Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2014-11-08 | Increment version to 1.0e for the next release | Mounir IDRASSI | 6 | -21/+21 | |
2014-11-08 | Include language xml files in the setup | Mounir IDRASSI | 2 | -2/+80 | |
2014-11-08 | Windows vulnerability fix: correct some integer overflow issues using the ↵ | Mounir IDRASSI | 2 | -6/+40 | |
IntSafe library. Detected by the Open Crypto Audit project | |||||
2014-11-08 | Windows vulnerability fix: correct checking device name to avoid possible ↵ | Mounir IDRASSI | 1 | -1/+17 | |
bypass attack detected by the Open Crypto Audit project | |||||
2014-11-08 | Windows vulnerability fix: correct possible BSOD attack targeted towards ↵ | Mounir IDRASSI | 5 | -10/+42 | |
GetWipePassCount() / WipeBuffer() found by the Open Crypto Audit Project. | |||||
2014-11-08 | Revert previous modification on boad-loader decompressor because it ↵ | Mounir IDRASSI | 3 | -54/+18 | |
increased its size and it became impossible to include it with the SERPENT version of bootloader. The decompressor and the compressed bootloader are copied twice (original and backup) in the 63 first sectors of the hard drive (32K), thus the size limitation. This reverts commit 154235d589222e3c31cda05aa53e73ab69a89a6e. | |||||
2014-11-08 | Windows vulnerability fix : make boot-loader decompressor more robust and ↵ | Mounir IDRASSI | 3 | -18/+54 | |
secure by adding multiple checks and validation code. Note that we had to switch to the slow implementation of the function decode in order to keep the size of the decompressor code under 2K. | |||||
2014-11-08 | Windows vulnerability fix : clear sensitive data in Windows kernel driver by ↵ | Mounir IDRASSI | 1 | -1/+1 | |
using burjn instead of memset | |||||
2014-11-08 | Windows vulnerability fix : avoid kernel pointer disclosure through a call ↵ | Mounir IDRASSI | 1 | -1/+3 | |
to TC_IOCTL_GET_SYSTEM_DRIVE_DUMP_CONFIG but restricting this call to Kernel Mode. | |||||
2014-11-08 | Windows : Specify "IDRIX" in signtool for the subject of the code signing ↵ | Mounir IDRASSI | 1 | -5/+5 | |
certificate. | |||||
2014-11-08 | Remove driver version test that is non application to VeraCrypt and that was ↵ | Mounir IDRASSI | 1 | -3/+0 | |
wrongly inherited from TrueCrypt. | |||||
2014-11-08 | Correctly handle dialogs from previous versions that used 'TRUE' instead of ↵ | Mounir IDRASSI | 2 | -3/+6 | |
'VERA' as a value for GWLP_USERDATA. | |||||
2014-11-08 | Windows : correct bug in construction of Format.exe path that prevented the ↵ | Mounir IDRASSI | 1 | -1/+1 | |
new volume wizard to launch. | |||||
2014-11-08 | MacOSX : Update Main Makefile to used the new package name that include the ↵VeraCrypt_MacOSX_1.0d | Mounir IDRASSI | 1 | -1/+1 | |
version. | |||||
2014-11-08 | MacOSX : Add detection of MacFUSE compatibility layer in installer. Change ↵ | Mounir IDRASSI | 1 | -3/+50 | |
package name to include version in order to avoid specifying manually the title of the installer window. | |||||
2014-11-08 | MacOSX : Correct typos in Main Makefile | Mounir IDRASSI | 1 | -3/+3 | |
2014-11-08 | MacOSX : change OSXFuse error message to indicate the MacFUSE compatibility ↵ | Mounir IDRASSI | 1 | -1/+1 | |
layer is needed. | |||||
2014-11-08 | MacOSX : modify Makefile to automatically build and sign the MacOSX ↵ | Mounir IDRASSI | 1 | -1/+3 | |
installer for VeraCrypt. | |||||
2014-11-08 | MacOSX : add Packages project that creates the MacOSX installer for VeraCrypt | Mounir IDRASSI | 1 | -0/+1018 | |
2014-11-08 | MacOSX : Since we link directly with OSXFuse, change error message to ↵ | Mounir IDRASSI | 1 | -1/+1 | |
indicate that OSXFuse 2.3+ is needed. | |||||
2014-11-08 | MacOSX : Copy console version of VeraCrypt inside the bundle under the name ↵ | Mounir IDRASSI | 1 | -0/+11 | |
veracrypt_console. | |||||
2014-11-08 | MacOSX : Update Fuse error message to display OSXFUSE requirement alongside ↵ | Mounir IDRASSI | 1 | -1/+1 | |
MacFuse. | |||||
2014-11-08 | MacOSX : Support detection of OSXFUSE and the presence of MacFUSE ↵ | Mounir IDRASSI | 1 | -3/+29 | |
compatibility layer. | |||||
2014-11-08 | MacOSX : copy the help pdf into the VeraCrypt bundle during package creation | Mounir IDRASSI | 1 | -0/+1 | |
2014-11-08 | MacOSX : correct the name of dmg file used by the rm command | Mounir IDRASSI | 1 | -1/+1 | |
2014-11-08 | MacOSX : correct compilation issue caused by system API deprication and use ↵ | Mounir IDRASSI | 2 | -11/+5 | |
of new wxWidgets. | |||||
2014-11-08 | MacOSX : Correct issue of compiling assembly files in both 32-bit and 64-bit ↵ | Mounir IDRASSI | 4 | -24/+54 | |
mode. Modify Makefiles to correct compilation process using latest Xcode. | |||||
2014-11-08 | MacOSX : add icns file to be used by VeraCrypt bundle | Mounir IDRASSI | 1 | -0/+0 | |
2014-11-08 | MacOSX : add nasm binary to be used instead of the native one because of the ↵ | Mounir IDRASSI | 1 | -0/+0 | |
limitations of the version shipped by Apple | |||||
2014-11-08 | Linux GUI : hide the wipe choice during volume creation. Remove extra ↵ | Mounir IDRASSI | 3 | -3/+5 | |
content from wipe choice list. | |||||
2014-11-08 | Correct message in Linux VeraCrypt installer to replace ↵ | Mounir IDRASSI | 1 | -1/+1 | |
truecrypt-uninstall.sh by veracrypt-uninstall.sh | |||||
2014-11-08 | Correct compilation error under Linux introduced in latest commit | Mounir IDRASSI | 1 | -1/+1 | |
2014-11-08 | Linux/MacOSX port of manual selection of number of passes for volume header ↵ | Mounir IDRASSI | 8 | -11/+217 | |
over-write operation. | |||||
2014-11-08 | Add description string for the new wipe mode WIPE_MODE_256 in language files. | Mounir IDRASSI | 1 | -0/+1 | |
2014-11-08 | Add option in select the number of passes for volume header over-writing. By ↵ | Mounir IDRASSI | 16 | -35/+67 | |
default, it is set to 3 but it can be increased to 256 passes (which can lead to a delay of many hours for a single password change operation). | |||||
2014-11-08 | Lower number of times we overwrite volume header during the encryption of a ↵ | Mounir IDRASSI | 2 | -4/+7 | |
partition if the user choose to wipe the driver. Latest studies show that even one pass is enough to make data irretrievable. A value of 3 is a conservative approach that enhance performance without scarifying security. http://www.infosecisland.com/blogview/16130-The-Urban-Legend-of-Multipass-Hard-Disk-Overwrite.html http://digital-forensics.sans.org/blog/2009/01/15/overwriting-hard-drive-data/ | |||||
2014-11-08 | Correct Linux compilation after removing legacy cryptographic code. | Mounir IDRASSI | 2 | -3/+1 | |
2014-11-08 | Remove remaining legacy cryptographic algorithms that are never used by ↵ | Mounir IDRASSI | 26 | -1012/+1 | |
VeraCrypt. | |||||
2014-11-08 | Remove deprecated/legacy cryptographic algorithms and encryption modes that ↵ | Mounir IDRASSI | 21 | -3979/+21 | |
are never used by VeraCrypt. This will speed up volumes opening in many cases. | |||||
2014-11-08 | Mount.c : call burn directly in szFileName instead of (&szFileName). This ↵ | Mounir IDRASSI | 1 | -1/+1 | |
was not an issue because the compiler returns the same address for both, but for the sake of clarity it had to be corrected. | |||||
2014-11-08 | Static Code Analysis : Generalize the use of Safe String functions. Add some ↵ | Mounir IDRASSI | 15 | -395/+490 | |
NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL. | |||||
2014-11-08 | Static Code Analysis : Use Safe String function in Dlgcode.c. Add byte size ↵ | Mounir IDRASSI | 2 | -274/+340 | |
parameter in various functions to help implement secure handling of strings. | |||||
2014-11-08 | Static Code Analysis : Add various NULL pointers checks | Mounir IDRASSI | 4 | -21/+39 | |
2014-11-08 | Static Code Analysis : Add NULL pointers checks on the result of ATL string ↵ | Mounir IDRASSI | 2 | -10/+24 | |
conversion. Avoid some conversions by using UNICODE functions directly. | |||||
2014-11-08 | Use Safe String functions in Registry.c and add a unicode version of ↵ | Mounir IDRASSI | 2 | -5/+31 | |
WriteLocalMachineRegistryDword function to avoid doing conversions when used. | |||||
2014-11-08 | Static Code Analysis : Use Safe String functions in Setup code to avoid ↵ | Mounir IDRASSI | 3 | -105/+108 | |
potential security issues. | |||||
2014-11-08 | Static Code Analysis : Add check on the return of strtok inside ↵ | Mounir IDRASSI | 1 | -5/+8 | |
mkfulldir_internal to avoid warning. | |||||
2014-11-08 | Static Code Analysis: Correctly initialize variables to avoid false-positive ↵ | Mounir IDRASSI | 2 | -3/+3 | |
detection in the boot code. | |||||
2014-11-08 | Static Code Analysis : Use Safe string functions inside VeraCrypt Device ↵ | Mounir IDRASSI | 4 | -38/+62 | |
Driver to avoid potential security issues. Add many checks for NULL pointers to handle low memory use cases. | |||||
2014-11-08 | Remove test inherited from TrueCrypt because it's always true since we ↵ | Mounir IDRASSI | 1 | -1/+1 | |
inherited from version 0x71a |