VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)AuthorFilesLines
2020-01-22Linux: correct OpenSUSE build script to indicate that we link against GTK2 ↵Mounir IDRASSI1-2/+2
and not GTK3
2020-01-22Windows: Fix regression in Expander and Format when RAM encryption is enable ↵Mounir IDRASSI5-2/+217
that was causing volume headers to be corrupted.
2020-01-21Windows: Support notifying WAITFOR.EXE Windows command when VeraCrypt.exe ↵Mounir IDRASSI1-0/+54
exits if /q was specified in CLI. This done using the new switch "/signalExit" who must have a string parameter that must be the same as the one that will be specified for WAITFOR.EXE command.
2020-01-21Windows: Fix failure of Screen Readers (Accessibility support) to reader UI ↵Mounir IDRASSI5-3/+97
by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed. This fixes issue https://github.com/veracrypt/VeraCrypt/issues/536
2020-01-21Windows: don't display mount/dismount examples in help dialog for command ↵Mounir IDRASSI1-2/+2
line in Format and Expander
2020-01-20Linux/MacOSX: Fix regression that limited the size available for hidden volumesMounir IDRASSI1-1/+1
created on disk or partition.
2019-12-22Increment version to 1.24-Update3 for Linux and update Release NotesVeraCrypt_1.24-Update3Mounir IDRASSI2-4/+4
2019-12-22Linux: Modify .deb build scripts to link against statically built wxWidgets ↵Mounir IDRASSI2-7/+29
on Ubuntu 14.04, 12.04 and Debian 8
2019-12-21Linux: Fix building and packaging console-only version to remove dependency ↵Mounir IDRASSI2-23/+41
on GTK
2019-12-20Fix the compilation against WxWidgets when NOGUI=1 (#570)Gokturk Yuksek3-1/+8
* Revert "Linux: Fix failure to run VeraCrypt binary built for console mode on headless machines (fix issue https://github.com/veracrypt/VeraCrypt/issues/531)" The build failure still exists for system wxGTK compiled with '--disable-gui': ``` In file included from TextUserInterface.cpp:27: TextUserInterface.h: In member function ‘virtual bool VeraCrypt::TextUserInterface::Initialize(int&, wxChar**)’: TextUserInterface.h:50:63: error: ‘wxAppBase’ has not been declared 50 | virtual bool Initialize (int &argc, wxChar **argv) { return wxAppBase::Initialize(argc, argv); } ``` This reverts commit 737e1f126b8826ed02418266e590e195aebdd7c0. * Revert "Linux: fix compilation error when building console-only version of VeraCrypt that is statically linked to wxWidgets" The build failure still exists for system wxGTK compiled with '--disable-gui': ``` In file included from TextUserInterface.cpp:27: TextUserInterface.h: In member function ‘virtual bool VeraCrypt::TextUserInterface::Initialize(int&, wxChar**)’: TextUserInterface.h:50:63: error: ‘wxAppBase’ has not been declared 50 | virtual bool Initialize (int &argc, wxChar **argv) { return wxAppBase::Initialize(argc, argv); } ``` This reverts commit 14bee5e6a227701e78c5fec04064c0494f6361f0. * src/Main/Main.make: simplify the WX_CONFIG_LIBS logic Irrespective of whether we are linking against widgets statically or dynamically, pull in only 'base' when GUI is disabled, and 'adv,core,base' when GUI is enabled. When GUI is disabled, the C/CXX flag must include '-DwxUSE_GUI=0' for this to work. * src/Makefile: pass '-DwxUSE_GUI=0' when NOGUI=1 veracrypt with NOGUI=1 fails to properly link against wxGTK compiled with '--disable-gui' only using the 'base' library because the wx's setup.h implicitly defines wxUSE_GUI=1, which then changes the definition of various structures, requiring symbols from the core library as well. For example, wxwidgets include/wx/app.h defines: #if wxUSE_GUI class WXDLLIMPEXP_CORE wxAppBase : public wxAppConsole ... [snip] ... #else // !GUI // wxApp is defined in core and we cannot define another one in wxBase, // so use the preprocessor to allow using wxApp in console programs too #define wxApp wxAppConsole #endif // GUI/!GUI To fix this, pass '-DwxUSE_GUI=0' when compiling veracrypt with NOGUI=1. Closes: https://github.com/veracrypt/VeraCrypt/issues/531
2019-12-17MacOSX: revert to using wxWidgets 3.1.2 following unexplained crash when ↵VeraCrypt_1.24-Update2Mounir IDRASSI1-2/+2
using wxWidgets 3.1.3
2019-12-16Linux: Fix build error when linking with old wxWidgets versionMounir IDRASSI1-1/+3
2019-12-16Update version information in preparation for 1.24-Update2 releaseMounir IDRASSI11-16/+16
2019-12-16Update Format wizard bitmap using submission by Andreas Becker ↵Mounir IDRASSI1-0/+0
(https://github.com/veracrypt/VeraCrypt/issues/9#issuecomment-565833478)
2019-12-16Windows: make /fastCreateFile switch apply to both UI and command line ↵Mounir IDRASSI1-1/+2
creation of file containers
2019-12-16MacOSX: Ensure that the heading bar is always visible when window is moved ↵Mounir IDRASSI2-5/+27
so that it can still be moved by user using mouse (https://github.com/veracrypt/VeraCrypt/issues/546)
2019-12-16MacOSX: Ensure that main window is visible on screen when About is display ↵Mounir IDRASSI2-0/+22
as a way to workaround for situations where UI is not visible or can't be move (for example, when changing display monitor with a different resolution).
2019-12-16MacOSX: fix compilation error caused by missing StringConverter::ToWide ↵Mounir IDRASSI1-1/+1
method that takes a size_t argument (we cast to uint32)
2019-12-13Windows: check "TrueCrypt Mode" in password dialog when mounting a file ↵Mounir IDRASSI3-1/+11
container with .tc extension
2019-12-12Windows: Fix the checkbox for skipping verification of Rescue Disk not ↵Mounir IDRASSI1-0/+1
reflecting the value of /noisocheck switch when specified in VeraCrypt Format command line.
2019-12-11Linux: fix compilation error when building console-only version of VeraCrypt ↵Mounir IDRASSI2-9/+0
that is statically linked to wxWidgets
2019-12-10MacOSX: link against latest wxWidgets version 3.1.3Mounir IDRASSI1-3/+3
2019-12-10Increment version to 1.24-Update2Mounir IDRASSI20-38/+38
2019-12-10Windows: Align volume size field in Format wizard with other controlsMounir IDRASSI1-1/+1
2019-12-10Windows: Add switch /FastCreateFile for VeraCrypt Format.exe to speedup ↵Mounir IDRASSI3-2/+34
creation of large file container if quick format is selected. This switch comes with security issues since it will embed existing content on disk into the file container which may expose sensitive content to an attacker who has access to the file container.
2019-12-09Windows Driver: Reduce memory usage of IOCTL_DISK_VERIFY handler. Now we ↵Mounir IDRASSI1-6/+22
reader disk by chunks of at most 64 KiB. Fix https://github.com/veracrypt/VeraCrypt/issues/562.
2019-12-09Fix wrong check on the define CRYPTOPP_BOOL_X64Mounir IDRASSI1-1/+1
2019-12-09Windows: Add latest 1.24 EFI bootloader files that are signed by Microsoft ↵Mounir IDRASSI12-0/+0
that come with the following modifications: - Fix F5 showing previous password after failed authentication attempt. Ensure that even wrong password value are cleared from memory.
2019-12-09Linux/MacOSX: use x64 optimized SHA256 implementation instead of limiting it ↵Mounir IDRASSI1-1/+1
to Windows.
2019-12-09Add burn calls for temporary ss variable (#569)Hanno Böck1-0/+13
2019-12-09Linux: fix NOASM compilation (#563) (#568)alt3r 3go9-21/+22
Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com>
2019-12-08Windows: use fix for CVE-2019-19501 only on Vista and above since it doesn't ↵Mounir IDRASSI1-1/+2
make sens under XP.
2019-12-08Windows: enhancements to the mechanism preserving file timestamps, ↵Mounir IDRASSI8-78/+138
especially for keyfiles.
2019-12-08Windows: Add missing defines in Tcdefs.hMounir IDRASSI1-0/+9
2019-12-05Make sure password gets deleted in case of exception in ↵Hanno Böck1-0/+1
CoreUnix::MountVolume (#565)
2019-12-05Windows: Modify memory process protection when running with admin privileges ↵Mounir IDRASSI1-1/+12
to allow calling functions needed for CVE-2019-19501 fix while still protecting against memory access by non-admin processes.
2019-12-05Windows: Enhancement to the fix for CVE-2019-19501Mounir IDRASSI1-3/+6
2019-12-03Windows: Fix possible local privilege escalation vulnerability during ↵Mounir IDRASSI3-22/+232
execution of VeraCrypt Expander (CVE-2019-19501)
2019-12-02fixed typo "this [is (#559)vstoykovbg1-1/+1
2019-12-01UNIX: make sector size mismatch error more verbose (#552) (#561)alt3r 3go4-2/+8
Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com>
2019-11-28Windows: Don't write extra 0x00 byte at the end of DcsProp file when ↵Mounir IDRASSI1-3/+4
modifying it through UI
2019-11-27Windows: compatibility with multi-OS boot configuration by only setting ↵Mounir IDRASSI3-9/+38
VeraCrypt as first bootloader of the system if the current first bootloader is Windows one.
2019-11-27Windows: Don't restore MBR to VeraCrypt value if it is coming from a loader ↵Mounir IDRASSI1-2/+25
different from us or different from Microsoft one.
2019-11-22Windows: Add new registry flags for SystemFavoritesService to control ↵Mounir IDRASSI3-23/+46
updating of EFI BIOS boot menu on shutdown. This will help better manage multi-boot scenarios where we should not mess up with boot order (e.g. grub2 case)
2019-11-22Windows: Add latest 1.24 EFI bootloader files that are signed by Microsoft ↵Mounir IDRASSI12-0/+0
that come with the following modifications: - Fix "ActionFailed" not working and add "ActionCancelled" to customize handling of user hitting ESC on password prompt
2019-11-18Linux: Fix failure to run VeraCrypt binary built for console mode on ↵Mounir IDRASSI1-2/+0
headless machines (fix issue https://github.com/veracrypt/VeraCrypt/issues/531)
2019-11-17Linux/MacOS: text mode did not recognize Unicode in passwords (#540) (#551)alt3r 3go1-1/+3
2019-11-15Debug build: fix ParameterIncorrect error on hash benchmark start (#542) (#544)alt3r 3go1-1/+1
2019-11-12Windows: Allow system encrypted devices to be mounted from WindowsPE - even ↵csware1-4/+9
if changing the keyboard layout failed (#539) When my system broke and I had to use WindowsPE to rescue some files the password dialog always closed immediately. There was no chance to mount the system device using the GUI. It took me a while to realize that I could try using the CLI by passing the password as a parameter (which might not be so obvious for not advanced users). Signed-off-by: Sven Strickroth <email@cs-ware.de>
2019-11-12Fix off by one overflow with 31 args (#541)Hanno Böck1-1/+1