1
0
mirror of https://github.com/veracrypt/VeraCrypt.git synced 2025-11-11 19:08:26 -06:00
Commit Graph

202 Commits

Author SHA1 Message Date
Mounir IDRASSI
ed1263bf8c Implement detection of volumes with vulnerable XTS master key.
If vulnerability detected, a warning message is displayed during mount or backup/restore header, and changing the password is disallowed since it will not change the master key.
2024-08-02 00:20:53 +02:00
Mounir IDRASSI
f1f626cc56 Increment version to 1.26.12 2024-06-23 21:37:59 +02:00
Mounir IDRASSI
03ad95164b Increment version to 1.26.11. Update Release Notes. 2024-06-23 12:43:26 +02:00
Mounir IDRASSI
455a4f2176 Avoid conflict with C++17 features std::byte by using uint8 type instead of byte 2024-06-12 12:30:04 +02:00
Mounir IDRASSI
7e7d776338 Increment version to 1.26.10. Update signed Windows drivers. 2023-11-09 00:09:00 +01:00
Mounir IDRASSI
4cfb4b03a7 Increment version to 1.26.9 2023-10-11 23:59:02 +02:00
Mounir IDRASSI
06b3095e20 Increment version to 1.26.8 2023-10-10 23:15:18 +02:00
Mounir IDRASSI
35135cd1fb Windows: Fix expansion of volumes on devices with sector size!=512 (by skl0n6) 2023-10-08 15:56:42 +02:00
Mounir IDRASSI
53cbe028cd Increment version to 1.26.7. Set release date to October 1st. Update Windows signed driver files. 2023-09-30 11:20:46 +02:00
Mounir IDRASSI
d02734dfaa Update Release Notes. Increment version to 1.26.6. 2023-09-21 01:31:35 +02:00
Mounir IDRASSI
b1657e88e4 Windows Security: make memory protection enabled by default. Add process mitigation (ASLR, Dynamic code, extension points)
Memory protection can be disabled using registry value "VeraCryptEnableMemoryProtection" under the key "HKLM\SYSTEM\CurrentControlSet\Services\veracrypt"
2023-09-18 00:13:52 +02:00
Mounir IDRASSI
fb8ae98c73 Windows: use same manifest structure for Expander as in Mount and Format 2023-09-18 00:07:10 +02:00
Mounir IDRASSI
aa311a6fad Windows: Indicate in manifest files that support starts from Windows 7 2023-09-10 23:57:53 +02:00
Mounir IDRASSI
2a6726b00e Windows: Replace legacy file/dir selection APIs with modern IFileDialog interface
We remove usage of GetOpenFileNameW/GetSaveFileNameW/SHBrowseForFolderW which are deprecated by Microsoft
2023-09-03 23:42:41 +02:00
Mounir IDRASSI
d68b9546bd Windows: simpler and more robust safe dll loading combined with delay loading thanks to Windows 7 being minimum supported version.
We also block execution on Windows versions older than Windows 7.
A lot of code was removed thanks to this.
2023-09-03 00:58:34 +02:00
Mounir IDRASSI
0dc4754c63 Windows: delay load bcrypt.dll to reduce startup dependency loading until setting safe dll loading 2023-08-20 09:57:38 +02:00
Mounir IDRASSI
fcf0cb94f1 Increment version to 1.26.5. Update signed Windows drivers. 2023-08-14 01:45:37 +02:00
Mounir IDRASSI
334ea9c0b9 Windows: Make Expander progress messages translatable 2023-07-23 10:00:45 +02:00
Mounir IDRASSI
fa6359d424 Windows: Remove TrueCrypt support. Increment version to 1.26.4. 2023-07-22 10:25:22 +02:00
Mounir IDRASSI
a438e19f61 Windows: Support drag-n-drop of files in Expander for mounting. Fix drag-n-drop of keyfiles.
To fix drag-n-drop of keyfiles, we remove the password drop target since it was blocking the standard drop of files and drop target doesn't work because of UIPI restrictions across privilege levels since Expander is started elevated
2023-06-30 23:03:56 +02:00
Mounir IDRASSI
034b64f415 EMV keyfile support: Overall code improvements and bug fixes 2023-06-29 00:06:20 +02:00
mmauv
502ab9112a Add EMV functionality (#1080)
* Add basic strcture needed for EMV implementation

* Add demo EMV functionality with C code pasted in a very dirty and unsafe way. NOT FINAL

* Refactor IccExtractor Structure

* Fix Makefile

* fix include file

* move global variables from h to c

* revert to memcpy

* fix icc data recovery functions

* Add EMV functionalities on windows

* Make EMVToken structures like SecurityToken

* Define constants instead of hard coded values

* Token structures created with inheritance

* refactor TokenKeyfile to use inherit. + polymor.

* add Token.h + Token.cpp in modules in VS2010

* Add a comment at each use of SecurityToken class or objects

* SecurityTokenKeyfilesDialog preparation

* Implemennt GetAvailableTokens in Token class on windows

* merge

* up (patching for Windows)

* foreach Token.cpp corrected

* Display EMV keyfiles on first window in graphic interface

* Add token to Windows UI

* EMVToken selection on OKButton on Linux

* Keyfile.cpp optimization

* Move getKeyfileData in the token class

* EMV::Token GetAvailableKeyfiles() base

* Move getKeyfileData in the token class on unix

* Remove test comments

* Warnings resolved

* RemoveeSecurityTokenLibraryNotInitialized exception if at least one emv token is detected

* Adding new files

* Remove old files and add the new version to the windows project

* Change make_shared to shared_ptr constructor

* IccExtractor integration working on linux

* Throwing card not EMV execption

* catch error when not EMV type in EMVToken::GetAvailableKeyfiles

* Change types to compile on windows

* list all keyfiles, security keyfiles and emv keyfiles in command line

* Change type to be coherent and remove old todo comments

* Remove todo comments

* Change indentation and resolve a bug from previous commit

* Use polymorphism for GetKeyfileData and add export option for EMVTokens on Linux

* Linux : Allow to export EMV Tokens in command lines, Windows : Disable the delete button when EMV Keyfiles are selected

* Remove SlotId from TokenInfo as it is already in Token

* Correct errors on Linux

* Disable delete option if one EMV Token is selected on Linux

* Fix bug enabling delete button if nothing is selected

* emv data used as reference then burnt

* use of normal files in linux corrected

* help updated

* help updated for export functionnality

* option EMV added to graphic interface but not yet working

* Bug fix : Allow to use multiple EMV on windows

* EMV Option added to UserPreferences

* EMV Option working for Linux

* EMV option added to Windows (not working yet)

* [NOT TESTED] EMV option for Windows

* Working EMV option on Windows

* EMV Option for data extraction working for volume creation

* EMV Option for data extraction working for Mount

* EMV Option for data extraction working for mounting favorites volumes

* EMV Option for extraction working for Changing volume password, Set Derivation Key Algorithm and Add or remove keyfile from volume

* Windows : re-checking EMV Option when getting data

* Removing error catches in the IccDataExtractor classe (It only throws error now). Changing GetPan signature to resemble the other functions signatures more

* Changing EMV errors

- Only throwing ICCExtractionException from outside of the ICC module.
- Catching all TLVExceptions and PCSCExceptions to throw the right ICCExtractionException

- Deleting APDU exceptions.

* First version of the documentation

* Adding function pointers for winscard library (but it crashes VeraCrypt)

* Debugging function pointers

* The import of the library on windows work as expected now

* Reverting EMVToken.cpp changes used to test to library import

* Searching for the System32 path instead of hard codding it

* Fixing the bug were VeraCrypt crashes if there is no readers when  "add Token files" is clicked

* Winscard library not initialized in object constructor anymore to delay it after EMVOption check

* Remove winscard lib from windows dependencies

* Properly displaying errors

* Adding a dot in Language.xml

* Catching TLVException

* Removing unused code

* Remove unusefull comments

* Trying to fix 0x1f error

* Update IccDataExtractor.cpp

* Delete History.xml

* Fix get data without get pan

* Cleanup code

* changes for linux compilation but linking not working

* error handling for linux

* erasing emv data

* Burn PAN

* Burn PAN from memory

* Uncomment selfcheck before merging master

* burn corrected

* EMV errors handling for Linux

* EMV working for Linux CLI

* Doc : Winscard Linux package and VeraCrypt versions

---------

Co-authored-by: doriandu45 <d45.poubelle@gmail.com>
Co-authored-by: red4game <redemgaiming@gmail.com>
Co-authored-by: Brice.Namy <brice.namy@insa-rennes.fr>
Co-authored-by: vocthor <pieceo108@gmail.com>
Co-authored-by: vocthor <67202139+vocthor@users.noreply.github.com>
Co-authored-by: Andrei COCAN <andrei.cocan@insa-rennes.fr>
Co-authored-by: AndreiCocan <95496161+AndreiCocan@users.noreply.github.com>
Co-authored-by: francoisLEROUX <francois3443@gmail.com>
2023-06-28 22:51:43 +02:00
Mounir IDRASSI
342f78c090 Increment version to 1.26.3. Update Release Notes 2023-06-28 19:18:35 +02:00
Mounir IDRASSI
78d22e569b Windows: 100% localization of Expander UI strings 2023-06-25 18:08:59 +02:00
Mounir IDRASSI
394ed5d867 Windows: Better language localization support for Expander.
More work is needed to localize remaining string resources
2023-06-25 00:41:02 +02:00
Mounir IDRASSI
2bfeba160c Windows: make Expander first check file existence before proceeding further 2023-06-18 23:31:18 +02:00
Mounir IDRASSI
9086232d17 Increment version to 1.26.2. Update Release Notes 2023-06-04 17:17:54 +02:00
Mounir IDRASSI
5e4e2e0483 Windows: Add dropdown menu to Mount button to allow mounting without cache 2023-06-02 09:39:14 +02:00
Mounir IDRASSI
28aff67293 Windows: Add missing update of libzip zip_err_str.c and fix libzip related project configuration 2023-05-26 00:35:58 +02:00
Mounir IDRASSI
762065917f Windows: Add various checks to address Coverity reported issues. 2022-03-26 21:15:11 +01:00
Mounir IDRASSI
67acba4b4f Increment version to 1.26 and update windows driver and MBR bootloader files 2022-03-21 01:19:02 +01:00
Mounir IDRASSI
3cab3ce37a Increment version to 1.25.9 and update Release Notes. 2022-02-19 22:54:59 +01:00
Mounir IDRASSI
c2b2f80d4f Increment version to 1.25.8.2 and update signed Windows drivers 2022-02-16 23:22:22 +01:00
Mounir IDRASSI
e925dd2f1a Windows: Increment version to 1.25.8.1 and update signed Windows drivers 2022-02-11 00:37:09 +01:00
Mounir IDRASSI
1ef05f24e2 Windows: Reduce the size of installers by almost 50% by using LZMA compression instead of DEFLATE 2022-02-10 01:21:17 +01:00
Mounir IDRASSI
463ae8e6aa Increment version to 1.25.8 2022-02-05 22:51:52 +01:00
Mounir IDRASSI
2d3771c45d Increment version to 1.25.7 and update Release Notes 2022-01-07 00:35:46 +01:00
Mounir IDRASSI
e3267f289b Increment version to 1.25.6. Update Release Notes and add signed Windows driver. 2021-12-27 22:40:28 +01:00
Mounir IDRASSI
e373e72cda Increment version to 1.25.5 and update release notes 2021-12-20 00:19:10 +01:00
Mounir IDRASSI
a21b2270e8 Windows: Implement TESTSIGNING build configuration that allows running under Windows Vista,7, 8 and 8.1. 2021-12-04 23:59:01 +01:00
Mounir IDRASSI
bf9866e812 Increment version to 1.25.4 and set release date to December 3rd 2021 2021-11-30 23:45:17 +01:00
Mounir IDRASSI
1dc9ec2499 Increment version to 1.25 (1.25.3) 2021-11-28 00:50:35 +01:00
Mounir IDRASSI
3a28821b1d Increment version to 1.25-RC2 and update release notes 2021-11-21 21:45:23 +01:00
Mounir IDRASSI
0dd87c07fd Increment version to 1.25-RC1 2021-09-05 20:10:33 +02:00
Mounir IDRASSI
c048e5dae5 Increment version to 1.25 2021-08-30 00:27:10 +02:00
Mounir IDRASSI
33baca7261 Windows: Increment version to 1.24.25.3 and update signed Windows driver 2021-08-15 01:07:03 +02:00
Mounir IDRASSI
ad1b91bf6f Windows: Increment version to 1.24.25.2 and update signed Windows driver 2021-08-02 00:57:32 +02:00
Mounir IDRASSI
c374782436 Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure equivalents
This fixed failure to build driver for ARM64 with latest VS 2019
2021-07-13 22:08:02 +02:00
alt3r 3go
c802db448d interface: add keyboard shortcut to "TrueCrypt mode" in the mount dialog (#729)
I've also updated all the relevant language files.

Closes #95.

Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com>
2021-02-21 10:11:32 +01:00
Mounir IDRASSI
441babf069 Increment version to 1.24-Update9 2021-01-02 01:16:57 +01:00