VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/Dlgcode.c
AgeCommit message (Collapse)AuthorFilesLines
2019-12-08Windows: use fix for CVE-2019-19501 only on Vista and above since it doesn't ↵Mounir IDRASSI1-1/+2
make sens under XP.
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI1-3/+8
especially for keyfiles.
2019-12-05Windows: Modify memory process protection when running with admin privileges ↵Mounir IDRASSI1-1/+12
to allow calling functions needed for CVE-2019-19501 fix while still protecting against memory access by non-admin processes.
2019-12-05Windows: Enhancement to the fix for CVE-2019-19501Mounir IDRASSI1-3/+6
2019-12-03Windows: Fix possible local privilege escalation vulnerability during ↵Mounir IDRASSI1-21/+230
execution of VeraCrypt Expander (CVE-2019-19501)
2019-11-27Windows: compatibility with multi-OS boot configuration by only setting ↵Mounir IDRASSI1-7/+15
VeraCrypt as first bootloader of the system if the current first bootloader is Windows one.
2019-11-04Windows: Display error message when password is too long and legacy maximum ↵Mounir IDRASSI1-1/+1
length used
2019-10-20Windows: Add checks that the System Favorites service is running. Warn user ↵Mounir IDRASSI1-1/+1
if he enabled option to clear RAM encryption keys and the service is stopped.
2019-10-03Windows: If Secure Desktop is started and random generator was not ↵Mounir IDRASSI1-53/+70
initialized before us, then stop random generator after we finish in order to avoid consuming CPU because of periodic fast poll thread. Next time a critical operation that requires RNG is performed, it will be initialized again. We do this because since the addition of secure desktop support, every time secure desktop is displayed, the RNG fast poll thread was started even if the user will never perform any critical operation that requires random bytes.
2019-09-30Windows: when periodic update of device is disabled, use SetupAPI to list ↵Mounir IDRASSI1-1/+3
disks on demand instead of testing all disks to reduce CPU usage.
2019-09-29Windows: Update the encoded hash of the code signing certificate used to ↵Mounir IDRASSI1-6/+6
verify the integrity of binaries.
2019-09-29Windows: Use periodic update of connected devices only if there is a ↵Mounir IDRASSI1-1/+4
Favorite that uses VolumeID. Add command option to disable the period update of devices.
2019-09-27Windows: fix another typo in code comment (hopefully last one!)Mounir IDRASSI1-1/+1
2019-09-27Windows: fix typo in code commentMounir IDRASSI1-1/+1
2019-09-26Windows: Fix sporadic keyboard issue in Secure Desktop for password dialog ↵Mounir IDRASSI1-1/+5
by not using the trick to put it reliably in foreground. The trick is based on a emulation of ALT+TAB but sometimes ALT key would remain pressed in case of Secure Desktop making it impossible to type the password (a workaround was to press CTRL key which reset the state of ALT key)
2019-03-03Fix formatting of credits in About dialog and documentationMounir IDRASSI1-1/+1
2019-03-03Windows: Add option to use legacy maximum password length (64 characters) ↵Mounir IDRASSI1-5/+9
instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt.
2019-03-02Windows: fix compilation errorMounir IDRASSI1-1/+1
2019-03-02Windows: mitigate some memory attacks by making VeraCrypt applications ↵Mounir IDRASSI1-0/+90
memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code (https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150)
2019-03-02Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵Mounir IDRASSI1-0/+82
especially Format and Expander
2019-02-12Add copyright and license information of JitterEntropy library by Stephan ↵Mounir IDRASSI1-2/+3
Mueller
2019-02-10Windows: Ensure that only one thread at a time can create a secure desktopMounir IDRASSI1-0/+8
2019-02-04Automatically truncate passwords for TrueCrypt volumes and System Encryption ↵Mounir IDRASSI1-1/+3
to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version.
2019-01-28Increase password maximum length to 128 bytes from 64 bytesMounir IDRASSI1-0/+3
2019-01-26Windows: Add a build configuration containing EFI bootloader signed with ↵Mounir IDRASSI1-1/+1
custom SecureBoot key instead
2019-01-21Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵Mounir IDRASSI1-3/+3
not needed after their key schedule is created
2018-12-19Windows: Add mount option that allows mounting a volume without attaching it ↵Mounir IDRASSI1-6/+5
to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX).
2018-09-03Windows: fix regression when language selected in the setup during fresh ↵Mounir IDRASSI1-8/+7
install and that caused VeraCrypt background task to be disabled.
2018-09-01Windows: handle case of some disk drivers not supporting ↵Mounir IDRASSI1-3/+51
IOCTL_DISK_GET_DRIVE_GEOMETRY_EX IOCTL.
2018-08-24Windows: fix language selected in the installer not used by "Create Volume" ↵Mounir IDRASSI1-0/+9
wizard until reboot or exiting VeraCrypt main process.
2018-08-16Windows: Fix regression that caused the system encryption wizard to crash ↵Mounir IDRASSI1-2/+7
when displaying password field.
2018-08-15Windows: Add various checks and replace STL code after Coverity reportMounir IDRASSI1-22/+12
2018-08-12Windows Installer: implement language selection mechanism at the start of ↵Mounir IDRASSI1-1/+17
the installer to make easier for international users.
2018-08-07Windows: Display a balloon tip warning or error message when the value ↵Mounir IDRASSI1-2/+134
pasted to password field is truncated or when there is no room for additional characters because of maximum password length reached
2018-08-06Windows: fix warning in debug buildMounir IDRASSI1-0/+3
2018-08-06Windows: avoid timeout of Secure Desktop display by waiting for the user to ↵Mounir IDRASSI1-3/+16
be really authenticated. Under Windows 10, a user session can be started in the background even before the user has been authenticated and this was causing VeraCrypt to be started before the user has logged in, in turn this was causing Secure Desktop to fail.
2018-06-24Windows: in DEBUG mode, disable verification to Authenticode signature of ↵Mounir IDRASSI1-1/+5
binaries.
2018-05-03Windows: Support machines without "EFI\Boot" folder for EFI system ↵Mounir IDRASSI1-0/+19
encryption (e.g. Windows LTSB). Compatibility enhancements for EFI system encryption.
2018-04-23Windows: Don't start EFI system encryption process if SecureBoot is enabled ↵Mounir IDRASSI1-6/+4
and VeraCrypt-DCS custom keys were not loaded in the machine firmware.
2018-04-23Windows: implement compatibility for Windows 10 major updates using ↵Mounir IDRASSI1-0/+125
ReflectDrivers mechanism whose support started from Windows 10 version 1607.
2018-04-23Windows: handle case when parameter of VerifyModuleSignature is enclosed ↵Mounir IDRASSI1-1/+16
between quotation marks
2018-04-23Windows: implement internal verification of Authenticode digital signature ↵Mounir IDRASSI1-14/+155
for all modules to protect against simple binaries tampering.
2018-03-25Windows: handle rare case where call to SwitchDestop fails when trying to ↵Mounir IDRASSI1-11/+30
display password dialog in our secure desktop. This can happen for example if VeraCrypt process is launched early when user session is opened and it tries to load favorites before user workstation becomes visible.
2018-03-25Windows: use cleaner approach to implement bringing our windows to ↵Mounir IDRASSI1-14/+23
foreground. The previous implementation was causing issues with other application, like random freezing.
2018-03-25Windows: ensure that out secure desktop has always user input to avoid cases ↵Mounir IDRASSI1-0/+76
where another application switch to default desktop while our password dialog is displayed.
2018-03-20Windows: Fix some cases of external applications freezing during ↵Mounir IDRASSI1-1/+38
mount/dismount by using an internal window as parent to the waiting dialog instead of the desktop window.
2018-03-18Update various copyright dates.Mounir IDRASSI1-4/+4
2018-03-13Windows: when /silent specified in command line, avoid performing any WIN32 ↵Mounir IDRASSI1-7/+7
UI calls. This fixes issue of current application losing focus when VeraCrypt is run with /quit /silent (cf https://github.com/veracrypt/VeraCrypt/issues/274)
2017-07-27Windows: when mounting system favorites using VolumeID feature, query all ↵Mounir IDRASSI1-29/+39
disks each time instead of caching previous call results. This is not efficient but it should fix rare cases where issues happen.
2017-07-27Windows: use large output buffer for IOCTL_DISK_GET_DRIVE_GEOMETRY_EX calls ↵Mounir IDRASSI1-134/+137
to avoid failure with disk drivers that don't support returning only sizeof(DISK_GEOMETRY_EX).