VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/Dlgcode.c
AgeCommit message (Expand)AuthorFilesLines
2020-07-02Windows: Don't allow to encrypt the system drive if it is already encrypted b...Mounir IDRASSI1-0/+102
2020-07-02Windows: Replace GetSystemInfo calls by more reliable function to get number ...Mounir IDRASSI1-9/+6
2020-06-28Windows: remove unused code targeting Windows 2000.Mounir IDRASSI1-6/+0
2020-06-26Windows: fix warning reported by static code analyzed by adding copy construc...Mounir IDRASSI1-4/+8
2020-06-21Windows: call VcProtectKeys in benchmark warm-up when RAM encryption is enabl...Mounir IDRASSI1-0/+4
2020-06-19Windows: Fix wrong results in benchmark of encryption algorithms when RAM enc...Mounir IDRASSI1-0/+5
2020-06-19Windows: remove duplicated function to detect AES-NI support in CPUMounir IDRASSI1-1/+1
2020-06-12Windows: Update IDRIX SHA-1 code signing certificate to latest one.Mounir IDRASSI1-6/+6
2020-06-11Switch from auto_ptr to unique_ptr (#638)Christopher Bergqvist1-1/+1
2020-03-10Update copyright year in creditsVeraCrypt_1.24-Update5Mounir IDRASSI1-3/+3
2020-03-10Windows: Fix compilation error caused by previous keyfile commitMounir IDRASSI1-0/+2
2020-03-10Windows: Fix keyfiles path passed as CLI argument and set as default not alwa...Mounir IDRASSI1-1/+3
2020-02-10Windows: Fix warnings reported by Coverity static code analyzerMounir IDRASSI1-4/+7
2020-01-22Windows: use fix for CVE-2019-19501 only when process elevated otherwise it w...Mounir IDRASSI1-1/+22
2020-01-21Windows: Fix failure of Screen Readers (Accessibility support) to reader UI b...Mounir IDRASSI1-3/+1
2019-12-13Windows: check "TrueCrypt Mode" in password dialog when mounting a file conta...Mounir IDRASSI1-0/+9
2019-12-08Windows: use fix for CVE-2019-19501 only on Vista and above since it doesn't ...Mounir IDRASSI1-1/+2
.highlight .hll { background-color: #ffffcc } .highlight .c { color: #888888 } /* Comment */ .highlight .err { color: #a61717; background-color: #e3d2d2 } /* Error */ .highlight .k { color: #008800; font-weight: bold } /* Keyword */ .highlight .ch { color: #888888 } /* Comment.Hashbang */ .highlight .cm { color: #888888 } /* Comment.Multiline */ .highlight .cp { color: #cc0000; font-weight: bold } /* Comment.Preproc */ .highlight .cpf { color: #888888 } /* Comment.PreprocFile */ .highlight .c1 { color: #888888 } /* Comment.Single */ .highlight .cs { color: #cc0000; font-weight: bold; background-color: #fff0f0 } /* Comment.Special */ .highlight .gd { color: #000000; background-color: #ffdddd } /* Generic.Deleted */ .highlight .ge { font-style: italic } /* Generic.Emph */ .highlight .gr { color: #aa0000 } /* Generic.Error */ .highlight .gh { color: #333333 } /* Generic.Heading */ .highlight .gi { color: #000000; background-color: #ddffdd } /* Generic.Inserted */ .highlight .go { color: #888888 } /* Generic.Output */ .highlight .gp { color: #555555 } /* Generic.Prompt */ .highlight .gs { font-weight: bold } /* Generic.Strong */ .highlight .gu { color: #666666 } /* Generic.Subheading */ .highlight .gt { color: #aa0000 } /* Generic.Traceback */ .highlight .kc { color: #008800; font-weight: bold } /* Keyword.Constant */ .highlight .kd { color: #008800; font-weight: bold } /* Keyword.Declaration */ .highlight .kn { color: #008800; font-weight: bold } /* Keyword.Namespace */ .highlight .kp { color: #008800 } /* Keyword.Pseudo */ .highlight .kr { color: #008800; font-weight: bold } /* Keyword.Reserved */ .highlight .kt { color: #888888; font-weight: bold } /* Keyword.Type */ .highlight .m { color: #0000DD; font-weight: bold } /* Literal.Number */ .highlight .s { color: #dd2200; background-color: #fff0f0 } /* Literal.String */ .highlight .na { color: #336699 } /* Name.Attribute */ .highlight .nb { color: #003388 } /* Name.Builtin */ .highlight .nc { color: #bb0066; font-weight: bold } /* Name.Class */ .highlight .no { color: #003366; font-weight: bold } /* Name.Constant */ .highlight .nd { color: #555555 } /* Name.Decorator */ .highlight .ne { color: #bb0066; font-weight: bold } /* Name.Exception */ .highlight .nf { color: #0066bb; font-weight: bold } /* Name.Function */ .highlight .nl { color: #336699; font-style: italic } /* Name.Label */ .highlight .nn { color: #bb0066; font-weight: bold } /* Name.Namespace */ .highlight .py { color: #336699; font-weight: bold } /* Name.Property */ .highlight .nt { color: #bb0066; font-weight: bold } /* Name.Tag */ .highlight .nv { color: #336699 } /* Name.Variable */ .highlight .ow { color: #008800 } /* Operator.Word */ .highlight .w { color: #bbbbbb } /* Text.Whitespace */ .highlight .mb { color: #0000DD; font-weight: bold } /* Literal.Number.Bin */ .highlight .mf { color: #0000DD; font-weight: bold } /* Literal.Number.Float */ .highlight .mh { color: #0000DD; font-weight: bold } /* Literal.Number.Hex */ .highlight .mi { color: #0000DD; font-weight: bold } /* Literal.Number.Integer */ .highlight .mo { color: #0000DD; font-weight: bold } /* Literal.Number.Oct */ .highlight .sa { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Affix */ .highlight .sb { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Backtick */ .highlight .sc { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Char */ .highlight .dl { color: #dd2200; background-color: #fff0f0 } /* L1-1/+3
2019-09-29Windows: Update the encoded hash of the code signing certificate used to veri...Mounir IDRASSI1-6/+6
2019-09-29Windows: Use periodic update of connected devices only if there is a Favorite...Mounir IDRASSI1-1/+4
2019-09-27Windows: fix another typo in code comment (hopefully last one!)Mounir IDRASSI1-1/+1
2019-09-27Windows: fix typo in code commentMounir IDRASSI1-1/+1
2019-09-26Windows: Fix sporadic keyboard issue in Secure Desktop for password dialog by...Mounir IDRASSI1-1/+5
2019-03-03Fix formatting of credits in About dialog and documentationMounir IDRASSI1-1/+1
2019-03-03Windows: Add option to use legacy maximum password length (64 characters) ins...Mounir IDRASSI1-5/+9
2019-03-02Windows: fix compilation errorMounir IDRASSI1-1/+1
2019-03-02Windows: mitigate some memory attacks by making VeraCrypt applications memory...Mounir IDRASSI1-0/+90
2019-03-02Windows: Generalize RAM encryption for keys to VeraCrypt binaries, especially...Mounir IDRASSI1-0/+82
2019-02-12Add copyright and license information of JitterEntropy library by Stephan Mue...Mounir IDRASSI1-2/+3
2019-02-10Windows: Ensure that only one thread at a time can create a secure desktopMounir IDRASSI1-0/+8
2019-02-04Automatically truncate passwords for TrueCrypt volumes and System Encryption ...Mounir IDRASSI1-1/+3
2019-01-28Increase password maximum length to 128 bytes from 64 bytesMounir IDRASSI1-0/+3
2019-01-26Windows: Add a build configuration containing EFI bootloader signed with cust...Mounir IDRASSI1-1/+1
2019-01-21Windows driver: remove volumes master keys from CRYPTO_INFO since they are no...Mounir IDRASSI1-3/+3
2018-12-19Windows: Add mount option that allows mounting a volume without attaching it ...Mounir IDRASSI1-6/+5
2018-09-03Windows: fix regression when language selected in the setup during fresh inst...Mounir IDRASSI1-8/+7
2018-09-01Windows: handle case of some disk drivers not supporting IOCTL_DISK_GET_DRIVE...Mounir IDRASSI1-3/+51
2018-08-24Windows: fix language selected in the installer not used by "Create Volume" w...Mounir IDRASSI1-0/+9
2018-08-16Windows: Fix regression that caused the system encryption wizard to crash whe...Mounir IDRASSI1-2/+7
2018-08-15Windows: Add various checks and replace STL code after Coverity reportMounir IDRASSI1-22/+12
2018-08-12Windows Installer: implement language selection mechanism at the start of the...Mounir IDRASSI1-1/+17
2018-08-07Windows: Display a balloon tip warning or error message when the value pasted...Mounir IDRASSI1-2/+134
pan> SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new SerpentTwofishAES ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new TwofishSerpent ())); SupportedEncryptionModes.push_back (shared_ptr <EncryptionMode> (new EncryptionModeXTS ())); } uint64 VolumeLayoutV1Normal::GetDataOffset (uint64 volumeHostSize) const { return HeaderSize; } uint64 VolumeLayoutV1Normal::GetDataSize (uint64 volumeHostSize) const { return volumeHostSize - GetHeaderSize(); } VolumeLayoutV2Normal::VolumeLayoutV2Normal () { Type = VolumeType::Normal; HeaderOffset = TC_VOLUME_HEADER_OFFSET; HeaderSize = TC_VOLUME_HEADER_SIZE; BackupHeaderOffset = -TC_VOLUME_HEADER_GROUP_SIZE; SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new AES ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new Serpent ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new Twofish ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new AESTwofish ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new AESTwofishSerpent ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new SerpentAES ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new SerpentTwofishAES ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new TwofishSerpent ())); SupportedEncryptionModes.push_back (shared_ptr <EncryptionMode> (new EncryptionModeXTS ())); } uint64 VolumeLayoutV2Normal::GetDataOffset (uint64 volumeHostSize) const { return Header->GetEncryptedAreaStart(); } uint64 VolumeLayoutV2Normal::GetDataSize (uint64 volumeHostSize) const { return Header->GetVolumeDataSize(); } uint64 VolumeLayoutV2Normal::GetMaxDataSize (uint64 volumeSize) const { if (volumeSize < TC_TOTAL_VOLUME_HEADERS_SIZE) return 0; return volumeSize - TC_TOTAL_VOLUME_HEADERS_SIZE; } VolumeLayoutV2Hidden::VolumeLayoutV2Hidden () { Type = VolumeType::Hidden; HeaderOffset = TC_HIDDEN_VOLUME_HEADER_OFFSET; HeaderSize = TC_VOLUME_HEADER_SIZE; BackupHeaderOffset = -TC_HIDDEN_VOLUME_HEADER_OFFSET; SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new AES ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new Serpent ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new Twofish ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new AESTwofish ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new AESTwofishSerpent ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new SerpentAES ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new SerpentTwofishAES ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new TwofishSerpent ())); SupportedEncryptionModes.push_back (shared_ptr <EncryptionMode> (new EncryptionModeXTS ())); } uint64 VolumeLayoutV2Hidden::GetDataOffset (uint64 volumeHostSize) const { return Header->GetEncryptedAreaStart(); } uint64 VolumeLayoutV2Hidden::GetDataSize (uint64 volumeHostSize) const { return Header->GetVolumeDataSize(); } uint64 VolumeLayoutV2Hidden::GetMaxDataSize (uint64 volumeSize) const { // Reserve free space at the end of the host filesystem uint64 reservedSize; if (volumeSize < TC_VOLUME_SMALL_SIZE_THRESHOLD) reservedSize = TC_HIDDEN_VOLUME_HOST_FS_RESERVED_END_AREA_SIZE; else reservedSize = TC_HIDDEN_VOLUME_HOST_FS_RESERVED_END_AREA_SIZE_HIGH; // Ensure size of a hidden volume larger than TC_VOLUME_SMALL_SIZE_THRESHOLD is a multiple of the maximum supported sector size if (volumeSize < reservedSize) return 0; return volumeSize - reservedSize; } VolumeLayoutSystemEncryption::VolumeLayoutSystemEncryption () { Type = VolumeType::Normal; HeaderOffset = TC_BOOT_VOLUME_HEADER_SECTOR_OFFSET; HeaderSize = TC_BOOT_ENCRYPTION_VOLUME_HEADER_SIZE; SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new AES ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new Serpent ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new Twofish ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new AESTwofish ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new AESTwofishSerpent ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new SerpentAES ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new SerpentTwofishAES ())); SupportedEncryptionAlgorithms.push_back (shared_ptr <EncryptionAlgorithm> (new TwofishSerpent ())); SupportedEncryptionModes.push_back (shared_ptr <EncryptionMode> (new EncryptionModeXTS ())); } uint64 VolumeLayoutSystemEncryption::GetDataOffset (uint64 volumeHostSize) const { return 0; } uint64 VolumeLayoutSystemEncryption::GetDataSize (uint64 volumeHostSize) const { return volumeHostSize; } Pkcs5KdfList VolumeLayoutSystemEncryption::GetSupportedKeyDerivationFunctions (bool truecryptMode) const { Pkcs5KdfList l; if (!truecryptMode) l.push_back (shared_ptr <Pkcs5Kdf> (new Pkcs5HmacSha256_Boot ())); l.push_back (shared_ptr <Pkcs5Kdf> (new Pkcs5HmacRipemd160_1000 (truecryptMode))); return l; } }