VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Format/InPlace.c
AgeCommit message (Collapse)AuthorFilesLines
2023-07-22Windows: Remove TrueCrypt support. Increment version to 1.26.4.Mounir IDRASSI1-1/+1
2023-06-04Windows: Possible workaround for logarithmic slowdown for Encrypt-In-Place ↵Mounir IDRASSI1-21/+51
on large volumes (relates to #1063) We replace absolute file pointer moving by relative moving with respect to current position. This was implemented as a workaround to address the performance issues related to in-place encryption. When using SetFilePointerEx() with FILE_BEGIN as the reference point, reaching the end of large drives during in-place encryption can cause significant slowdowns. By moving the file pointer relatively, these performance issues are mitigated.
2022-03-26Windows: Add various checks to address Coverity reported issues.Mounir IDRASSI1-0/+2
2020-02-10Windows: Fix warnings reported by Coverity static code analyzerMounir IDRASSI1-8/+17
2020-01-22Windows: Fix regression in Expander and Format when RAM encryption is enable ↵Mounir IDRASSI1-0/+41
that was causing volume headers to be corrupted.
2019-03-02Windows: Generalize RAM encryption for keys to VeraCrypt binaries, ↵Mounir IDRASSI1-2/+39
especially Format and Expander
2017-07-27Windows: use large output buffer for IOCTL_DISK_GET_DRIVE_GEOMETRY_EX calls ↵Mounir IDRASSI1-9/+9
to avoid failure with disk drivers that don't support returning only sizeof(DISK_GEOMETRY_EX).
2017-06-23Update IDRIX copyright yearMounir IDRASSI1-1/+1
2017-05-17Windows: use IOCTL_DISK_GET_DRIVE_GEOMETRY_EX instead of the deprecated ↵Mounir IDRASSI1-9/+9
IOCTL_DISK_GET_DRIVE_GEOMETRY in order to get accurate disk size value.
2016-09-11Windows: in case of In-Place encryption, encrypt random data instead of ↵Mounir IDRASSI1-2/+2
existing data when filling unused space like the other cases.
2016-08-15Windows: fill unused/reserved header areas with the result of encryption of ↵Mounir IDRASSI1-2/+2
random data instead of the encryption of zeros for better entropy of resulting random data.
2016-08-15Windows: Fix vulnerability inherited from TrueCrypt that allows an attacker ↵Mounir IDRASSI1-0/+79
to detect with high probability if a hidden volume is present. Vulnerability reported by Ivanov Alexey Mikhailovich.
2016-05-10Remove trailing whitespaceDavid Foerster1-47/+47
2016-05-10Normalize all line terminatorsDavid Foerster1-2293/+2293
2016-02-16Windows: use buffer with known maximum length as input to FakeDosNameForDeviceMounir IDRASSI1-4/+4
2016-02-07Windows:Fix various issues and warnings reported by static code analysis ↵Mounir IDRASSI1-1/+11
tool Coverity.
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2015-11-26Windows: Full UNICODE rewrite and implement support for UNICODE passwords.Mounir IDRASSI1-35/+31
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-5/+9
and TrueCrypt 3.0.
2015-07-11Use Pim name for internal variables instead of the old name PinMounir IDRASSI1-9/+9
2015-07-06Windows: Display source location of errors in order to help diagnose issues ↵Mounir IDRASSI1-10/+10
reported by users
2015-06-10Windows: solve installer issue on Windows 10 caused by failure to overwrite ↵Mounir IDRASSI1-2/+2
VeraCrypt driver file.
2015-05-26Windows: first implementation of dynamic modeMounir IDRASSI1-5/+9
2015-05-26Windows: solve 64-bit compilation warnings after checking that they are ↵Mounir IDRASSI1-2/+2
harmless.
2015-05-17Windows: First implementation of non-system volumes decryption.Mounir IDRASSI1-8/+570
2015-02-09Static Code Analysis: Avoid over-flaw in arithmetic operations by adding ↵Mounir IDRASSI1-0/+12
more checks. Add extra checks. Solve various issues.
2014-12-28Windows: support loading TrueCrypt volumes. Implement converting TrueCrypt ↵Mounir IDRASSI1-1/+1
volumes to VeraCrypt using the change password functionality.
2014-12-27Windows: use the correct window handle for creating message boxes. This ↵Mounir IDRASSI1-49/+51
became important after the introduction of the wait dialog in order to avoid having message boxes behind the wait dialog.
2014-12-16Windows: Enhance performance by implementing the possibility to choose the ↵Mounir IDRASSI1-4/+5
correct hash algorithm of volumes during various operations (mount, change password...). In case of system encryption, slightly speedup Windows startup time by making the driver pickup the correct hash algorithm used for the encryption.
2014-11-08Windows vulnerability fix: correct possible BSOD attack targeted towards ↵Mounir IDRASSI1-1/+9
GetWipePassCount() / WipeBuffer() found by the Open Crypto Audit Project.
2014-11-08Lower number of times we overwrite volume header during the encryption of a ↵Mounir IDRASSI1-4/+4
partition if the user choose to wipe the driver. Latest studies show that even one pass is enough to make data irretrievable. A value of 3 is a conservative approach that enhance performance without scarifying security. http://www.infosecisland.com/blogview/16130-The-Urban-Legend-of-Multipass-Hard-Disk-Overwrite.html http://digital-forensics.sans.org/blog/2009/01/15/overwriting-hard-drive-data/
2014-11-08Static Code Analysis : Generalize the use of Safe String functions. Add some ↵Mounir IDRASSI1-16/+18
NULL pointer checks. Avoid false-positive detection in AppendMenu (MF_SEPARATOR) calls by setting the last parameter to "" instead of NULL.
2014-11-08Change namespace from TrueCrypt to VeraCrypt. Rename method from Resources ↵Mounir IDRASSI1-1/+1
Resources::GetTrueCryptIcon to Resources::GetVeraCryptIcon.
2014-11-08Modifications to remove all TrueCrypt references in names. generate new ↵Mounir IDRASSI1-1/+1
GUIDs for VeraCrypt. Replace "TRUE" by "VERA" in volume headers and driver magic word.
2014-11-08Add original TrueCrypt 7.1a sourcesMounir IDRASSI1-0/+1692