VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common
AgeCommit message (Collapse)AuthorFilesLines
2014-11-11Windows: Avoid calling RegCloseKey on an invalid handle.Mounir IDRASSI1-6/+7
2014-11-10Windows: close file handle if the call to GetFileSize fails.Mounir IDRASSI1-0/+3
2014-11-08Remove unused functions from GfMul.cMounir IDRASSI1-16/+0
2014-11-08Linux/MacOSX: add newline at the end of Pkcs5.c to remove gcc warningMounir IDRASSI1-1/+1
2014-11-08Correct typo in language XML file.Mounir IDRASSI1-3/+3
2014-11-08Simplify code handling iterations count: in boot mode, we'll set the correct ↵Mounir IDRASSI6-32/+37
iterations count inside derive_u_sha256 and derive_u_ripemd160 depending in the value of the iterations parameter. On normal mode, we use normal values of iterations count. Removes the special test parameter from RIPEMD160 functions.
2014-11-08Bootloader: in function ReadVolumeHeader, arrays dk and masterKey have the ↵Mounir IDRASSI1-12/+9
same size and they are never needed at the same time. So, we can minimize stack memory usage by using only one array instead of two. At the end of the function, the array is erased securely.
2014-11-08Bootloader: optimize code size in single cipher mode by manually inlining ↵Mounir IDRASSI3-26/+61
EAInit, EAGetFirst and EAGetKeySize, and by removing the loop in ReadVolumeHeader that tests for encryption algorithms.
2014-11-08Bootloader code optimization: remove code in HMAC implementation in case of ↵Mounir IDRASSI1-4/+24
boot compilation that is never called since passwords are always less than 64-byte length. We leave it in Windows compilation because it is used to check the implementation against test vectors.
2014-11-08Implement support for creating and booting encrypted partition using ↵Mounir IDRASSI8-10/+136
SHA-256. Support SHA-256 for normal volumes as well.
2014-11-08Add support for SHA-256 in key derivation for bootloader encryption. Create ↵Mounir IDRASSI5-25/+234
separate bootloader images for SHA-256 and RIPEMD-160. Set SHA-256 as the default PRF for boot encryption and SHA-512 as default PRF for all other cases. Depricate RIPEMD-160.
2014-11-08Optimization to reduce code size of derive_u_ripemd160. Useful for boatloader.Mounir IDRASSI1-25/+20
2014-11-08Optimize code space and solve the Serpent issue ↵Mounir IDRASSI1-4/+4
(https://sourceforge.net/p/veracrypt/discussion/technical/thread/fb09633a/#6406) by removing key length parameter from serpent_set_key and twofish_set_key
2014-11-08Call RegCloseKey only if handle is valid.Mounir IDRASSI1-1/+2
2014-11-08Use absolute path in ShellExecute call that was missed when the security fix ↵Mounir IDRASSI1-1/+1
for Microsoft Security Advisory 2269637 was implemented.
2014-11-08Adapt certain functions in the case of Windows bootloader in order to make ↵Mounir IDRASSI2-5/+42
its size as small as possible.
2014-11-08Increment version to 1.0e for the next releaseMounir IDRASSI1-4/+4
2014-11-08Windows vulnerability fix: correct possible BSOD attack targeted towards ↵Mounir IDRASSI3-6/+16
GetWipePassCount() / WipeBuffer() found by the Open Crypto Audit Project.
2014-11-08Remove driver version test that is non application to VeraCrypt and that was ↵Mounir IDRASSI1-3/+0
wrongly inherited from TrueCrypt.
2014-11-08Correctly handle dialogs from previous versions that used 'TRUE' instead of ↵Mounir IDRASSI1-2/+4
'VERA' as a value for GWLP_USERDATA.
2014-11-08Add description string for the new wipe mode WIPE_MODE_256 in language files.Mounir IDRASSI1-0/+1
2014-11-08Add option in select the number of passes for volume header over-writing. By ↵Mounir IDRASSI8-17/+31
default, it is set to 3 but it can be increased to 256 passes (which can lead to a delay of many hours for a single password change operation).
2014-11-08Lower number of times we overwrite volume header during the encryption of a ↵Mounir IDRASSI1-0/+3
partition if the user choose to wipe the driver. Latest studies show that even one pass is enough to make data irretrievable. A value of 3 is a conservative approach that enhance performance without scarifying security. http://www.infosecisland.com/blogview/16130-The-Urban-Legend-of-Multipass-Hard-Disk-Overwrite.html http://digital-forensics.sans.org/blog/2009/01/15/overwriting-hard-drive-data/
2014-11-08Remove remaining legacy cryptographic algorithms that are never used by ↵Mounir IDRASSI4-17/+0
VeraCrypt.
2014-11-08Remove deprecated/legacy cryptographic algorithms and encryption modes that ↵Mounir IDRASSI10-1942/+16
are never used by VeraCrypt. This will speed up volumes opening in many cases.
2014-11-08Static Code Analysis : Generalize the use of Safe String functions. Add some ↵Mounir IDRASSI9-106/+165
NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL.
2014-11-08Static Code Analysis : Use Safe String function in Dlgcode.c. Add byte size ↵Mounir IDRASSI2-274/+340
parameter in various functions to help implement secure handling of strings.
2014-11-08Static Code Analysis : Add various NULL pointers checksMounir IDRASSI4-21/+39
2014-11-08Static Code Analysis : Add NULL pointers checks on the result of ATL string ↵Mounir IDRASSI1-7/+9
conversion. Avoid some conversions by using UNICODE functions directly.
2014-11-08Use Safe String functions in Registry.c and add a unicode version of ↵Mounir IDRASSI2-5/+31
WriteLocalMachineRegistryDword function to avoid doing conversions when used.
2014-11-08Disable crash handling until we put in place a dedicated URL for posting ↵Mounir IDRASSI1-14/+14
crash information.
2014-11-08Static Code Analysis : Correctly initialize member variable in HostDevice ↵Mounir IDRASSI1-1/+2
constructor
2014-11-08Static Code Analysis : Avoid using invalidate integer value received from ↵Mounir IDRASSI1-1/+5
GetFileSize.
2014-11-08Static Code Analysis : fix usage of strncpy and sscanf.Mounir IDRASSI1-1/+1
2014-11-08Static Code Analysis : fix various memory leaks.Mounir IDRASSI2-0/+6
2014-11-08Static Code Analysis : fix resource leakage by ensuring that all Windows ↵Mounir IDRASSI1-8/+20
handles are released properly
2014-11-08Static Code Analysis : Avoid potential overflow when parsing language file ↵Mounir IDRASSI1-1/+1
by specifying width for 's' conversion specifier
2014-11-08Static Code Analysis : fix non-absolute DLL/process loads that can be ↵Mounir IDRASSI4-10/+58
hijacked (Microsoft Security Advisory 2269637).
2014-11-08Static Code Analysis : Correctly initialize member variables in various ↵Mounir IDRASSI4-6/+14
constructors
2014-11-08Change namespace from TrueCrypt to VeraCrypt. Rename method from Resources ↵Mounir IDRASSI8-8/+8
Resources::GetTrueCryptIcon to Resources::GetVeraCryptIcon.
2014-11-08Point to the SourceForge website instead of idrix.fr for the application ↵Mounir IDRASSI1-2/+2
link. Remove OS parameter is URL constructed under Linux/MacOSX
2014-11-08Replace 'TRUE' by 'VERA' in some GUI constants and commentsMounir IDRASSI2-8/+8
2014-11-08Increment VeraCrypt version to 1.0dVeraCrypt_1.0dMounir IDRASSI1-5/+5
2014-11-08Correct issue in handling hidden system partitions that made it impossible ↵Mounir IDRASSI2-8/+21
to verify their password.
2014-11-08Use calloc directly instead of combining malloc and ZeroMemoryMounir IDRASSI1-8/+3
2014-11-08Correct minor bug in ReadRegistryString functionMounir IDRASSI1-1/+2
2014-11-08Increment VeraCrypt version to 1.0cVeraCrypt_1.0cMounir IDRASSI1-4/+4
2014-11-08Set correctly the minimum required version in volumes header (this value ↵Mounir IDRASSI1-2/+2
must always follow the current program version). This solves also the hidden volume issue.
2014-11-08Increment VeraCrypt version to 1.0bVeraCrypt_1.0bMounir IDRASSI1-3/+3
2014-11-08Only position legacy flag if the first release of VeraCrypt is detectedMounir IDRASSI1-1/+1