Commit Graph

1451 Commits

Author SHA1 Message Date
El Mostafa Idrassi
621330b726 MacOSX: Fixed devices / partitions not showing in the device selection dialog (#516)
To get the size of each device / partition on the system, the method 'GetDeviceSize()' in 'src/Core/Unix/CoreUnix.cpp' first opens
the device / partition using 'open()' function to get a File Descriptor, then retrieves its size using this File Descriptor.

Starting OS X 10.11 ("El Capitan"), a feature called "System Integrity Protection (SIP)" or less formally, "rootless mode" has been added.
This feature blocks access to certain critical aspects of the OS and Hardware by 3rd-Party programs.
Specifically, low-level access to the system disks, devices and partitions is forbidden ; namely functions like 'open()' for instance fail
with the error code : "EPERM = Operation Not Permitted".

Therefore, for system devices / partitions, 'GetDeviceSize()' fails because of the failure of the 'open()' function, and throws an exception,
which is then caught inside the method 'GetHostDevices()' in '/src/Core/Unix/FreeBSD/CoreFreeBSD.cpp' : this leads to the size of the
device / partition being set to '0'.

Therefore, in the constructor of 'DeviceSelectionDialog' in 'src/Main/Forms/DeviceSelectionDialog.cpp', when the size of a device is '0',
the whole device is skipped, leading to all of its partitions not being treated or shown, even though some of these partitions may have a size which is != 0.

This commit fixes the issue by :
1 - First, checking whether the device size is '0'. If it is the case, the code loops through all the devices partitions : if there is at least one partition
with a size != 0, the device is not skipped. Otherwise, it is.
2 - Then, if the size of the device is '0', the size of the device is not shown to avoid confusing the user.
Also, since the device is not usable, the 'OK' button is not active when the device is selected.
3 - Finally, if a partition's size is '0', it is not shown since it is not usable : we cannot open it.

Signed-off-by: El Mostafa IDRASSI <el-mostafa.idrassi@prestalab.net>
2019-10-11 17:02:03 +02:00
El Mostafa Idrassi
9463a628a6 Linux/FreeBSD: Use of 'sudo -n uptime' command to check whether user has an active 'sudo' session instead of the use of a 'dummy' password. (#513)
Signed-off-by: El Mostafa IDRASSI <el-mostafa.idrassi@prestalab.net>
2019-10-08 18:11:50 +02:00
El Mostafa Idrassi
15a8cde6f5 Updated and fixed build and packaging scripts. (#512)
Now, under Debian 10+ and Ubuntu 18.04+, we link against the GTK-3 version of wxWidgets (libwxgtk3.0-gtk3-0v5).
Under Debian 9- and Ubuntu 16.04, we link against the GTK-2 version of wxWidgets (libwxgtk3.0-0v5) which is the
only one available.

Also, we now have 2 separate RPM scripts : 'build_cmake_rpm_gtk2.sh' which builds wxWidgets and links it against GTK-2,
then links VeraCrypt against 'gtk2' package (typically to be used under CentOS 6) and 'build_cmake_rpm_gtk3' which builds
wxWidgets and links it against GTK-3, then links VeraCrypt against 'gtk3' package (typically to be used under CentOS 7+).
2019-10-07 18:49:46 +02:00
Mounir IDRASSI
6d7f7527be
MacOSX: fix link error under Xcode 4.6.3 2019-10-06 19:14:45 +02:00
Mounir IDRASSI
a4145721a7
Linux/FreeBSD: change location of documentation from /usr/share/veracrypt/doc to the standard /usr/share/doc/veracrypt 2019-10-06 13:30:47 +02:00
Mounir IDRASSI
be6c817873
Increment version to 1.24 2019-10-06 11:26:20 +02:00
Mounir IDRASSI
af9e0f0482
Linux: modifications to cmake files to use GTK3 on CentOS and change packages names 2019-10-05 19:21:33 +02:00
Mounir IDRASSI
4fe4cbc568
Linux: Add option in Makefile to use GTK3 in VeraCrypt static build 2019-10-05 19:07:03 +02:00
Mounir IDRASSI
4f24e877aa
Update Release Notes to indicate use of libzip 1.5.2 2019-10-04 21:44:51 +02:00
El Mostafa Idrassi
d2c53bc373 Linux: Added CMake script for creating .DEBs and .RPMs for VeraCrypt using CPack, and shell scripts which build then package VeraCrypt under CentOS and Debian/Ubuntu. (#511)
The DEB script builds VeraCrypt and links it against wxWidgets that comes with the distribution.
The RPM script awaits for wxWidgets-3.0.4 source code which it builds then links VeraCrypt statically to it.
Both scripts create the corresponding package after the build.
2019-10-04 21:33:46 +02:00
El Mostafa Idrassi
48ef6c3736 Linux : Added missing 'mkdir' before installing in case $DESTDIR does not exist (#510) 2019-10-04 21:26:25 +02:00
Mounir IDRASSI
b6babc688d
Windows: Update libzip to version 1.5.2 2019-10-04 21:15:10 +02:00
El Mostafa Idrassi
9a895bedde Fix "error "SSSE3 instruction set not enabled" when compiling using GCC version < 4.9 without -mssse3 option (SSSE3=1 when using make). (#507)
Compiling with -mxxx defines the corresponding macro of the intrinsics.
For example, -mssse3 defines __SSSE3__ macro to 1.

In GCC versions < 4.9, it is not possible to use and call x86 intrinsics only at runtime without
compiling the entire file with the -mxxx option.

For example, if we want to call SSSE3 intrinsics without compiling with -mssse3, the macro __SSSE3__ is not defined.
Therefore, when including <tmmintrin.h>, this results in "error "SSSE3 instruction set not enabled"" because of :
	#ifndef __SSSE3__
	# error "SSSE3 instruction set not enabled"
Since GCC 4.9, this has been fixed and it is possible to call x86 intrinsics from select functions in a file
that are tagged with the corresponding target attribute without having to compile the entire file with the -mxxx option.
This can be seen in <tmmintrin.h> which in recent versions (>= 4.9) contains :
	#ifndef __SSSE3__
	#pragma GCC push_options
	#pragma GCC target("ssse3")
	#define __DISABLE_SSSE3__

Since SSSE3 is only used under Windows for ChaCha256, this can be fixed by preceding '#include <tmmintrin.h>' with
#if defined (_MSC_VER) && !defined (TC_WINDOWS_BOOT).

See https://gcc.gnu.org/gcc-4.9/changes.html
2019-10-04 14:07:10 +02:00
Mounir IDRASSI
1fb81d1a43
Clarify in Release Notes that RAM encryption disables Hibernate only if System Encryption is being used. 2019-10-04 11:45:55 +02:00
Mounir IDRASSI
0e931b19fe
Update Release Notes for 1.24-Beta6 2019-10-03 21:44:57 +02:00
Mounir IDRASSI
ccda60f82f
Windows: If Secure Desktop is started and random generator was not initialized before us, then stop random generator after we finish in order to avoid consuming CPU because of periodic fast poll thread. Next time a critical operation that requires RNG is performed, it will be initialized again. We do this because since the addition of secure desktop support, every time secure desktop is displayed, the RNG fast poll thread was started even if the user will never perform any critical operation that requires random bytes. 2019-10-03 19:32:45 +02:00
Mounir IDRASSI
1298f83aa4
Windows: Add function RandinitWithCheck to detect if random generator was already initialized before our call or not 2019-10-03 19:32:39 +02:00
Mounir IDRASSI
9f91c47bd2
Windows: Use Jitterentropy RNG only in SlowPoll call and not in FastPoll since the it consumes too much CPU and FastPoll requires fast and minimal entropy gathering 2019-10-03 19:32:33 +02:00
El Mostafa Idrassi
be09fa8a53 '#define VERSION_STRING XXX' must come before '#define VERSION_STRING_SUFFIX YYY' (#506)
in order for 'export TC_VERSION := $(shell grep VERSION_STRING ../Common/Tcdefs.h | head -n 1 | cut -d'"' -f 2)'
in 'src/Main/Main.make' to actually return the version rather than '-CustomEFI'.
2019-10-03 16:34:43 +02:00
Ettore Atalan
75d0bb97cb Update german translation (#505)
Translated newly added text string.
2019-10-03 11:04:59 +02:00
Mounir IDRASSI
400bb52247
Linux/MacOSX:check that the requested size of file container is less than available
disk free space. Add a CLI switch to disable this check.
2019-10-02 22:31:28 +02:00
Felix Reichmann
f16a298d9f German translation (#491)
* Corrected german translation

* Delete .gitignore
2019-10-02 22:07:18 +02:00
Unit 193
bb2eaa6697 Utilize $(BASE_DIR) in the install targets rather than $(PWD) and $(CURDIR) (#472)
As $(PWD) is not always the expected value and can result in failing the target.
2019-10-02 21:59:13 +02:00
Felix Reichmann
66e43753cb Added creation of Rescue USB Drive (#486)
- In my tests it was not possible to create a usb Stick with Unetbootin like mentioned in this post: https://sourceforge.net/p/veracrypt/discussion/features/thread/5453c652/#97df
- I followed the instructions mentioned by Mounir IDRASSI in this post: https://sourceforge.net/p/veracrypt/discussion/features/thread/5453c652/#8e81
- In my test the usb_format.exe does not work, but the Windows internal formatting led to the same results.
2019-10-02 21:35:34 +02:00
Skid
4f16f763bb [FR] Fix some translation issues (#473)
* Fix some translation issues

* Update Translations/Language.fr.xml

Co-Authored-By: Luclu7 <luclu7@luclu7.fr>
2019-10-02 21:33:18 +02:00
Unit 193
10c4a3e807 Allow $(ARCH) to be defined during build (#471)
This can be useful when crossbuilding or building in a chroot where using
uname -m would cause the wrong compiler options.
2019-10-02 21:31:07 +02:00
Hans-Peter Jansen
0d91dab5b9 Align section types of Whirlpool_C and SHA256_K (#479)
in order to fix LTO linking.

After switching to LTO for openSUSE Tumbleweed, veracrypt build failed with:
[  185s] ../Crypto/Whirlpool.c:105:45: error: 'Whirlpool_C' causes a section type conflict with 'SHA256_K'
[  185s]   105 | CRYPTOPP_ALIGN_DATA(16) static const uint64 Whirlpool_C[8*256+R] CRYPTOPP_SECTION_ALIGN16 = {
[  185s]       |                                             ^
[  185s] ../Crypto/Sha2.c:321:34: note: 'SHA256_K' was declared here
[  185s]   321 | CRYPTOPP_ALIGN_DATA(16) uint_32t SHA256_K[64] CRYPTOPP_SECTION_ALIGN16 = {
[  185s]       |                                  ^
[  185s] lto-wrapper: fatal error: g++ returned 1 exit status

Aligning section types of Whirlpool_C and SHA256_K fixes this.
2019-10-02 21:25:10 +02:00
Mounir IDRASSI
e211749c7c
Documentation: Add missing documentation for Format command line switch /nosizecheck 2019-10-02 19:04:18 +02:00
Mounir IDRASSI
b39a724f26
Windows: Add support for /nosizecheck switch in Format command line file container creation 2019-10-02 19:04:12 +02:00
Mounir IDRASSI
fa3d4c79c9
Increment version to 1.24-Beta6 2019-10-02 11:40:08 +02:00
Mounir IDRASSI
3923d11c7b
Windows Driver: Disable Hibernation when RAM encryption is enabled since we can't resume from Hibernation without RAM encryption keys (a chicken and egg situation) 2019-10-01 15:09:35 +02:00
Mounir IDRASSI
9b804137e0
Windows: when periodic update of device is disabled, use SetupAPI to list disks on demand instead of testing all disks to reduce CPU usage. 2019-09-30 22:27:55 +02:00
Mounir IDRASSI
e3afa296c7
Windows: resize VeraCrypt Format Wizard and Mount Options dialogs to fix some text truncation issues with non-English languages. 2019-09-30 22:27:48 +02:00
Mounir IDRASSI
14fecc93f7
Documentation: Add missing documentation for command line switch (/cache PIM) to enable both password and PIM cache 2019-09-29 17:51:42 +02:00
Mounir IDRASSI
128234c066
Windows: Update the encoded hash of the code signing certificate used to verify the integrity of binaries. 2019-09-29 16:07:49 +02:00
Mounir IDRASSI
3e5b7e1457
Windows: update signing script to use newly issued IDRIX SHA-1 code signing certificate. 2019-09-29 16:07:42 +02:00
Mounir IDRASSI
15fc29dc6b
Windows: Add latest 1.24 EFI bootloader files that are signed by Microsoft that come with the following modifications: - Fix issue that was preventing Streebog hash from being selected manually during Pre-Boot authentication - Ensure that the correct Windows bootloader is executed when the user press ESCAPE - make the rescue disk boot machine directly from disk if "VeraCrypt" folder is missing. This make it easy to create a bootable disk for VeraCrypt from the rescue disk by just removing or renaming its "VeraCrypt" folder. 2019-09-29 16:07:35 +02:00
Mounir IDRASSI
909255d55f
Windows: Use periodic update of connected devices only if there is a Favorite that uses VolumeID. Add command option to disable the period update of devices. 2019-09-29 16:07:28 +02:00
Mounir IDRASSI
7d88577c61
Windows: fix another typo in code comment (hopefully last one!) 2019-09-27 18:23:32 +02:00
Mounir IDRASSI
d8ac0f7ec7
Windows: fix typo in code comment 2019-09-27 00:33:22 +02:00
Mounir IDRASSI
684259b438
Windows: Fix sporadic keyboard issue in Secure Desktop for password dialog by not using the trick to put it reliably in foreground. The trick is based on a emulation of ALT+TAB but sometimes ALT key would remain pressed in case of Secure Desktop making it impossible to type the password (a workaround was to press CTRL key which reset the state of ALT key) 2019-09-26 23:01:46 +02:00
Mounir IDRASSI
0e2be7153f
Language Files: update polish translation 2019-09-26 10:28:13 +02:00
Mounir IDRASSI
685130c100
Language XML files: update Russian XML file by Dmitry Yerokhin. 2019-09-26 10:28:07 +02:00
Mounir IDRASSI
d0e49804e2
XML Language files: update Chinese translation 2019-09-25 23:14:33 +02:00
Mounir IDRASSI
2a652b842f
Windows: Add two missing UI strings to XML translation files so that they can be localized correctly 2019-09-25 17:44:08 +02:00
Mounir IDRASSI
06e8fbace7
Windows: Disable the Keyfiles button in system encryption wizard since we don't support them yet. 2019-09-25 17:43:59 +02:00
Mounir IDRASSI
c8beacbdd7
Linux/OSX: make CLI switch --import-token-keyfiles compatible with Non-Interactive
mode by using keyfiles passed as arguments and check the Non-Interactive
mode switch.
2019-09-24 22:06:44 +02:00
Mounir IDRASSI
89a8b0c262
Language XML files: update Russian XML file by Dmitry Yerokhin. 2019-09-24 18:31:05 +02:00
Mounir IDRASSI
8021d44465
Windows: fix HourGlass cursor showing up in main UI after launching disk decryption wizard/ 2019-09-24 18:30:58 +02:00
Mounir IDRASSI
6b10f88e40
Fix build error of UEFI bootloader caused by latest changes that introduced ChaCha20 and T1HA algorithms and which are not present nor used in UEFI bootloader 2019-09-23 00:07:15 +02:00