VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Mount
AgeCommit message (Collapse)AuthorFilesLines
2020-01-22Windows: restore Visual Studio solution and project files to default ↵VeraCrypt_1.24-Update4Mounir IDRASSI1-1/+2
configuration
2020-01-22Increment version to 1.24-Update4 and update Release NotesMounir IDRASSI2-5/+5
2020-01-21Windows: Support notifying WAITFOR.EXE Windows command when VeraCrypt.exe ↵Mounir IDRASSI1-0/+54
exits if /q was specified in CLI. This done using the new switch "/signalExit" who must have a string parameter that must be the same as the one that will be specified for WAITFOR.EXE command.
2020-01-21Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵Mounir IDRASSI1-0/+14
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536
2019-12-16Update version information in preparation for 1.24-Update2 releaseMounir IDRASSI1-2/+2
2019-12-13Windows: check "TrueCrypt Mode" in password dialog when mounting a file ↵Mounir IDRASSI1-1/+1
container with .tc extension
2019-12-10Increment version to 1.24-Update2Mounir IDRASSI1-4/+4
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI1-9/+15
especially for keyfiles.
2019-11-28Windows: Don't write extra 0x00 byte at the end of DcsProp file when ↵Mounir IDRASSI1-3/+4
modifying it through UI
2019-11-22Windows: Add new registry flags for SystemFavoritesService to control ↵Mounir IDRASSI1-2/+9
updating of EFI BIOS boot menu on shutdown. This will help better manage multi-boot scenarios where we should not mess up with boot order (e.g. grub2 case)
2019-11-12Windows: Allow system encrypted devices to be mounted from WindowsPE - even ↵csware1-4/+9
if changing the keyboard layout failed (#539) When my system broke and I had to use WindowsPE to rescue some files the password dialog always closed immediately. There was no chance to mount the system device using the GUI. It took me a while to realize that I could try using the CLI by passing the password as a parameter (which might not be so obvious for not advanced users). Signed-off-by: Sven Strickroth <email@cs-ware.de>
2019-11-07Increment version to 1.24-Hotfix2Mounir IDRASSI1-4/+4
2019-10-27Windows: use strcmp to compare effective content of std::string since == ↵VeraCrypt_1.24-Hotfix1Mounir IDRASSI1-1/+1
operator may return false if one of the strins has an extra \0 at the end.
2019-10-27Windows: Only update boot configuration on disk if the user actually changed ↵Mounir IDRASSI1-25/+29
something in the UI
2019-10-27Windows: Update EFI NVRAM variable only if changed or doesn't exist and add ↵Mounir IDRASSI1-1/+4
configuration to force setting EFI BootNext to veraCrypt bootloader before each shutdown
2019-10-25Windows: for system encryption case, also perform automatic fix of boot ↵Mounir IDRASSI1-14/+10
configuration if MBR boot used and not only EFI.
2019-10-24Increment version to 1.24-Hotfix1Mounir IDRASSI1-4/+4
2019-10-20Increment version to 1.23-Hotfix1-PreviewMounir IDRASSI1-4/+4
2019-10-20Windows: Add checks that the System Favorites service is running. Warn user ↵Mounir IDRASSI2-1/+38
if he enabled option to clear RAM encryption keys and the service is stopped.
2019-10-06Increment version to 1.24Mounir IDRASSI1-2/+2
2019-10-02Increment version to 1.24-Beta6Mounir IDRASSI2-4/+8
2019-09-29Windows: Use periodic update of connected devices only if there is a ↵Mounir IDRASSI2-54/+94
Favorite that uses VolumeID. Add command option to disable the period update of devices.
2019-09-26Windows: Fix sporadic keyboard issue in Secure Desktop for password dialog ↵Mounir IDRASSI1-1/+6
by not using the trick to put it reliably in foreground. The trick is based on a emulation of ALT+TAB but sometimes ALT key would remain pressed in case of Secure Desktop making it impossible to type the password (a workaround was to press CTRL key which reset the state of ALT key)
2019-09-24Windows: fix HourGlass cursor showing up in main UI after launching disk ↵Mounir IDRASSI1-4/+0
decryption wizard/
2019-03-09Increment version to 1.24-Beta5Mounir IDRASSI1-4/+4
2019-03-09Increment version to 1.24-Beta4 and update release notes to clarify that ↵Mounir IDRASSI1-4/+4
password length increase applies only to non-system volumes.
2019-03-08Windows: inform user that RAM encryption setting requires reboot to take effectMounir IDRASSI1-1/+23
2019-03-03Increment version to 1.24-Beta3. Update Release Notes.Mounir IDRASSI1-4/+4
2019-03-03Windows: Add command line switch (/m noattach) that is equivalent to UI ↵Mounir IDRASSI1-0/+4
option "Only create virtual device without mounting on selected drive letter"
2019-03-03Windows: replicate old behavior when handling passwords in UI when legacy ↵Mounir IDRASSI1-4/+7
password maximum length option selected
2019-03-03Windows: Add option to use legacy maximum password length (64 characters) ↵Mounir IDRASSI3-13/+29
instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt.
2019-03-01Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵Mounir IDRASSI3-7/+23
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
2019-02-15Windows: rename IsCpuRngSupport to IsCpuRngSupported for clarity and use it ↵Mounir IDRASSI1-1/+1
in Mount.c
2019-02-10Windows: Avoid simultaneous calls of favorites mounting, for example if ↵Mounir IDRASSI1-13/+26
corresponding hotkey is pressed multiple times.
2019-02-08Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy ↵Mounir IDRASSI3-7/+26
which is now disabled by default
2019-02-04Automatically truncate passwords for TrueCrypt volumes and System Encryption ↵Mounir IDRASSI1-9/+34
to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version.
2019-01-28Increment version to 1.24-Beta2Mounir IDRASSI1-4/+4
2019-01-26Windows: Add a build configuration containing EFI bootloader signed with ↵Mounir IDRASSI1-0/+139
custom SecureBoot key instead
2019-01-21Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵Mounir IDRASSI1-2/+2
not needed after their key schedule is created
2019-01-15Windows: enhancements to EFI system encryption, like handling of Multi-Boot ↵Mounir IDRASSI1-38/+48
and better compatibility with Windows Upgrade process.
2019-01-14Windows: enhance support of new behavior of favorite service which is now ↵Mounir IDRASSI2-12/+7
always running in case of system encryption
2019-01-14Windows: Implement feature that enables clearing of encryption keys when a ↵Mounir IDRASSI3-21/+160
new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade).
2019-01-14Increment version to 1.24-Beta1Mounir IDRASSI1-4/+4
2018-12-24Windows: Fix mount option to disable Windows Mount Manager can preserved ↵Mounir IDRASSI1-3/+1
when mount options dialog opened a second time.
2018-12-19Increment version to 1.24-Beta0Mounir IDRASSI1-4/+4
2018-12-19Windows: Add mount option that allows mounting a volume without attaching it ↵Mounir IDRASSI1-5/+42
to the specified drive letter. This is useful in situation where Windows has issue with the filesystem (e.g. ReFS on Windows 10 1809) and we need to use third party software to be able to use the filesystem under Windows through low level VeraCrypt virtual device (e.g. \Device\VeraCryptVolumeX).
2018-10-10Increment version to 1.23-Hotfix-2Mounir IDRASSI1-4/+4
2018-09-21Increment version to 1.23-Hotfix-1Mounir IDRASSI1-4/+4
2018-09-09Increment version to 1.23Mounir IDRASSI1-2/+2
2018-09-03Increment version to 1.23-BETA8 and update release notes.Mounir IDRASSI1-4/+4