VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)AuthorFilesLines
2023-10-10Windows: Fix writing wrong EFI configuration options to registryMounir IDRASSI1-1/+1
2023-10-08Windows: Fix expansion of volumes on devices with sector size!=512 (by skl0n6)Mounir IDRASSI1-2/+8
2023-10-08Fix warnings and throwing an exception instead of ignoring the error (#1229)kovalev03-7/+3
* EMVCard.cpp: ArrayToHexWideString: prohibit conversion of a string constant ../Common/EMVCard.cpp: In function 'std::wstring VeraCrypt::ArrayToHexWideString(con st unsigned char*, size_t)': ../Common/EMVCard.cpp:28:43: warning: ISO C++ forbids converting a string constant to 'wchar_t*' [-Wwrite-strings] 28 | static wchar_t* hexChar = L"0123456789ABCDEF"; | ^~~~~~~~~~~~~~~~~~~ Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> * EMVCard.cpp: ArrayToHexWideString: fix of the comparison of different types ../Common/EMVCard.cpp: In function 'std::wstring VeraCrypt::ArrayToHexWideString(con st unsigned char*, size_t)': ../Common/EMVCard.cpp:32:43: warning: comparison of integer expressions of different signedness: 'int' and 'size_t' {aka 'long unsigned int'} [-Wsign-compare] 32 | for (int i = 0; i < cbData; i++) | ~~^~~~~~~~ Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> * SecurityTokenKeyfilesDialog.cpp: removed initialization of an unused variable Forms/SecurityTokenKeyfilesDialog.cpp:58:24: warning: unused variable 'i' [-Wunused- variable] 58 | size_t i = 0; | ^ Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> * Core/Unix: throwing an exception instead of ignoring the error Fixes: 5a6b445f ("fix warnings and UB (#1164)") Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> --------- Signed-off-by: Vasiliy Kovalev <kovalev@altlinux.org> Co-authored-by: Vasiliy Kovalev <kovalev@altlinux.org>
2023-10-08Windows: Modified implementation for Secure Desktop handling to overcome ↵Mounir IDRASSI1-54/+82
Windows 11 issues We use only alphanumeric characters for the name in addition to the '_' character We ensure the random desktop name doesn't already exist We create the random desktop on the Secure Desktop thread and we look over SwitchDesktop until it works. We call SetThreadDesktop (hOriginalDesk) in main thread once we finish
2023-10-06Harmonize copyright date and statements across various filesMounir IDRASSI3-10/+132
2023-10-05Update various copyright datesMounir IDRASSI4-15/+15
2023-10-05fix for corrupted icons (#1226)sardanap1-1/+1
2023-10-02Linux: Fix compilation error on some 32-bit machines.Mounir IDRASSI1-2/+5
2023-10-01MacOS: Fix Blake2s SSE 4.1 not being builtVeraCrypt_1.26.7Mounir IDRASSI1-0/+6
For now, we set GCC_GTEQ_430 to 1 to each OS. Later we will always suppose that gcc is newer than 4.3 and remove this logic.
2023-10-01MacOS: set minimum target to OSX 12. Fix About menu not working.Mounir IDRASSI3-9/+23
The modification to Forms.cpp is temporary until we find a better approach
2023-10-01Linux: use "-std=c++11" for gcc 4.8 and adapt code to old compilersMounir IDRASSI4-8/+8
2023-10-01Linux: Better detection of gcc version to correctly enable c++11Mounir IDRASSI1-8/+15
This allows to build correctly under CentOS 6 and CentOS 7
2023-09-30Windows: Update MBR bootloader for version 1.26.7Mounir IDRASSI20-0/+0
2023-09-30Increment version to 1.26.7. Set release date to October 1st. Update Windows ↵Mounir IDRASSI25-52/+52
signed driver files.
2023-09-29Windows: enhancement to RAM encryptionMounir IDRASSI1-17/+55
- use a more standard-looking memory value tag instead of fully random one that will look suspicious and outstanding - If we fail to allocate 1MiB for derivation area, we device the size by two in a loop until we succeed. This is better than falling back directly to 8KiB size - Better method to derive actual encryption key: instead of simply duplicating 128bit key value, we combine a xor addition and self-encryption to build a 256-bit key - use both encID and pbKeyDerivationArea to derive IV for encryption and not only endID
2023-09-29Windows Driver: Use KeQueryInterruptTimePrecise on Windows 8.1 and newer as ↵Mounir IDRASSI2-2/+24
better seed for internal RNG compared to KeQueryInterruptTime
2023-09-26Windows: during Setup, and if VeraCrypt already installed, open online help ↵Mounir IDRASSI2-3/+40
only if PC connected to Internet
2023-09-24Windows: make Setup correctly manage option to disable memory protection ↵Mounir IDRASSI3-2/+8
during upgrade
2023-09-24Libzip 1.10.1 (#1209)DLL12518-32/+87
Updated to the latest version for the VeraCrypt 1.26.6 release.
2023-09-24Windows: always open online help in case of Setup because local help may be ↵Mounir IDRASSI2-1/+7
outdated
2023-09-24Windows: Add tooltip message and help button for new option to disable ↵Mounir IDRASSI9-8/+187
memory protection Also a dedicated page in the documentation was added for it.
2023-09-22Linux/MacOSX: Increment packaging version to 1.26.6Mounir IDRASSI5-8/+8
2023-09-21Windows: Load Riched20.dll to use RichEdit control. Use InitCommonControlsEx ↵VeraCrypt_1.26.6Mounir IDRASSI1-2/+7
instead of InitCommonControls
2023-09-21Update Release Notes. Increment version to 1.26.6.Mounir IDRASSI32-39/+39
2023-09-21Windows: use separate name for SetProcessMitigationPolicy function point. ↵Mounir IDRASSI1-11/+5
Remove unneeded boolean
2023-09-20Windows: Add setting in main UI and setup wizard to disable memory protectionMounir IDRASSI10-20/+69
This can be useful for users who need Accessibility software that may not work when memory protection is active in VeraCrypt
2023-09-18Windows Security: make memory protection enabled by default. Add process ↵Mounir IDRASSI7-6/+139
mitigation (ASLR, Dynamic code, extension points) Memory protection can be disabled using registry value "VeraCryptEnableMemoryProtection" under the key "HKLM\SYSTEM\CurrentControlSet\Services\veracrypt"
2023-09-18Windows: use same manifest structure for Expander as in Mount and FormatMounir IDRASSI1-9/+9
2023-09-15Update Language.xml (#1199)TigerxWood1-1/+1
Corrected small typo
2023-09-11Windows: replace CoInitialize calls with CoInitializeExMounir IDRASSI6-15/+15
2023-09-10Windows: Indicate in manifest files that support starts from Windows 7Mounir IDRASSI5-4/+45
2023-09-08Linux/macOS: simplify logic of handling /dev/random reading failure ↵Mounir IDRASSI2-16/+11
(proposed by @Lavode in #1187) Fixes #1187
2023-09-08Windows: Add link in keyfiles dialog to documentation page for risks of ↵Mounir IDRASSI5-10/+33
third-party file extensions usage.
2023-09-08Update Language.xml (#1192)TigerxWood1-1/+1
Corected a typo
2023-09-06Windows: remove recommendation of keyfiles files extensions and update ↵Mounir IDRASSI2-1/+14
documentation to mention risks of third-party file extensions. This commit also adds red color to the warning text about keyfiles in keyfiles dialogs.
2023-09-03Windows: Replace legacy file/dir selection APIs with modern IFileDialog ↵Mounir IDRASSI7-201/+275
interface We remove usage of GetOpenFileNameW/GetSaveFileNameW/SHBrowseForFolderW which are deprecated by Microsoft
2023-09-03Windows: remove legacy code (XP, Vista). Simplify code since Windows 7 is ↵Mounir IDRASSI7-317/+130
now minimal OS version.
2023-09-03Windows: simpler and more robust safe dll loading combined with delay ↵Mounir IDRASSI15-968/+164
loading thanks to Windows 7 being minimum supported version. We also block execution on Windows versions older than Windows 7. A lot of code was removed thanks to this.
2023-09-02Linux/macOS: preserve unknown entries in configuration fileMounir IDRASSI2-10/+28
This helps to preserve unknown entries that may be used by future versions of VeraCrypt (forward compatibility) or entries used by old versions that were removed from current version (backward compatibility)
2023-08-21Allow cross compilation. (#1182)Unit 1933-5/+6
2023-08-20Windows: Set minimum build target to Windows 7Mounir IDRASSI1-1/+1
2023-08-20Windows: delay load bcrypt.dll to reduce startup dependency loading until ↵Mounir IDRASSI9-62/+62
setting safe dll loading
2023-08-20Update zlib to latest (#1181)DLL12523-1485/+918
* Update zlib to latest * Update copyright Updated copyright of zlib.
2023-08-19Linux: try use IOCTL BLKGETSIZE64 to get size of device instead of lseekMounir IDRASSI1-0/+11
2023-08-19Linux: Fix wrong max size for hidden volume in CLI direct mode creationMounir IDRASSI1-8/+15
There was a logical bug that made the code check the filesystem size of the device path "/dev" instead of using the actual size of the device Fix #1180
2023-08-15Windows: Update MBR bootloader files to 1.26.5 buildMounir IDRASSI20-0/+0
2023-08-15Update Release Notes and set date of 1.26.5 to August 15thMounir IDRASSI1-1/+1
2023-08-14Increment version to 1.26.5. Update signed Windows drivers.Mounir IDRASSI23-45/+45
2023-08-13Windows: Implement support for mounting partially encrypted system partitionsMounir IDRASSI7-5/+34
For now, we force ReadOnly mounting for such partitions.
2023-08-13Windows: Better way to enable required privileges for FastCreate OptionsMounir IDRASSI10-8/+183
If we can set required privilege, we ask the user using UAC to enable them.