VeraCrypt
aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2014-11-08MacOSX : Update Fuse error message to display OSXFUSE requirement alongside ↵Mounir IDRASSI1-1/+1
MacFuse.
2014-11-08MacOSX : Support detection of OSXFUSE and the presence of MacFUSE ↵Mounir IDRASSI1-3/+29
compatibility layer.
2014-11-08MacOSX : copy the help pdf into the VeraCrypt bundle during package creationMounir IDRASSI1-0/+1
2014-11-08MacOSX : correct the name of dmg file used by the rm commandMounir IDRASSI1-1/+1
2014-11-08MacOSX : correct compilation issue caused by system API deprication and use ↵Mounir IDRASSI2-11/+5
of new wxWidgets.
2014-11-08MacOSX : Correct issue of compiling assembly files in both 32-bit and 64-bit ↵Mounir IDRASSI4-24/+54
mode. Modify Makefiles to correct compilation process using latest Xcode.
2014-11-08MacOSX : add icns file to be used by VeraCrypt bundleMounir IDRASSI1-0/+0
2014-11-08MacOSX : add nasm binary to be used instead of the native one because of the ↵Mounir IDRASSI1-0/+0
limitations of the version shipped by Apple
2014-11-08Linux GUI : hide the wipe choice during volume creation. Remove extra ↵Mounir IDRASSI3-3/+5
content from wipe choice list.
2014-11-08Correct message in Linux VeraCrypt installer to replace ↵Mounir IDRASSI1-1/+1
truecrypt-uninstall.sh by veracrypt-uninstall.sh
2014-11-08Correct compilation error under Linux introduced in latest commitMounir IDRASSI1-1/+1
2014-11-08Linux/MacOSX port of manual selection of number of passes for volume header ↵Mounir IDRASSI8-11/+217
over-write operation.
2014-11-08Add description string for the new wipe mode WIPE_MODE_256 in language files.Mounir IDRASSI38-6/+42
2014-11-08Add option in select the number of passes for volume header over-writing. By ↵Mounir IDRASSI16-35/+67
default, it is set to 3 but it can be increased to 256 passes (which can lead to a delay of many hours for a single password change operation).
2014-11-08Lower number of times we overwrite volume header during the encryption of a ↵Mounir IDRASSI2-4/+7
partition if the user choose to wipe the driver. Latest studies show that even one pass is enough to make data irretrievable. A value of 3 is a conservative approach that enhance performance without scarifying security. http://www.infosecisland.com/blogview/16130-The-Urban-Legend-of-Multipass-Hard-Disk-Overwrite.html http://digital-forensics.sans.org/blog/2009/01/15/overwriting-hard-drive-data/
2014-11-08Correct Linux compilation after removing legacy cryptographic code.Mounir IDRASSI2-3/+1
2014-11-08Remove remaining legacy cryptographic algorithms that are never used by ↵Mounir IDRASSI26-1012/+1
VeraCrypt.
2014-11-08Remove deprecated/legacy cryptographic algorithms and encryption modes that ↵Mounir IDRASSI21-3979/+21
are never used by VeraCrypt. This will speed up volumes opening in many cases.
2014-11-08Mount.c : call burn directly in szFileName instead of (&szFileName). This ↵Mounir IDRASSI1-1/+1
was not an issue because the compiler returns the same address for both, but for the sake of clarity it had to be corrected.
2014-11-08Static Code Analysis : Generalize the use of Safe String functions. Add some ↵Mounir IDRASSI15-395/+490
NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL.
2014-11-08Static Code Analysis : Use Safe String function in Dlgcode.c. Add byte size ↵Mounir IDRASSI2-274/+340
parameter in various functions to help implement secure handling of strings.
2014-11-08Static Code Analysis : Add various NULL pointers checksMounir IDRASSI4-21/+39
2014-11-08Static Code Analysis : Add NULL pointers checks on the result of ATL string ↵Mounir IDRASSI2-10/+24
conversion. Avoid some conversions by using UNICODE functions directly.
2014-11-08Use Safe String functions in Registry.c and add a unicode version of ↵Mounir IDRASSI2-5/+31
WriteLocalMachineRegistryDword function to avoid doing conversions when used.
2014-11-08Static Code Analysis : Use Safe String functions in Setup code to avoid ↵Mounir IDRASSI3-105/+108
potential security issues.
2014-11-08Static Code Analysis : Add check on the return of strtok inside ↵Mounir IDRASSI1-5/+8
mkfulldir_internal to avoid warning.
2014-11-08Static Code Analysis: Correctly initialize variables to avoid false-positive ↵Mounir IDRASSI2-3/+3
detection in the boot code.
2014-11-08Static Code Analysis : Use Safe string functions inside VeraCrypt Device ↵Mounir IDRASSI4-38/+62
Driver to avoid potential security issues. Add many checks for NULL pointers to handle low memory use cases.
2014-11-08Remove test inherited from TrueCrypt because it's always true since we ↵Mounir IDRASSI1-1/+1
inherited from version 0x71a
2014-11-08Disable posting the results of minidump analysis until a dedicated URL is ↵Mounir IDRASSI1-1/+3
put in place.
2014-11-08Disable crash handling until we put in place a dedicated URL for posting ↵Mounir IDRASSI1-14/+14
crash information.
2014-11-08Remove unused label.Mounir IDRASSI1-1/+0
2014-11-08Static Code Analysis : Correctly initialize member variable in HostDevice ↵Mounir IDRASSI1-1/+2
constructor
2014-11-08Static Code Analysis : Avoid using invalidate integer value received from ↵Mounir IDRASSI1-1/+5
GetFileSize.
2014-11-08Static Code Analysis : fix usage of strncpy and sscanf.Mounir IDRASSI3-8/+8
2014-11-08Static Code Analysis : fix various memory leaks.Mounir IDRASSI4-4/+16
2014-11-08Static Code Analysis : fix resource leakage by ensuring that all Windows ↵Mounir IDRASSI3-12/+50
handles are released properly
2014-11-08Static Code Analysis : Avoid potential overflow when parsing language file ↵Mounir IDRASSI1-1/+1
by specifying width for 's' conversion specifier
2014-11-08Static Code Analysis : fix non-absolute DLL/process loads that can be ↵Mounir IDRASSI5-11/+66
hijacked (Microsoft Security Advisory 2269637).
2014-11-08Static Code Analysis : Add virtual attribute to destructor of classes that ↵Mounir IDRASSI2-2/+2
have virtual methods inherited from a base class
2014-11-08Static Code Analysis : Correctly initialize member variables in various ↵Mounir IDRASSI4-6/+14
constructors
2014-11-08Fix password memory leak inside the Device driver in boot encryption mode.Mounir IDRASSI1-1/+1
2014-11-08Avoid changing metadata (ownership, permission,etc) of /usr when unpacking ↵VeraCrypt_Linux_1.0dMounir IDRASSI1-1/+1
VeraCrypt tar package
2014-11-08Set the Execute bit for VeraCrypt uninstall script before copying it to the ↵Mounir IDRASSI1-0/+1
tar package
2014-11-08Remove VeraCrypt version number from Readme.txt.Mounir IDRASSI1-1/+2
2014-11-08Add VeraCrypt specific Linux packaging code in Makefiles and add various ↵Mounir IDRASSI5-1/+917
helper scripts. The original TrueCrypt sources didn't contain anything about this.
2014-11-08Change namespace from TrueCrypt to VeraCrypt. Rename method from Resources ↵Mounir IDRASSI239-246/+246
Resources::GetTrueCryptIcon to Resources::GetVeraCryptIcon.
2014-11-08Update wxFormBuild file to latest version (3.5 beta) and generate new ↵Mounir IDRASSI3-4086/+12798
Forms.cpp/Forms.h files.
2014-11-08Point to the SourceForge website instead of idrix.fr for the application ↵Mounir IDRASSI2-4/+4
link. Remove OS parameter is URL constructed under Linux/MacOSX
2014-11-08Update wxWidgets compilation flags in order to be compatible with wxWidgets ↵Mounir IDRASSI1-2/+4
3.0 and remove unneeded dependencies to ensure maximum compatibility.