VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common
AgeCommit message (Collapse)AuthorFilesLines
2015-01-04Windows: Add support for TrueCrypt 6.x since its format (v4) is identical to ↵Mounir IDRASSI1-1/+1
7.x apart from the sector size field which we already handle correctly.
2015-01-03Windows: change cascade encryption naming format to reflex mathematical ↵Mounir IDRASSI4-13/+29
composition of the encryption algorithm, thus being more clear. For example AES(Twofish(Serpent)) instead of AES-Twofish-Serpent.
2014-12-31Increment version to 1.0f and update language XML files with new fields.Mounir IDRASSI1-2/+2
2014-12-28Windows: support loading TrueCrypt volumes. Implement converting TrueCrypt ↵Mounir IDRASSI16-38/+83
volumes to VeraCrypt using the change password functionality.
2014-12-28Windows: make the wait dialog wider to accommodate long messagesMounir IDRASSI1-4/+4
2014-12-28Windows: implement wait dialog for benchmark operation.Mounir IDRASSI1-7/+30
2014-12-28Windows: Add possibility to choose 1-pass wipe mode in all cases without ↵Mounir IDRASSI1-4/+2
changing the default wipe mode.
2014-12-27Windows: use the correct parent window when changing the password of the ↵Mounir IDRASSI2-7/+7
encrypted system partition.
2014-12-27Windows: use the correct window handle for creating message boxes. This ↵Mounir IDRASSI18-258/+264
became important after the introduction of the wait dialog in order to avoid having message boxes behind the wait dialog.
2014-12-27Windows: make the wait dialog mechanism more generic in order to reuse it ↵Mounir IDRASSI2-29/+65
more widely across VeraCrypt.
2014-12-26Windows: workaround freezing of waiting dialog but setting its parent to the ↵Mounir IDRASSI2-3/+4
desktop and making all mount calls in a separate thread. DeviceIoControl is making our like hard because it doesn't behave as a normal system call and it blocks our window message loop even when called from a separate thread.
2014-12-22Windows: Solve issue of some dialogs not showing up and that was caused by ↵Mounir IDRASSI1-98/+99
wrong handling of WM_NOTIFY messages. This behavior appeared after switching to Windows visual styles.
2014-12-20Increment version to 1.0f-BETA3 and update language XML files with new fields.Mounir IDRASSI1-4/+4
2014-12-20Reduce time for reporting wrong password by removing support for legacy ↵Mounir IDRASSI3-20/+1
hidden format because it was never functional and it was superseded by current hidden format.
2014-12-20Windows: Add a donation menu entryMounir IDRASSI1-0/+1
2014-12-19Correct small typo in language XML file.Mounir IDRASSI1-2/+2
2014-12-17Windows: in silent mode, don't show the wait dialog during mount operationMounir IDRASSI1-9/+17
2014-12-17Windows: Remove Truecrypt name is error message.Mounir IDRASSI1-2/+2
2014-12-16Windows: Enhance performance by implementing the possibility to choose the ↵Mounir IDRASSI17-32/+87
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption.
2014-12-16Windows: display a wait dialog during the lengthy opening of a volume. There ↵Mounir IDRASSI3-3/+101
is still a freeze in the GUI even though the call to DeviceIoControl is done in a separate thread which can't be explained. Maybe if we had an asynchronous Device Driver call, things would better.
2014-12-11Windows: always display random gathering dialog when UserEnrichRandomPool is ↵Mounir IDRASSI2-0/+8
called instead of once per application run. This is implemented through the call SetRandomPoolEnrichedByUserStatus(FALSE) at the begining of sensitive operations instead of changing UserEnrichRandomPool because in the same call there can be many calls to UserEnrichRandomPool which can result in displaying the dialog many times.
2014-12-11Correct XML syntax for symbols '<' and '>'Mounir IDRASSI1-1/+1
2014-12-11Windows: Implement specifying the size of the generated keyfiles and also ↵Mounir IDRASSI4-18/+77
letting VeraCrypt choose random size values.
2014-12-11Implement function RandgetBytesFull that enables generating random bytes of ↵Mounir IDRASSI2-21/+55
any length.
2014-12-11Windows: correct lock issue in RandgetBytes by releasing critical section in ↵Mounir IDRASSI1-0/+1
case of error.
2014-12-11Windows Driver: change inherited TrueCrypt constants in kernel objects tags ↵Mounir IDRASSI1-3/+3
by VeraCrypt specific values. These are used in crash dumps analysis and during debugging.
2014-12-07Windows: Implement creation of multiple keyfiles at once.Mounir IDRASSI4-43/+206
2014-12-07Windows: implement auto-dismount option when session is lockedMounir IDRASSI1-0/+1
2014-12-04Windows: correct issue in handling "More information on keyfiles" link that ↵Mounir IDRASSI1-0/+2
caused a crash on some machines
2014-12-04Windows: correct issue in displaying PDF of User Guide.Mounir IDRASSI1-2/+2
2014-12-04Windows: update URLs to points to the online documentation. Use a dedicated ↵Mounir IDRASSI2-5/+105
donation link.
2014-12-01Add test vectors for HMAC-SHA256 and PBKDF2-HMAC-SHA256Mounir IDRASSI1-0/+71
2014-11-11Windows: Avoid calling RegCloseKey on an invalid handle.Mounir IDRASSI1-6/+7
2014-11-10Windows: close file handle if the call to GetFileSize fails.Mounir IDRASSI1-0/+3
2014-11-08Remove unused functions from GfMul.cMounir IDRASSI1-16/+0
2014-11-08Linux/MacOSX: add newline at the end of Pkcs5.c to remove gcc warningMounir IDRASSI1-1/+1
2014-11-08Correct typo in language XML file.Mounir IDRASSI1-3/+3
2014-11-08Simplify code handling iterations count: in boot mode, we'll set the correct ↵Mounir IDRASSI6-32/+37
iterations count inside derive_u_sha256 and derive_u_ripemd160 depending in the value of the iterations parameter. On normal mode, we use normal values of iterations count. Removes the special test parameter from RIPEMD160 functions.
2014-11-08Bootloader: in function ReadVolumeHeader, arrays dk and masterKey have the ↵Mounir IDRASSI1-12/+9
same size and they are never needed at the same time. So, we can minimize stack memory usage by using only one array instead of two. At the end of the function, the array is erased securely.
2014-11-08Bootloader: optimize code size in single cipher mode by manually inlining ↵Mounir IDRASSI3-26/+61
EAInit, EAGetFirst and EAGetKeySize, and by removing the loop in ReadVolumeHeader that tests for encryption algorithms.
2014-11-08Bootloader code optimization: remove code in HMAC implementation in case of ↵Mounir IDRASSI1-4/+24
boot compilation that is never called since passwords are always less than 64-byte length. We leave it in Windows compilation because it is used to check the implementation against test vectors.
2014-11-08Implement support for creating and booting encrypted partition using ↵Mounir IDRASSI8-10/+136
SHA-256. Support SHA-256 for normal volumes as well.
2014-11-08Add support for SHA-256 in key derivation for bootloader encryption. Create ↵Mounir IDRASSI5-25/+234
separate bootloader images for SHA-256 and RIPEMD-160. Set SHA-256 as the default PRF for boot encryption and SHA-512 as default PRF for all other cases. Depricate RIPEMD-160.
2014-11-08Optimization to reduce code size of derive_u_ripemd160. Useful for boatloader.Mounir IDRASSI1-25/+20
2014-11-08Optimize code space and solve the Serpent issue ↵Mounir IDRASSI1-4/+4
(https://sourceforge.net/p/veracrypt/discussion/technical/thread/fb09633a/#6406) by removing key length parameter from serpent_set_key and twofish_set_key
2014-11-08Call RegCloseKey only if handle is valid.Mounir IDRASSI1-1/+2
2014-11-08Use absolute path in ShellExecute call that was missed when the security fix ↵Mounir IDRASSI1-1/+1
for Microsoft Security Advisory 2269637 was implemented.
2014-11-08Adapt certain functions in the case of Windows bootloader in order to make ↵Mounir IDRASSI2-5/+42
its size as small as possible.
2014-11-08Increment version to 1.0e for the next releaseMounir IDRASSI1-4/+4
2014-11-08Windows vulnerability fix: correct possible BSOD attack targeted towards ↵Mounir IDRASSI3-6/+16
GetWipePassCount() / WipeBuffer() found by the Open Crypto Audit Project.