VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/ExpandVolume
AgeCommit message (Collapse)AuthorFilesLines
2023-06-28Add EMV functionality (#1080)mmauv3-4/+37
* Add basic strcture needed for EMV implementation * Add demo EMV functionality with C code pasted in a very dirty and unsafe way. NOT FINAL * Refactor IccExtractor Structure * Fix Makefile * fix include file * move global variables from h to c * revert to memcpy * fix icc data recovery functions * Add EMV functionalities on windows * Make EMVToken structures like SecurityToken * Define constants instead of hard coded values * Token structures created with inheritance * refactor TokenKeyfile to use inherit. + polymor. * add Token.h + Token.cpp in modules in VS2010 * Add a comment at each use of SecurityToken class or objects * SecurityTokenKeyfilesDialog preparation * Implemennt GetAvailableTokens in Token class on windows * merge * up (patching for Windows) * foreach Token.cpp corrected * Display EMV keyfiles on first window in graphic interface * Add token to Windows UI * EMVToken selection on OKButton on Linux * Keyfile.cpp optimization * Move getKeyfileData in the token class * EMV::Token GetAvailableKeyfiles() base * Move getKeyfileData in the token class on unix * Remove test comments * Warnings resolved * RemoveeSecurityTokenLibraryNotInitialized exception if at least one emv token is detected * Adding new files * Remove old files and add the new version to the windows project * Change make_shared to shared_ptr constructor * IccExtractor integration working on linux * Throwing card not EMV execption * catch error when not EMV type in EMVToken::GetAvailableKeyfiles * Change types to compile on windows * list all keyfiles, security keyfiles and emv keyfiles in command line * Change type to be coherent and remove old todo comments * Remove todo comments * Change indentation and resolve a bug from previous commit * Use polymorphism for GetKeyfileData and add export option for EMVTokens on Linux * Linux : Allow to export EMV Tokens in command lines, Windows : Disable the delete button when EMV Keyfiles are selected * Remove SlotId from TokenInfo as it is already in Token * Correct errors on Linux * Disable delete option if one EMV Token is selected on Linux * Fix bug enabling delete button if nothing is selected * emv data used as reference then burnt * use of normal files in linux corrected * help updated * help updated for export functionnality * option EMV added to graphic interface but not yet working * Bug fix : Allow to use multiple EMV on windows * EMV Option added to UserPreferences * EMV Option working for Linux * EMV option added to Windows (not working yet) * [NOT TESTED] EMV option for Windows * Working EMV option on Windows * EMV Option for data extraction working for volume creation * EMV Option for data extraction working for Mount * EMV Option for data extraction working for mounting favorites volumes * EMV Option for extraction working for Changing volume password, Set Derivation Key Algorithm and Add or remove keyfile from volume * Windows : re-checking EMV Option when getting data * Removing error catches in the IccDataExtractor classe (It only throws error now). Changing GetPan signature to resemble the other functions signatures more * Changing EMV errors - Only throwing ICCExtractionException from outside of the ICC module. - Catching all TLVExceptions and PCSCExceptions to throw the right ICCExtractionException - Deleting APDU exceptions. * First version of the documentation * Adding function pointers for winscard library (but it crashes VeraCrypt) * Debugging function pointers * The import of the library on windows work as expected now * Reverting EMVToken.cpp changes used to test to library import * Searching for the System32 path instead of hard codding it * Fixing the bug were VeraCrypt crashes if there is no readers when "add Token files" is clicked * Winscard library not initialized in object constructor anymore to delay it after EMVOption check * Remove winscard lib from windows dependencies * Properly displaying errors * Adding a dot in Language.xml * Catching TLVException * Removing unused code * Remove unusefull comments * Trying to fix 0x1f error * Update IccDataExtractor.cpp * Delete History.xml * Fix get data without get pan * Cleanup code * changes for linux compilation but linking not working * error handling for linux * erasing emv data * Burn PAN * Burn PAN from memory * Uncomment selfcheck before merging master * burn corrected * EMV errors handling for Linux * EMV working for Linux CLI * Doc : Winscard Linux package and VeraCrypt versions --------- Co-authored-by: doriandu45 <d45.poubelle@gmail.com> Co-authored-by: red4game <redemgaiming@gmail.com> Co-authored-by: Brice.Namy <brice.namy@insa-rennes.fr> Co-authored-by: vocthor <pieceo108@gmail.com> Co-authored-by: vocthor <67202139+vocthor@users.noreply.github.com> Co-authored-by: Andrei COCAN <andrei.cocan@insa-rennes.fr> Co-authored-by: AndreiCocan <95496161+AndreiCocan@users.noreply.github.com> Co-authored-by: francoisLEROUX <francois3443@gmail.com>
2023-06-28Increment version to 1.26.3. Update Release NotesMounir IDRASSI1-4/+4
2023-06-25Windows: 100% localization of Expander UI stringsMounir IDRASSI3-40/+39
2023-06-25Windows: Better language localization support for Expander.Mounir IDRASSI4-5/+34
More work is needed to localize remaining string resources
2023-06-18Windows: make Expander first check file existence before proceeding furtherMounir IDRASSI1-1/+6
2023-06-04Increment version to 1.26.2. Update Release NotesMounir IDRASSI1-4/+4
2023-06-02Windows: Add dropdown menu to Mount button to allow mounting without cacheMounir IDRASSI1-0/+1
2023-05-26Windows: Add missing update of libzip zip_err_str.c and fix libzip related ↵Mounir IDRASSI1-6/+6
project configuration
2022-03-26Windows: Add various checks to address Coverity reported issues.Mounir IDRASSI1-0/+6
2022-03-21Increment version to 1.26 and update windows driver and MBR bootloader filesMounir IDRASSI1-4/+4
2022-02-19Increment version to 1.25.9 and update Release Notes.Mounir IDRASSI1-2/+2
2022-02-16Increment version to 1.25.8.2 and update signed Windows driversMounir IDRASSI1-2/+2
2022-02-11Windows: Increment version to 1.25.8.1 and update signed Windows driversMounir IDRASSI1-2/+2
2022-02-10Windows: Reduce the size of installers by almost 50% by using LZMA ↵Mounir IDRASSI2-25/+31
compression instead of DEFLATE
2022-02-05Increment version to 1.25.8Mounir IDRASSI1-2/+2
2022-01-07Increment version to 1.25.7 and update Release NotesMounir IDRASSI1-2/+2
2021-12-27Increment version to 1.25.6. Update Release Notes and add signed Windows driver.Mounir IDRASSI1-2/+2
2021-12-20Increment version to 1.25.5 and update release notesMounir IDRASSI1-2/+2
2021-12-04Windows: Implement TESTSIGNING build configuration that allows running under ↵Mounir IDRASSI1-0/+144
Windows Vista,7, 8 and 8.1.
2021-11-30Increment version to 1.25.4 and set release date to December 3rd 2021Mounir IDRASSI1-2/+2
2021-11-28Increment version to 1.25 (1.25.3)Mounir IDRASSI1-2/+2
2021-11-21Increment version to 1.25-RC2 and update release notesMounir IDRASSI1-2/+2
2021-09-05Increment version to 1.25-RC1Mounir IDRASSI1-2/+2
2021-08-30Increment version to 1.25Mounir IDRASSI1-4/+4
2021-08-15Windows: Increment version to 1.24.25.3 and update signed Windows driverMounir IDRASSI1-2/+2
2021-08-02Windows: Increment version to 1.24.25.2 and update signed Windows driverMounir IDRASSI1-2/+2
2021-07-13Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure ↵Mounir IDRASSI1-1/+2
equivalents This fixed failure to build driver for ARM64 with latest VS 2019
2021-02-21interface: add keyboard shortcut to "TrueCrypt mode" in the mount dialog (#729)alt3r 3go1-1/+1
I've also updated all the relevant language files. Closes #95. Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com>
2021-01-02Increment version to 1.24-Update9Mounir IDRASSI1-4/+4
2021-01-02Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵Mounir IDRASSI2-0/+1095
System encryption still not implemented on ARM64
2020-11-29Increment version to 1.24-Update8Mounir IDRASSI1-4/+4
2020-08-06Increment internal version to 1.24.23 and update release notesMounir IDRASSI1-2/+2
2020-08-06Increment internal version to 1.24.22 and update release notesMounir IDRASSI1-2/+2
2020-08-03Increment internal version to 1.24.21 and update release notesMounir IDRASSI1-2/+2
2020-07-22Increment internal version to 1.24.20 and update release notesMounir IDRASSI1-2/+2
2020-07-06Windows: Support direct password drag-n-drop from external applications ↵Mounir IDRASSI1-0/+24
(e.g. KeePass) which is more secure than using clipboard.
2020-07-04Increment internal version to 1.24.19Mounir IDRASSI1-2/+2
2020-06-29Increment internal version to 1.24.18 and update signed Windows drivers.Mounir IDRASSI1-2/+2
2020-06-23Increment version to 1.24-Update7Mounir IDRASSI1-4/+4
2020-06-21Windows: Fix issue when RAM encryption used, AES selected and AES-NI not ↵Mounir IDRASSI1-0/+5
supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected by user.
2020-03-10Increment version to 1.24-Update6Mounir IDRASSI1-4/+4
2020-02-11Increment version to 1.24-Update5 and update signed Windows drivers.Mounir IDRASSI1-4/+4
2020-02-10Windows: Fix warnings reported by Coverity static code analyzerMounir IDRASSI1-5/+6
2020-01-22Increment version to 1.24-Update4 and update Release NotesMounir IDRASSI1-4/+4
2020-01-22Windows: Fix regression in Expander and Format when RAM encryption is enable ↵Mounir IDRASSI2-0/+70
that was causing volume headers to be corrupted.
2020-01-21Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵Mounir IDRASSI1-0/+69
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536
2019-12-16Update version information in preparation for 1.24-Update2 releaseMounir IDRASSI1-2/+2
2019-12-10Increment version to 1.24-Update2Mounir IDRASSI1-4/+4
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI1-14/+21
especially for keyfiles.
2019-12-03Windows: Fix possible local privilege escalation vulnerability during ↵Mounir IDRASSI1-1/+1
execution of VeraCrypt Expander (CVE-2019-19501)