VeraCrypt
aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2014-11-08Windows vulnerability fix : clear sensitive data in Windows kernel driver by ↵Mounir IDRASSI1-1/+1
using burjn instead of memset
2014-11-08Windows vulnerability fix : avoid kernel pointer disclosure through a call ↵Mounir IDRASSI1-1/+3
to TC_IOCTL_GET_SYSTEM_DRIVE_DUMP_CONFIG but restricting this call to Kernel Mode.
2014-11-08Windows : Specify "IDRIX" in signtool for the subject of the code signing ↵Mounir IDRASSI1-5/+5
certificate.
2014-11-08Remove driver version test that is non application to VeraCrypt and that was ↵Mounir IDRASSI1-3/+0
wrongly inherited from TrueCrypt.
2014-11-08Correctly handle dialogs from previous versions that used 'TRUE' instead of ↵Mounir IDRASSI2-3/+6
'VERA' as a value for GWLP_USERDATA.
2014-11-08Windows : correct bug in construction of Format.exe path that prevented the ↵Mounir IDRASSI1-1/+1
new volume wizard to launch.
2014-11-08MacOSX : Update Main Makefile to used the new package name that include the ↵VeraCrypt_MacOSX_1.0dMounir IDRASSI1-1/+1
version.
2014-11-08MacOSX : Add detection of MacFUSE compatibility layer in installer. Change ↵Mounir IDRASSI1-3/+50
package name to include version in order to avoid specifying manually the title of the installer window.
2014-11-08MacOSX : Correct typos in Main MakefileMounir IDRASSI1-3/+3
2014-11-08MacOSX : change OSXFuse error message to indicate the MacFUSE compatibility ↵Mounir IDRASSI1-1/+1
layer is needed.
2014-11-08MacOSX : modify Makefile to automatically build and sign the MacOSX ↵Mounir IDRASSI1-1/+3
installer for VeraCrypt.
2014-11-08MacOSX : add Packages project that creates the MacOSX installer for VeraCryptMounir IDRASSI1-0/+1018
2014-11-08MacOSX : Since we link directly with OSXFuse, change error message to ↵Mounir IDRASSI1-1/+1
indicate that OSXFuse 2.3+ is needed.
2014-11-08MacOSX : Copy console version of VeraCrypt inside the bundle under the name ↵Mounir IDRASSI1-0/+11
veracrypt_console.
2014-11-08MacOSX : Update Fuse error message to display OSXFUSE requirement alongside ↵Mounir IDRASSI1-1/+1
MacFuse.
2014-11-08MacOSX : Support detection of OSXFUSE and the presence of MacFUSE ↵Mounir IDRASSI1-3/+29
compatibility layer.
2014-11-08MacOSX : copy the help pdf into the VeraCrypt bundle during package creationMounir IDRASSI1-0/+1
2014-11-08MacOSX : correct the name of dmg file used by the rm commandMounir IDRASSI1-1/+1
2014-11-08MacOSX : correct compilation issue caused by system API deprication and use ↵Mounir IDRASSI2-11/+5
of new wxWidgets.
2014-11-08MacOSX : Correct issue of compiling assembly files in both 32-bit and 64-bit ↵Mounir IDRASSI4-24/+54
mode. Modify Makefiles to correct compilation process using latest Xcode.
2014-11-08MacOSX : add icns file to be used by VeraCrypt bundleMounir IDRASSI1-0/+0
2014-11-08MacOSX : add nasm binary to be used instead of the native one because of the ↵Mounir IDRASSI1-0/+0
limitations of the version shipped by Apple
2014-11-08Linux GUI : hide the wipe choice during volume creation. Remove extra ↵Mounir IDRASSI3-3/+5
content from wipe choice list.
2014-11-08Correct message in Linux VeraCrypt installer to replace ↵Mounir IDRASSI1-1/+1
truecrypt-uninstall.sh by veracrypt-uninstall.sh
2014-11-08Correct compilation error under Linux introduced in latest commitMounir IDRASSI1-1/+1
2014-11-08Linux/MacOSX port of manual selection of number of passes for volume header ↵Mounir IDRASSI8-11/+217
over-write operation.
2014-11-08Add description string for the new wipe mode WIPE_MODE_256 in language files.Mounir IDRASSI38-6/+42
2014-11-08Add option in select the number of passes for volume header over-writing. By ↵Mounir IDRASSI16-35/+67
default, it is set to 3 but it can be increased to 256 passes (which can lead to a delay of many hours for a single password change operation).
2014-11-08Lower number of times we overwrite volume header during the encryption of a ↵Mounir IDRASSI2-4/+7
partition if the user choose to wipe the driver. Latest studies show that even one pass is enough to make data irretrievable. A value of 3 is a conservative approach that enhance performance without scarifying security. http://www.infosecisland.com/blogview/16130-The-Urban-Legend-of-Multipass-Hard-Disk-Overwrite.html http://digital-forensics.sans.org/blog/2009/01/15/overwriting-hard-drive-data/
2014-11-08Correct Linux compilation after removing legacy cryptographic code.Mounir IDRASSI2-3/+1
2014-11-08Remove remaining legacy cryptographic algorithms that are never used by ↵Mounir IDRASSI26-1012/+1
VeraCrypt.
2014-11-08Remove deprecated/legacy cryptographic algorithms and encryption modes that ↵Mounir IDRASSI21-3979/+21
are never used by VeraCrypt. This will speed up volumes opening in many cases.
2014-11-08Mount.c : call burn directly in szFileName instead of (&szFileName). This ↵Mounir IDRASSI1-1/+1
was not an issue because the compiler returns the same address for both, but for the sake of clarity it had to be corrected.
2014-11-08Static Code Analysis : Generalize the use of Safe String functions. Add some ↵Mounir IDRASSI15-395/+490
NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL.
2014-11-08Static Code Analysis : Use Safe String function in Dlgcode.c. Add byte size ↵Mounir IDRASSI2-274/+340
parameter in various functions to help implement secure handling of strings.
2014-11-08Static Code Analysis : Add various NULL pointers checksMounir IDRASSI4-21/+39
2014-11-08Static Code Analysis : Add NULL pointers checks on the result of ATL string ↵Mounir IDRASSI2-10/+24
conversion. Avoid some conversions by using UNICODE functions directly.
2014-11-08Use Safe String functions in Registry.c and add a unicode version of ↵Mounir IDRASSI2-5/+31
WriteLocalMachineRegistryDword function to avoid doing conversions when used.
2014-11-08Static Code Analysis : Use Safe String functions in Setup code to avoid ↵Mounir IDRASSI3-105/+108
potential security issues.
2014-11-08Static Code Analysis : Add check on the return of strtok inside ↵Mounir IDRASSI1-5/+8
mkfulldir_internal to avoid warning.
2014-11-08Static Code Analysis: Correctly initialize variables to avoid false-positive ↵Mounir IDRASSI2-3/+3
detection in the boot code.
2014-11-08Static Code Analysis : Use Safe string functions inside VeraCrypt Device ↵Mounir IDRASSI4-38/+62
Driver to avoid potential security issues. Add many checks for NULL pointers to handle low memory use cases.
2014-11-08Remove test inherited from TrueCrypt because it's always true since we ↵Mounir IDRASSI1-1/+1
inherited from version 0x71a
2014-11-08Disable posting the results of minidump analysis until a dedicated URL is ↵Mounir IDRASSI1-1/+3
put in place.
2014-11-08Disable crash handling until we put in place a dedicated URL for posting ↵Mounir IDRASSI1-14/+14
crash information.
2014-11-08Remove unused label.Mounir IDRASSI1-1/+0
2014-11-08Static Code Analysis : Correctly initialize member variable in HostDevice ↵Mounir IDRASSI1-1/+2
constructor
2014-11-08Static Code Analysis : Avoid using invalidate integer value received from ↵Mounir IDRASSI1-1/+5
GetFileSize.
2014-11-08Static Code Analysis : fix usage of strncpy and sscanf.Mounir IDRASSI3-8/+8
2014-11-08Static Code Analysis : fix various memory leaks.Mounir IDRASSI4-4/+16