VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common
AgeCommit message (Collapse)AuthorFilesLines
2023-10-10Increment version to 1.26.8Mounir IDRASSI1-2/+2
2023-10-10Windows: Fix writing wrong EFI configuration options to registryMounir IDRASSI1-1/+1
2023-10-08Fix warnings and throwing an exception instead of ignoring the error (#1229)kovalev01-2/+2
* EMVCard.cpp: ArrayToHexWideString: prohibit conversion of a string constant ../Common/EMVCard.cpp: In function 'std::wstring VeraCrypt::ArrayToHexWideString(con st unsigned char*, size_t)': ../Common/EMVCard.cpp:28:43: warning: ISO C++ forbids converting a string constant to 'wchar_t*' [-Wwrite-strings] 28 | static wchar_t* hexChar = L"0123456789ABCDEF"; | ^~~~~~~~~~~~~~~~~~~ Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> * EMVCard.cpp: ArrayToHexWideString: fix of the comparison of different types ../Common/EMVCard.cpp: In function 'std::wstring VeraCrypt::ArrayToHexWideString(con st unsigned char*, size_t)': ../Common/EMVCard.cpp:32:43: warning: comparison of integer expressions of different signedness: 'int' and 'size_t' {aka 'long unsigned int'} [-Wsign-compare] 32 | for (int i = 0; i < cbData; i++) | ~~^~~~~~~~ Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> * SecurityTokenKeyfilesDialog.cpp: removed initialization of an unused variable Forms/SecurityTokenKeyfilesDialog.cpp:58:24: warning: unused variable 'i' [-Wunused- variable] 58 | size_t i = 0; | ^ Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> * Core/Unix: throwing an exception instead of ignoring the error Fixes: 5a6b445f ("fix warnings and UB (#1164)") Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> --------- Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> Co-authored-by: Vasiliy Kovalev <kovalev@altlinux.org>
2023-10-08Windows: Modified implementation for Secure Desktop handling to overcome ↵Mounir IDRASSI1-54/+82
Windows 11 issues We use only alphanumeric characters for the name in addition to the '_' character We ensure the random desktop name doesn't already exist We create the random desktop on the Secure Desktop thread and we look over SwitchDesktop until it works. We call SetThreadDesktop (hOriginalDesk) in main thread once we finish
2023-10-05Update various copyright datesMounir IDRASSI1-3/+3
2023-10-02Linux: Fix compilation error on some 32-bit machines.Mounir IDRASSI1-2/+5
2023-10-01Linux: use "-std=c++11" for gcc 4.8 and adapt code to old compilersMounir IDRASSI2-5/+5
2023-09-30Increment version to 1.26.7. Set release date to October 1st. Update Windows ↵Mounir IDRASSI1-3/+3
signed driver files.
2023-09-29Windows: enhancement to RAM encryptionMounir IDRASSI1-17/+55
- use a more standard-looking memory value tag instead of fully random one that will look suspicious and outstanding - If we fail to allocate 1MiB for derivation area, we device the size by two in a loop until we succeed. This is better than falling back directly to 8KiB size - Better method to derive actual encryption key: instead of simply duplicating 128bit key value, we combine a xor addition and self-encryption to build a 256-bit key - use both encID and pbKeyDerivationArea to derive IV for encryption and not only endID
2023-09-29Windows Driver: Use KeQueryInterruptTimePrecise on Windows 8.1 and newer as ↵Mounir IDRASSI1-0/+4
better seed for internal RNG compared to KeQueryInterruptTime
2023-09-26Windows: during Setup, and if VeraCrypt already installed, open online help ↵Mounir IDRASSI2-3/+40
only if PC connected to Internet
2023-09-24Libzip 1.10.1 (#1209)DLL12518-32/+87
Updated to the latest version for the VeraCrypt 1.26.6 release.
2023-09-24Windows: always open online help in case of Setup because local help may be ↵Mounir IDRASSI1-0/+6
outdated
2023-09-24Windows: Add tooltip message and help button for new option to disable ↵Mounir IDRASSI4-2/+129
memory protection Also a dedicated page in the documentation was added for it.
2023-09-21Windows: Load Riched20.dll to use RichEdit control. Use InitCommonControlsEx ↵VeraCrypt_1.26.6Mounir IDRASSI1-2/+7
instead of InitCommonControls
2023-09-21Update Release Notes. Increment version to 1.26.6.Mounir IDRASSI1-3/+3
2023-09-21Windows: use separate name for SetProcessMitigationPolicy function point. ↵Mounir IDRASSI1-11/+5
Remove unneeded boolean
2023-09-20Windows: Add setting in main UI and setup wizard to disable memory protectionMounir IDRASSI4-3/+13
This can be useful for users who need Accessibility software that may not work when memory protection is active in VeraCrypt
2023-09-18Windows Security: make memory protection enabled by default. Add process ↵Mounir IDRASSI4-3/+136
mitigation (ASLR, Dynamic code, extension points) Memory protection can be disabled using registry value "VeraCryptEnableMemoryProtection" under the key "HKLM\SYSTEM\CurrentControlSet\Services\veracrypt"
2023-09-15Update Language.xml (#1199)TigerxWood1-1/+1
Corrected small typo
2023-09-11Windows: replace CoInitialize calls with CoInitializeExMounir IDRASSI2-5/+5
2023-09-08Windows: Add link in keyfiles dialog to documentation page for risks of ↵Mounir IDRASSI5-10/+33
third-party file extensions usage.
2023-09-08Update Language.xml (#1192)TigerxWood1-1/+1
Corected a typo
2023-09-06Windows: remove recommendation of keyfiles files extensions and update ↵Mounir IDRASSI2-1/+14
documentation to mention risks of third-party file extensions. This commit also adds red color to the warning text about keyfiles in keyfiles dialogs.
2023-09-03Windows: Replace legacy file/dir selection APIs with modern IFileDialog ↵Mounir IDRASSI3-190/+264
interface We remove usage of GetOpenFileNameW/GetSaveFileNameW/SHBrowseForFolderW which are deprecated by Microsoft
2023-09-03Windows: remove legacy code (XP, Vista). Simplify code since Windows 7 is ↵Mounir IDRASSI3-152/+77
now minimal OS version.
2023-09-03Windows: simpler and more robust safe dll loading combined with delay ↵Mounir IDRASSI2-627/+102
loading thanks to Windows 7 being minimum supported version. We also block execution on Windows versions older than Windows 7. A lot of code was removed thanks to this.
2023-08-20Windows: Set minimum build target to Windows 7Mounir IDRASSI1-1/+1
2023-08-20Update zlib to latest (#1181)DLL12523-1485/+918
* Update zlib to latest * Update copyright Updated copyright of zlib.
2023-08-15Update Release Notes and set date of 1.26.5 to August 15thMounir IDRASSI1-1/+1
2023-08-14Increment version to 1.26.5. Update signed Windows drivers.Mounir IDRASSI1-2/+2
2023-08-13Windows: Implement support for mounting partially encrypted system partitionsMounir IDRASSI3-0/+13
For now, we force ReadOnly mounting for such partitions.
2023-08-13Windows: Better way to enable required privileges for FastCreate OptionsMounir IDRASSI5-8/+144
If we can set required privilege, we ask the user using UAC to enable them.
2023-08-10Windows: Fix failure creating Traveler Disk caused by outdated hardcoded ↵Mounir IDRASSI1-10/+10
value of MS certificate We also rename the variables gpbSha256CodeSignCertFingerprint and gpbSha256MSCodeSignCertFingerprint to gpbSha512CodeSignCertFingerprint and gpbSha512MSCodeSignCertFingerprint respectively to reflect the fact that they are actually SHA512 hash values and not SHA256 ones.
2023-08-06Linux: capture both stdout and stderr in popen call to avoid printing anythingMounir IDRASSI1-2/+2
If an error happens, error message will be read from popen pipe and so libpcsclite.so will not be found. This is the same outcome as when stdout is empty.
2023-08-05Security: ensure that XTS primary key is different from secondary key when ↵Mounir IDRASSI1-0/+9
creating volumes This is unlikely to happen thanks to random generator properties but we much add this check to prevent an attack described in page 3 of https://csrc.nist.gov/csrc/media/Projects/crypto-publication-review-project/documents/initial-comments/sp800-38e-initial-public-comments-2021.pdf
2023-08-05Windows: Fix false positive detection of new device insertion when clear ↵Mounir IDRASSI6-1/+73
keys option is enable When this option is enabled, we first build the list of currently inserted devices then we start listening to insertion events. When a device insertion occurs, we check if this device is on our list and if yes, we ignore its insertion. We also ignore devices whose Device ID starts with "SWD\" and "ROOT\" since these are not real devices.
2023-07-24Update Release Notes and set date of 1.26.4 to July 24thMounir IDRASSI1-1/+1
2023-07-24Linux/macOS: Remove TrueCrypt supportMounir IDRASSI2-8/+2
2023-07-23XML Language files: remove \r from new entries as it is automatically added ↵Mounir IDRASSI1-7/+7
by code
2023-07-23Windows: Make Expander progress messages translatableMounir IDRASSI1-0/+7
2023-07-22Windows: Remove TrueCrypt support. Increment version to 1.26.4.Mounir IDRASSI15-127/+51
2023-07-18Windows: Fix compiler warningsMounir IDRASSI1-2/+1
2023-07-17Windows: Fix buffer overrun caused by bug in UpperCaseCopy functionMounir IDRASSI1-3/+3
2023-07-17Windows: Fix link error with latest libzip by adding new file ↵Mounir IDRASSI3-0/+5
zip_source_pass_to_lower_layer.c tp VS projects
2023-07-17Libzip (#1152)DLL12577-541/+1376
* Update LZMA to latest * Update Libzip Libzip updated to latest.
2023-07-16Windows: fix issue with fastCreate by requesting SE_MANAGE_VOLUME_NAME ↵Mounir IDRASSI1-26/+28
privilege before calling CreateFile This ensures that the returned handle inherits the privilege
2023-07-15Windows: enhance secure desktop handling to try to workaround Windows 11 issueMounir IDRASSI1-30/+49
Several enhancements implemented: - replace CreateThread by _beginthreadex to avoid potential issues when using C runtime - use an event to notify monitoring thread to stop instead of a volatile boolean - perform switch to the regular desktop in the main thread and not in the secure desktop thread
2023-07-02Windows: Fix regression when creating multiple keyfiles with a fixed sizeMounir IDRASSI1-3/+2
2023-07-02Renormalize 7zWindows.h from CRLF to LF line separator as intended (#1144)Jertzukka1-101/+101