Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2019-10-02 | Linux/MacOSX:check that the requested size of file container is less than ↵ | Mounir IDRASSI | 4 | -2/+13 | |
available disk free space. Add a CLI switch to disable this check. | |||||
2019-10-02 | Utilize $(BASE_DIR) in the install targets rather than $(PWD) and $(CURDIR) ↵ | Unit 193 | 1 | -63/+63 | |
(#472) As $(PWD) is not always the expected value and can result in failing the target. | |||||
2019-10-02 | Allow $(ARCH) to be defined during build (#471) | Unit 193 | 1 | -1/+1 | |
This can be useful when crossbuilding or building in a chroot where using uname -m would cause the wrong compiler options. | |||||
2019-10-02 | Align section types of Whirlpool_C and SHA256_K (#479) | Hans-Peter Jansen | 1 | -1/+1 | |
in order to fix LTO linking. After switching to LTO for openSUSE Tumbleweed, veracrypt build failed with: [ 185s] ../Crypto/Whirlpool.c:105:45: error: 'Whirlpool_C' causes a section type conflict with 'SHA256_K' [ 185s] 105 | CRYPTOPP_ALIGN_DATA(16) static const uint64 Whirlpool_C[8*256+R] CRYPTOPP_SECTION_ALIGN16 = { [ 185s] | ^ [ 185s] ../Crypto/Sha2.c:321:34: note: 'SHA256_K' was declared here [ 185s] 321 | CRYPTOPP_ALIGN_DATA(16) uint_32t SHA256_K[64] CRYPTOPP_SECTION_ALIGN16 = { [ 185s] | ^ [ 185s] lto-wrapper: fatal error: g++ returned 1 exit status Aligning section types of Whirlpool_C and SHA256_K fixes this. | |||||
2019-10-02 | Windows: Add support for /nosizecheck switch in Format command line file ↵ | Mounir IDRASSI | 1 | -1/+1 | |
container creation | |||||
2019-10-02 | Increment version to 1.24-Beta6 | Mounir IDRASSI | 18 | -32/+36 | |
2019-10-01 | Windows Driver: Disable Hibernation when RAM encryption is enabled since we ↵ | Mounir IDRASSI | 1 | -0/+6 | |
can't resume from Hibernation without RAM encryption keys (a chicken and egg situation) | |||||
2019-09-30 | Windows: when periodic update of device is disabled, use SetupAPI to list ↵ | Mounir IDRASSI | 1 | -1/+3 | |
disks on demand instead of testing all disks to reduce CPU usage. | |||||
2019-09-30 | Windows: resize VeraCrypt Format Wizard and Mount Options dialogs to fix ↵ | Mounir IDRASSI | 3 | -297/+295 | |
some text truncation issues with non-English languages. | |||||
2019-09-29 | Windows: Update the encoded hash of the code signing certificate used to ↵ | Mounir IDRASSI | 1 | -6/+6 | |
verify the integrity of binaries. | |||||
2019-09-29 | Windows: update signing script to use newly issued IDRIX SHA-1 code signing ↵ | Mounir IDRASSI | 5 | -62/+33 | |
certificate. | |||||
2019-09-29 | Windows: Add latest 1.24 EFI bootloader files that are signed by Microsoft ↵ | Mounir IDRASSI | 12 | -0/+0 | |
that come with the following modifications: - Fix issue that was preventing Streebog hash from being selected manually during Pre-Boot authentication - Ensure that the correct Windows bootloader is executed when the user press ESCAPE - make the rescue disk boot machine directly from disk if "VeraCrypt" folder is missing. This make it easy to create a bootable disk for VeraCrypt from the rescue disk by just removing or renaming its "VeraCrypt" folder. | |||||
2019-09-29 | Windows: Use periodic update of connected devices only if there is a ↵ | Mounir IDRASSI | 4 | -55/+101 | |
Favorite that uses VolumeID. Add command option to disable the period update of devices. | |||||
2019-09-27 | Windows: fix another typo in code comment (hopefully last one!) | Mounir IDRASSI | 1 | -1/+1 | |
2019-09-27 | Windows: fix typo in code comment | Mounir IDRASSI | 1 | -1/+1 | |
2019-09-26 | Windows: Fix sporadic keyboard issue in Secure Desktop for password dialog ↵ | Mounir IDRASSI | 3 | -2/+12 | |
by not using the trick to put it reliably in foreground. The trick is based on a emulation of ALT+TAB but sometimes ALT key would remain pressed in case of Secure Desktop making it impossible to type the password (a workaround was to press CTRL key which reset the state of ALT key) | |||||
2019-09-25 | Windows: Add two missing UI strings to XML translation files so that they ↵ | Mounir IDRASSI | 2 | -1/+3 | |
can be localized correctly | |||||
2019-09-25 | Windows: Disable the Keyfiles button in system encryption wizard since we ↵ | Mounir IDRASSI | 1 | -1/+2 | |
don't support them yet. | |||||
2019-09-24 | Linux/OSX: make CLI switch --import-token-keyfiles compatible with ↵ | Mounir IDRASSI | 1 | -3/+12 | |
Non-Interactive mode by using keyfiles passed as arguments and check the Non-Interactive mode switch. | |||||
2019-09-24 | Windows: fix HourGlass cursor showing up in main UI after launching disk ↵ | Mounir IDRASSI | 1 | -4/+0 | |
decryption wizard/ | |||||
2019-09-23 | Fix build error of UEFI bootloader caused by latest changes that introduced ↵ | Mounir IDRASSI | 2 | -1/+3 | |
ChaCha20 and T1HA algorithms and which are not present nor used in UEFI bootloader | |||||
2019-08-26 | Windows: fix compilation error of legacy MBR bootloader caused by missing ↵ | Mounir IDRASSI | 1 | -1/+1 | |
intrin.h header | |||||
2019-06-06 | Some cleanup related to "Invalid characters..." on mount issue. (#453) | Alexander Karzhenkov | 1 | -23/+3 | |
* Revert previous commit * Fix "Invalid characters..." issue by not using "foreach" macro The "foreach" macro creates a copy of the container. This copy is destroyed immediately after the iteration is completed. C-strings pointers passed to the local array were invalidated with destroying of "std::string"s contained in the copy. | |||||
2019-06-06 | Fix password-only example in help text (pim missing) (#438) | Dany Shaanan | 1 | -1/+1 | |
2019-03-21 | Linux: Fix compilation error caused by wrong include of "intrin.h" | Mounir IDRASSI | 1 | -3/+1 | |
2019-03-09 | Increment version to 1.24-Beta5 | Mounir IDRASSI | 17 | -31/+31 | |
2019-03-09 | Windows Driver: fix BSOD when mounting outer volume with hidden volume ↵ | Mounir IDRASSI | 1 | -1/+1 | |
protection if RAM encryption is enabled | |||||
2019-03-09 | Increment version to 1.24-Beta4 and update release notes to clarify that ↵ | Mounir IDRASSI | 17 | -31/+31 | |
password length increase applies only to non-system volumes. | |||||
2019-03-08 | Windows: inform user that RAM encryption setting requires reboot to take effect | Mounir IDRASSI | 1 | -1/+23 | |
2019-03-08 | Windows Driver: fix BSOD when mounting hidden volume if RAM encryption is ↵ | Mounir IDRASSI | 1 | -4/+5 | |
enabled | |||||
2019-03-04 | Windows: Update signed drivers for 1.24-Beta3 | Mounir IDRASSI | 5 | -1/+1 | |
2019-03-03 | Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt ↵ | Mounir IDRASSI | 2 | -0/+13 | |
driver | |||||
2019-03-03 | Fix formatting of credits in About dialog and documentation | Mounir IDRASSI | 2 | -2/+2 | |
2019-03-03 | Windows: Add missing UI string to XML language files. | Mounir IDRASSI | 1 | -0/+1 | |
2019-03-03 | Increment version to 1.24-Beta3. Update Release Notes. | Mounir IDRASSI | 17 | -32/+32 | |
2019-03-03 | Windows: Add command line switch (/m noattach) that is equivalent to UI ↵ | Mounir IDRASSI | 1 | -0/+4 | |
option "Only create virtual device without mounting on selected drive letter" | |||||
2019-03-03 | Windows: replicate old behavior when handling passwords in UI when legacy ↵ | Mounir IDRASSI | 3 | -14/+27 | |
password maximum length option selected | |||||
2019-03-03 | Windows: Add option to use legacy maximum password length (64 characters) ↵ | Mounir IDRASSI | 8 | -20/+45 | |
instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt. | |||||
2019-03-02 | Windows: fix compilation error | Mounir IDRASSI | 1 | -1/+1 | |
2019-03-02 | Windows: mitigate some memory attacks by making VeraCrypt applications ↵ | Mounir IDRASSI | 2 | -0/+91 | |
memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code (https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150) | |||||
2019-03-02 | Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵ | Mounir IDRASSI | 12 | -6/+187 | |
especially Format and Expander | |||||
2019-03-01 | Windows Driver: Enable RAM encryption only after its security parameters ↵ | Mounir IDRASSI | 1 | -6/+5 | |
were created | |||||
2019-03-01 | Windows: better debug messages for VcProtectKeys and VcUnprotectKeys functions | Mounir IDRASSI | 1 | -3/+11 | |
2019-03-01 | Windows Driver: Implement RAM encryption for cached passwords | Mounir IDRASSI | 3 | -11/+91 | |
2019-03-01 | Windows driver: call VcProtectKeys only when RAM encryption enabled although ↵ | Mounir IDRASSI | 1 | -2/+5 | |
this function does nothing when RAM encryption is disabled. | |||||
2019-03-01 | Windows: Add some logs in functions for RAM encryption | Mounir IDRASSI | 1 | -0/+8 | |
2019-03-01 | Windows: use specific order for EFI boot arguments memory regions that ↵ | Mounir IDRASSI | 5 | -11/+63 | |
matches the one used by EFI bootloader. | |||||
2019-03-01 | Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵ | Mounir IDRASSI | 21 | -21/+2241 | |
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha) | |||||
2019-02-15 | Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it ↵ | Mounir IDRASSI | 3 | -3/+3 | |
in Mount.c | |||||
2019-02-15 | Windows: Set CpuRngDisabled variable to TRUE for clarity even if it will be ↵ | Mounir IDRASSI | 1 | -1/+1 | |
set to TRUE anyway by default through EnableCpuRng calls |