VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Format/Tcformat.c
AgeCommit message (Collapse)AuthorFilesLines
2024-11-15Windows: Fix various compiler warningsMounir IDRASSI1-36/+39
2023-11-13wolfCrypt as crypto backend for VeraCrypt (#1227)lealem471-2/+4
* wolfCrypt as crypto backend for VeraCrypt * Refactor to use EncryptionModeWolfCryptXTS class
2023-09-18Windows Security: make memory protection enabled by default. Add process ↵Mounir IDRASSI1-1/+1
mitigation (ASLR, Dynamic code, extension points) Memory protection can be disabled using registry value "VeraCryptEnableMemoryProtection" under the key "HKLM\SYSTEM\CurrentControlSet\Services\veracrypt"
2023-09-03Windows: Replace legacy file/dir selection APIs with modern IFileDialog ↵Mounir IDRASSI1-2/+2
interface We remove usage of GetOpenFileNameW/GetSaveFileNameW/SHBrowseForFolderW which are deprecated by Microsoft
2023-09-03Windows: remove legacy code (XP, Vista). Simplify code since Windows 7 is ↵Mounir IDRASSI1-61/+6
now minimal OS version.
2023-09-03Windows: simpler and more robust safe dll loading combined with delay ↵Mounir IDRASSI1-1/+0
loading thanks to Windows 7 being minimum supported version. We also block execution on Windows versions older than Windows 7. A lot of code was removed thanks to this.
2023-07-22Windows: Remove TrueCrypt support. Increment version to 1.26.4.Mounir IDRASSI1-5/+5
2023-07-11Windows: when overwriting an existing file container, add its current size ↵Mounir IDRASSI1-0/+7
to the available free space
2023-07-01Windows: Use full list of supported cluster sizes for NTFS, ReFS and exFAT ↵Mounir IDRASSI1-6/+26
filesystems We keep FAT32 list of supported cluster sizes as it is today for compatibility with existing FAT code
2023-06-29EMV keyfile support: Overall code improvements and bug fixesMounir IDRASSI1-1/+1
2023-06-28Add EMV functionality (#1080)mmauv1-1/+3
* Add basic strcture needed for EMV implementation * Add demo EMV functionality with C code pasted in a very dirty and unsafe way. NOT FINAL * Refactor IccExtractor Structure * Fix Makefile * fix include file * move global variables from h to c * revert to memcpy * fix icc data recovery functions * Add EMV functionalities on windows * Make EMVToken structures like SecurityToken * Define constants instead of hard coded values * Token structures created with inheritance * refactor TokenKeyfile to use inherit. + polymor. * add Token.h + Token.cpp in modules in VS2010 * Add a comment at each use of SecurityToken class or objects * SecurityTokenKeyfilesDialog preparation * Implemennt GetAvailableTokens in Token class on windows * merge * up (patching for Windows) * foreach Token.cpp corrected * Display EMV keyfiles on first window in graphic interface * Add token to Windows UI * EMVToken selection on OKButton on Linux * Keyfile.cpp optimization * Move getKeyfileData in the token class * EMV::Token GetAvailableKeyfiles() base * Move getKeyfileData in the token class on unix * Remove test comments * Warnings resolved * RemoveeSecurityTokenLibraryNotInitialized exception if at least one emv token is detected * Adding new files * Remove old files and add the new version to the windows project * Change make_shared to shared_ptr constructor * IccExtractor integration working on linux * Throwing card not EMV execption * catch error when not EMV type in EMVToken::GetAvailableKeyfiles * Change types to compile on windows * list all keyfiles, security keyfiles and emv keyfiles in command line * Change type to be coherent and remove old todo comments * Remove todo comments * Change indentation and resolve a bug from previous commit * Use polymorphism for GetKeyfileData and add export option for EMVTokens on Linux * Linux : Allow to export EMV Tokens in command lines, Windows : Disable the delete button when EMV Keyfiles are selected * Remove SlotId from TokenInfo as it is already in Token * Correct errors on Linux * Disable delete option if one EMV Token is selected on Linux * Fix bug enabling delete button if nothing is selected * emv data used as reference then burnt * use of normal files in linux corrected * help updated * help updated for export functionnality * option EMV added to graphic interface but not yet working * Bug fix : Allow to use multiple EMV on windows * EMV Option added to UserPreferences * EMV Option working for Linux * EMV option added to Windows (not working yet) * [NOT TESTED] EMV option for Windows * Working EMV option on Windows * EMV Option for data extraction working for volume creation * EMV Option for data extraction working for Mount * EMV Option for data extraction working for mounting favorites volumes * EMV Option for extraction working for Changing volume password, Set Derivation Key Algorithm and Add or remove keyfile from volume * Windows : re-checking EMV Option when getting data * Removing error catches in the IccDataExtractor classe (It only throws error now). Changing GetPan signature to resemble the other functions signatures more * Changing EMV errors - Only throwing ICCExtractionException from outside of the ICC module. - Catching all TLVExceptions and PCSCExceptions to throw the right ICCExtractionException - Deleting APDU exceptions. * First version of the documentation * Adding function pointers for winscard library (but it crashes VeraCrypt) * Debugging function pointers * The import of the library on windows work as expected now * Reverting EMVToken.cpp changes used to test to library import * Searching for the System32 path instead of hard codding it * Fixing the bug were VeraCrypt crashes if there is no readers when "add Token files" is clicked * Winscard library not initialized in object constructor anymore to delay it after EMVOption check * Remove winscard lib from windows dependencies * Properly displaying errors * Adding a dot in Language.xml * Catching TLVException * Removing unused code * Remove unusefull comments * Trying to fix 0x1f error * Update IccDataExtractor.cpp * Delete History.xml * Fix get data without get pan * Cleanup code * changes for linux compilation but linking not working * error handling for linux * erasing emv data * Burn PAN * Burn PAN from memory * Uncomment selfcheck before merging master * burn corrected * EMV errors handling for Linux * EMV working for Linux CLI * Doc : Winscard Linux package and VeraCrypt versions --------- Co-authored-by: doriandu45 <d45.poubelle@gmail.com> Co-authored-by: red4game <redemgaiming@gmail.com> Co-authored-by: Brice.Namy <brice.namy@insa-rennes.fr> Co-authored-by: vocthor <pieceo108@gmail.com> Co-authored-by: vocthor <67202139+vocthor@users.noreply.github.com> Co-authored-by: Andrei COCAN <andrei.cocan@insa-rennes.fr> Co-authored-by: AndreiCocan <95496161+AndreiCocan@users.noreply.github.com> Co-authored-by: francoisLEROUX <francois3443@gmail.com>
2023-06-28Windows: Add comboxbox to Format wizard to choose ↵Mounir IDRASSI1-19/+73
QuickFormat/FastCreate/FullFormat This required changes to internal logic and addition of new UI strings
2022-12-11Revert "New sys enc wizard (#957)"Mounir IDRASSI1-1041/+196
This reverts commit c0ff7a7c521b1d658316d9a177383ab0c403007a.
2022-08-25New sys enc wizard (#957)SysEncWizardPR957Felix Reichmann1-196/+1041
* New VeraCrypt interface (for system encryption) with improved usability * System Encryption: translate password to US keyboard layout + improved new interface * Windows: Fix build error following merge * Windows: Remove unused variable * Windows: Add missing string in Language.xml * Windows: fix buffer overrun caused by wrong use of wmemset * Do not delete password file Since the file is only available in \Release\Setup Files\ it would be fully deleted after running this script the first time. * Correct return code Originally the function would have always returned the return-code 1 resulting that the user is not able to change the location for the rescue zip. * Added hint for sysenc Added a hint why the field for repeating the password is initially greyed out within the system encryption. * Corrected spelling mistake Corrected spelling mistake * Removed not working copy job The file to be copied was stored at the source location. Therefore the copyjob will not work. Instead the file is already in the target folder. * Removed RIPEMD-160 from Product64.wxs See commit from 21.03.2022 * Added german translation for new interface * Fixed PIM bug * Corrected translation file based on the guidelines within the pull request * Fixing merge conflicts * Fixed Compiling issues. Reverted keyboard translation * Removed artifacts of password translation * Corrected language.xml * Fixed order within german language file * Corrected positions Co-authored-by: Bruna2803 <bruna.radeljak@hotmail.com> Co-authored-by: felixreichmann <30237956+felixreichmann@users.noreply.github.com> Co-authored-by: Mounir IDRASSI <mounir.idrassi@idrix.fr>
2022-03-26Windows: Add various checks to address Coverity reported issues.Mounir IDRASSI1-5/+12
2022-03-08Implement support of Blake2s-256 hash algorithm and remove deprecated ↵Mounir IDRASSI1-6/+3
algorithms RIPEMD-160 and GOST89.
2021-07-13Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure ↵Mounir IDRASSI1-6/+6
equivalents This fixed failure to build driver for ARM64 with latest VS 2019
2021-01-02Windows: Fix issue in preserving last access timestamp of file containers ↵Mounir IDRASSI1-2/+0
when creating hidden volumes in direct mode inside them
2020-07-28Windows: Don't allow a directory path to be entered for the file container ↵Mounir IDRASSI1-1/+17
to be created in Format wizard
2020-07-22Windows: Warn about Fast Startup if it is enabled during system encryption ↵Mounir IDRASSI1-0/+18
or volume creation and propose to disable it
2020-07-06Windows: correctly wipe password in UI input field in case of direct ↵Mounir IDRASSI1-2/+8
creation of Hidden volume or resuming non-system in-place encryption
2020-07-06Windows: Support direct password drag-n-drop from external applications ↵Mounir IDRASSI1-2/+26
(e.g. KeePass) which is more secure than using clipboard.
2020-06-28Windows: remove unused code targeting Windows 2000.Mounir IDRASSI1-14/+2
2020-06-23Windows: Don't allow Hidden volume to have the same password, PIM and ↵Mounir IDRASSI1-7/+49
keyfiles as Outer volume
2020-03-10Windows: Add /secureDesktop switch to VeraCrypt FormatMounir IDRASSI1-0/+21
2020-03-10Windows: Support using token keyfile when creating file container using ↵Mounir IDRASSI1-1/+33
command line
2020-01-21Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵Mounir IDRASSI1-0/+12
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536
2019-12-16Windows: make /fastCreateFile switch apply to both UI and command line ↵Mounir IDRASSI1-1/+2
creation of file containers
2019-12-12Windows: Fix the checkbox for skipping verification of Rescue Disk not ↵Mounir IDRASSI1-0/+1
reflecting the value of /noisocheck switch when specified in VeraCrypt Format command line.
2019-12-10Windows: Add switch /FastCreateFile for VeraCrypt Format.exe to speedup ↵Mounir IDRASSI1-0/+10
creation of large file container if quick format is selected. This switch comes with security issues since it will embed existing content on disk into the file container which may expose sensitive content to an attacker who has access to the file container.
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI1-0/+12
especially for keyfiles.
2019-10-02Windows: Add support for /nosizecheck switch in Format command line file ↵Mounir IDRASSI1-1/+1
container creation
2019-09-25Windows: Disable the Keyfiles button in system encryption wizard since we ↵Mounir IDRASSI1-1/+2
don't support them yet.
2019-03-03Windows: replicate old behavior when handling passwords in UI when legacy ↵Mounir IDRASSI1-9/+16
password maximum length option selected
2019-03-03Windows: Add option to use legacy maximum password length (64 characters) ↵Mounir IDRASSI1-1/+4
instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt.
2019-02-04Automatically truncate passwords for TrueCrypt volumes and System Encryption ↵Mounir IDRASSI1-6/+6
to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version.
2019-01-15Windows: enhancements to EFI system encryption, like handling of Multi-Boot ↵Mounir IDRASSI1-7/+3
and better compatibility with Windows Upgrade process.
2018-12-19Windows: Enable selection of Quick Format for file containers. Separate ↵Mounir IDRASSI1-22/+48
Quick Format and Dynamic Volume options.
2018-09-21Windows: don't use quick format by default when creating file containers ↵Mounir IDRASSI1-1/+8
using command line and add a switch to enable quick format explicitly in command line
2018-09-21Windows: add /nosizecheck switch to VeraCrypt Format that allows disabling ↵Mounir IDRASSI1-1/+8
check on file container size against available free space on target disk. This enables to workaround a bug in Microsoft Distributed File System (DFS) that report wrong free disk space (https://support.microsoft.com/en-us/help/177127/incorrect-disk-free-space-information-for-a-dfs-client-share)
2018-09-03Windows: fix regression when language selected in the setup during fresh ↵Mounir IDRASSI1-0/+5
install and that caused VeraCrypt background task to be disabled.
2018-08-24Windows: fix language selected in the installer not used by "Create Volume" ↵Mounir IDRASSI1-1/+1
wizard until reboot or exiting VeraCrypt main process.
2018-08-24Windows: Add check on size of file container to ensure it's smaller than ↵Mounir IDRASSI1-3/+42
available free space on disk when this is required.
2018-08-16Windows: Fix regression that caused the system encryption wizard to crash ↵Mounir IDRASSI1-3/+3
when displaying password field.
2018-08-07Windows: Display a balloon tip warning or error message when the value ↵Mounir IDRASSI1-3/+3
pasted to password field is truncated or when there is no room for additional characters because of maximum password length reached
2018-04-23Windows: Fix system encryption issues on machines that always force booting ↵Mounir IDRASSI1-2/+2
on Microsoft bootloader (e.g. HP).
2017-11-28Language XML files: remove references to GOST89 since it is not supported ↵Mounir IDRASSI1-6/+0
anymore.
2017-07-02Windows: fix documentation and UI messages about the PIM constraints and ↵Mounir IDRASSI1-4/+4
calculation formula when EFI system encryption is using SHA-512 or Whirlpool. For historical reasons, if SHA-512 or Whirlpool is selected for EFI system encryption, then iterations = 15000 + (PIM x 1000) and not iterations = PIM x 2048 like the other algorithms.
2017-07-02Windows: when mounting multiple favorites, use PIM of previous favorite ↵Mounir IDRASSI1-4/+4
alongside its password if option "Include PIM when caching password" is selected alongside option "Temporarily cache password during Mount Favorite Volumes operations".
2017-06-23Update IDRIX copyright yearMounir IDRASSI1-1/+1