VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common
AgeCommit message (Collapse)AuthorFilesLines
2014-11-08Add support for SHA-256 in key derivation for bootloader encryption. Create ↵Mounir IDRASSI5-25/+234
separate bootloader images for SHA-256 and RIPEMD-160. Set SHA-256 as the default PRF for boot encryption and SHA-512 as default PRF for all other cases. Depricate RIPEMD-160.
2014-11-08Optimization to reduce code size of derive_u_ripemd160. Useful for boatloader.Mounir IDRASSI1-25/+20
2014-11-08Optimize code space and solve the Serpent issue ↵Mounir IDRASSI1-4/+4
(https://sourceforge.net/p/veracrypt/discussion/technical/thread/fb09633a/#6406) by removing key length parameter from serpent_set_key and twofish_set_key
2014-11-08Call RegCloseKey only if handle is valid.Mounir IDRASSI1-1/+2
2014-11-08Use absolute path in ShellExecute call that was missed when the security fix ↵Mounir IDRASSI1-1/+1
for Microsoft Security Advisory 2269637 was implemented.
2014-11-08Adapt certain functions in the case of Windows bootloader in order to make ↵Mounir IDRASSI2-5/+42
its size as small as possible.
2014-11-08Increment version to 1.0e for the next releaseMounir IDRASSI1-4/+4
2014-11-08Windows vulnerability fix: correct possible BSOD attack targeted towards ↵Mounir IDRASSI3-6/+16
GetWipePassCount() / WipeBuffer() found by the Open Crypto Audit Project.
2014-11-08Remove driver version test that is non application to VeraCrypt and that was ↵Mounir IDRASSI1-3/+0
wrongly inherited from TrueCrypt.
2014-11-08Correctly handle dialogs from previous versions that used 'TRUE' instead of ↵Mounir IDRASSI1-2/+4
'VERA' as a value for GWLP_USERDATA.
2014-11-08Add description string for the new wipe mode WIPE_MODE_256 in language files.Mounir IDRASSI1-0/+1
2014-11-08Add option in select the number of passes for volume header over-writing. By ↵Mounir IDRASSI8-17/+31
default, it is set to 3 but it can be increased to 256 passes (which can lead to a delay of many hours for a single password change operation).
2014-11-08Lower number of times we overwrite volume header during the encryption of a ↵Mounir IDRASSI1-0/+3
partition if the user choose to wipe the driver. Latest studies show that even one pass is enough to make data irretrievable. A value of 3 is a conservative approach that enhance performance without scarifying security. http://www.infosecisland.com/blogview/16130-The-Urban-Legend-of-Multipass-Hard-Disk-Overwrite.html http://digital-forensics.sans.org/blog/2009/01/15/overwriting-hard-drive-data/
2014-11-08Remove remaining legacy cryptographic algorithms that are never used by ↵Mounir IDRASSI4-17/+0
VeraCrypt.
2014-11-08Remove deprecated/legacy cryptographic algorithms and encryption modes that ↵Mounir IDRASSI10-1942/+16
are never used by VeraCrypt. This will speed up volumes opening in many cases.
2014-11-08Static Code Analysis : Generalize the use of Safe String functions. Add some ↵Mounir IDRASSI9-106/+165
NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL.
2014-11-08Static Code Analysis : Use Safe String function in Dlgcode.c. Add byte size ↵Mounir IDRASSI2-274/+340
parameter in various functions to help implement secure handling of strings.
2014-11-08Static Code Analysis : Add various NULL pointers checksMounir IDRASSI4-21/+39
2014-11-08Static Code Analysis : Add NULL pointers checks on the result of ATL string ↵Mounir IDRASSI1-7/+9
conversion. Avoid some conversions by using UNICODE functions directly.
2014-11-08Use Safe String functions in Registry.c and add a unicode version of ↵Mounir IDRASSI2-5/+31
WriteLocalMachineRegistryDword function to avoid doing conversions when used.
2014-11-08Disable crash handling until we put in place a dedicated URL for posting ↵Mounir IDRASSI1-14/+14
crash information.
2014-11-08Static Code Analysis : Correctly initialize member variable in HostDevice ↵Mounir IDRASSI1-1/+2
constructor
2014-11-08Static Code Analysis : Avoid using invalidate integer value received from ↵Mounir IDRASSI1-1/+5
GetFileSize.
2014-11-08Static Code Analysis : fix usage of strncpy and sscanf.Mounir IDRASSI1-1/+1
2014-11-08Static Code Analysis : fix various memory leaks.Mounir IDRASSI2-0/+6
2014-11-08Static Code Analysis : fix resource leakage by ensuring that all Windows ↵Mounir IDRASSI1-8/+20
handles are released properly
2014-11-08Static Code Analysis : Avoid potential overflow when parsing language file ↵Mounir IDRASSI1-1/+1
by specifying width for 's' conversion specifier
2014-11-08Static Code Analysis : fix non-absolute DLL/process loads that can be ↵Mounir IDRASSI4-10/+58
hijacked (Microsoft Security Advisory 2269637).
2014-11-08Static Code Analysis : Correctly initialize member variables in various ↵Mounir IDRASSI4-6/+14
constructors
2014-11-08Change namespace from TrueCrypt to VeraCrypt. Rename method from Resources ↵Mounir IDRASSI8-8/+8
Resources::GetTrueCryptIcon to Resources::GetVeraCryptIcon.
2014-11-08Point to the SourceForge website instead of idrix.fr for the application ↵Mounir IDRASSI1-2/+2
link. Remove OS parameter is URL constructed under Linux/MacOSX
2014-11-08Replace 'TRUE' by 'VERA' in some GUI constants and commentsMounir IDRASSI2-8/+8
2014-11-08Increment VeraCrypt version to 1.0dVeraCrypt_1.0dMounir IDRASSI1-5/+5
2014-11-08Correct issue in handling hidden system partitions that made it impossible ↵Mounir IDRASSI2-8/+21
to verify their password.
2014-11-08Use calloc directly instead of combining malloc and ZeroMemoryMounir IDRASSI1-8/+3
2014-11-08Correct minor bug in ReadRegistryString functionMounir IDRASSI1-1/+2
2014-11-08Increment VeraCrypt version to 1.0cVeraCrypt_1.0cMounir IDRASSI1-4/+4
2014-11-08Set correctly the minimum required version in volumes header (this value ↵Mounir IDRASSI1-2/+2
must always follow the current program version). This solves also the hidden volume issue.
2014-11-08Increment VeraCrypt version to 1.0bVeraCrypt_1.0bMounir IDRASSI1-3/+3
2014-11-08Only position legacy flag if the first release of VeraCrypt is detectedMounir IDRASSI1-1/+1
2014-11-08Reduce excessive iterations count while on the same time keep very high securityMounir IDRASSI1-4/+4
2014-11-08Concert bitmaps to supported formatMounir IDRASSI3-0/+0
2014-11-08Change the required version in volume header to the one of VeraCrypt (now 1.0)Mounir IDRASSI2-20/+3
2014-11-08Restore correct bitmapsMounir IDRASSI2-0/+0
2014-11-08Comment unused variablesMounir IDRASSI1-2/+2
2014-11-08Correct missing " in defineMounir IDRASSI1-2/+2
2014-11-08Enhance security by rising the iterations used in PBKDF2 : 327670 instead of ↵Mounir IDRASSI6-25/+32
1000 when booting in encrypted system partition, and 2000000 instead of 2000 when using encrypted containers and partitions
2014-11-08Modifications to remove all TrueCrypt references in names. generate new ↵Mounir IDRASSI14-440/+435
GUIDs for VeraCrypt. Replace "TRUE" by "VERA" in volume headers and driver magic word.
2014-11-08Modify all graphicsMounir IDRASSI5-0/+0
2014-11-08Rename bitmap and icon file to remove TrueCrypt referenceMounir IDRASSI3-0/+0