VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/Dlgcode.c
AgeCommit message (Collapse)AuthorFilesLines
2022-01-07Windows: Update IDRIX SHA-256 code signing certificate to latest oneMounir IDRASSI1-6/+6
2022-01-02Windows: Restore support of Windows 7, 8/8.1 by using single attestation ↵Mounir IDRASSI1-4/+230
signature for driver and add checks on needed KBs for Windows Vista and Windows 7. Add signed driver files. - Windows 7 needs KB3033929 or KB4474419 - Windows Vista needs KB4039648 or KB4474419
2022-01-02Update copyright year to 2022Mounir IDRASSI1-2/+2
2021-12-04Windows: Implement TESTSIGNING build configuration that allows running under ↵Mounir IDRASSI1-2/+52
Windows Vista,7, 8 and 8.1.
2021-11-21Windows: Restrict supported Windows versions to XP, 10 and 11 because of new ↵Mounir IDRASSI1-22/+7
requirement on driver code signing. For now, we are not able to put in place HCK/WLK certification of VeraCrypt driver that is needed for Windows 7, 8 and 8.1.
2021-09-02Windows: Implement a new way to detect Windows version to overcome MSI ↵Mounir IDRASSI1-0/+53
limitation
2021-08-30Windows: Set minimal supported version to Windows 8 since our driver is now ↵Mounir IDRASSI1-2/+2
signed only SHA256
2021-08-30Update copyright year to 2021Mounir IDRASSI1-2/+2
2021-08-30Windows: Update IDRIX SHA-256 code signing certificate to latest oneMounir IDRASSI1-6/+6
2021-08-02Windows: Fix wrong detection of ARM architectureMounir IDRASSI1-1/+1
2021-07-14Windows: Use only SHA256 certificate for code signature verification since ↵Mounir IDRASSI1-12/+1
SHA1 certificate is not used anymore.
2021-07-13Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure ↵Mounir IDRASSI1-2/+2
equivalents This fixed failure to build driver for ARM64 with latest VS 2019
2021-03-22Windows: first implementation of MSI installer for silent mode deployment ↵Mounir IDRASSI1-4/+39
(ACCEPTLICENSE=YES must be set in msiexec command line)
2021-02-27Windows: Load UrlUnescapeW dynamically from Shlwapi.dll and use safe URL ↵Mounir IDRASSI1-5/+14
opening starting from Vista only since security mechanism doesn't apply to Windows XP.
2021-02-24Windows: Fix freeze when password dialog displayed in secure desktop and try ↵Mounir IDRASSI1-2/+36
to access token keyfiles protected by PIN
2021-02-21Windows: Fix failure to load local HTML documentation if application running ↵Mounir IDRASSI1-6/+24
with administrative privileges In this case, FileExists was called on a path with format "file:///..." and containing escape sequences, which was not recognized.
2021-01-02Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵Mounir IDRASSI1-11/+88
System encryption still not implemented on ARM64
2020-08-06Windows: Fix wrong error message when UTF-8 encoding of entered password ↵Mounir IDRASSI1-1/+1
exceeds the maximum supported length.
2020-08-06Windows: Display a warning during system encryption wizard when typed ↵Mounir IDRASSI1-36/+42
password reaches maximum length and inform user that no more characters are allowed and that they are ignored.
2020-08-06Windows: Display warning message with correct maximum length value when ↵Mounir IDRASSI1-5/+39
password is truncated
2020-08-03Windows: Fix issue in UI for configuration autofix mechanism of bootloaderMounir IDRASSI1-0/+10
2020-08-02Windows: use fix for CVE-2019-19501 only if standard Windows Shell is ↵Mounir IDRASSI1-2/+4
running since we rely on it for the implementation of the fix. If Windows Shell has been modified or is not running, then we can't really protect the user is such non standard environment
2020-07-29Windows: Don't use HRESULT macros SUCCEEDED to check if WinVerifyTrust ↵Mounir IDRASSI1-1/+1
succeeded. Instead, check the return value for equality to zero.
2020-07-22Windows: Add possibility to sign binaries using SHA256 only. This fixes ↵Mounir IDRASSI1-1/+13
Windows Smart Screen warning when launching installer
2020-07-21Windows: Implement detection of Hibernate and Fast Startup and disable them ↵Mounir IDRASSI1-0/+73
if RAM encryption is activated.
2020-07-06Windows: Support direct password drag-n-drop from external applications ↵Mounir IDRASSI1-0/+422
(e.g. KeePass) which is more secure than using clipboard.
2020-07-02Windows: Don't allow to encrypt the system drive if it is already encrypted ↵Mounir IDRASSI1-0/+102
by BitLocker
2020-07-02Windows: Replace GetSystemInfo calls by more reliable function to get number ↵Mounir IDRASSI1-9/+6
of CPUs active on the PC.
2020-06-28Windows: remove unused code targeting Windows 2000.Mounir IDRASSI1-6/+0
2020-06-26Windows: fix warning reported by static code analyzed by adding copy ↵Mounir IDRASSI1-4/+8
constructor to _TEXT_EDIT_DIALOG_PARAM and = operator to HostDevice
2020-06-21Windows: call VcProtectKeys in benchmark warm-up when RAM encryption is ↵Mounir IDRASSI1-0/+4
enabled in order to be follow the same execution path as the result of benchmark calculations.
2020-06-19Windows: Fix wrong results in benchmark of encryption algorithms when RAM ↵Mounir IDRASSI1-0/+5
encryption is enabled
2020-06-19Windows: remove duplicated function to detect AES-NI support in CPUMounir IDRASSI1-1/+1
2020-06-12Windows: Update IDRIX SHA-1 code signing certificate to latest one.Mounir IDRASSI1-6/+6
2020-06-11Switch from auto_ptr to unique_ptr (#638)Christopher Bergqvist1-1/+1
2020-03-10Update copyright year in creditsVeraCrypt_1.24-Update5Mounir IDRASSI1-3/+3
2020-03-10Windows: Fix compilation error caused by previous keyfile commitMounir IDRASSI1-0/+2
2020-03-10Windows: Fix keyfiles path passed as CLI argument and set as default not ↵Mounir IDRASSI1-1/+3
always cleared from RAM when VeraCrypt exits
2020-02-10Windows: Fix warnings reported by Coverity static code analyzerMounir IDRASSI1-4/+7
2020-01-22Windows: use fix for CVE-2019-19501 only when process elevated otherwise it ↵Mounir IDRASSI1-1/+22
will not add any benefit compared to standard ShellExecute while at the same time potentially causing issue when opening links.
2020-01-21Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵Mounir IDRASSI1-3/+1
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536
2019-12-13Windows: check "TrueCrypt Mode" in password dialog when mounting a file ↵Mounir IDRASSI1-0/+9
container with .tc extension
2019-12-08Windows: use fix for CVE-2019-19501 only on Vista and above since it doesn't ↵Mounir IDRASSI1-1/+2
make sens under XP.
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI1-3/+8
especially for keyfiles.
2019-12-05Windows: Modify memory process protection when running with admin privileges ↵Mounir IDRASSI1-1/+12
to allow calling functions needed for CVE-2019-19501 fix while still protecting against memory access by non-admin processes.
2019-12-05Windows: Enhancement to the fix for CVE-2019-19501Mounir IDRASSI1-3/+6
2019-12-03Windows: Fix possible local privilege escalation vulnerability during ↵Mounir IDRASSI1-21/+230
execution of VeraCrypt Expander (CVE-2019-19501)
2019-11-27Windows: compatibility with multi-OS boot configuration by only setting ↵Mounir IDRASSI1-7/+15
VeraCrypt as first bootloader of the system if the current first bootloader is Windows one.
2019-11-04Windows: Display error message when password is too long and legacy maximum ↵Mounir IDRASSI1-1/+1
length used
2019-10-20Windows: Add checks that the System Favorites service is running. Warn user ↵Mounir IDRASSI1-1/+1
if he enabled option to clear RAM encryption keys and the service is stopped.