1
0
mirror of https://github.com/veracrypt/VeraCrypt.git synced 2025-11-12 03:18:26 -06:00
Commit Graph

556 Commits

Author SHA1 Message Date
Mounir IDRASSI
8fa1596e73 Increment version to 1.24-Update5 and update signed Windows drivers. 2020-02-11 23:05:48 +01:00
Mounir IDRASSI
94d3a1919c Windows: Implement support for processor groups in the driver and fix build issues caused by previous implementation 2020-02-10 02:23:25 +01:00
Mounir IDRASSI
c1d670fd75 Windows: Fix warnings reported by Coverity static code analyzer 2020-02-10 02:23:18 +01:00
techvintage
123b187af5 Adding Processor Groups support for more than 64 processors (#581)
*  Adding Processor Groups support for more than 64 processors

* Revert " Adding Processor Groups support for more than 64 processors"

This reverts commit e1d5fe0a55.

* Adding Processor Groups support for >64 logical processors
2020-01-29 11:10:00 +01:00
Mounir IDRASSI
11aa708076 Windows: use fix for CVE-2019-19501 only when process elevated otherwise it will not add any benefit compared to standard ShellExecute while at the same time potentially causing issue when opening links. 2020-01-22 18:20:35 +01:00
Mounir IDRASSI
3874e9af97 Increment version to 1.24-Update4 and update Release Notes 2020-01-22 18:20:27 +01:00
Mounir IDRASSI
be1aee0034 Windows: Fix regression in Expander and Format when RAM encryption is enable that was causing volume headers to be corrupted. 2020-01-22 18:20:11 +01:00
Mounir IDRASSI
b6c290e4fd Windows: Fix failure of Screen Readers (Accessibility support) to reader UI by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536 2020-01-21 01:46:11 +01:00
Mounir IDRASSI
8fe3eb0136 Windows: don't display mount/dismount examples in help dialog for command line in Format and Expander 2020-01-21 01:46:03 +01:00
Mounir IDRASSI
f9572ea8f5 Increment version to 1.24-Update3 for Linux and update Release Notes 2019-12-22 16:35:56 +01:00
Mounir IDRASSI
7aecbb225c Update version information in preparation for 1.24-Update2 release 2019-12-16 00:47:13 +01:00
Mounir IDRASSI
1fd097c666 Windows: check "TrueCrypt Mode" in password dialog when mounting a file container with .tc extension 2019-12-13 00:08:17 +01:00
Mounir IDRASSI
ed8068cbbd Increment version to 1.24-Update2 2019-12-10 11:10:24 +01:00
Mounir IDRASSI
f9d95ef2c8 Windows: Add switch /FastCreateFile for VeraCrypt Format.exe to speedup creation of large file container if quick format is selected. This switch comes with security issues since it will embed existing content on disk into the file container which may expose sensitive content to an attacker who has access to the file container. 2019-12-10 00:51:34 +01:00
alt3r 3go
0364a36f84 Linux: fix NOASM compilation (#563) (#568)
Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com>
2019-12-09 17:43:33 +01:00
Mounir IDRASSI
07bb27e3b9 Windows: use fix for CVE-2019-19501 only on Vista and above since it doesn't make sens under XP. 2019-12-08 23:42:54 +01:00
Mounir IDRASSI
5e96a5c44c Windows: enhancements to the mechanism preserving file timestamps, especially for keyfiles. 2019-12-08 23:42:47 +01:00
Mounir IDRASSI
7f1e21e6a1 Windows: Add missing defines in Tcdefs.h 2019-12-08 23:42:39 +01:00
Mounir IDRASSI
4a215c2ddb Windows: Modify memory process protection when running with admin privileges to allow calling functions needed for CVE-2019-19501 fix while still protecting against memory access by non-admin processes. 2019-12-05 13:35:27 +01:00
Mounir IDRASSI
27d1f404f1 Windows: Enhancement to the fix for CVE-2019-19501 2019-12-05 13:35:18 +01:00
Mounir IDRASSI
ade8e3f8cb Windows: Fix possible local privilege escalation vulnerability during execution of VeraCrypt Expander (CVE-2019-19501) 2019-12-03 22:25:37 +01:00
Mounir IDRASSI
14a477026d Windows: compatibility with multi-OS boot configuration by only setting VeraCrypt as first bootloader of the system if the current first bootloader is Windows one. 2019-11-27 00:15:51 +01:00
Mounir IDRASSI
79eea6e5b1 Windows: Don't restore MBR to VeraCrypt value if it is coming from a loader different from us or different from Microsoft one. 2019-11-27 00:15:43 +01:00
Mounir IDRASSI
9741c9209d Windows: Add new registry flags for SystemFavoritesService to control updating of EFI BIOS boot menu on shutdown. This will help better manage multi-boot scenarios where we should not mess up with boot order (e.g. grub2 case) 2019-11-22 00:11:55 +01:00
Mounir IDRASSI
4587472e87 Increment version to 1.24-Hotfix2 2019-11-07 00:48:01 +01:00
Mounir IDRASSI
54c7e1cfd3 Windows: Display error message when password is too long and legacy maximum length used 2019-11-04 00:10:00 +01:00
Mounir IDRASSI
a7d5b6a477 Linux/MacOSX: Add switch to force the use of legacy maximum password length (64 UTF8 bytes)
The switch is --legacy-password-maxlength
2019-11-04 00:09:52 +01:00
Meteor0id
bb123bb3e8 Start following IEEE 1541 agreed naming of bytes (#532)
* Start following IEEE 1541 agreed naming of bytes

This standard exists to prevent any confusion about the actual number of bytes. It has been agreed on by experts and is being used more widespead these day. Let's start properly naming the number of bytes, which is absolutely important in disk encryption software.

* Update LanguageStrings.cpp

* Update UserInterface.cpp

* kibibyte instead of kilobyte

* kibibyte instead of kilobyte

* MiB instead of MB

* undo accidental deletions

Odd indeed that two random lines were deleted in a previous commit. Probably happened when using a keyboard shortcut while editing the file. This fixes the issue.

* Mb to Mib
2019-11-02 01:06:02 +01:00
Mounir IDRASSI
1ae99f2e67 Windows: Update Release Notes and set 1.24-Hotfix1 release date to October 27th. 2019-10-27 10:46:32 +01:00
Mounir IDRASSI
94084525b1 Windows: fix failure to create rescue and thus to encrypt the system if the Windows username contains a UNICODE non-ASCII character (cf https://github.com/veracrypt/VeraCrypt/issues/441) 2019-10-27 02:30:15 +02:00
Mounir IDRASSI
2722b46530 Windows: code refactoring and convert NTSTATUS error code to WIN32 equivalent before displaying error message. 2019-10-27 02:04:51 +02:00
Mounir IDRASSI
89e2547851 Windows: Make EFI System Encryption PostOOBE code more robust to failure to access "\\\\?\\GLOBALROOT" disk namespace 2019-10-27 02:04:43 +02:00
Mounir IDRASSI
ca46cf928a Windows: Update EFI NVRAM variable only if changed or doesn't exist and add configuration to force setting EFI BootNext to veraCrypt bootloader before each shutdown 2019-10-27 02:04:34 +02:00
Mounir IDRASSI
f22abf93dd Windows: Restore veraCrypt boot meny entry for system encryption more often, especially during PostOOBE calls, and handle additional corner cases. 2019-10-26 22:09:27 +02:00
Mounir IDRASSI
38b5af907e Set release date of 1.24-Hotfix1 to October 25th. 2019-10-25 18:25:44 +02:00
Mounir IDRASSI
28fc65e479 Windows: Fix test of GetPrivateProfileString output since this function discards double quotation marks 2019-10-25 18:25:29 +02:00
Mounir IDRASSI
343d1a95dc Windows: only update MBR first 512 bytes if they have changed and don't update full MBR bootload in case of PostOOBE 2019-10-25 14:47:51 +02:00
Mounir IDRASSI
318b00b6a2 Windows: Avoid unnecessarily update of system encryption SetupConfig related files if there content didn't change 2019-10-25 14:47:37 +02:00
Mounir IDRASSI
6b90e02624 Increment version to 1.24-Hotfix1 2019-10-24 00:10:34 +02:00
Mounir IDRASSI
11f1a21652 Increment version to 1.23-Hotfix1-Preview 2019-10-20 22:31:42 +02:00
Mounir IDRASSI
9b394ddc49 Windows: Avoid unnecessary write operations when copying/modifying EFI bootloader files in order to avoid leaking modification timestamp 2019-10-20 22:17:12 +02:00
Mounir IDRASSI
31a87c2e5f Windows: add more checks to correctly identify Microsoft original bootloader. 2019-10-20 22:17:04 +02:00
Mounir IDRASSI
cca08e1ed5 Windows: Add checks that the System Favorites service is running. Warn user if he enabled option to clear RAM encryption keys and the service is stopped. 2019-10-20 22:16:57 +02:00
Mounir IDRASSI
5b88a183ac Windows: handle case of DcsProp configuration file for EFI system encryption contains wrong "ActionSuccess" entry that points towards bootmgfw.efi which is now our bootloader and not Microsoft one. 2019-10-18 00:56:39 +02:00
Mounir IDRASSI
f56a8c49f9 Windows: Fix regression that causes system favorites not to mount if VeraCrypt 1.24 is freshly installed and not updated. 2019-10-14 01:08:43 +02:00
Mounir IDRASSI
be6c817873 Increment version to 1.24 2019-10-06 11:26:20 +02:00
Mounir IDRASSI
b6babc688d Windows: Update libzip to version 1.5.2 2019-10-04 21:15:10 +02:00
Mounir IDRASSI
ccda60f82f Windows: If Secure Desktop is started and random generator was not initialized before us, then stop random generator after we finish in order to avoid consuming CPU because of periodic fast poll thread. Next time a critical operation that requires RNG is performed, it will be initialized again. We do this because since the addition of secure desktop support, every time secure desktop is displayed, the RNG fast poll thread was started even if the user will never perform any critical operation that requires random bytes. 2019-10-03 19:32:45 +02:00
Mounir IDRASSI
1298f83aa4 Windows: Add function RandinitWithCheck to detect if random generator was already initialized before our call or not 2019-10-03 19:32:39 +02:00
Mounir IDRASSI
9f91c47bd2 Windows: Use Jitterentropy RNG only in SlowPoll call and not in FastPoll since the it consumes too much CPU and FastPoll requires fast and minimal entropy gathering 2019-10-03 19:32:33 +02:00