Mounir IDRASSI
9f91c47bd2
Windows: Use Jitterentropy RNG only in SlowPoll call and not in FastPoll since the it consumes too much CPU and FastPoll requires fast and minimal entropy gathering
2019-10-03 19:32:33 +02:00
El Mostafa Idrassi
be09fa8a53
'#define VERSION_STRING XXX' must come before '#define VERSION_STRING_SUFFIX YYY' ( #506 )
...
in order for 'export TC_VERSION := $(shell grep VERSION_STRING ../Common/Tcdefs.h | head -n 1 | cut -d'"' -f 2)'
in 'src/Main/Main.make' to actually return the version rather than '-CustomEFI'.
2019-10-03 16:34:43 +02:00
Mounir IDRASSI
400bb52247
Linux/MacOSX:check that the requested size of file container is less than available
...
disk free space. Add a CLI switch to disable this check.
2019-10-02 22:31:28 +02:00
Unit 193
bb2eaa6697
Utilize $(BASE_DIR) in the install targets rather than $(PWD) and $(CURDIR) ( #472 )
...
As $(PWD) is not always the expected value and can result in failing the target.
2019-10-02 21:59:13 +02:00
Unit 193
10c4a3e807
Allow $(ARCH) to be defined during build ( #471 )
...
This can be useful when crossbuilding or building in a chroot where using
uname -m would cause the wrong compiler options.
2019-10-02 21:31:07 +02:00
Hans-Peter Jansen
0d91dab5b9
Align section types of Whirlpool_C and SHA256_K ( #479 )
...
in order to fix LTO linking.
After switching to LTO for openSUSE Tumbleweed, veracrypt build failed with:
[ 185s] ../Crypto/Whirlpool.c:105:45: error: 'Whirlpool_C' causes a section type conflict with 'SHA256_K'
[ 185s] 105 | CRYPTOPP_ALIGN_DATA(16) static const uint64 Whirlpool_C[8*256+R] CRYPTOPP_SECTION_ALIGN16 = {
[ 185s] | ^
[ 185s] ../Crypto/Sha2.c:321:34: note: 'SHA256_K' was declared here
[ 185s] 321 | CRYPTOPP_ALIGN_DATA(16) uint_32t SHA256_K[64] CRYPTOPP_SECTION_ALIGN16 = {
[ 185s] | ^
[ 185s] lto-wrapper: fatal error: g++ returned 1 exit status
Aligning section types of Whirlpool_C and SHA256_K fixes this.
2019-10-02 21:25:10 +02:00
Mounir IDRASSI
b39a724f26
Windows: Add support for /nosizecheck switch in Format command line file container creation
2019-10-02 19:04:12 +02:00
Mounir IDRASSI
fa3d4c79c9
Increment version to 1.24-Beta6
2019-10-02 11:40:08 +02:00
Mounir IDRASSI
3923d11c7b
Windows Driver: Disable Hibernation when RAM encryption is enabled since we can't resume from Hibernation without RAM encryption keys (a chicken and egg situation)
2019-10-01 15:09:35 +02:00
Mounir IDRASSI
9b804137e0
Windows: when periodic update of device is disabled, use SetupAPI to list disks on demand instead of testing all disks to reduce CPU usage.
2019-09-30 22:27:55 +02:00
Mounir IDRASSI
e3afa296c7
Windows: resize VeraCrypt Format Wizard and Mount Options dialogs to fix some text truncation issues with non-English languages.
2019-09-30 22:27:48 +02:00
Mounir IDRASSI
128234c066
Windows: Update the encoded hash of the code signing certificate used to verify the integrity of binaries.
2019-09-29 16:07:49 +02:00
Mounir IDRASSI
3e5b7e1457
Windows: update signing script to use newly issued IDRIX SHA-1 code signing certificate.
2019-09-29 16:07:42 +02:00
Mounir IDRASSI
15fc29dc6b
Windows: Add latest 1.24 EFI bootloader files that are signed by Microsoft that come with the following modifications: - Fix issue that was preventing Streebog hash from being selected manually during Pre-Boot authentication - Ensure that the correct Windows bootloader is executed when the user press ESCAPE - make the rescue disk boot machine directly from disk if "VeraCrypt" folder is missing. This make it easy to create a bootable disk for VeraCrypt from the rescue disk by just removing or renaming its "VeraCrypt" folder.
2019-09-29 16:07:35 +02:00
Mounir IDRASSI
909255d55f
Windows: Use periodic update of connected devices only if there is a Favorite that uses VolumeID. Add command option to disable the period update of devices.
2019-09-29 16:07:28 +02:00
Mounir IDRASSI
7d88577c61
Windows: fix another typo in code comment (hopefully last one!)
2019-09-27 18:23:32 +02:00
Mounir IDRASSI
d8ac0f7ec7
Windows: fix typo in code comment
2019-09-27 00:33:22 +02:00
Mounir IDRASSI
684259b438
Windows: Fix sporadic keyboard issue in Secure Desktop for password dialog by not using the trick to put it reliably in foreground. The trick is based on a emulation of ALT+TAB but sometimes ALT key would remain pressed in case of Secure Desktop making it impossible to type the password (a workaround was to press CTRL key which reset the state of ALT key)
2019-09-26 23:01:46 +02:00
Mounir IDRASSI
2a652b842f
Windows: Add two missing UI strings to XML translation files so that they can be localized correctly
2019-09-25 17:44:08 +02:00
Mounir IDRASSI
06e8fbace7
Windows: Disable the Keyfiles button in system encryption wizard since we don't support them yet.
2019-09-25 17:43:59 +02:00
Mounir IDRASSI
c8beacbdd7
Linux/OSX: make CLI switch --import-token-keyfiles compatible with Non-Interactive
...
mode by using keyfiles passed as arguments and check the Non-Interactive
mode switch.
2019-09-24 22:06:44 +02:00
Mounir IDRASSI
8021d44465
Windows: fix HourGlass cursor showing up in main UI after launching disk decryption wizard/
2019-09-24 18:30:58 +02:00
Mounir IDRASSI
6b10f88e40
Fix build error of UEFI bootloader caused by latest changes that introduced ChaCha20 and T1HA algorithms and which are not present nor used in UEFI bootloader
2019-09-23 00:07:15 +02:00
Mounir IDRASSI
2ab57bcf70
Windows: fix compilation error of legacy MBR bootloader caused by missing intrin.h header
2019-08-26 00:50:25 +02:00
Alexander Karzhenkov
6f1ebacd39
Some cleanup related to "Invalid characters..." on mount issue. ( #453 )
...
* Revert previous commit
* Fix "Invalid characters..." issue by not using "foreach" macro
The "foreach" macro creates a copy of the container.
This copy is destroyed immediately after the iteration is completed.
C-strings pointers passed to the local array were invalidated
with destroying of "std::string"s contained in the copy.
2019-06-06 11:41:42 +02:00
Dany Shaanan
1973fd6d26
Fix password-only example in help text (pim missing) ( #438 )
2019-06-06 11:39:52 +02:00
Mounir IDRASSI
08a8a0ce30
Linux: Fix compilation error caused by wrong include of "intrin.h"
2019-03-21 18:52:14 +01:00
Mounir IDRASSI
69df92c81d
Increment version to 1.24-Beta5
2019-03-09 08:04:04 +01:00
Mounir IDRASSI
1bd3a6cc70
Windows Driver: fix BSOD when mounting outer volume with hidden volume protection if RAM encryption is enabled
2019-03-09 08:03:57 +01:00
Mounir IDRASSI
d6ce1db2a8
Increment version to 1.24-Beta4 and update release notes to clarify that password length increase applies only to non-system volumes.
2019-03-09 08:03:51 +01:00
Mounir IDRASSI
76c03c23a1
Windows: inform user that RAM encryption setting requires reboot to take effect
2019-03-08 01:03:04 +01:00
Mounir IDRASSI
f780011a86
Windows Driver: fix BSOD when mounting hidden volume if RAM encryption is enabled
2019-03-08 01:02:57 +01:00
Mounir IDRASSI
7701dfde07
Windows: Update signed drivers for 1.24-Beta3
2019-03-04 00:55:10 +01:00
Mounir IDRASSI
5c934d8122
Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt driver
2019-03-03 23:48:49 +01:00
Mounir IDRASSI
6d2cef1fd8
Fix formatting of credits in About dialog and documentation
2019-03-03 23:48:42 +01:00
Mounir IDRASSI
c7b23530f9
Windows: Add missing UI string to XML language files.
2019-03-03 23:48:35 +01:00
Mounir IDRASSI
8e39877054
Increment version to 1.24-Beta3. Update Release Notes.
2019-03-03 23:48:28 +01:00
Mounir IDRASSI
28b8bf5222
Windows: Add command line switch (/m noattach) that is equivalent to UI option "Only create virtual device without mounting on selected drive letter"
2019-03-03 23:48:06 +01:00
Mounir IDRASSI
d92e045b8d
Windows: replicate old behavior when handling passwords in UI when legacy password maximum length option selected
2019-03-03 23:47:58 +01:00
Mounir IDRASSI
453ef927ef
Windows: Add option to use legacy maximum password length (64 characters) instead of new maximum length (128) in UI and command line. This will users who were relying on the UI truncating the passwords to the first 64 characters in the previous versions of VeraCrypt.
2019-03-03 00:20:49 +01:00
Mounir IDRASSI
ea88c6175c
Windows: fix compilation error
2019-03-02 14:50:22 +01:00
Mounir IDRASSI
f7bc58b38f
Windows: mitigate some memory attacks by making VeraCrypt applications memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code ( https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150 )
2019-03-02 14:45:38 +01:00
Mounir IDRASSI
321715202a
Windows: Generalize RAM encryption for keys to VeraCrypt binaries, especially Format and Expander
2019-03-02 10:23:39 +01:00
Mounir IDRASSI
edd1b00126
Windows Driver: Enable RAM encryption only after its security parameters were created
2019-03-01 00:35:54 +01:00
Mounir IDRASSI
3d6032d69e
Windows: better debug messages for VcProtectKeys and VcUnprotectKeys functions
2019-03-01 00:35:47 +01:00
Mounir IDRASSI
954bfd45d0
Windows Driver: Implement RAM encryption for cached passwords
2019-03-01 00:35:40 +01:00
Mounir IDRASSI
ae5eb73f93
Windows driver: call VcProtectKeys only when RAM encryption enabled although this function does nothing when RAM encryption is disabled.
2019-03-01 00:35:33 +01:00
Mounir IDRASSI
0391b8e550
Windows: Add some logs in functions for RAM encryption
2019-03-01 00:35:27 +01:00
Mounir IDRASSI
8d7a318795
Windows: use specific order for EFI boot arguments memory regions that matches the one used by EFI bootloader.
2019-03-01 00:35:20 +01:00
Mounir IDRASSI
cf48b532b4
Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 cipher and t1ha non-cryptographic fast hash ( https://github.com/leo-yuriev/t1ha )
2019-03-01 00:35:13 +01:00