VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/Format.c
AgeCommit message (Collapse)AuthorFilesLines
11 hoursWindows: Fix various compiler warningsMounir IDRASSI1-3/+3
2 daysWindows: Remove support for 32-bit driver code. Set build target as Windows ↵Mounir IDRASSI1-1/+1
10. Simplify code and fix all warnings in driver.
2024-06-12Avoid conflict with C++17 features std::byte by using uint8 type instead of byteMounir IDRASSI1-2/+2
2023-09-03Windows: remove legacy code (XP, Vista). Simplify code since Windows 7 is ↵Mounir IDRASSI1-1/+1
now minimal OS version.
2023-08-13Windows: Better way to enable required privileges for FastCreate OptionsMounir IDRASSI1-8/+51
If we can set required privilege, we ask the user using UAC to enable them.
2023-07-22Windows: Remove TrueCrypt support. Increment version to 1.26.4.Mounir IDRASSI1-1/+1
2023-07-16Windows: fix issue with fastCreate by requesting SE_MANAGE_VOLUME_NAME ↵Mounir IDRASSI1-26/+28
privilege before calling CreateFile This ensures that the returned handle inherits the privilege
2023-07-01Windows: Make API formatting fallback to format.com in case of elevation. ↵Mounir IDRASSI1-51/+12
remove dead code from ExternalFormatFs We also modify UacFormatNtfs/UacFormatFs to return actual error code in case of failure
2023-07-01Windows: Fix formatting issue during volume creation by using /Y for ↵Mounir IDRASSI1-28/+76
format.com and specifying removal parameter in FormatEx The usage of /Y parameter in format.com simplifies the logic and makes the code robust since we don't need to send \n to the format.com process. Specifying RemovableMedia parameter to FormatEx fixes its failure in Windows 10 and later to perform quick format. This is also more adequate since we are mounting the volume as removable media for the formatting process. We also add better error management in order to display adequate error message to the user in case of failure
2023-06-28Windows: Better handling of quick format for file containerMounir IDRASSI1-8/+48
We write a zeroed sector every 128 MiB, leaving other sectors untouched This helps users visualize the progress of actual file creation while forcing Windows to allocate the disk space of each 128 MiB chunk immediately, otherwise, Windows would delay the allocation until we write the backup header at the end of the volume which would make the user think that the format process has stalled after progress bar reaches 100%.
2023-06-23Windows: if /fastCreateFile set, request SE_MANAGE_VOLUME_NAME privileges ↵Mounir IDRASSI1-6/+23
(credits: @xnoreq) Display a warning if request failed and allow to continue without fast creation
2022-03-26Windows: check result of WriteFile and don't block if it is failing (Coverity)Mounir IDRASSI1-4/+10
2020-07-02Windows: Use native Windows format program first to perform formatting since ↵Mounir IDRASSI1-7/+6
it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.
2020-07-02Windows: Hide the console windows of the native Windows format tool when we ↵Mounir IDRASSI1-1/+2
call it to perform formatting
2020-06-29Windows: Fallback to Windows native formatting tool if we fail to format a ↵Mounir IDRASSI1-2/+152
volume as NTFS/exFAT/ReFS using FormatEx function from fmifs.dll
2020-06-29Windows: Avoid displaying waiting dialog when /silent specified for ↵Mounir IDRASSI1-1/+1
"VeraCrypt Format" during creating of file container using /create switch and a filesystem other than FAT (fixes Github issue #648)
2020-06-21Windows: Fix issue when RAM encryption used, AES selected and AES-NI not ↵Mounir IDRASSI1-0/+5
supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected by user.
2020-01-22Windows: Fix regression in Expander and Format when RAM encryption is enable ↵Mounir IDRASSI1-0/+72
that was causing volume headers to be corrupted.
2019-12-10Windows: Add switch /FastCreateFile for VeraCrypt Format.exe to speedup ↵Mounir IDRASSI1-2/+23
creation of large file container if quick format is selected. This switch comes with security issues since it will embed existing content on disk into the file container which may expose sensitive content to an attacker who has access to the file container.
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI1-8/+13
especially for keyfiles.
2019-03-02Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵Mounir IDRASSI1-0/+7
especially Format and Expander
2019-01-21Windows driver: remove volumes master keys from CRYPTO_INFO since they are ↵Mounir IDRASSI1-2/+2
not needed after their key schedule is created
2017-06-23Update IDRIX copyright yearMounir IDRASSI1-1/+1
2017-06-11Windows: various fixes following Coverity analysis.Mounir IDRASSI1-2/+3
2017-06-02Windows: fix compilation error cause by extra '&&' in if statementMounir IDRASSI1-1/+1
2017-05-28Windows: add support for ReFS on Windows 10 when creating normal volumes.Mounir IDRASSI1-3/+7
2016-09-11Windows: in case of In-Place encryption, encrypt random data instead of ↵Mounir IDRASSI1-1/+1
existing data when filling unused space like the other cases.
2016-08-15Windows: fill unused/reserved header areas with the result of encryption of ↵Mounir IDRASSI1-1/+1
random data instead of the encryption of zeros for better entropy of resulting random data.
2016-08-15Windows: align buffers used for keys to avoid issues when SSE used.Mounir IDRASSI1-2/+2
2016-08-15Windows: Fix vulnerability inherited from TrueCrypt that allows an attacker ↵Mounir IDRASSI1-0/+53
to detect with high probability if a hidden volume is present. Vulnerability reported by Ivanov Alexey Mikhailovich.
2016-05-10Remove trailing whitespaceDavid Foerster1-41/+41
2016-05-10Normalize all line terminatorsDavid Foerster1-1054/+1054
2016-02-07Windows:Fix various issues and warnings reported by static code analysis ↵Mounir IDRASSI1-6/+6
tool Coverity.
2016-01-27Windows/Linux: Implement exFAT support.Mounir IDRASSI1-6/+26
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2015-12-21Windows: Implement PIM caching, both for system encryption and for normal ↵Mounir IDRASSI1-1/+1
volumes. Add options to activate it in the Preferences and System Settings.
2015-11-26Windows: Full UNICODE rewrite and implement support for UNICODE passwords.Mounir IDRASSI1-14/+13
2015-09-16Windows: first implementation of CLI support for creating volumes.Mounir IDRASSI1-9/+15
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-7/+9
and TrueCrypt 3.0.
2015-07-11Use Pim name for internal variables instead of the old name PinMounir IDRASSI1-3/+3
2015-07-06Windows: better logic for FormatEx function call. To be replaced in the ↵Mounir IDRASSI1-9/+61
future by Microsoft COM interfaces.
2015-07-06Windows: Display source location of errors in order to help diagnose issues ↵Mounir IDRASSI1-3/+7
reported by users
2015-05-29Windows: workaround FormatEx keeping references on formatted volume by ↵Mounir IDRASSI1-3/+3
adding extra delays.
2015-05-26Windows: first implementation of dynamic modeMounir IDRASSI1-1/+3
2014-12-28Windows: support loading TrueCrypt volumes. Implement converting TrueCrypt ↵Mounir IDRASSI1-1/+1
volumes to VeraCrypt using the change password functionality.
2014-12-27Windows: use the correct window handle for creating message boxes. This ↵Mounir IDRASSI1-14/+15
became important after the introduction of the wait dialog in order to avoid having message boxes behind the wait dialog.
2014-12-16Windows: Enhance performance by implementing the possibility to choose the ↵Mounir IDRASSI1-1/+1
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption.
2014-11-08Static Code Analysis : Generalize the use of Safe String functions. Add some ↵Mounir IDRASSI1-6/+8
NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL.
2014-11-08Static Code Analysis : fix non-absolute DLL/process loads that can be ↵Mounir IDRASSI1-1/+11
hijacked (Microsoft Security Advisory 2269637).
2014-11-08Add original TrueCrypt 7.1a sourcesMounir IDRASSI1-0/+1010