VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/Password.c
AgeCommit message (Collapse)AuthorFilesLines
2024-11-13Windows: Remove support for 32-bit driver code. Set build target as Windows ↵Mounir IDRASSI1-1/+1
10. Simplify code and fix all warnings in driver.
2024-08-24Windows: Fix regression causing crash when a wrong password is used when ↵Mounir IDRASSI1-1/+1
changing password of volumes
2024-08-02Implement detection of volumes with vulnerable XTS master key.Mounir IDRASSI1-0/+4
If vulnerability detected, a warning message is displayed during mount or backup/restore header, and changing the password is disallowed since it will not change the master key.
2023-07-22Windows: Remove TrueCrypt support. Increment version to 1.26.4.Mounir IDRASSI1-5/+5
2022-12-11Revert "New sys enc wizard (#957)"Mounir IDRASSI1-6/+6
This reverts commit c0ff7a7c521b1d658316d9a177383ab0c403007a.
2022-08-25New sys enc wizard (#957)SysEncWizardPR957Felix Reichmann1-6/+6
* New VeraCrypt interface (for system encryption) with improved usability * System Encryption: translate password to US keyboard layout + improved new interface * Windows: Fix build error following merge * Windows: Remove unused variable * Windows: Add missing string in Language.xml * Windows: fix buffer overrun caused by wrong use of wmemset * Do not delete password file Since the file is only available in \Release\Setup Files\ it would be fully deleted after running this script the first time. * Correct return code Originally the function would have always returned the return-code 1 resulting that the user is not able to change the location for the rescue zip. * Added hint for sysenc Added a hint why the field for repeating the password is initially greyed out within the system encryption. * Corrected spelling mistake Corrected spelling mistake * Removed not working copy job The file to be copied was stored at the source location. Therefore the copyjob will not work. Instead the file is already in the target folder. * Removed RIPEMD-160 from Product64.wxs See commit from 21.03.2022 * Added german translation for new interface * Fixed PIM bug * Corrected translation file based on the guidelines within the pull request * Fixing merge conflicts * Fixed Compiling issues. Reverted keyboard translation * Removed artifacts of password translation * Corrected language.xml * Fixed order within german language file * Corrected positions Co-authored-by: Bruna2803 <bruna.radeljak@hotmail.com> Co-authored-by: felixreichmann <30237956+felixreichmann@users.noreply.github.com> Co-authored-by: Mounir IDRASSI <mounir.idrassi@idrix.fr>
2021-07-13Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure ↵Mounir IDRASSI1-1/+2
equivalents This fixed failure to build driver for ARM64 with latest VS 2019
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI1-7/+13
especially for keyfiles.
2019-03-03Windows: Add option to use legacy maximum password length (64 characters) ↵Mounir IDRASSI1-1/+1
instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt.
2018-09-01Windows: handle case of some disk drivers not supporting ↵Mounir IDRASSI1-1/+27
IOCTL_DISK_GET_DRIVE_GEOMETRY_EX IOCTL.
2017-07-27Windows: use large output buffer for IOCTL_DISK_GET_DRIVE_GEOMETRY_EX calls ↵Mounir IDRASSI1-3/+3
to avoid failure with disk drivers that don't support returning only sizeof(DISK_GEOMETRY_EX).
2017-07-02Windows: fix documentation and UI messages about the PIM constraints and ↵Mounir IDRASSI1-4/+5
calculation formula when EFI system encryption is using SHA-512 or Whirlpool. For historical reasons, if SHA-512 or Whirlpool is selected for EFI system encryption, then iterations = 15000 + (PIM x 1000) and not iterations = PIM x 2048 like the other algorithms.
2017-06-23Update IDRIX copyright yearMounir IDRASSI1-1/+1
2017-05-17Windows: use IOCTL_DISK_GET_DRIVE_GEOMETRY_EX instead of the deprecated ↵Mounir IDRASSI1-4/+3
IOCTL_DISK_GET_DRIVE_GEOMETRY in order to get accurate disk size value.
2016-09-11Windows: in case of In-Place encryption, encrypt random data instead of ↵Mounir IDRASSI1-1/+1
existing data when filling unused space like the other cases.
2016-08-15Windows: fill unused/reserved header areas with the result of encryption of ↵Mounir IDRASSI1-1/+1
random data instead of the encryption of zeros for better entropy of resulting random data.
2016-08-15Windows: Fix vulnerability inherited from TrueCrypt that allows an attacker ↵Mounir IDRASSI1-0/+42
to detect with high probability if a hidden volume is present. Vulnerability reported by Ivanov Alexey Mikhailovich.
2016-05-10Remove trailing whitespaceDavid Foerster1-15/+15
2016-05-10Normalize all line terminatorsDavid Foerster1-491/+491
2016-02-07Windows:Fix various issues and warnings reported by static code analysis ↵Mounir IDRASSI1-2/+2
tool Coverity.
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2015-11-26Windows: Full UNICODE rewrite and implement support for UNICODE passwords.Mounir IDRASSI1-9/+29
2015-09-16Windows: first implementation of CLI support for creating volumes.Mounir IDRASSI1-3/+3
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-7/+9
and TrueCrypt 3.0.
2015-07-13Windows: Modify PIM parts in GUI to make it easier to use. Users must ↵Mounir IDRASSI1-0/+7
explicitly check "User PIM" to enable its use.
2015-07-11Use Pim name for internal variables instead of the old name PinMounir IDRASSI1-7/+7
2015-07-06Windows: Display source location of errors in order to help diagnose issues ↵Mounir IDRASSI1-3/+7
reported by users
2015-06-21Windows: Add a dedicate page for volume PIM in the volume creation wizardMounir IDRASSI1-3/+3
2015-06-08Windows: rename PIN to PIM to avoid confusion. Better error messages.Mounir IDRASSI1-2/+2
2015-05-26Windows: first implementation of dynamic modeMounir IDRASSI1-3/+18
2015-04-06Windows vulnerability fix: CryptAcquireContext vulnerability fix. Add checks ↵Mounir IDRASSI1-0/+6
to random generator to abort in case of error and display a diagnose message to the user.
2015-02-09Static Code Analysis: handle unused variables more properly. Catch STL ↵Mounir IDRASSI1-1/+1
exception. Add more checks. Add proper cast to arithmetic operations.
2014-12-28Windows: support loading TrueCrypt volumes. Implement converting TrueCrypt ↵Mounir IDRASSI1-4/+4
volumes to VeraCrypt using the change password functionality.
2014-12-27Windows: use the correct window handle for creating message boxes. This ↵Mounir IDRASSI1-2/+2
became important after the introduction of the wait dialog in order to avoid having message boxes behind the wait dialog.
2014-12-20Reduce time for reporting wrong password by removing support for legacy ↵Mounir IDRASSI1-7/+1
hidden format because it was never functional and it was superseded by current hidden format.
2014-12-16Windows: Enhance performance by implementing the possibility to choose the ↵Mounir IDRASSI1-2/+2
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption.
2014-12-11Windows: always display random gathering dialog when UserEnrichRandomPool is ↵Mounir IDRASSI1-0/+2
called instead of once per application run. This is implemented through the call SetRandomPoolEnrichedByUserStatus(FALSE) at the begining of sensitive operations instead of changing UserEnrichRandomPool because in the same call there can be many calls to UserEnrichRandomPool which can result in displaying the dialog many times.
2014-11-08Windows vulnerability fix: correct possible BSOD attack targeted towards ↵Mounir IDRASSI1-0/+7
GetWipePassCount() / WipeBuffer() found by the Open Crypto Audit Project.
2014-11-08Add option in select the number of passes for volume header over-writing. By ↵Mounir IDRASSI1-4/+4
default, it is set to 3 but it can be increased to 256 passes (which can lead to a delay of many hours for a single password change operation).
2014-11-08Static Code Analysis : Add various NULL pointers checksMounir IDRASSI1-10/+22
2014-11-08Add original TrueCrypt 7.1a sourcesMounir IDRASSI1-0/+422