VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Main/CommandLineInterface.h
AgeCommit message (Collapse)AuthorFilesLines
2023-07-24Linux/macOS: Remove TrueCrypt supportMounir IDRASSI1-1/+0
2023-06-29EMV keyfile support: Overall code improvements and bug fixesMounir IDRASSI1-2/+2
2023-06-28Add EMV functionality (#1080)mmauv1-1/+3
* Add basic strcture needed for EMV implementation * Add demo EMV functionality with C code pasted in a very dirty and unsafe way. NOT FINAL * Refactor IccExtractor Structure * Fix Makefile * fix include file * move global variables from h to c * revert to memcpy * fix icc data recovery functions * Add EMV functionalities on windows * Make EMVToken structures like SecurityToken * Define constants instead of hard coded values * Token structures created with inheritance * refactor TokenKeyfile to use inherit. + polymor. * add Token.h + Token.cpp in modules in VS2010 * Add a comment at each use of SecurityToken class or objects * SecurityTokenKeyfilesDialog preparation * Implemennt GetAvailableTokens in Token class on windows * merge * up (patching for Windows) * foreach Token.cpp corrected * Display EMV keyfiles on first window in graphic interface * Add token to Windows UI * EMVToken selection on OKButton on Linux * Keyfile.cpp optimization * Move getKeyfileData in the token class * EMV::Token GetAvailableKeyfiles() base * Move getKeyfileData in the token class on unix * Remove test comments * Warnings resolved * RemoveeSecurityTokenLibraryNotInitialized exception if at least one emv token is detected * Adding new files * Remove old files and add the new version to the windows project * Change make_shared to shared_ptr constructor * IccExtractor integration working on linux * Throwing card not EMV execption * catch error when not EMV type in EMVToken::GetAvailableKeyfiles * Change types to compile on windows * list all keyfiles, security keyfiles and emv keyfiles in command line * Change type to be coherent and remove old todo comments * Remove todo comments * Change indentation and resolve a bug from previous commit * Use polymorphism for GetKeyfileData and add export option for EMVTokens on Linux * Linux : Allow to export EMV Tokens in command lines, Windows : Disable the delete button when EMV Keyfiles are selected * Remove SlotId from TokenInfo as it is already in Token * Correct errors on Linux * Disable delete option if one EMV Token is selected on Linux * Fix bug enabling delete button if nothing is selected * emv data used as reference then burnt * use of normal files in linux corrected * help updated * help updated for export functionnality * option EMV added to graphic interface but not yet working * Bug fix : Allow to use multiple EMV on windows * EMV Option added to UserPreferences * EMV Option working for Linux * EMV option added to Windows (not working yet) * [NOT TESTED] EMV option for Windows * Working EMV option on Windows * EMV Option for data extraction working for volume creation * EMV Option for data extraction working for Mount * EMV Option for data extraction working for mounting favorites volumes * EMV Option for extraction working for Changing volume password, Set Derivation Key Algorithm and Add or remove keyfile from volume * Windows : re-checking EMV Option when getting data * Removing error catches in the IccDataExtractor classe (It only throws error now). Changing GetPan signature to resemble the other functions signatures more * Changing EMV errors - Only throwing ICCExtractionException from outside of the ICC module. - Catching all TLVExceptions and PCSCExceptions to throw the right ICCExtractionException - Deleting APDU exceptions. * First version of the documentation * Adding function pointers for winscard library (but it crashes VeraCrypt) * Debugging function pointers * The import of the library on windows work as expected now * Reverting EMVToken.cpp changes used to test to library import * Searching for the System32 path instead of hard codding it * Fixing the bug were VeraCrypt crashes if there is no readers when "add Token files" is clicked * Winscard library not initialized in object constructor anymore to delay it after EMVOption check * Remove winscard lib from windows dependencies * Properly displaying errors * Adding a dot in Language.xml * Catching TLVException * Removing unused code * Remove unusefull comments * Trying to fix 0x1f error * Update IccDataExtractor.cpp * Delete History.xml * Fix get data without get pan * Cleanup code * changes for linux compilation but linking not working * error handling for linux * erasing emv data * Burn PAN * Burn PAN from memory * Uncomment selfcheck before merging master * burn corrected * EMV errors handling for Linux * EMV working for Linux CLI * Doc : Winscard Linux package and VeraCrypt versions --------- Co-authored-by: doriandu45 <d45.poubelle@gmail.com> Co-authored-by: red4game <redemgaiming@gmail.com> Co-authored-by: Brice.Namy <brice.namy@insa-rennes.fr> Co-authored-by: vocthor <pieceo108@gmail.com> Co-authored-by: vocthor <67202139+vocthor@users.noreply.github.com> Co-authored-by: Andrei COCAN <andrei.cocan@insa-rennes.fr> Co-authored-by: AndreiCocan <95496161+AndreiCocan@users.noreply.github.com> Co-authored-by: francoisLEROUX <francois3443@gmail.com>
2020-06-11Switch from auto_ptr to unique_ptr (#638)Christopher Bergqvist1-1/+1
2019-11-04Linux/FreeBSD: Add CLI switch to force use of old sudo behavior of sending a ↵Mounir IDRASSI1-0/+3
dummy password The new switch is --use-dummy-sudo-password
2019-11-04Linux/MacOSX: Add switch to force the use of legacy maximum password length ↵Mounir IDRASSI1-2/+3
(64 UTF8 bytes) The switch is --legacy-password-maxlength
2019-10-02Linux/MacOSX:check that the requested size of file container is less than ↵Mounir IDRASSI1-0/+1
available disk free space. Add a CLI switch to disable this check.
2017-06-23Update IDRIX copyright yearMounir IDRASSI1-1/+1
2016-05-29Linux/MacOSX: Implement passing smart card PIN as command line argument ↵Mounir IDRASSI1-0/+1
(--token-pin switch)
2016-05-10Remove trailing whitespaceDavid Foerster1-2/+2
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2015-11-30Linux/MacOSX: Implement Unicode passwords suppport. Make validation of ↵Mounir IDRASSI1-0/+3
parameters in GUI more robust.
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-4/+8
and TrueCrypt 3.0.
2015-07-19Linux: Add "new-hash" switch for changing PRF and remove "current-hash" ↵Mounir IDRASSI1-1/+1
switch which didin't fit the change password/keyfile logic.
2015-06-24Linux/MacOSX: restore normal file mode to some source filesMounir IDRASSI1-0/+0
2015-06-24Linux/MacOSX: first dynamic mode implementationMounir IDRASSI1-0/+2
2015-03-08Linux/MacOSX: Load preferences if only volume path is given in command line ↵Mounir IDRASSI1-1/+1
and GUI mode enabled.
2014-12-30Linux/MacOSX: Implement TrueCrypt conversion and loading support. Correct ↵Mounir IDRASSI1-0/+1
many GTK issues linked to multi-threaded origine of events by implementing an automatic mechanism for handling such requests in the main thread.
2014-12-19Linux/MacOSX: Enhance performance by implementing the possibility to choose ↵Mounir IDRASSI1-0/+1
the correct hash algorithm of volumes during various operations (mount, change password...), both using the GUI and the command line.
2014-11-08Change namespace from TrueCrypt to VeraCrypt. Rename method from Resources ↵Mounir IDRASSI1-1/+1
Resources::GetTrueCryptIcon to Resources::GetVeraCryptIcon.
2014-11-08Add TrueCrypt 7.1a MacOSX/Linux specific source files.Mounir IDRASSI1-0/+94
pan> href="Disclaimers.html">Disclaimers</a>.</em></p> <ul> <li><a title="Preface" href="Preface.html"><strong>Preface</strong></a> </li><li><strong><a href="Introduction.html">Introduction</a></strong> </li><li><strong><a href="Beginner%27s%20Tutorial.html">Beginner's Tutorial</a></strong> </li><li><strong><a href="VeraCrypt%20Volume.html">VeraCrypt Volume</a></strong> <ul> <li><a href="Creating%20New%20Volumes.html">Creating a New VeraCrypt Volume</a> </li><li><a href="Favorite%20Volumes.html">Favorite Volumes</a> </li><li><a href="System%20Favorite%20Volumes.html">System Favorite Volumes</a> </li></ul> </li><li><strong><a href="System%20Encryption.html">System Encryption</a></strong> <ul> <li><a href="Hidden%20Operating%20System.html">Hidden Operating System</a> </li><li><a href="Supported%20Systems%20for%20System%20Encryption.html">Operating Systems Supported for System Encryption</a> </li><li><a href="VeraCrypt%20Rescue%20Disk.html">VeraCrypt Rescue Disk</a> </li></ul> </li><li><strong><a href="Plausible%20Deniability.html">Plausible Deniability</a></strong><br> <ul> <li><a href="Hidden%20Volume.html">Hidden Volume</a> <ul> <li><a href="Protection%20of%20Hidden%20Volumes.html">Protection of Hidden Volumes Against Damage</a> </li><li><a href="Security%20Requirements%20for%20Hidden%20Volumes.html">Security Requirements and Precautions Pertaining to Hidden Volumes</a> </li></ul> </li><li><a href="VeraCrypt%20Hidden%20Operating%20System.html">Hidden Operating System</a> </li></ul> </li><li><strong><a href="Main%20Program%20Window.html">Main Program Window</a></strong> <ul> <li><a href="Program%20Menu.html">Program Menu</a> </li><li><a href="Mounting%20VeraCrypt%20Volumes.html">Mounting Volumes</a> </li></ul> </li><li><strong><a href="Normal%20Dismount%20vs%20Force%20Dismount.html">Normal Dismount vs Force Dismount</a></strong> </li><li><strong><a href="Parallelization.html">Parallelization</a></strong> </li><li><strong><a href="Pipelining.html">Pipelining</a></strong> </li><li><strong><a href="Hardware%20Acceleration.html">Hardware acceleration</a></strong> </li><li><strong><a href="Hot%20Keys.html">Hot keys</a></strong> </li><li><strong><a href="Keyfiles%20in%20VeraCrypt.html">Keyfiles</a></strong> </li><li><strong><a href="Security%20Tokens%20%26%20Smart%20Cards.html">Security Tokens &amp; Smart Cards</a></strong> </li><li><strong><a href="EMV%20Smart%20Cards.html">EMV Smart Cards</a></strong> </li><li><strong><a href="Portable%20Mode.html">Portable Mode</a></strong> </li><li><strong><a href="TrueCrypt%20Support.html">TrueCrypt Support</a></strong> </li><li><strong><a href="Converting%20TrueCrypt%20volumes%20and%20partitions.html">Converting TrueCrypt Volumes &amp; Partitions</a></strong> </li><li><strong><a href="Default%20Mount%20Parameters.html">Default Mount Parameters</a></strong> </li><li><strong><a href="Language%20Packs.html">Language Packs</a></strong> </li><li><strong><a href="Encryption%20Algorithms.html">Encryption Algorithms</a></strong> <ul> <li><a href="AES.html">AES</a> </li><li><a href="Camellia.html">Camellia</a> </li><li><a href="Kuznyechik.html">Kuznyechik</a> </li><li><a href="Serpent.html">Serpent</a> </li><li><a href="Twofish.html">Twofish</a> </li><li><a href="Cascades.html">Cascades of ciphers</a> </li></ul> </li><li><strong><a href="Hash%20Algorithms.html">Hash Algorithms</a></strong> <ul> <li><a href="BLAKE2s-256.html">BLAKE2s-256</a> </li><li><a href="SHA-256.html">SHA-256</a> </li><li><a href="SHA-512.html">SHA-512</a> </li><li><a href="Whirlpool.html">Whirlpool</a> </li><li><a href="Streebog.html">Streebog</a></li></ul> </li><li><strong><a href="Supported%20Operating%20Systems.html">Supported Operating Systems</a></strong> </li><li><strong><a href="Command%20Line%20Usage.html">Command Line Usage</a></strong> </li><li><strong><a href="Security%20Model.html">Security Model</a></strong> </li><li><strong><a href="Security%20Requirements%20and%20Precautions.html">Security Requirements And Precautions<br> </a></strong> <ul> <li><a href="Data%20Leaks.html">Data Leaks</a> <ul> <li><a href="Paging%20File.html">Paging File</a> </li><li><a href="Memory%20Dump%20Files.html">Memory Dump Files</a> </li><li><a href="Hibernation%20File.html">Hibernation File</a> </li></ul> </li><li><a href="Unencrypted%20Data%20in%20RAM.html">Unencrypted Data in RAM</a> </li><li><a href="Physical%20Security.html">Physical Security</a> </li><li><a href="Malware.html">Malware</a> </li><li><a href="Multi-User%20Environment.html">Multi-User Environment</a> </li><li><a href="Authenticity%20and%20Integrity.html">Authenticity and Integrity</a> </li><li><a href="Choosing%20Passwords%20and%20Keyfiles.html">Choosing Passwords and Keyfiles</a> </li><li><a href="Changing%20Passwords%20and%20Keyfiles.html">Changing Passwords and Keyfiles</a> </li><li><a href="Trim%20Operation.html">Trim Operation</a> </li><li><a href="Wear-Leveling.html">Wear-Leveling</a> </li><li><a href="Reallocated%20Sectors.html">Reallocated Sectors</a> </li><li><a href="Defragmenting.html">Defragmenting</a> </li><li><a href="Journaling%20File%20Systems.html">Journaling File Systems</a> </li><li><a href="Volume%20Clones.html">Volume Clones</a> </li><li><a href="Additional%20Security%20Requirements%20and%20Precautions.html">Additional Security Requirements and Precautions</a> </li></ul> </li><li><strong><a href="How%20to%20Back%20Up%20Securely.html">How To Back Up Securely</a></strong> </li><li><strong><a href="Miscellaneous.html">Miscellaneous</a></strong> <ul> <li><a href="Using%20VeraCrypt%20Without%20Administrator%20Privileges.html">Using VeraCrypt Without Administrator Privileges</a> </li><li><a href="Sharing%20over%20Network.html">Sharing Over Network</a> </li><li><a href="VeraCrypt%20Background%20Task.html">VeraCrypt Background Task</a> </li><li><a href="Removable%20Medium%20Volume.html">Volume Mounted as Removable Medium</a> </li><li><a href="VeraCrypt%20System%20Files.html">VeraCrypt System Files &amp; Application Data</a> </li><li><a href="Removing%20Encryption.html">How To Remove Encryption</a> </li><li><a href="Uninstalling%20VeraCrypt.html">Uninstalling VeraCrypt</a> </li><li><a href="Digital%20Signatures.html">Digital Signatures</a> </li></ul> </li><li><strong><a href="Troubleshooting.html">Troubleshooting</a></strong> </li><li><strong><a href="Incompatibilities.html">Incompatibilities</a></strong> </li><li><strong><a href="Issues%20and%20Limitations.html">Known Issues and Limitations</a></strong> </li><li><strong><a href="FAQ.html">Frequently Asked Questions</a></strong> </li><li><strong><a href="Technical%20Details.html">Technical Details</a></strong> <ul> <li><a href="Notation.html">Notation</a> </li><li><a href="Encryption%20Scheme.html">Encryption Scheme</a> </li><li><a href="Modes%20of%20Operation.html">Modes of Operation</a> </li><li><a href="Header%20Key%20Derivation.html">Header Key Derivation, Salt, and Iteration Count</a> </li><li><a href="Random%20Number%20Generator.html">Random Number Generator</a> </li><li><a href="Keyfiles.html">Keyfiles</a> </li><li><a title="PIM" href="Personal%20Iterations%20Multiplier%20(PIM).html">PIM</a> </li><li><a href="VeraCrypt%20Volume%20Format%20Specification.html">VeraCrypt Volume Format Specification</a> </li><li><a href="Standard%20Compliance.html">Compliance with Standards and Specifications</a> </li><li><a href="Source%20Code.html">Source Code</a> </li><li><a href="CompilingGuidelines.html">Building VeraCrypt From Source</a> <ul> <li><a href="CompilingGuidelineWin.html">Windows Build Guide</a> </li><li><a href="CompilingGuidelineLinux.html">Linux Build Guide</a> </li></ul> </li></ul> </li><li><strong><a href="Contact.html">Contact</a></strong> </li><li><strong><a href="Legal%20Information.html">Legal Information</a></strong> </li><li><strong><a href="Release%20Notes.html">Version History</a></strong> </li><li><strong><a href="Acknowledgements.html">Acknowledgements</a></strong> </li><li><strong><a href="References.html">References</a></strong> </li></ul> </div> </body></html>