Commit Graph

397 Commits

Author SHA1 Message Date
Mounir IDRASSI 7e7d776338
Increment version to 1.26.10. Update signed Windows drivers. 2023-11-09 00:09:00 +01:00
Mounir IDRASSI 4cfb4b03a7
Increment version to 1.26.9 2023-10-11 23:59:02 +02:00
Mounir IDRASSI 06b3095e20
Increment version to 1.26.8 2023-10-10 23:15:18 +02:00
Mounir IDRASSI 53cbe028cd
Increment version to 1.26.7. Set release date to October 1st. Update Windows signed driver files. 2023-09-30 11:20:46 +02:00
Mounir IDRASSI 76c64d49ea
Windows: Add tooltip message and help button for new option to disable memory protection
Also a dedicated page in the documentation was added for it.
2023-09-24 01:26:02 +02:00
Mounir IDRASSI d02734dfaa
Update Release Notes. Increment version to 1.26.6. 2023-09-21 01:31:35 +02:00
Mounir IDRASSI 0f3ae268a4
Windows: Add setting in main UI and setup wizard to disable memory protection
This can be useful for users who need Accessibility software that may not work when memory protection is active in VeraCrypt
2023-09-20 09:39:22 +02:00
Mounir IDRASSI b1657e88e4
Windows Security: make memory protection enabled by default. Add process mitigation (ASLR, Dynamic code, extension points)
Memory protection can be disabled using registry value "VeraCryptEnableMemoryProtection" under the key "HKLM\SYSTEM\CurrentControlSet\Services\veracrypt"
2023-09-18 00:13:52 +02:00
Mounir IDRASSI d2f2defca9
Windows: replace CoInitialize calls with CoInitializeEx 2023-09-11 00:03:28 +02:00
Mounir IDRASSI aa311a6fad
Windows: Indicate in manifest files that support starts from Windows 7 2023-09-10 23:57:53 +02:00
Mounir IDRASSI 2a6726b00e
Windows: Replace legacy file/dir selection APIs with modern IFileDialog interface
We remove usage of GetOpenFileNameW/GetSaveFileNameW/SHBrowseForFolderW which are deprecated by Microsoft
2023-09-03 23:42:41 +02:00
Mounir IDRASSI 201d09ff5a
Windows: remove legacy code (XP, Vista). Simplify code since Windows 7 is now minimal OS version. 2023-09-03 16:47:41 +02:00
Mounir IDRASSI d68b9546bd
Windows: simpler and more robust safe dll loading combined with delay loading thanks to Windows 7 being minimum supported version.
We also block execution on Windows versions older than Windows 7.
A lot of code was removed thanks to this.
2023-09-03 00:58:34 +02:00
Mounir IDRASSI 0dc4754c63
Windows: delay load bcrypt.dll to reduce startup dependency loading until setting safe dll loading 2023-08-20 09:57:38 +02:00
Mounir IDRASSI fcf0cb94f1
Increment version to 1.26.5. Update signed Windows drivers. 2023-08-14 01:45:37 +02:00
Mounir IDRASSI 8c7962bda7
Windows: Better way to enable required privileges for FastCreate Options
If we can set required privilege, we ask the user using UAC to enable them.
2023-08-13 00:56:49 +02:00
Mounir IDRASSI e8f83544ea
Windows: Fix false positive detection of new device insertion when clear keys option is enable
When this option is enabled, we first build the list of currently inserted devices then we start listening to insertion events.
When a device insertion occurs, we check if this device is on our list and if yes, we ignore its insertion.
We also ignore devices whose Device ID starts with "SWD\" and "ROOT\" since these are not real devices.
2023-08-05 00:45:39 +02:00
Mounir IDRASSI fa6359d424
Windows: Remove TrueCrypt support. Increment version to 1.26.4. 2023-07-22 10:25:22 +02:00
Mounir IDRASSI 17dcd73936
Windows: Don't make Mount button split button if it is for dismounting
If the currently selected item in the drive list is a mounted volume that can be dismounted, the Mount button displays "Dismount" and so we should not add the popup menu of "mount without cache" to it.
2023-07-01 09:58:36 +02:00
Mounir IDRASSI 034b64f415
EMV keyfile support: Overall code improvements and bug fixes 2023-06-29 00:06:20 +02:00
mmauv 502ab9112a
Add EMV functionality (#1080)
* Add basic strcture needed for EMV implementation

* Add demo EMV functionality with C code pasted in a very dirty and unsafe way. NOT FINAL

* Refactor IccExtractor Structure

* Fix Makefile

* fix include file

* move global variables from h to c

* revert to memcpy

* fix icc data recovery functions

* Add EMV functionalities on windows

* Make EMVToken structures like SecurityToken

* Define constants instead of hard coded values

* Token structures created with inheritance

* refactor TokenKeyfile to use inherit. + polymor.

* add Token.h + Token.cpp in modules in VS2010

* Add a comment at each use of SecurityToken class or objects

* SecurityTokenKeyfilesDialog preparation

* Implemennt GetAvailableTokens in Token class on windows

* merge

* up (patching for Windows)

* foreach Token.cpp corrected

* Display EMV keyfiles on first window in graphic interface

* Add token to Windows UI

* EMVToken selection on OKButton on Linux

* Keyfile.cpp optimization

* Move getKeyfileData in the token class

* EMV::Token GetAvailableKeyfiles() base

* Move getKeyfileData in the token class on unix

* Remove test comments

* Warnings resolved

* RemoveeSecurityTokenLibraryNotInitialized exception if at least one emv token is detected

* Adding new files

* Remove old files and add the new version to the windows project

* Change make_shared to shared_ptr constructor

* IccExtractor integration working on linux

* Throwing card not EMV execption

* catch error when not EMV type in EMVToken::GetAvailableKeyfiles

* Change types to compile on windows

* list all keyfiles, security keyfiles and emv keyfiles in command line

* Change type to be coherent and remove old todo comments

* Remove todo comments

* Change indentation and resolve a bug from previous commit

* Use polymorphism for GetKeyfileData and add export option for EMVTokens on Linux

* Linux : Allow to export EMV Tokens in command lines, Windows : Disable the delete button when EMV Keyfiles are selected

* Remove SlotId from TokenInfo as it is already in Token

* Correct errors on Linux

* Disable delete option if one EMV Token is selected on Linux

* Fix bug enabling delete button if nothing is selected

* emv data used as reference then burnt

* use of normal files in linux corrected

* help updated

* help updated for export functionnality

* option EMV added to graphic interface but not yet working

* Bug fix : Allow to use multiple EMV on windows

* EMV Option added to UserPreferences

* EMV Option working for Linux

* EMV option added to Windows (not working yet)

* [NOT TESTED] EMV option for Windows

* Working EMV option on Windows

* EMV Option for data extraction working for volume creation

* EMV Option for data extraction working for Mount

* EMV Option for data extraction working for mounting favorites volumes

* EMV Option for extraction working for Changing volume password, Set Derivation Key Algorithm and Add or remove keyfile from volume

* Windows : re-checking EMV Option when getting data

* Removing error catches in the IccDataExtractor classe (It only throws error now). Changing GetPan signature to resemble the other functions signatures more

* Changing EMV errors

- Only throwing ICCExtractionException from outside of the ICC module.
- Catching all TLVExceptions and PCSCExceptions to throw the right ICCExtractionException

- Deleting APDU exceptions.

* First version of the documentation

* Adding function pointers for winscard library (but it crashes VeraCrypt)

* Debugging function pointers

* The import of the library on windows work as expected now

* Reverting EMVToken.cpp changes used to test to library import

* Searching for the System32 path instead of hard codding it

* Fixing the bug were VeraCrypt crashes if there is no readers when  "add Token files" is clicked

* Winscard library not initialized in object constructor anymore to delay it after EMVOption check

* Remove winscard lib from windows dependencies

* Properly displaying errors

* Adding a dot in Language.xml

* Catching TLVException

* Removing unused code

* Remove unusefull comments

* Trying to fix 0x1f error

* Update IccDataExtractor.cpp

* Delete History.xml

* Fix get data without get pan

* Cleanup code

* changes for linux compilation but linking not working

* error handling for linux

* erasing emv data

* Burn PAN

* Burn PAN from memory

* Uncomment selfcheck before merging master

* burn corrected

* EMV errors handling for Linux

* EMV working for Linux CLI

* Doc : Winscard Linux package and VeraCrypt versions

---------

Co-authored-by: doriandu45 <d45.poubelle@gmail.com>
Co-authored-by: red4game <redemgaiming@gmail.com>
Co-authored-by: Brice.Namy <brice.namy@insa-rennes.fr>
Co-authored-by: vocthor <pieceo108@gmail.com>
Co-authored-by: vocthor <67202139+vocthor@users.noreply.github.com>
Co-authored-by: Andrei COCAN <andrei.cocan@insa-rennes.fr>
Co-authored-by: AndreiCocan <95496161+AndreiCocan@users.noreply.github.com>
Co-authored-by: francoisLEROUX <francois3443@gmail.com>
2023-06-28 22:51:43 +02:00
Mounir IDRASSI 342f78c090
Increment version to 1.26.3. Update Release Notes 2023-06-28 19:18:35 +02:00
Mounir IDRASSI 9086232d17
Increment version to 1.26.2. Update Release Notes 2023-06-04 17:17:54 +02:00
Mounir IDRASSI 5e4e2e0483
Windows: Add dropdown menu to Mount button to allow mounting without cache 2023-06-02 09:39:14 +02:00
Mounir IDRASSI 762065917f
Windows: Add various checks to address Coverity reported issues. 2022-03-26 21:15:11 +01:00
Mounir IDRASSI 67acba4b4f
Increment version to 1.26 and update windows driver and MBR bootloader files 2022-03-21 01:19:02 +01:00
Mounir IDRASSI 36795a688f
Implement support of Blake2s-256 hash algorithm and remove deprecated algorithms RIPEMD-160 and GOST89. 2022-03-08 00:29:26 +01:00
Mounir IDRASSI 3cab3ce37a
Increment version to 1.25.9 and update Release Notes. 2022-02-19 22:54:59 +01:00
Mounir IDRASSI c2b2f80d4f
Increment version to 1.25.8.2 and update signed Windows drivers 2022-02-16 23:22:22 +01:00
Mounir IDRASSI e925dd2f1a
Windows: Increment version to 1.25.8.1 and update signed Windows drivers 2022-02-11 00:37:09 +01:00
Mounir IDRASSI 1ef05f24e2
Windows: Reduce the size of installers by almost 50% by using LZMA compression instead of DEFLATE 2022-02-10 01:21:17 +01:00
Mounir IDRASSI 302dc37fb9
Windows: Make Travel Disk contains 32-bit and arm64 binaries when VeraCrypt installed using MSI 2022-02-10 01:20:25 +01:00
Mounir IDRASSI 463ae8e6aa
Increment version to 1.25.8 2022-02-05 22:51:52 +01:00
Mounir IDRASSI ebb67499f1
Windows: Fix failure to create Traveler Disk when VeraCrypt is installed using MSI 2022-02-02 01:23:34 +01:00
Mounir IDRASSI 9b88625d97
Windows: Make MSI installer compatible with System Encryption by leveraging VeraCrypt service capabilities 2022-02-01 23:32:55 +01:00
Mounir IDRASSI 2d3771c45d
Increment version to 1.25.7 and update Release Notes 2022-01-07 00:35:46 +01:00
Mounir IDRASSI e3267f289b
Increment version to 1.25.6. Update Release Notes and add signed Windows driver. 2021-12-27 22:40:28 +01:00
Mounir IDRASSI e373e72cda
Increment version to 1.25.5 and update release notes 2021-12-20 00:19:10 +01:00
Mounir IDRASSI a21b2270e8
Windows: Implement TESTSIGNING build configuration that allows running under Windows Vista,7, 8 and 8.1. 2021-12-04 23:59:01 +01:00
Mounir IDRASSI bf9866e812
Increment version to 1.25.4 and set release date to December 3rd 2021 2021-11-30 23:45:17 +01:00
Mounir IDRASSI 622aaf4ef2
Windows: Try to workaround Windows Updates issues by fixing of bootloader and SetupConfig.ini when session logged in/unlocked or system resumes 2021-11-29 22:24:04 +01:00
Mounir IDRASSI 1dc9ec2499
Increment version to 1.25 (1.25.3) 2021-11-28 00:50:35 +01:00
Mounir IDRASSI 3a28821b1d
Increment version to 1.25-RC2 and update release notes 2021-11-21 21:45:23 +01:00
Mounir IDRASSI 0dd87c07fd
Increment version to 1.25-RC1 2021-09-05 20:10:33 +02:00
Mounir IDRASSI c048e5dae5
Increment version to 1.25 2021-08-30 00:27:10 +02:00
Mounir IDRASSI 33baca7261
Windows: Increment version to 1.24.25.3 and update signed Windows driver 2021-08-15 01:07:03 +02:00
Mounir IDRASSI ad1b91bf6f
Windows: Increment version to 1.24.25.2 and update signed Windows driver 2021-08-02 00:57:32 +02:00
Mounir IDRASSI 66acbbf6a3
Windows: Copy ARM64 binaries when creating Traveler Disk and when VeraCrypt is installed 2021-07-14 14:07:15 +02:00
Mounir IDRASSI c374782436
Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure equivalents
This fixed failure to build driver for ARM64 with latest VS 2019
2021-07-13 22:08:02 +02:00
alt3r 3go c802db448d
interface: add keyboard shortcut to "TrueCrypt mode" in the mount dialog (#729)
I've also updated all the relevant language files.

Closes #95.

Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com>
2021-02-21 10:11:32 +01:00