This archive contains the source code of VeraCrypt.
It is based on original TrueCrypt 7.1a with security enhancements and modifications.
Important
=========
You may use the source code contained in this archive only if you accept and
agree to the license terms contained in the file 'License.txt', which is
included in this archive.
Note that the license specifies, for example, that a derived work must not be
called 'TrueCrypt' or 'VeraCrypt'
Contents
========
I. Windows
Requirements for Building VeraCrypt for Windows.
Instructions for Building VeraCrypt for Windows.
Instructions for Signing and Packaging VeraCrypt for Windows.
II. Linux and Mac OS X
Requirements for Building VeraCrypt for Linux and Mac OS X.
Instructions for Building VeraCrypt for Linux and Mac OS X.
Mac OS X specifics
III. FreeBSD
IV. Third-Party Developers (Contributors)
V. Legal Information
VI. Further Information
I. Windows
==========
Requirements for Building VeraCrypt for Windows:
------------------------------------------------
- Microsoft Visual C++ 2010 SP1 (Professional Edition or compatible)
- Microsoft Visual C++ 2019
- Microsoft Visual C++ 1.52 (available from MSDN Subscriber Downloads)
- Microsoft Windows SDK for Windows 7.1 (configured for Visual C++ 2010)
- Microsoft Windows SDK for Windows 8.1 (needed for SHA-256 code signing)
- Microsoft Windows Driver Kit 7.1.0 (build 7600.16385.1)
- NASM assembler 2.08 or compatible
- YASM 1.3.0 or newer.
- gzip compressor
- upx packer (available at https://upx.github.io/)
IMPORTANT:
The 64-bit editions of Windows Vista and later versions of Windows, and in
some cases (e.g. playback of HD DVD content) also the 32-bit editions, do not
allow the VeraCrypt driver to run without an appropriate digital signature.
Therefore, all .sys files in official VeraCrypt binary packages are digitally
signed with the digital certificate of the IDRIX, which was issued by
GlobalSign certification authority. At the end of each official .exe and
.sys file, there are embedded digital signatures and all related certificates
(i.e. all certificates in the relevant certification chain, such as the
certification authority certificates, CA-MS cross-certificate, and the
IDRIX certificate).
Keep this in mind if you compile VeraCrypt and compare your binaries with the
official binaries. If your binaries are unsigned, the sizes of the official
binaries will usually be approximately 10 KiB greater than sizes of your
binaries (there may be further differences if you use a different version of
the compiler, or if you install a different or no service pack for Visual
Studio, or different hotfixes for it, or if you use different versions of
the required SDKs).
Instructions for Building VeraCrypt for Windows:
------------------------------------------------
1) Create an environment variable 'MSVC16_ROOT' pointing to the folder 'MSVC15'
extracted from the Visual C++ 1.52 self-extracting package.
Note: The 16-bit installer MSVC15\SETUP.EXE cannot be run on 64-bit Windows,
but it is actually not necessary to run it. You only need to extract the
folder 'MSVC15', which contains the 32-bit binaries required to build the
VeraCrypt Boot Loader.
2) If you have installed the Windows Driver Development Kit in another
directory than '%SYSTEMDRIVE%\WinDDK', create an environment variable
'WINDDK_ROOT' pointing to the DDK installation directory.
3) Open the solution file 'VeraCrypt.sln' in Microsoft Visual Studio 2010.
4) Select 'All' as the active solution configuration and WIN32 as the active
platform.
5) Build the solution.
6) Select x64 as the active platform and build the solution again.
7) Open the solution file 'VeraCrypt_vs2019.sln' in Microsoft Visual Studio 2019.
8) Select 'All' as the active solution configuration and ARM64 as the active
platform.
9) Build the solution.
6) If successful, there should be newly built VeraCrypt binaries in the
'Release\Setup Files' folder.
Instructions for Signing and Packaging VeraCrypt for Windows:
-------------------------------------------------------------
First, create an environment variable 'WSDK81' pointing to the Windows SDK
for Windows 8.1 installation directory.
The folder "Signing" contains a batch file (sign.bat) that will sign all
VeraCrypt components using a code signing certificate present on the
certificate store and also build the final installation setup and MSI package.
The batch file suppose that the code signing certificate is issued by
GlobalSign. This is the case for IDRIX's certificate. If yours is issued by
another CA, then you should put its intermediate certificates in the "Signing"
folder and modify sign.bat accordingly.
In order to generate MSI packages, WiX Toolset v3.11 must be installed.
VeraCrypt EFI Boot Loader:
--------------------------
VeraCrypt source code contains pre-built EFI binaries under src\Boot\EFI.
The source code of VeraCrypt EFI Boot Loader is licensed under LGPL and
it is available at https://github.com/veracrypt/VeraCrypt-DCS.
For build instructions, please refer to the file src\Boot\EFI\Readme.txt.
II. Linux and Mac OS X
======================
Requirements for Building VeraCrypt for Linux and Mac OS X:
-----------------------------------------------------------
- GNU Make
- GNU C++ Compiler 4.0 or compatible
- Apple Xcode (Mac OS X only)
- YASM 1.3.0 or newer (Linux only, x86/x64 architecture only)
- pkg-config
- wxWidgets 3.0 shared library and header files installed or
wxWidgets 3.0 library source code (available at https://www.wxwidgets.org)
- FUSE library and header files (available at https://github.com/libfuse/libfuse
and https://osxfuse.github.io/)
Instructions for Building VeraCrypt for Linux and Mac OS X:
-----------------------------------------------------------
1) Change the current directory to the root of the VeraCrypt source code.
2) If you have no wxWidgets shared library installed, run the following
command to configure the wxWidgets static library for VeraCrypt and to
build it:
$ make WXSTATIC=1 WX_ROOT=/usr/src/wxWidgets wxbuild
The variable WX_ROOT must point to the location of the source code of the
wxWidgets library. Output files will be placed in the './wxrelease/'
directory.
3) To build VeraCrypt, run the following command:
$ make
or if you have no wxWidgets shared library installed:
$ make WXSTATIC=1
4) If successful, the VeraCrypt executable should be located in the directory
'Main'.
By default, a universal executable supporting both graphical and text user
interface (through the switch --text) is built.
On Linux, a console-only executable, which requires no GUI library, can be
built using the 'NOGUI' parameter:
$ make NOGUI=1 WXSTATIC=1 WX_ROOT=/usr/src/wxWidgets wxbuild
$ make NOGUI=1 WXSTATIC=1
On MacOSX, building a console-only executable is not supported.
Mac OS X specifics:
-----------------------------------------------------------
Under MacOSX, the SDK for OSX 11.3 is used by default. To use another version
of the SDK (i.e. 10.15), you can export the environment variable VC_OSX_TARGET:
$ export VC_OSX_TARGET=10.15
Before building under MacOSX, pkg-config must be installed if not yet available.
Get it from https://pkgconfig.freedesktop.org/releases/pkg-config-0.28.tar.gz and
compile using the following commands :
$ ./configure --with-internal-glib
$ make
$ sudo make install
After making sure pkg-config is available, download and install OSXFuse from
https://osxfuse.github.io/
The script build_veracrypt_macosx.sh available under "src/Build" performs the
full build of VeraCrypt including the creation of the installer pkg. It expects
to find the wxWidgets 3.1.2 sources at the same level as where you put
VeraCrypt sources (i.e. if "src" path is "/Users/joe/Projects/VeraCrypt/src"
then wxWidgets should be at "/Users/joe/Projects/wxWidgets-3.1.2")
The build process uses Code Signing certifica
没有合适的资源?快使用搜索试试~ 我知道了~
veracrypt U盘磁盘加密 源代码编译部署
共2283个文件
obj:525个
h:279个
cod:259个
需积分: 5 12 下载量 80 浏览量
2022-04-20
13:55:15
上传
评论 1
收藏 168.76MB RAR 举报
温馨提示
1、包含 VeraCrypt 的源代码。它基于原始的 TrueCrypt 7.1a,并进行了安全增强和修改。 2、详情可以参考【项目部署】veracry windows版源码编译https://blog.csdn.net/m0_66345324/article/details/123691767
资源详情
资源评论
资源推荐
收起资源包目录
veracrypt U盘磁盘加密 源代码编译部署 (2283个子文件)
AesSmall_x86.asm 37KB
sha512_avx2_x64.asm 27KB
Aes_x64.asm 26KB
sha256_avx2_x64.asm 25KB
sha256_avx1_x64.asm 16KB
sha256_sse4_x64.asm 15KB
Aes_x86.asm 15KB
sha512_avx1_x64.asm 13KB
sha512_sse4_x64.asm 13KB
gost89_x64.asm 11KB
rdrand_ml.asm 6KB
rdseed_ml.asm 6KB
Aes_hw_cpu.asm 5KB
BootSector.asm 5KB
BootCrt.asm 652B
sha256_avx2_x86.asm 281B
sha512_avx2_x86.asm 281B
sha256_avx1_x86.asm 281B
sha512_sse4_x86.asm 281B
sha256_sse4_x86.asm 281B
sha512_avx1_x86.asm 281B
gost89_x86.asm 0B
bench.bat 12KB
build_msi_x64.bat 7KB
sign_test.bat 4KB
sign_test_debug.bat 3KB
sign.bat 3KB
sign_TESTSIGNING.bat 2KB
create_chm.bat 191B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
BootSector.bin 512B
Textual_logo_288dpi.bmp 216KB
VeraCrypt_Wizard.bmp 189KB
Logo_288dpi.bmp 61KB
Logo_288dpi.bmp 49KB
VeraCrypt_setup.bmp 48KB
VeraCrypt_setup.bmp 48KB
Textual_logo_96dpi.bmp 24KB
Logo_96dpi.bmp 7KB
Logo_96dpi.bmp 5KB
Drive_icon_96dpi.bmp 1KB
System_drive_icon_96dpi.bmp 1KB
VeraCrypt_setup_background.bmp 822B
Textual_logo_background.bmp 822B
VeraCrypt_setup_background.bmp 822B
Drive_icon_mask_96dpi.bmp 110B
System_drive_icon_mask_96dpi.bmp 110B
template.dmg.bz2 8.86MB
kuznyechik_simd.c 1.03MB
Dlgcode.c 424KB
kuznyechik.c 421KB
Mount.c 374KB
Tcformat.c 317KB
Ntdriver.c 166KB
Camellia.c 122KB
Setup.c 120KB
Streebog.c 116KB
Tests.c 79KB
LzmaEnc.c 79KB
deflate.c 77KB
DriveFilter.c 77KB
Setup.c 76KB
Whirlpool.c 68KB
Twofish.c 63KB
InPlace.c 62KB
inflate.c 54KB
Inflate.c 45KB
trees.c 43KB
Volumes.c 42KB
LzFind.c 39KB
Format.c 38KB
LzmaDec.c 37KB
Crypto.c 36KB
EncryptedIoQueue.c 35KB
LzFindMt.c 35KB
Ntvol.c 35KB
Wizard.c 34KB
Pkcs5.c 33KB
zip_dirent.c 31KB
AesSmall.c 31KB
ExpandVolume.c 28KB
Xts.c 27KB
共 2283 条
- 1
- 2
- 3
- 4
- 5
- 6
- 23
小卓仗剑走天涯
- 粉丝: 2681
- 资源: 22
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- nuget 库官方下载包,可使用解压文件打开解压使用
- 非wine、原生Linux迅雷安装包deb文件,支持Ubuntu、UOS统信、深度Deepin、LinuxMint、Debain系通用
- KUKA机器人安装包,与PROFINET软件包
- 船舶燃料消耗和二氧化碳排放分析数据集,燃料消耗和碳排放关联分析数据
- req-sign、bd-ticket-ree-public加密算法(JS)
- 全自动批量建站快速养权重站系统【纯静态html站群版】:(GPT4.0自动根据关键词写文章+自动发布+自定义友链+自动文章内链+20%页面加提权词)
- 串联式、并联式、混联式混合动力系统simulink控制策略模型(串联式、并联式、混联式每个都是独立的需要单独说拿哪个,默认是混联式RB) 有基于逻辑门限值、状态机的规则控制策略(RB)、基于等效燃油
- 法码滋.exe法码滋2.exe法码滋3.exe
- python-geohash-0.8.5-cp38-cp38-win-amd64
- Matlab根据flac、pfc或其他软件导出的坐标及应力、位移数据再现云图 案例包括导出在flac6.0中导出位移的fish代码(也可以自己先准备软件导出的坐标数据及对应点的位移或应力数据,可根据需
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0