Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2023-10-01 | MacOS: Fix Blake2s SSE 4.1 not being builtVeraCrypt_1.26.7 | Mounir IDRASSI | 1 | -0/+6 | |
For now, we set GCC_GTEQ_430 to 1 to each OS. Later we will always suppose that gcc is newer than 4.3 and remove this logic. | |||||
2023-10-01 | MacOS: set minimum target to OSX 12. Fix About menu not working. | Mounir IDRASSI | 3 | -9/+23 | |
The modification to Forms.cpp is temporary until we find a better approach | |||||
2023-10-01 | Linux: use "-std=c++11" for gcc 4.8 and adapt code to old compilers | Mounir IDRASSI | 4 | -8/+8 | |
2023-10-01 | Linux: Better detection of gcc version to correctly enable c++11 | Mounir IDRASSI | 1 | -8/+15 | |
This allows to build correctly under CentOS 6 and CentOS 7 | |||||
2023-09-30 | Windows: Update MBR bootloader for version 1.26.7 | Mounir IDRASSI | 20 | -0/+0 | |
2023-09-30 | Increment version to 1.26.7. Set release date to October 1st. Update Windows ↵ | Mounir IDRASSI | 25 | -52/+52 | |
signed driver files. | |||||
2023-09-29 | Windows: enhancement to RAM encryption | Mounir IDRASSI | 1 | -17/+55 | |
- use a more standard-looking memory value tag instead of fully random one that will look suspicious and outstanding - If we fail to allocate 1MiB for derivation area, we device the size by two in a loop until we succeed. This is better than falling back directly to 8KiB size - Better method to derive actual encryption key: instead of simply duplicating 128bit key value, we combine a xor addition and self-encryption to build a 256-bit key - use both encID and pbKeyDerivationArea to derive IV for encryption and not only endID | |||||
2023-09-29 | Windows Driver: Use KeQueryInterruptTimePrecise on Windows 8.1 and newer as ↵ | Mounir IDRASSI | 2 | -2/+24 | |
better seed for internal RNG compared to KeQueryInterruptTime | |||||
2023-09-26 | Windows: during Setup, and if VeraCrypt already installed, open online help ↵ | Mounir IDRASSI | 2 | -3/+40 | |
only if PC connected to Internet | |||||
2023-09-24 | Windows: make Setup correctly manage option to disable memory protection ↵ | Mounir IDRASSI | 3 | -2/+8 | |
during upgrade | |||||
2023-09-24 | Libzip 1.10.1 (#1209) | DLL125 | 18 | -32/+87 | |
Updated to the latest version for the VeraCrypt 1.26.6 release. | |||||
2023-09-24 | Windows: always open online help in case of Setup because local help may be ↵ | Mounir IDRASSI | 2 | -1/+7 | |
outdated | |||||
2023-09-24 | Windows: Add tooltip message and help button for new option to disable ↵ | Mounir IDRASSI | 9 | -8/+187 | |
memory protection Also a dedicated page in the documentation was added for it. | |||||
2023-09-22 | Linux/MacOSX: Increment packaging version to 1.26.6 | Mounir IDRASSI | 5 | -8/+8 | |
2023-09-21 | Windows: Load Riched20.dll to use RichEdit control. Use InitCommonControlsEx ↵VeraCrypt_1.26.6 | Mounir IDRASSI | 1 | -2/+7 | |
instead of InitCommonControls | |||||
2023-09-21 | Update Release Notes. Increment version to 1.26.6. | Mounir IDRASSI | 32 | -39/+39 | |
2023-09-21 | Windows: use separate name for SetProcessMitigationPolicy function point. ↵ | Mounir IDRASSI | 1 | -11/+5 | |
Remove unneeded boolean | |||||
2023-09-20 | Windows: Add setting in main UI and setup wizard to disable memory protection | Mounir IDRASSI | 10 | -20/+69 | |
This can be useful for users who need Accessibility software that may not work when memory protection is active in VeraCrypt | |||||
2023-09-18 | Windows Security: make memory protection enabled by default. Add process ↵ | Mounir IDRASSI | 7 | -6/+139 | |
mitigation (ASLR, Dynamic code, extension points) Memory protection can be disabled using registry value "VeraCryptEnableMemoryProtection" under the key "HKLM\SYSTEM\CurrentControlSet\Services\veracrypt" | |||||
2023-09-18 | Windows: use same manifest structure for Expander as in Mount and Format | Mounir IDRASSI | 1 | -9/+9 | |
2023-09-15 | Update Language.xml (#1199) | TigerxWood | 1 | -1/+1 | |
Corrected small typo | |||||
2023-09-11 | Windows: replace CoInitialize calls with CoInitializeEx | Mounir IDRASSI | 6 | -15/+15 | |
2023-09-10 | Windows: Indicate in manifest files that support starts from Windows 7 | Mounir IDRASSI | 5 | -4/+45 | |
2023-09-08 | Linux/macOS: simplify logic of handling /dev/random reading failure ↵ | Mounir IDRASSI | 2 | -16/+11 | |
(proposed by @Lavode in #1187) Fixes #1187 | |||||
2023-09-08 | Windows: Add link in keyfiles dialog to documentation page for risks of ↵ | Mounir IDRASSI | 5 | -10/+33 | |
third-party file extensions usage. | |||||
2023-09-08 | Update Language.xml (#1192) | TigerxWood | 1 | -1/+1 | |
Corected a typo | |||||
2023-09-06 | Windows: remove recommendation of keyfiles files extensions and update ↵ | Mounir IDRASSI | 2 | -1/+14 | |
documentation to mention risks of third-party file extensions. This commit also adds red color to the warning text about keyfiles in keyfiles dialogs. | |||||
2023-09-03 | Windows: Replace legacy file/dir selection APIs with modern IFileDialog ↵ | Mounir IDRASSI | 7 | -201/+275 | |
interface We remove usage of GetOpenFileNameW/GetSaveFileNameW/SHBrowseForFolderW which are deprecated by Microsoft | |||||
2023-09-03 | Windows: remove legacy code (XP, Vista). Simplify code since Windows 7 is ↵ | Mounir IDRASSI | 7 | -317/+130 | |
now minimal OS version. | |||||
2023-09-03 | Windows: simpler and more robust safe dll loading combined with delay ↵ | Mounir IDRASSI | 15 | -968/+164 | |
loading thanks to Windows 7 being minimum supported version. We also block execution on Windows versions older than Windows 7. A lot of code was removed thanks to this. | |||||
2023-09-02 | Linux/macOS: preserve unknown entries in configuration file | Mounir IDRASSI | 2 | -10/+28 | |
This helps to preserve unknown entries that may be used by future versions of VeraCrypt (forward compatibility) or entries used by old versions that were removed from current version (backward compatibility) | |||||
2023-08-21 | Allow cross compilation. (#1182) | Unit 193 | 3 | -5/+6 | |
2023-08-20 | Windows: Set minimum build target to Windows 7 | Mounir IDRASSI | 1 | -1/+1 | |
2023-08-20 | Windows: delay load bcrypt.dll to reduce startup dependency loading until ↵ | Mounir IDRASSI | 9 | -62/+62 | |
setting safe dll loading | |||||
2023-08-20 | Update zlib to latest (#1181) | DLL125 | 23 | -1485/+918 | |
* Update zlib to latest * Update copyright Updated copyright of zlib. | |||||
2023-08-19 | Linux: try use IOCTL BLKGETSIZE64 to get size of device instead of lseek | Mounir IDRASSI | 1 | -0/+11 | |
2023-08-19 | Linux: Fix wrong max size for hidden volume in CLI direct mode creation | Mounir IDRASSI | 1 | -8/+15 | |
There was a logical bug that made the code check the filesystem size of the device path "/dev" instead of using the actual size of the device Fix #1180 | |||||
2023-08-15 | Windows: Update MBR bootloader files to 1.26.5 build | Mounir IDRASSI | 20 | -0/+0 | |
2023-08-15 | Update Release Notes and set date of 1.26.5 to August 15th | Mounir IDRASSI | 1 | -1/+1 | |
2023-08-14 | Increment version to 1.26.5. Update signed Windows drivers. | Mounir IDRASSI | 23 | -45/+45 | |
2023-08-13 | Windows: Implement support for mounting partially encrypted system partitions | Mounir IDRASSI | 7 | -5/+34 | |
For now, we force ReadOnly mounting for such partitions. | |||||
2023-08-13 | Windows: Better way to enable required privileges for FastCreate Options | Mounir IDRASSI | 10 | -8/+183 | |
If we can set required privilege, we ask the user using UAC to enable them. | |||||
2023-08-12 | Linux: Flush stdout explicitly when reading stdin (#1172) | Jertzukka | 1 | -1/+1 | |
Rules of automatic flushing of stdout buffer is implementation-defined behaviour. In glibc this is automatically flushed, but we can't rely on it for other implementations such as musl. | |||||
2023-08-12 | Linux: Typo fix and consistency in help command (#1169) | Jertzukka | 1 | -1/+2 | |
2023-08-10 | Windows: Fix failure creating Traveler Disk caused by outdated hardcoded ↵ | Mounir IDRASSI | 1 | -10/+10 | |
value of MS certificate We also rename the variables gpbSha256CodeSignCertFingerprint and gpbSha256MSCodeSignCertFingerprint to gpbSha512CodeSignCertFingerprint and gpbSha512MSCodeSignCertFingerprint respectively to reflect the fact that they are actually SHA512 hash values and not SHA256 ones. | |||||
2023-08-07 | Call EnsureVisible() for OSX in OnActivate (#1167) | Deniz Türkoglu | 1 | -0/+1 | |
When using multiple monitors, the resolution can change in OSX, during plug-in/off off the display(s). To avoid window becoming non-usable, there is EnsureVisible, that is called in several places. However, if you minimize VeraCrypt on the bigger screen, and restore it in the main screen of a MacBook, after unplugging, the window will become unusable (unless you know that clicking 'About' calls EnsureVisible :-)). Call EnsureVisible OnActivate so MainFrame is always functional across screens, even when minimized. | |||||
2023-08-06 | Linux/macOS: Add explicit include of <sys/types.h> to define ssize_t | Mounir IDRASSI | 1 | -0/+2 | |
Some systems (e.g. Alpine Linux) seems to require this. | |||||
2023-08-06 | Linux: capture both stdout and stderr in popen call to avoid printing anything | Mounir IDRASSI | 1 | -2/+2 | |
If an error happens, error message will be read from popen pipe and so libpcsclite.so will not be found. This is the same outcome as when stdout is empty. | |||||
2023-08-05 | Security: ensure that XTS primary key is different from secondary key when ↵ | Mounir IDRASSI | 2 | -0/+14 | |
creating volumes This is unlikely to happen thanks to random generator properties but we much add this check to prevent an attack described in page 3 of https://csrc.nist.gov/csrc/media/Projects/crypto-publication-review-project/documents/initial-comments/sp800-38e-initial-public-comments-2021.pdf | |||||
2023-08-05 | Windows: Fix false positive detection of new device insertion when clear ↵ | Mounir IDRASSI | 13 | -9/+255 | |
keys option is enable When this option is enabled, we first build the list of currently inserted devices then we start listening to insertion events. When a device insertion occurs, we check if this device is on our list and if yes, we ignore its insertion. We also ignore devices whose Device ID starts with "SWD\" and "ROOT\" since these are not real devices. |