VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Format/InPlace.c
AgeCommit message (Collapse)AuthorFilesLines
2016-08-15Windows: Fix vulnerability inherited from TrueCrypt that allows an attacker ↵Mounir IDRASSI1-0/+79
to detect with high probability if a hidden volume is present. Vulnerability reported by Ivanov Alexey Mikhailovich.
2016-05-10Remove trailing whitespaceDavid Foerster1-47/+47
2016-05-10Normalize all line terminatorsDavid Foerster1-2293/+2293
2016-02-16Windows: use buffer with known maximum length as input to FakeDosNameForDeviceMounir IDRASSI1-4/+4
2016-02-07Windows:Fix various issues and warnings reported by static code analysis ↵Mounir IDRASSI1-1/+11
tool Coverity.
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2015-11-26Windows: Full UNICODE rewrite and implement support for UNICODE passwords.Mounir IDRASSI1-35/+31
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-5/+9
and TrueCrypt 3.0.
2015-07-11Use Pim name for internal variables instead of the old name PinMounir IDRASSI1-9/+9
2015-07-06Windows: Display source location of errors in order to help diagnose issues ↵Mounir IDRASSI1-10/+10
reported by users
2015-06-10Windows: solve installer issue on Windows 10 caused by failure to overwrite ↵Mounir IDRASSI1-2/+2
VeraCrypt driver file.
2015-05-26Windows: first implementation of dynamic modeMounir IDRASSI1-5/+9
2015-05-26Windows: solve 64-bit compilation warnings after checking that they are ↵Mounir IDRASSI1-2/+2
harmless.
2015-05-17Windows: First implementation of non-system volumes decryption.Mounir IDRASSI1-8/+570
2015-02-09Static Code Analysis: Avoid over-flaw in arithmetic operations by adding ↵Mounir IDRASSI1-0/+12
more checks. Add extra checks. Solve various issues.
2014-12-28Windows: support loading TrueCrypt volumes. Implement converting TrueCrypt ↵Mounir IDRASSI1-1/+1
volumes to VeraCrypt using the change password functionality.
2014-12-27Windows: use the correct window handle for creating message boxes. This ↵Mounir IDRASSI1-49/+51
became important after the introduction of the wait dialog in order to avoid having message boxes behind the wait dialog.
2014-12-16Windows: Enhance performance by implementing the possibility to choose the ↵Mounir IDRASSI1-4/+5
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption.
2014-11-08Windows vulnerability fix: correct possible BSOD attack targeted towards ↵Mounir IDRASSI1-1/+9
GetWipePassCount() / WipeBuffer() found by the Open Crypto Audit Project.
2014-11-08Lower number of times we overwrite volume header during the encryption of a ↵Mounir IDRASSI1-4/+4
partition if the user choose to wipe the driver. Latest studies show that even one pass is enough to make data irretrievable. A value of 3 is a conservative approach that enhance performance without scarifying security. http://www.infosecisland.com/blogview/16130-The-Urban-Legend-of-Multipass-Hard-Disk-Overwrite.html http://digital-forensics.sans.org/blog/2009/01/15/overwriting-hard-drive-data/
2014-11-08Static Code Analysis : Generalize the use of Safe String functions. Add some ↵Mounir IDRASSI1-16/+18
NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL.
2014-11-08Change namespace from TrueCrypt to VeraCrypt. Rename method from Resources ↵Mounir IDRASSI1-1/+1
Resources::GetTrueCryptIcon to Resources::GetVeraCryptIcon.
2014-11-08Modifications to remove all TrueCrypt references in names. generate new ↵Mounir IDRASSI1-1/+1
GUIDs for VeraCrypt. Replace "TRUE" by "VERA" in volume headers and driver magic word.
2014-11-08Add original TrueCrypt 7.1a sourcesMounir IDRASSI1-0/+1692