VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common
AgeCommit message (Collapse)AuthorFilesLines
2020-03-10Windows: Fix keyfiles path passed as CLI argument and set as default not ↵Mounir IDRASSI1-1/+3
always cleared from RAM when VeraCrypt exits
2020-02-11Increment version to 1.24-Update5 and update signed Windows drivers.Mounir IDRASSI1-3/+3
2020-02-10Windows: Implement support for processor groups in the driver and fix build ↵Mounir IDRASSI2-54/+78
issues caused by previous implementation
2020-02-10Windows: Fix warnings reported by Coverity static code analyzerMounir IDRASSI1-4/+7
2020-01-29 Adding Processor Groups support for more than 64 processors (#581)techvintage1-3/+57
* Adding Processor Groups support for more than 64 processors * Revert " Adding Processor Groups support for more than 64 processors" This reverts commit e1d5fe0a55f46a53549450972c5b5506a43ca94c. * Adding Processor Groups support for >64 logical processors
2020-01-22Windows: use fix for CVE-2019-19501 only when process elevated otherwise it ↵Mounir IDRASSI1-1/+22
will not add any benefit compared to standard ShellExecute while at the same time potentially causing issue when opening links.
2020-01-22Increment version to 1.24-Update4 and update Release NotesMounir IDRASSI1-4/+4
2020-01-22Windows: Fix regression in Expander and Format when RAM encryption is enable ↵Mounir IDRASSI2-2/+106
that was causing volume headers to be corrupted.
2020-01-21Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵Mounir IDRASSI2-3/+2
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536
2020-01-21Windows: don't display mount/dismount examples in help dialog for command ↵Mounir IDRASSI1-2/+2
line in Format and Expander
2019-12-22Increment version to 1.24-Update3 for Linux and update Release NotesVeraCrypt_1.24-Update3Mounir IDRASSI1-2/+2
2019-12-16Update version information in preparation for 1.24-Update2 releaseMounir IDRASSI1-1/+1
2019-12-13Windows: check "TrueCrypt Mode" in password dialog when mounting a file ↵Mounir IDRASSI2-0/+10
container with .tc extension
2019-12-10Increment version to 1.24-Update2Mounir IDRASSI1-3/+3
2019-12-10Windows: Add switch /FastCreateFile for VeraCrypt Format.exe to speedup ↵Mounir IDRASSI2-2/+24
creation of large file container if quick format is selected. This switch comes with security issues since it will embed existing content on disk into the file container which may expose sensitive content to an attacker who has access to the file container.
2019-12-09Linux: fix NOASM compilation (#563) (#568)alt3r 3go1-3/+3
Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com>
2019-12-08Windows: use fix for CVE-2019-19501 only on Vista and above since it doesn't ↵Mounir IDRASSI1-1/+2
make sens under XP.
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI4-54/+57
especially for keyfiles.
2019-12-08Windows: Add missing defines in Tcdefs.hMounir IDRASSI1-0/+9
2019-12-05Windows: Modify memory process protection when running with admin privileges ↵Mounir IDRASSI1-1/+12
to allow calling functions needed for CVE-2019-19501 fix while still protecting against memory access by non-admin processes.
2019-12-05Windows: Enhancement to the fix for CVE-2019-19501Mounir IDRASSI1-3/+6
2019-12-03Windows: Fix possible local privilege escalation vulnerability during ↵Mounir IDRASSI2-21/+231
execution of VeraCrypt Expander (CVE-2019-19501)
2019-11-27Windows: compatibility with multi-OS boot configuration by only setting ↵Mounir IDRASSI3-9/+38
VeraCrypt as first bootloader of the system if the current first bootloader is Windows one.
2019-11-27Windows: Don't restore MBR to VeraCrypt value if it is coming from a loader ↵Mounir IDRASSI1-2/+25
different from us or different from Microsoft one.
2019-11-22Windows: Add new registry flags for SystemFavoritesService to control ↵Mounir IDRASSI2-21/+37
updating of EFI BIOS boot menu on shutdown. This will help better manage multi-boot scenarios where we should not mess up with boot order (e.g. grub2 case)
2019-11-07Increment version to 1.24-Hotfix2Mounir IDRASSI1-3/+3
2019-11-04Windows: Display error message when password is too long and legacy maximum ↵Mounir IDRASSI1-1/+1
length used
2019-11-04Linux/MacOSX: Add switch to force the use of legacy maximum password length ↵Mounir IDRASSI1-0/+1
(64 UTF8 bytes) The switch is --legacy-password-maxlength
2019-11-02Start following IEEE 1541 agreed naming of bytes (#532)Meteor0id1-45/+45
* Start following IEEE 1541 agreed naming of bytes This standard exists to prevent any confusion about the actual number of bytes. It has been agreed on by experts and is being used more widespead these day. Let's start properly naming the number of bytes, which is absolutely important in disk encryption software. * Update LanguageStrings.cpp * Update UserInterface.cpp * kibibyte instead of kilobyte * kibibyte instead of kilobyte * MiB instead of MB * undo accidental deletions Odd indeed that two random lines were deleted in a previous commit. Probably happened when using a keyboard shortcut while editing the file. This fixes the issue. * Mb to Mib
2019-10-27Windows: Update Release Notes and set 1.24-Hotfix1 release date to October 27th.Mounir IDRASSI1-1/+1
2019-10-27Windows: fix failure to create rescue and thus to encrypt the system if the ↵Mounir IDRASSI1-6/+13
Windows username contains a UNICODE non-ASCII character (cf https://github.com/veracrypt/VeraCrypt/issues/441)
2019-10-27Windows: code refactoring and convert NTSTATUS error code to WIN32 ↵Mounir IDRASSI2-41/+26
equivalent before displaying error message.
2019-10-27Windows: Make EFI System Encryption PostOOBE code more robust to failure to ↵Mounir IDRASSI2-92/+104
access "\\\\?\\GLOBALROOT" disk namespace
2019-10-27Windows: Update EFI NVRAM variable only if changed or doesn't exist and add ↵Mounir IDRASSI2-11/+23
configuration to force setting EFI BootNext to veraCrypt bootloader before each shutdown
2019-10-26Windows: Restore veraCrypt boot meny entry for system encryption more often, ↵Mounir IDRASSI1-7/+16
especially during PostOOBE calls, and handle additional corner cases.
2019-10-25Set release date of 1.24-Hotfix1 to October 25th.Mounir IDRASSI1-1/+1
2019-10-25Windows: Fix test of GetPrivateProfileString output since this function ↵Mounir IDRASSI1-1/+1
discards double quotation marks
2019-10-25Windows: only update MBR first 512 bytes if they have changed and don't ↵Mounir IDRASSI1-30/+45
update full MBR bootload in case of PostOOBE
2019-10-25Windows: Avoid unnecessarily update of system encryption SetupConfig related ↵Mounir IDRASSI1-4/+53
files if there content didn't change
2019-10-24Increment version to 1.24-Hotfix1Mounir IDRASSI1-2/+2
2019-10-20Increment version to 1.23-Hotfix1-PreviewMounir IDRASSI1-2/+2
2019-10-20Windows: Avoid unnecessary write operations when copying/modifying EFI ↵Mounir IDRASSI2-6/+126
bootloader files in order to avoid leaking modification timestamp
2019-10-20Windows: add more checks to correctly identify Microsoft original bootloader.Mounir IDRASSI1-3/+24
2019-10-20Windows: Add checks that the System Favorites service is running. Warn user ↵Mounir IDRASSI4-3/+42
if he enabled option to clear RAM encryption keys and the service is stopped.
2019-10-18Windows: handle case of DcsProp configuration file for EFI system encryption ↵Mounir IDRASSI2-30/+93
contains wrong "ActionSuccess" entry that points towards bootmgfw.efi which is now our bootloader and not Microsoft one.
2019-10-14Windows: Fix regression that causes system favorites not to mount if ↵Mounir IDRASSI1-1/+9
VeraCrypt 1.24 is freshly installed and not updated.
2019-10-06Increment version to 1.24Mounir IDRASSI1-2/+2
2019-10-04Windows: Update libzip to version 1.5.2Mounir IDRASSI112-164/+247
2019-10-03Windows: If Secure Desktop is started and random generator was not ↵Mounir IDRASSI1-53/+70
initialized before us, then stop random generator after we finish in order to avoid consuming CPU because of periodic fast poll thread. Next time a critical operation that requires RNG is performed, it will be initialized again. We do this because since the addition of secure desktop support, every time secure desktop is displayed, the RNG fast poll thread was started even if the user will never perform any critical operation that requires random bytes.
2019-10-03Windows: Add function RandinitWithCheck to detect if random generator was ↵Mounir IDRASSI2-1/+14
already initialized before our call or not