VeraCrypt
aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2019-10-20Windows: Add checks that the System Favorites service is running. Warn user ↵Mounir IDRASSI6-4/+80
if he enabled option to clear RAM encryption keys and the service is stopped.
2019-10-20Windows: resize UI elements of random collection step in Format wizardMounir IDRASSI1-8/+7
2019-10-19MacOSX: Support APFS for creating volumes.Mounir IDRASSI5-0/+14
2019-10-18Windows: make VeraCrypt Expander able to resume expansion of volumes whose ↵Mounir IDRASSI2-7/+18
previous expansion was aborted before it finishes
2019-10-18Windows: handle case of DcsProp configuration file for EFI system encryption ↵Mounir IDRASSI2-30/+93
contains wrong "ActionSuccess" entry that points towards bootmgfw.efi which is now our bootloader and not Microsoft one.
2019-10-17Linux: Workaround for gcc 4.4.7 bug under CentOS 6 that causes VeraCrypt ↵Mounir IDRASSI1-0/+14
built under CentOS 6 to crash when Whirlpool hash is used.
2019-10-17Linux: fix compilation error under CentOS 6Mounir IDRASSI1-0/+1
2019-10-16Small GUI enhancements (#521)El Mostafa Idrassi2-12/+12
2019-10-16Fixed drag and drop not showing correct path, specifically under GTK-3. (#520)El Mostafa Idrassi3-6/+0
2019-10-15Documentation: Add missing documentation for VeraCrypt.exe command line ↵Mounir IDRASSI2-1/+5
switch /DisableDeviceUpdate
2019-10-15MacOSX: Enhanced Makefile and build script (#519)El Mostafa Idrassi2-13/+14
Added new variable 'VC_OSX_SDK' to differentiate between the OSX minimum target and the SDK to use for building.
2019-10-15Fixed buttons not being correctly aligned (#518)El Mostafa Idrassi2-9/+12
2019-10-14MacOSX: Add build scripts and modifications to linking against wxWidgets ↵Mounir IDRASSI6-23/+183
3.1.2 for non legacy build targeting OSX 10.9+
2019-10-14Windows: Fix regression that causes system favorites not to mount if ↵Mounir IDRASSI1-1/+9
VeraCrypt 1.24 is freshly installed and not updated.
2019-10-11MacOSX: Fixed devices / partitions not showing in the device selection ↵El Mostafa Idrassi1-6/+34
dialog (#516) To get the size of each device / partition on the system, the method 'GetDeviceSize()' in 'src/Core/Unix/CoreUnix.cpp' first opens the device / partition using 'open()' function to get a File Descriptor, then retrieves its size using this File Descriptor. Starting OS X 10.11 ("El Capitan"), a feature called "System Integrity Protection (SIP)" or less formally, "rootless mode" has been added. This feature blocks access to certain critical aspects of the OS and Hardware by 3rd-Party programs. Specifically, low-level access to the system disks, devices and partitions is forbidden ; namely functions like 'open()' for instance fail with the error code : "EPERM = Operation Not Permitted". Therefore, for system devices / partitions, 'GetDeviceSize()' fails because of the failure of the 'open()' function, and throws an exception, which is then caught inside the method 'GetHostDevices()' in '/src/Core/Unix/FreeBSD/CoreFreeBSD.cpp' : this leads to the size of the device / partition being set to '0'. Therefore, in the constructor of 'DeviceSelectionDialog' in 'src/Main/Forms/DeviceSelectionDialog.cpp', when the size of a device is '0', the whole device is skipped, leading to all of its partitions not being treated or shown, even though some of these partitions may have a size which is != 0. This commit fixes the issue by : 1 - First, checking whether the device size is '0'. If it is the case, the code loops through all the devices partitions : if there is at least one partition with a size != 0, the device is not skipped. Otherwise, it is. 2 - Then, if the size of the device is '0', the size of the device is not shown to avoid confusing the user. Also, since the device is not usable, the 'OK' button is not active when the device is selected. 3 - Finally, if a partition's size is '0', it is not shown since it is not usable : we cannot open it. Signed-off-by: El Mostafa IDRASSI <el-mostafa.idrassi@prestalab.net>
2019-10-08Linux/FreeBSD: Use of 'sudo -n uptime' command to check whether user has an ↵El Mostafa Idrassi1-0/+37
active 'sudo' session instead of the use of a 'dummy' password. (#513) Signed-off-by: El Mostafa IDRASSI <el-mostafa.idrassi@prestalab.net>
2019-10-07Updated and fixed build and packaging scripts. (#512)El Mostafa Idrassi4-45/+130
Now, under Debian 10+ and Ubuntu 18.04+, we link against the GTK-3 version of wxWidgets (libwxgtk3.0-gtk3-0v5). Under Debian 9- and Ubuntu 16.04, we link against the GTK-2 version of wxWidgets (libwxgtk3.0-0v5) which is the only one available. Also, we now have 2 separate RPM scripts : 'build_cmake_rpm_gtk2.sh' which builds wxWidgets and links it against GTK-2, then links VeraCrypt against 'gtk2' package (typically to be used under CentOS 6) and 'build_cmake_rpm_gtk3' which builds wxWidgets and links it against GTK-3, then links VeraCrypt against 'gtk3' package (typically to be used under CentOS 7+).
2019-10-06MacOSX: fix link error under Xcode 4.6.3VeraCrypt_1.24Mounir IDRASSI2-3/+7
2019-10-06Linux/FreeBSD: change location of documentation from ↵Mounir IDRASSI4-4/+6
/usr/share/veracrypt/doc to the standard /usr/share/doc/veracrypt
2019-10-06Increment version to 1.24Mounir IDRASSI51-56/+56
2019-10-05Linux: modifications to cmake files to use GTK3 on CentOS and change ↵Mounir IDRASSI3-11/+11
packages names
2019-10-05Linux: Add option in Makefile to use GTK3 in VeraCrypt static buildMounir IDRASSI1-1/+7
2019-10-04Update Release Notes to indicate use of libzip 1.5.2Mounir IDRASSI2-1/+1
2019-10-04Linux: Added CMake script for creating .DEBs and .RPMs for VeraCrypt using ↵El Mostafa Idrassi5-0/+441
CPack, and shell scripts which build then package VeraCrypt under CentOS and Debian/Ubuntu. (#511) The DEB script builds VeraCrypt and links it against wxWidgets that comes with the distribution. The RPM script awaits for wxWidgets-3.0.4 source code which it builds then links VeraCrypt statically to it. Both scripts create the corresponding package after the build.
2019-10-04Linux : Added missing 'mkdir' before installing in case $DESTDIR does not ↵El Mostafa Idrassi1-0/+2
exist (#510)
2019-10-04Windows: Update libzip to version 1.5.2Mounir IDRASSI112-164/+247
2019-10-04Fix "error "SSSE3 instruction set not enabled" when compiling using GCC ↵El Mostafa Idrassi1-0/+2
version < 4.9 without -mssse3 option (SSSE3=1 when using make). (#507) Compiling with -mxxx defines the corresponding macro of the intrinsics. For example, -mssse3 defines __SSSE3__ macro to 1. In GCC versions < 4.9, it is not possible to use and call x86 intrinsics only at runtime without compiling the entire file with the -mxxx option. For example, if we want to call SSSE3 intrinsics without compiling with -mssse3, the macro __SSSE3__ is not defined. Therefore, when including <tmmintrin.h>, this results in "error "SSSE3 instruction set not enabled"" because of : #ifndef __SSSE3__ # error "SSSE3 instruction set not enabled" Since GCC 4.9, this has been fixed and it is possible to call x86 intrinsics from select functions in a file that are tagged with the corresponding target attribute without having to compile the entire file with the -mxxx option. This can be seen in <tmmintrin.h> which in recent versions (>= 4.9) contains : #ifndef __SSSE3__ #pragma GCC push_options #pragma GCC target("ssse3") #define __DISABLE_SSSE3__ Since SSSE3 is only used under Windows for ChaCha256, this can be fixed by preceding '#include <tmmintrin.h>' with #if defined (_MSC_VER) && !defined (TC_WINDOWS_BOOT). See https://gcc.gnu.org/gcc-4.9/changes.html
2019-10-04Clarify in Release Notes that RAM encryption disables Hibernate only if ↵Mounir IDRASSI2-1/+1
System Encryption is being used.
2019-10-03Update Release Notes for 1.24-Beta6Mounir IDRASSI2-1/+7
2019-10-03Windows: If Secure Desktop is started and random generator was not ↵Mounir IDRASSI1-53/+70
initialized before us, then stop random generator after we finish in order to avoid consuming CPU because of periodic fast poll thread. Next time a critical operation that requires RNG is performed, it will be initialized again. We do this because since the addition of secure desktop support, every time secure desktop is displayed, the RNG fast poll thread was started even if the user will never perform any critical operation that requires random bytes.
2019-10-03Windows: Add function RandinitWithCheck to detect if random generator was ↵Mounir IDRASSI2-1/+14
already initialized before our call or not
2019-10-03Windows: Use Jitterentropy RNG only in SlowPoll call and not in FastPoll ↵Mounir IDRASSI1-13/+0
since the it consumes too much CPU and FastPoll requires fast and minimal entropy gathering
2019-10-03'#define VERSION_STRING XXX' must come before '#define VERSION_STRING_SUFFIX ↵El Mostafa Idrassi1-3/+3
YYY' (#506) in order for 'export TC_VERSION := $(shell grep VERSION_STRING ../Common/Tcdefs.h | head -n 1 | cut -d'"' -f 2)' in 'src/Main/Main.make' to actually return the version rather than '-CustomEFI'.
2019-10-03Update german translation (#505)Ettore Atalan1-1/+1
Translated newly added text string.
2019-10-02Linux/MacOSX:check that the requested size of file container is less than ↵Mounir IDRASSI4-2/+13
available disk free space. Add a CLI switch to disable this check.
2019-10-02German translation (#491)Felix Reichmann1-4/+4
* Corrected german translation * Delete .gitignore
2019-10-02Utilize $(BASE_DIR) in the install targets rather than $(PWD) and $(CURDIR) ↵Unit 1931-63/+63
(#472) As $(PWD) is not always the expected value and can result in failing the target.
2019-10-02Added creation of Rescue USB Drive (#486)Felix Reichmann1-1/+69
- In my tests it was not possible to create a usb Stick with Unetbootin like mentioned in this post: https://sourceforge.net/p/veracrypt/discussion/features/thread/5453c652/#97df - I followed the instructions mentioned by Mounir IDRASSI in this post: https://sourceforge.net/p/veracrypt/discussion/features/thread/5453c652/#8e81 - In my test the usb_format.exe does not work, but the Windows internal formatting led to the same results.
2019-10-02[FR] Fix some translation issues (#473)Skid1-14/+14
* Fix some translation issues * Update Translations/Language.fr.xml Co-Authored-By: Luclu7 <luclu7@luclu7.fr>
2019-10-02Allow $(ARCH) to be defined during build (#471)Unit 1931-1/+1
This can be useful when crossbuilding or building in a chroot where using uname -m would cause the wrong compiler options.
2019-10-02Align section types of Whirlpool_C and SHA256_K (#479)Hans-Peter Jansen1-1/+1
in order to fix LTO linking. After switching to LTO for openSUSE Tumbleweed, veracrypt build failed with: [ 185s] ../Crypto/Whirlpool.c:105:45: error: 'Whirlpool_C' causes a section type conflict with 'SHA256_K' [ 185s] 105 | CRYPTOPP_ALIGN_DATA(16) static const uint64 Whirlpool_C[8*256+R] CRYPTOPP_SECTION_ALIGN16 = { [ 185s] | ^ [ 185s] ../Crypto/Sha2.c:321:34: note: 'SHA256_K' was declared here [ 185s] 321 | CRYPTOPP_ALIGN_DATA(16) uint_32t SHA256_K[64] CRYPTOPP_SECTION_ALIGN16 = { [ 185s] | ^ [ 185s] lto-wrapper: fatal error: g++ returned 1 exit status Aligning section types of Whirlpool_C and SHA256_K fixes this.
2019-10-02Documentation: Add missing documentation for Format command line switch ↵Mounir IDRASSI2-0/+4
/nosizecheck
2019-10-02Windows: Add support for /nosizecheck switch in Format command line file ↵Mounir IDRASSI1-1/+1
container creation
2019-10-02Increment version to 1.24-Beta6Mounir IDRASSI59-72/+90
2019-10-01Windows Driver: Disable Hibernation when RAM encryption is enabled since we ↵Mounir IDRASSI1-0/+6
can't resume from Hibernation without RAM encryption keys (a chicken and egg situation)
2019-09-30Windows: when periodic update of device is disabled, use SetupAPI to list ↵Mounir IDRASSI1-1/+3
disks on demand instead of testing all disks to reduce CPU usage.
2019-09-30Windows: resize VeraCrypt Format Wizard and Mount Options dialogs to fix ↵Mounir IDRASSI3-297/+295
some text truncation issues with non-English languages.
2019-09-29Documentation: Add missing documentation for command line switch (/cache ↵Mounir IDRASSI2-0/+1
PIM) to enable both password and PIM cache
2019-09-29Windows: Update the encoded hash of the code signing certificate used to ↵Mounir IDRASSI1-6/+6
verify the integrity of binaries.
2019-09-29Windows: update signing script to use newly issued IDRIX SHA-1 code signing ↵Mounir IDRASSI5-62/+33
certificate.