VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/ExpandVolume/WinMain.cpp
AgeCommit message (Collapse)AuthorFilesLines
2023-09-18Windows Security: make memory protection enabled by default. Add process ↵Mounir IDRASSI1-1/+1
mitigation (ASLR, Dynamic code, extension points) Memory protection can be disabled using registry value "VeraCryptEnableMemoryProtection" under the key "HKLM\SYSTEM\CurrentControlSet\Services\veracrypt"
2023-09-03Windows: Replace legacy file/dir selection APIs with modern IFileDialog ↵Mounir IDRASSI1-1/+1
interface We remove usage of GetOpenFileNameW/GetSaveFileNameW/SHBrowseForFolderW which are deprecated by Microsoft
2023-07-22Windows: Remove TrueCrypt support. Increment version to 1.26.4.Mounir IDRASSI1-34/+3
2023-06-30Windows: Support drag-n-drop of files in Expander for mounting. Fix ↵Mounir IDRASSI1-24/+12
drag-n-drop of keyfiles. To fix drag-n-drop of keyfiles, we remove the password drop target since it was blocking the standard drop of files and drop target doesn't work because of UIPI restrictions across privilege levels since Expander is started elevated
2023-06-29EMV keyfile support: Overall code improvements and bug fixesMounir IDRASSI1-1/+1
2023-06-28Add EMV functionality (#1080)mmauv1-0/+1
* Add basic strcture needed for EMV implementation * Add demo EMV functionality with C code pasted in a very dirty and unsafe way. NOT FINAL * Refactor IccExtractor Structure * Fix Makefile * fix include file * move global variables from h to c * revert to memcpy * fix icc data recovery functions * Add EMV functionalities on windows * Make EMVToken structures like SecurityToken * Define constants instead of hard coded values * Token structures created with inheritance * refactor TokenKeyfile to use inherit. + polymor. * add Token.h + Token.cpp in modules in VS2010 * Add a comment at each use of SecurityToken class or objects * SecurityTokenKeyfilesDialog preparation * Implemennt GetAvailableTokens in Token class on windows * merge * up (patching for Windows) * foreach Token.cpp corrected * Display EMV keyfiles on first window in graphic interface * Add token to Windows UI * EMVToken selection on OKButton on Linux * Keyfile.cpp optimization * Move getKeyfileData in the token class * EMV::Token GetAvailableKeyfiles() base * Move getKeyfileData in the token class on unix * Remove test comments * Warnings resolved * RemoveeSecurityTokenLibraryNotInitialized exception if at least one emv token is detected * Adding new files * Remove old files and add the new version to the windows project * Change make_shared to shared_ptr constructor * IccExtractor integration working on linux * Throwing card not EMV execption * catch error when not EMV type in EMVToken::GetAvailableKeyfiles * Change types to compile on windows * list all keyfiles, security keyfiles and emv keyfiles in command line * Change type to be coherent and remove old todo comments * Remove todo comments * Change indentation and resolve a bug from previous commit * Use polymorphism for GetKeyfileData and add export option for EMVTokens on Linux * Linux : Allow to export EMV Tokens in command lines, Windows : Disable the delete button when EMV Keyfiles are selected * Remove SlotId from TokenInfo as it is already in Token * Correct errors on Linux * Disable delete option if one EMV Token is selected on Linux * Fix bug enabling delete button if nothing is selected * emv data used as reference then burnt * use of normal files in linux corrected * help updated * help updated for export functionnality * option EMV added to graphic interface but not yet working * Bug fix : Allow to use multiple EMV on windows * EMV Option added to UserPreferences * EMV Option working for Linux * EMV option added to Windows (not working yet) * [NOT TESTED] EMV option for Windows * Working EMV option on Windows * EMV Option for data extraction working for volume creation * EMV Option for data extraction working for Mount * EMV Option for data extraction working for mounting favorites volumes * EMV Option for extraction working for Changing volume password, Set Derivation Key Algorithm and Add or remove keyfile from volume * Windows : re-checking EMV Option when getting data * Removing error catches in the IccDataExtractor classe (It only throws error now). Changing GetPan signature to resemble the other functions signatures more * Changing EMV errors - Only throwing ICCExtractionException from outside of the ICC module. - Catching all TLVExceptions and PCSCExceptions to throw the right ICCExtractionException - Deleting APDU exceptions. * First version of the documentation * Adding function pointers for winscard library (but it crashes VeraCrypt) * Debugging function pointers * The import of the library on windows work as expected now * Reverting EMVToken.cpp changes used to test to library import * Searching for the System32 path instead of hard codding it * Fixing the bug were VeraCrypt crashes if there is no readers when "add Token files" is clicked * Winscard library not initialized in object constructor anymore to delay it after EMVOption check * Remove winscard lib from windows dependencies * Properly displaying errors * Adding a dot in Language.xml * Catching TLVException * Removing unused code * Remove unusefull comments * Trying to fix 0x1f error * Update IccDataExtractor.cpp * Delete History.xml * Fix get data without get pan * Cleanup code * changes for linux compilation but linking not working * error handling for linux * erasing emv data * Burn PAN * Burn PAN from memory * Uncomment selfcheck before merging master * burn corrected * EMV errors handling for Linux * EMV working for Linux CLI * Doc : Winscard Linux package and VeraCrypt versions --------- Co-authored-by: doriandu45 <d45.poubelle@gmail.com> Co-authored-by: red4game <redemgaiming@gmail.com> Co-authored-by: Brice.Namy <brice.namy@insa-rennes.fr> Co-authored-by: vocthor <pieceo108@gmail.com> Co-authored-by: vocthor <67202139+vocthor@users.noreply.github.com> Co-authored-by: Andrei COCAN <andrei.cocan@insa-rennes.fr> Co-authored-by: AndreiCocan <95496161+AndreiCocan@users.noreply.github.com> Co-authored-by: francoisLEROUX <francois3443@gmail.com>
2023-06-25Windows: Better language localization support for Expander.Mounir IDRASSI1-1/+25
More work is needed to localize remaining string resources
2023-06-18Windows: make Expander first check file existence before proceeding furtherMounir IDRASSI1-1/+6
2023-06-02Windows: Add dropdown menu to Mount button to allow mounting without cacheMounir IDRASSI1-0/+1
2020-07-06Windows: Support direct password drag-n-drop from external applications ↵Mounir IDRASSI1-0/+24
(e.g. KeePass) which is more secure than using clipboard.
2020-01-21Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵Mounir IDRASSI1-0/+69
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536
2019-12-03Windows: Fix possible local privilege escalation vulnerability during ↵Mounir IDRASSI1-1/+1
execution of VeraCrypt Expander (CVE-2019-19501)
2019-03-03Windows: replicate old behavior when handling passwords in UI when legacy ↵Mounir IDRASSI1-1/+4
password maximum length option selected
2019-02-04Automatically truncate passwords for TrueCrypt volumes and System Encryption ↵Mounir IDRASSI1-2/+3
to the first 64 characters. This fix issues encountered by users of TrueCrypt volumes who were using passwords longer than 64 characters that were truncated in previous version.
2018-08-07Windows: Display a balloon tip warning or error message when the value ↵Mounir IDRASSI1-1/+1
pasted to password field is truncated or when there is no room for additional characters because of maximum password length reached
2017-07-02Windows: when mounting multiple favorites, use PIM of previous favorite ↵Mounir IDRASSI1-1/+1
alongside its password if option "Include PIM when caching password" is selected alongside option "Temporarily cache password during Mount Favorite Volumes operations".
2017-06-23Update IDRIX copyright yearMounir IDRASSI1-1/+1
2017-06-11Windows: fix compiler warningsMounir IDRASSI1-10/+10
2017-05-15Replace Codeplex links by ones on veracrypt.frMounir IDRASSI1-1/+1
2016-12-30Windows: Implement Secure Desktop for password entry. Add option and command ↵Mounir IDRASSI1-1/+3
line switch to activate it.
2016-12-08Windows: Enhancement to favorites handling. Add PRF/TrueCryptMode fields in ↵Mounir IDRASSI1-2/+2
favorites management dialog, and use default mount parameters when mounting multiple favorites at once.
2016-08-15Windows: Implement support for EFI system encryption in Windows GUI.Mounir IDRASSI1-1/+9
2016-05-10Remove trailing whitespaceDavid Foerster1-16/+16
2016-05-10Normalize all line terminatorsDavid Foerster1-423/+423
2016-05-05Windows: Add option and command line switch to hide waiting dialog when ↵Mounir IDRASSI1-0/+2
performing operations.
2016-02-07Windows:Fix various issues and warnings reported by static code analysis ↵Mounir IDRASSI1-1/+1
tool Coverity.
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2016-01-10Windows: Avoid wrong update of configuration XML file caused by not using ↵Mounir IDRASSI1-1/+1
the correct window handle to get some GUI fields content. Some code cleanup.
2016-01-10Windows: Don't show disconnected network drives in the list of available ↵Mounir IDRASSI1-0/+2
drives. Add option to make them available for mounting if needed.
2016-01-03Windows: Fix Dll hijacking vulnerability affecting installer that allows ↵Mounir IDRASSI1-1/+0
arbitrary code execution with elevation of privilege (CVE-2016-1281)
2015-12-31Cryptography: Optimize Whirlpool implementation by using public domain ↵Mounir IDRASSI1-0/+3
assembly code developed by Wei Dai
2015-11-26Windows: Full UNICODE rewrite and implement support for UNICODE passwords.Mounir IDRASSI1-38/+46
2015-09-26Windows: Set keyboard focus to PIM field when "Use PIM" is checked.Mounir IDRASSI1-0/+2
2015-08-28Windows: Treat the PIM like a password and make it visible when "Display ↵Mounir IDRASSI1-2/+2
password" is checked.
2015-08-27Windows: Correctly display the password edit "black dot" instead of a '*' ↵Mounir IDRASSI1-8/+7
when showing it then hiding it.
2015-08-27Windows: Protect against using a container file as its own keyfile. ↵Mounir IDRASSI1-3/+5
Normalizing path names to never use '/' but always '\'.
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-28/+15
and TrueCrypt 3.0.
2015-07-13Windows: Modify PIM parts in GUI to make it easier to use. Users must ↵Mounir IDRASSI1-5/+19
explicitly check "User PIM" to enable its use.
2015-07-11Use Pim name for internal variables instead of the old name PinMounir IDRASSI1-10/+10
2015-07-06Windows: Display source location of errors in order to help diagnose issues ↵Mounir IDRASSI1-2/+2
reported by users
2015-06-08Windows: rename PIN to PIM to avoid confusion. Better error messages.Mounir IDRASSI1-6/+6
2015-05-27Windows: GUI modifications around PIN fieldMounir IDRASSI1-16/+2
2015-05-26Windows: first implementation of dynamic modeMounir IDRASSI1-1/+43
2015-05-06Windows: Solve detection issue when resuming encryption. Add separate logic ↵Mounir IDRASSI1-1/+3
for manual selection of device and display error message in case of failure.
2015-05-03Windows: enable showing/hiding password for system encryption in Windows UI ↵Mounir IDRASSI1-1/+0
and in the bootloader (F5 key). This will be helpful to diagnose issues with non-US versions of Windows.
2015-04-27Windows: Support A: and B: as driver letters for mounting volumes.Mounir IDRASSI1-1/+1
2015-02-09Static Code Analysis: handle unused variables more properly. Catch STL ↵Mounir IDRASSI1-1/+0
exception. Add more checks. Add proper cast to arithmetic operations.
2015-01-20Windows: Add first version of VeraCryptExpander who is based on extcv. Minor ↵Mounir IDRASSI1-0/+971
modification to Mount.c to avoid link errors when building VeraCryptExpander.