VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Format
AgeCommit message (Collapse)AuthorFilesLines
2024-11-27Windows: Increment version to 1.26.17.2. Update signed drivers.Mounir IDRASSI1-2/+2
2024-11-20Windows driver: use correct WDM type. Increment version to 1.26.17Mounir IDRASSI1-4/+4
2024-11-18Increment version to 1.26.16. Update Release Notes. Update signed Windows ↵Mounir IDRASSI1-4/+4
drivers.
2024-11-16Windows: remove 32-bit logic from the code since we support only 64-bit. ↵Mounir IDRASSI1-22/+1
remove 32-bit EFI bootloader files. We also fix intermediary files folder for Portable and Setup projects
2024-11-15Windows: Fix VS 2022 projects referencesMounir IDRASSI1-3/+5
2024-11-15Windows: remove VS 2019 solution and project files since we migrated to VS 2022.Mounir IDRASSI2-586/+0
2024-11-15Windows: Fix delayload link warning about comdlg32.dll not used. Remove ↵Mounir IDRASSI1-6/+6
unused old project files
2024-11-15Windows: move main project files and solution from VS 2010 to VS 2022. ↵Mounir IDRASSI3-1269/+107
Delete unused files.
2024-11-15Windows: Upgrade VS 2019 solution/projects to VS 2022. Remove Win32 ↵Mounir IDRASSI1-203/+6
configuration for driver and binaries. Only setup remains 32-bit to be compatible with both x64 and arm64 Windows.
2024-11-15Windows: Fix various compiler warningsMounir IDRASSI2-39/+42
2024-11-13Windows: Remove support for 32-bit driver code. Set build target as Windows ↵Mounir IDRASSI1-9/+9
10. Simplify code and fix all warnings in driver.
2024-11-10Add support for SHA-256 x86 instrinsic for enhance performance of ↵Mounir IDRASSI1-1/+1
PBKDF2-HMAC-SHA256
2024-09-08Windows: Add support for x86 and x64 build for driver and binaries using ↵Mounir IDRASSI1-18/+27
Visual Studio 2019 We also enable Control Flow Guard and Spectre Mitigation
2024-09-01Windows: Fix MSI not installing all new documentation file. Remove old files ↵Mounir IDRASSI1-4/+4
left from old versions. Increment version to 1.26.15.
2024-08-25Increment version to 1.26.14. Set release date to August 25th.Mounir IDRASSI1-4/+4
2024-08-02Increment version to 1.26.13. Update release notes. Update signed Windows ↵Mounir IDRASSI1-4/+4
drivers.
2024-06-23Increment version to 1.26.12Mounir IDRASSI1-4/+4
2024-06-23Increment version to 1.26.11. Update Release Notes.Mounir IDRASSI1-4/+4
2024-06-12Avoid conflict with C++17 features std::byte by using uint8 type instead of byteMounir IDRASSI1-25/+25
2023-11-13wolfCrypt as crypto backend for VeraCrypt (#1227)lealem471-2/+4
* wolfCrypt as crypto backend for VeraCrypt * Refactor to use EncryptionModeWolfCryptXTS class
2023-11-09Increment version to 1.26.10. Update signed Windows drivers.Mounir IDRASSI1-4/+4
2023-10-13Windows: fallback to absolute positioning if relative positioning failsMounir IDRASSI1-10/+13
This can serve as workaround if a disk rejects relative positioning for some reason.
2023-10-11Increment version to 1.26.9Mounir IDRASSI1-4/+4
2023-10-10Increment version to 1.26.8Mounir IDRASSI1-4/+4
2023-09-30Increment version to 1.26.7. Set release date to October 1st. Update Windows ↵Mounir IDRASSI1-4/+4
signed driver files.
2023-09-21Update Release Notes. Increment version to 1.26.6.Mounir IDRASSI1-4/+4
2023-09-18Windows Security: make memory protection enabled by default. Add process ↵Mounir IDRASSI1-1/+1
mitigation (ASLR, Dynamic code, extension points) Memory protection can be disabled using registry value "VeraCryptEnableMemoryProtection" under the key "HKLM\SYSTEM\CurrentControlSet\Services\veracrypt"
2023-09-11Windows: replace CoInitialize calls with CoInitializeExMounir IDRASSI1-5/+5
2023-09-10Windows: Indicate in manifest files that support starts from Windows 7Mounir IDRASSI1-1/+7
2023-09-03Windows: Replace legacy file/dir selection APIs with modern IFileDialog ↵Mounir IDRASSI1-2/+2
interface We remove usage of GetOpenFileNameW/GetSaveFileNameW/SHBrowseForFolderW which are deprecated by Microsoft
2023-09-03Windows: remove legacy code (XP, Vista). Simplify code since Windows 7 is ↵Mounir IDRASSI1-61/+6
now minimal OS version.
2023-09-03Windows: simpler and more robust safe dll loading combined with delay ↵Mounir IDRASSI3-18/+17
loading thanks to Windows 7 being minimum supported version. We also block execution on Windows versions older than Windows 7. A lot of code was removed thanks to this.
2023-08-20Windows: delay load bcrypt.dll to reduce startup dependency loading until ↵Mounir IDRASSI2-17/+17
setting safe dll loading
2023-08-14Increment version to 1.26.5. Update signed Windows drivers.Mounir IDRASSI1-4/+4
2023-08-13Windows: Better way to enable required privileges for FastCreate OptionsMounir IDRASSI3-0/+33
If we can set required privilege, we ask the user using UAC to enable them.
2023-08-05Windows: Fix false positive detection of new device insertion when clear ↵Mounir IDRASSI2-1/+7
keys option is enable When this option is enabled, we first build the list of currently inserted devices then we start listening to insertion events. When a device insertion occurs, we check if this device is on our list and if yes, we ignore its insertion. We also ignore devices whose Device ID starts with "SWD\" and "ROOT\" since these are not real devices.
2023-07-22Windows: Remove TrueCrypt support. Increment version to 1.26.4.Mounir IDRASSI3-10/+10
2023-07-11Windows: when overwriting an existing file container, add its current size ↵Mounir IDRASSI1-0/+7
to the available free space
2023-07-01Windows: Use full list of supported cluster sizes for NTFS, ReFS and exFAT ↵Mounir IDRASSI1-6/+26
filesystems We keep FAT32 list of supported cluster sizes as it is today for compatibility with existing FAT code
2023-07-01Windows: Make API formatting fallback to format.com in case of elevation. ↵Mounir IDRASSI1-4/+4
remove dead code from ExternalFormatFs We also modify UacFormatNtfs/UacFormatFs to return actual error code in case of failure
2023-06-29EMV keyfile support: Overall code improvements and bug fixesMounir IDRASSI4-11/+89
2023-06-28Add EMV functionality (#1080)mmauv3-6/+42
* Add basic strcture needed for EMV implementation * Add demo EMV functionality with C code pasted in a very dirty and unsafe way. NOT FINAL * Refactor IccExtractor Structure * Fix Makefile * fix include file * move global variables from h to c * revert to memcpy * fix icc data recovery functions * Add EMV functionalities on windows * Make EMVToken structures like SecurityToken * Define constants instead of hard coded values * Token structures created with inheritance * refactor TokenKeyfile to use inherit. + polymor. * add Token.h + Token.cpp in modules in VS2010 * Add a comment at each use of SecurityToken class or objects * SecurityTokenKeyfilesDialog preparation * Implemennt GetAvailableTokens in Token class on windows * merge * up (patching for Windows) * foreach Token.cpp corrected * Display EMV keyfiles on first window in graphic interface * Add token to Windows UI * EMVToken selection on OKButton on Linux * Keyfile.cpp optimization * Move getKeyfileData in the token class * EMV::Token GetAvailableKeyfiles() base * Move getKeyfileData in the token class on unix * Remove test comments * Warnings resolved * RemoveeSecurityTokenLibraryNotInitialized exception if at least one emv token is detected * Adding new files * Remove old files and add the new version to the windows project * Change make_shared to shared_ptr constructor * IccExtractor integration working on linux * Throwing card not EMV execption * catch error when not EMV type in EMVToken::GetAvailableKeyfiles * Change types to compile on windows * list all keyfiles, security keyfiles and emv keyfiles in command line * Change type to be coherent and remove old todo comments * Remove todo comments * Change indentation and resolve a bug from previous commit * Use polymorphism for GetKeyfileData and add export option for EMVTokens on Linux * Linux : Allow to export EMV Tokens in command lines, Windows : Disable the delete button when EMV Keyfiles are selected * Remove SlotId from TokenInfo as it is already in Token * Correct errors on Linux * Disable delete option if one EMV Token is selected on Linux * Fix bug enabling delete button if nothing is selected * emv data used as reference then burnt * use of normal files in linux corrected * help updated * help updated for export functionnality * option EMV added to graphic interface but not yet working * Bug fix : Allow to use multiple EMV on windows * EMV Option added to UserPreferences * EMV Option working for Linux * EMV option added to Windows (not working yet) * [NOT TESTED] EMV option for Windows * Working EMV option on Windows * EMV Option for data extraction working for volume creation * EMV Option for data extraction working for Mount * EMV Option for data extraction working for mounting favorites volumes * EMV Option for extraction working for Changing volume password, Set Derivation Key Algorithm and Add or remove keyfile from volume * Windows : re-checking EMV Option when getting data * Removing error catches in the IccDataExtractor classe (It only throws error now). Changing GetPan signature to resemble the other functions signatures more * Changing EMV errors - Only throwing ICCExtractionException from outside of the ICC module. - Catching all TLVExceptions and PCSCExceptions to throw the right ICCExtractionException - Deleting APDU exceptions. * First version of the documentation * Adding function pointers for winscard library (but it crashes VeraCrypt) * Debugging function pointers * The import of the library on windows work as expected now * Reverting EMVToken.cpp changes used to test to library import * Searching for the System32 path instead of hard codding it * Fixing the bug were VeraCrypt crashes if there is no readers when "add Token files" is clicked * Winscard library not initialized in object constructor anymore to delay it after EMVOption check * Remove winscard lib from windows dependencies * Properly displaying errors * Adding a dot in Language.xml * Catching TLVException * Removing unused code * Remove unusefull comments * Trying to fix 0x1f error * Update IccDataExtractor.cpp * Delete History.xml * Fix get data without get pan * Cleanup code * changes for linux compilation but linking not working * error handling for linux * erasing emv data * Burn PAN * Burn PAN from memory * Uncomment selfcheck before merging master * burn corrected * EMV errors handling for Linux * EMV working for Linux CLI * Doc : Winscard Linux package and VeraCrypt versions --------- Co-authored-by: doriandu45 <d45.poubelle@gmail.com> Co-authored-by: red4game <redemgaiming@gmail.com> Co-authored-by: Brice.Namy <brice.namy@insa-rennes.fr> Co-authored-by: vocthor <pieceo108@gmail.com> Co-authored-by: vocthor <67202139+vocthor@users.noreply.github.com> Co-authored-by: Andrei COCAN <andrei.cocan@insa-rennes.fr> Co-authored-by: AndreiCocan <95496161+AndreiCocan@users.noreply.github.com> Co-authored-by: francoisLEROUX <francois3443@gmail.com>
2023-06-28Increment version to 1.26.3. Update Release NotesMounir IDRASSI1-4/+4
2023-06-28Windows: Add comboxbox to Format wizard to choose ↵Mounir IDRASSI3-22/+77
QuickFormat/FastCreate/FullFormat This required changes to internal logic and addition of new UI strings
2023-06-28Windows: Better handling of quick format for file containerMounir IDRASSI1-1/+0
We write a zeroed sector every 128 MiB, leaving other sectors untouched This helps users visualize the progress of actual file creation while forcing Windows to allocate the disk space of each 128 MiB chunk immediately, otherwise, Windows would delay the allocation until we write the backup header at the end of the volume which would make the user think that the format process has stalled after progress bar reaches 100%.
2023-06-04Increment version to 1.26.2. Update Release NotesMounir IDRASSI1-4/+4
2023-06-04Windows: Possible workaround for logarithmic slowdown for Encrypt-In-Place ↵Mounir IDRASSI2-21/+52
on large volumes (relates to #1063) We replace absolute file pointer moving by relative moving with respect to current position. This was implemented as a workaround to address the performance issues related to in-place encryption. When using SetFilePointerEx() with FILE_BEGIN as the reference point, reaching the end of large drives during in-place encryption can cause significant slowdowns. By moving the file pointer relatively, these performance issues are mitigated.
2022-12-11Revert "New sys enc wizard (#957)"Mounir IDRASSI4-1191/+243
This reverts commit c0ff7a7c521b1d658316d9a177383ab0c403007a.
2022-08-25New sys enc wizard (#957)SysEncWizardPR957Felix Reichmann4-243/+1191
* New VeraCrypt interface (for system encryption) with improved usability * System Encryption: translate password to US keyboard layout + improved new interface * Windows: Fix build error following merge * Windows: Remove unused variable * Windows: Add missing string in Language.xml * Windows: fix buffer overrun caused by wrong use of wmemset * Do not delete password file Since the file is only available in \Release\Setup Files\ it would be fully deleted after running this script the first time. * Correct return code Originally the function would have always returned the return-code 1 resulting that the user is not able to change the location for the rescue zip. * Added hint for sysenc Added a hint why the field for repeating the password is initially greyed out within the system encryption. * Corrected spelling mistake Corrected spelling mistake * Removed not working copy job The file to be copied was stored at the source location. Therefore the copyjob will not work. Instead the file is already in the target folder. * Removed RIPEMD-160 from Product64.wxs See commit from 21.03.2022 * Added german translation for new interface * Fixed PIM bug * Corrected translation file based on the guidelines within the pull request * Fixing merge conflicts * Fixed Compiling issues. Reverted keyboard translation * Removed artifacts of password translation * Corrected language.xml * Fixed order within german language file * Corrected positions Co-authored-by: Bruna2803 <bruna.radeljak@hotmail.com> Co-authored-by: felixreichmann <30237956+felixreichmann@users.noreply.github.com> Co-authored-by: Mounir IDRASSI <mounir.idrassi@idrix.fr>
2022-03-26Windows: Add various checks to address Coverity reported issues.Mounir IDRASSI2-5/+14