options to control the behavior of automatic bootloader ↵ | Mounir IDRASSI | 1 | -2/+84 | |
fixing when System Encryption used. | |||||
2020-07-06 | Windows: Support direct password drag-n-drop from external applications ↵ | Mounir IDRASSI | 1 | -0/+70 | |
(e.g. KeePass) which is more secure than using clipboard. | |||||
2020-07-02 | Windows: Replace GetSystemInfo calls by more reliable function to get number ↵ | Mounir IDRASSI | 1 | -7/+7 | |
of CPUs active on the PC. | |||||
2020-06-28 | Windows: Fix failure to detect suspension of machine that caused mounted ↵ | Mounir IDRASSI | 1 | -12/+47 | |
volume not be dismount even if "Entering power saving mode" is checked in Preferences. This fix implements compatibility with Windows 10 Modern Standby and Windows 8.1 Connected Standby power model. | |||||
2020-06-28 | Windows: remove unused code targeting Windows 2000. | Mounir IDRASSI | 1 | -14/+6 | |
2020-06-19 | Windows: remove duplicated function to detect AES-NI support in CPU | Mounir IDRASSI | 1 | -1/+1 | |
2020-03-10 | Windows: Fix keyfiles path passed as CLI argument and set as default not ↵ | Mounir IDRASSI | 1 | -3/+6 | |
always cleared from RAM when VeraCrypt exits | |||||
2020-02-10 | Windows: Fix warnings reported by Coverity static code analyzer | Mounir IDRASSI | 1 | -0/+7 | |
2020-01-21 | Windows: Support notifying WAITFOR.EXE Windows command when VeraCrypt.exe ↵ | Mounir IDRASSI | 1 | -0/+54 | |
exits if /q was specified in CLI. This done using the new switch "/signalExit" who must have a string parameter that must be the same as the one that will be specified for WAITFOR.EXE command. | |||||
2020-01-21 | Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵ | Mounir IDRASSI | 1 | -0/+14 | |
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536 | |||||
2019-12-13 | Windows: check "TrueCrypt Mode" in password dialog when mounting a file ↵ | Mounir IDRASSI | 1 | -1/+1 | |
container with .tc extension | |||||
2019-12-08 | Windows: enhancements to the mechanism preserving file timestamps, ↵ | Mounir IDRASSI | 1 | -9/+15 | |
especially for keyfiles. | |||||
2019-11-28 | Windows: Don't write extra 0x00 byte at the end of DcsProp file when ↵ | Mounir IDRASSI | 1 | -3/+4 | |
modifying it through UI | |||||
2019-11-22 | Windows: Add new registry flags for SystemFavoritesService to control ↵ | Mounir IDRASSI | 1 | -2/+9 | |
updating of EFI BIOS boot menu on shutdown. This will help better manage multi-boot scenarios where we should not mess up with boot order (e.g. grub2 case) | |||||
2019-11-12 | Windows: Allow system encrypted devices to be mounted from WindowsPE - even ↵ | csware | 1 | -4/+9 | |
if changing the keyboard layout failed (#539) When my system broke and I had to use WindowsPE to rescue some files the password dialog always closed immediately. There was no chance to mount the system device using the GUI. It took me a while to realize that I could try using the CLI by passing the password as a parameter (which might not be so obvious for not advanced users). Signed-off-by: Sven Strickroth <email@cs-ware.de> | |||||
2019-10-27 | Windows: use strcmp to compare effective content of std::string since == ↵VeraCrypt_1.24-Hotfix1 | Mounir IDRASSI | 1 | -1/+1 | |
operator may return false if one of the strins has an extra \0 at the end. | |||||
2019-10-27 | Windows: Only update boot configuration on disk if the user actually changed ↵ | Mounir IDRASSI | 1 | -25/+29 | |
something in the UI | |||||
2019-10-27 | Windows: Update EFI NVRAM variable only if changed or doesn't exist and add ↵ | Mounir IDRASSI | 1 | -1/+4 | |
configuration to force setting EFI BootNext to veraCrypt bootloader before each shutdown | |||||
2019-10-25 | Windows: for system encryption case, also perform automatic fix of boot ↵ | Mounir IDRASSI | 1 | -14/+10 | |
configuration if MBR boot used and not only EFI. | |||||
2019-10-20 | Windows: Add checks that the System Favorites service is running. Warn user ↵ | Mounir IDRASSI | 1 | -1/+31 | |
if he enabled option to clear RAM encryption keys and the service is stopped. | |||||
2019-09-29 | Windows: Use periodic update of connected devices only if there is a ↵ | Mounir IDRASSI | 1 | -8/+15 | |
Favorite that uses VolumeID. Add command option to disable the period update of devices. | |||||
2019-09-26 | Windows: Fix sporadic keyboard issue in Secure Desktop for password dialog ↵ | Mounir IDRASSI | 1 | -1/+6 | |
by not using the trick to put it reliably in foreground. The trick is based on a emulation of ALT+TAB but sometimes ALT key would remain pressed in case of Secure Desktop making it impossible to type the password (a workaround was to press CTRL key which reset the state of ALT key) | |||||
2019-09-24 | Windows: fix HourGlass cursor showing up in main UI after launching disk ↵ | Mounir IDRASSI | 1 | -4/+0 | |
decryption wizard/ | |||||
2019-03-08 | Windows: inform user that RAM encryption setting requires reboot to take effect | Mounir IDRASSI | 1 | -1/+23 | |
2019-03-03 | Windows: Add command line switch (/m noattach) that is equivalent to UI ↵ | Mounir IDRASSI | 1 | -0/+4 | |
option "Only create virtual device without mounting on selected drive letter" | |||||
2019-03-03 | Windows: replicate old behavior when handling passwords in UI when legacy ↵ | Mounir IDRASSI | 1 | -4/+7 | |
password maximum length option selected | |||||
2019-03-03 | Windows: Add option to use legacy maximum password length (64 characters) ↵ | Mounir IDRASSI | 1 | -0/+13 | |
instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt. | |||||
2019-03-01 | Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵ | Mounir IDRASSI | 1 | -0/+13 | |
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha) | |||||
2019-02-15 | Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it ↵ | Mounir IDRASSI | 1 | -1/+1 | |
in Mount.c | |||||
2019-02-10 | Windows: Avoid simultaneous calls of favorites mounting, for example if ↵ | Mounir IDRASSI | 1 | -13/+26 | |
corresponding hotkey is pressed multiple times. | |||||
2019-02-08 | Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵ | Mounir IDRASSI | 1 | -0/+16 | |
which is now disabled by default | |||||
2019-02-04 | Automatically truncate passwords for TrueCrypt volumes and System Encryption ↵ | Mounir IDRASSI | 1 | -9/+34 | |
to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version. | |||||
2019-01-21 | Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵ | Mounir IDRASSI | 1 | -2/+2 | |
not needed after their key schedule is created | |||||
2019-01-15 | Windows: enhancements to EFI system encryption, like handling of Multi-Boot ↵ | Mounir IDRASSI | 1 | -38/+48 | |
and better compatibility with Windows Upgrade process. | |||||
2019-01-14 | Windows: enhance support of new behavior of favorite service which is now ↵ | Mounir IDRASSI | 1 | -11/+6 | |
always running in case of system encryption | |||||
2019-01-14 | Windows: Implement feature that enables clearing of encryption keys when a ↵ | Mounir IDRASSI | 1 | -7/+141 | |
new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade). | |||||
2018-12-24 | Windows: Fix mount option to disable Windows Mount Manager can preserved ↵ | Mounir IDRASSI | 1 | -3/+1 | |
when mount options dialog opened a second time. | |||||
2018-12-19 | Windows: Add mount option that allows mounting a volume without attaching it ↵ | Mounir IDRASSI | 1 | -5/+42 | |
to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX). |