VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common
AgeCommit message (Collapse)AuthorFilesLines
2020-06-21Windows: call VcProtectKeys in benchmark warm-up when RAM encryption is ↵Mounir IDRASSI1-0/+4
enabled in order to be follow the same execution path as the result of benchmark calculations.
2020-06-19Windows: Fix wrong results in benchmark of encryption algorithms when RAM ↵Mounir IDRASSI1-0/+5
encryption is enabled
2020-06-19Windows: remove duplicated function to detect AES-NI support in CPUMounir IDRASSI1-1/+1
2020-06-12Windows: Update IDRIX SHA-1 code signing certificate to latest one.Mounir IDRASSI1-6/+6
2020-06-11Switch from auto_ptr to unique_ptr (#638)Christopher Bergqvist4-13/+13
2020-03-10Increment version to 1.24-Update6Mounir IDRASSI1-2/+2
2020-03-10Windows setup: Fix wrong language used in installer if we select a language ↵Mounir IDRASSI1-0/+1
in the language selection dialog and then select English followed by OK.
2020-03-10Update copyright year in creditsVeraCrypt_1.24-Update5Mounir IDRASSI1-3/+3
2020-03-10Windows: Add missing libzip file to the build projectMounir IDRASSI2-0/+4
2020-03-10Set release date of 1.24-Update5 and update release notesMounir IDRASSI1-2/+2
2020-03-10Windows: Update libzip to 1.6.1Mounir IDRASSI112-266/+585
2020-03-10Windows: Fix compilation error caused by previous keyfile commitMounir IDRASSI1-0/+2
2020-03-10Windows: Fix keyfiles path passed as CLI argument and set as default not ↵Mounir IDRASSI1-1/+3
always cleared from RAM when VeraCrypt exits
2020-02-11Increment version to 1.24-Update5 and update signed Windows drivers.Mounir IDRASSI1-3/+3
2020-02-10Windows: Implement support for processor groups in the driver and fix build ↵Mounir IDRASSI2-54/+78
issues caused by previous implementation
2020-02-10Windows: Fix warnings reported by Coverity static code analyzerMounir IDRASSI1-4/+7
2020-01-29 Adding Processor Groups support for more than 64 processors (#581)techvintage1-3/+57
* Adding Processor Groups support for more than 64 processors * Revert " Adding Processor Groups support for more than 64 processors" This reverts commit e1d5fe0a55f46a53549450972c5b5506a43ca94c. * Adding Processor Groups support for >64 logical processors
2020-01-22Windows: use fix for CVE-2019-19501 only when process elevated otherwise it ↵Mounir IDRASSI1-1/+22
will not add any benefit compared to standard ShellExecute while at the same time potentially causing issue when opening links.
2020-01-22Increment version to 1.24-Update4 and update Release NotesMounir IDRASSI1-4/+4
2020-01-22Windows: Fix regression in Expander and Format when RAM encryption is enable ↵Mounir IDRASSI2-2/+106
that was causing volume headers to be corrupted.
2020-01-21Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵Mounir IDRASSI2-3/+2
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536
2020-01-21Windows: don't display mount/dismount examples in help dialog for command ↵Mounir IDRASSI1-2/+2
line in Format and Expander
2019-12-22Increment version to 1.24-Update3 for Linux and update Release NotesVeraCrypt_1.24-Update3Mounir IDRASSI1-2/+2
2019-12-16Update version information in preparation for 1.24-Update2 releaseMounir IDRASSI1-1/+1
2019-12-13Windows: check "TrueCrypt Mode" in password dialog when mounting a file ↵Mounir IDRASSI2-0/+10
container with .tc extension
2019-12-10Increment version to 1.24-Update2Mounir IDRASSI1-3/+3
2019-12-10Windows: Add switch /FastCreateFile for VeraCrypt Format.exe to speedup ↵Mounir IDRASSI2-2/+24
creation of large file container if quick format is selected. This switch comes with security issues since it will embed existing content on disk into the file container which may expose sensitive content to an attacker who has access to the file container.
2019-12-09Linux: fix NOASM compilation (#563) (#568)alt3r 3go1-3/+3
Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com>
2019-12-08Windows: use fix for CVE-2019-19501 only on Vista and above since it doesn't ↵Mounir IDRASSI1-1/+2
make sens under XP.
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI4-54/+57
especially for keyfiles.
2019-12-08Windows: Add missing defines in Tcdefs.hMounir IDRASSI1-0/+9
2019-12-05Windows: Modify memory process protection when running with admin privileges ↵Mounir IDRASSI1-1/+12
to allow calling functions needed for CVE-2019-19501 fix while still protecting against memory access by non-admin processes.
2019-12-05Windows: Enhancement to the fix for CVE-2019-19501Mounir IDRASSI1-3/+6
2019-12-03Windows: Fix possible local privilege escalation vulnerability during ↵Mounir IDRASSI2-21/+231
execution of VeraCrypt Expander (CVE-2019-19501)
2019-11-27Windows: compatibility with multi-OS boot configuration by only setting ↵Mounir IDRASSI3-9/+38
VeraCrypt as first bootloader of the system if the current first bootloader is Windows one.
2019-11-27Windows: Don't restore MBR to VeraCrypt value if it is coming from a loader ↵Mounir IDRASSI1-2/+25
different from us or different from Microsoft one.
2019-11-22Windows: Add new registry flags for SystemFavoritesService to control ↵Mounir IDRASSI2-21/+37
updating of EFI BIOS boot menu on shutdown. This will help better manage multi-boot scenarios where we should not mess up with boot order (e.g. grub2 case)
2019-11-07Increment version to 1.24-Hotfix2Mounir IDRASSI1-3/+3
2019-11-04Windows: Display error message when password is too long and legacy maximum ↵Mounir IDRASSI1-1/+1
length used
2019-11-04Linux/MacOSX: Add switch to force the use of legacy maximum password length ↵Mounir IDRASSI1-0/+1
(64 UTF8 bytes) The switch is --legacy-password-maxlength
2019-11-02Start following IEEE 1541 agreed naming of bytes (#532)Meteor0id1-45/+45
* Start following IEEE 1541 agreed naming of bytes This standard exists to prevent any confusion about the actual number of bytes. It has been agreed on by experts and is being used more widespead these day. Let's start properly naming the number of bytes, which is absolutely important in disk encryption software. * Update LanguageStrings.cpp * Update UserInterface.cpp * kibibyte instead of kilobyte * kibibyte instead of kilobyte * MiB instead of MB * undo accidental deletions Odd indeed that two random lines were deleted in a previous commit. Probably happened when using a keyboard shortcut while editing the file. This fixes the issue. * Mb to Mib
2019-10-27Windows: Update Release Notes and set 1.24-Hotfix1 release date to October 27th.Mounir IDRASSI1-1/+1
2019-10-27Windows: fix failure to create rescue and thus to encrypt the system if the ↵Mounir IDRASSI1-6/+13
Windows username contains a UNICODE non-ASCII character (cf https://github.com/veracrypt/VeraCrypt/issues/441)
2019-10-27Windows: code refactoring and convert NTSTATUS error code to WIN32 ↵Mounir IDRASSI2-41/+26
equivalent before displaying error message.
2019-10-27Windows: Make EFI System Encryption PostOOBE code more robust to failure to ↵Mounir IDRASSI2-92/+104
access "\\\\?\\GLOBALROOT" disk namespace
2019-10-27Windows: Update EFI NVRAM variable only if changed or doesn't exist and add ↵Mounir IDRASSI2-11/+23
configuration to force setting EFI BootNext to veraCrypt bootloader before each shutdown
2019-10-26Windows: Restore veraCrypt boot meny entry for system encryption more often, ↵Mounir IDRASSI1-7/+16
especially during PostOOBE calls, and handle additional corner cases.
2019-10-25Set release date of 1.24-Hotfix1 to October 25th.Mounir IDRASSI1-1/+1
2019-10-25Windows: Fix test of GetPrivateProfileString output since this function ↵Mounir IDRASSI1-1/+1
discards double quotation marks
2019-10-25Windows: only update MBR first 512 bytes if they have changed and don't ↵Mounir IDRASSI1-30/+45
update full MBR bootload in case of PostOOBE