mirror of
https://github.com/veracrypt/VeraCrypt.git
synced 2025-11-11 11:08:02 -06:00
Windows Driver: Erase sensitive boot memory before throwing fatal exception
This commit is contained in:
@@ -424,7 +424,16 @@ static NTSTATUS MountDrive (DriveFilterExtension *Extension, Password *password,
|
|||||||
Extension->Queue.CryptoInfo->EncryptedAreaStart.Value = BootArgs.DecoySystemPartitionStart;
|
Extension->Queue.CryptoInfo->EncryptedAreaStart.Value = BootArgs.DecoySystemPartitionStart;
|
||||||
|
|
||||||
if (Extension->Queue.CryptoInfo->VolumeSize.Value > hiddenPartitionOffset - BootArgs.DecoySystemPartitionStart)
|
if (Extension->Queue.CryptoInfo->VolumeSize.Value > hiddenPartitionOffset - BootArgs.DecoySystemPartitionStart)
|
||||||
|
{
|
||||||
|
// Erase boot loader scheduled keys
|
||||||
|
if (mappedCryptoInfo)
|
||||||
|
{
|
||||||
|
burn (mappedCryptoInfo, BootArgs.CryptoInfoLength);
|
||||||
|
MmUnmapIoSpace (mappedCryptoInfo, BootArgs.CryptoInfoLength);
|
||||||
|
BootArgs.CryptoInfoLength = 0;
|
||||||
|
}
|
||||||
TC_THROW_FATAL_EXCEPTION;
|
TC_THROW_FATAL_EXCEPTION;
|
||||||
|
}
|
||||||
|
|
||||||
Dump ("RemappedAreaOffset = %I64d\n", Extension->Queue.RemappedAreaOffset);
|
Dump ("RemappedAreaOffset = %I64d\n", Extension->Queue.RemappedAreaOffset);
|
||||||
Dump ("RemappedAreaDataUnitOffset = %I64d\n", Extension->Queue.RemappedAreaDataUnitOffset);
|
Dump ("RemappedAreaDataUnitOffset = %I64d\n", Extension->Queue.RemappedAreaDataUnitOffset);
|
||||||
|
|||||||
Reference in New Issue
Block a user