mirror of
https://github.com/veracrypt/VeraCrypt.git
synced 2025-11-11 19:08:26 -06:00
Avoid conflict with C++17 features std::byte by using uint8 type instead of byte
This commit is contained in:
@@ -35,7 +35,7 @@ static BOOL DeviceFilterActive = FALSE;
|
||||
|
||||
BOOL BootArgsValid = FALSE;
|
||||
BootArguments BootArgs;
|
||||
byte* BootSecRegionData = NULL;
|
||||
uint8* BootSecRegionData = NULL;
|
||||
uint32 BootSecRegionSize = 0;
|
||||
uint32 BootPkcs5 = 0;
|
||||
|
||||
@@ -47,13 +47,13 @@ static KMUTEX MountMutex;
|
||||
static volatile BOOL BootDriveFound = FALSE;
|
||||
static DriveFilterExtension *BootDriveFilterExtension = NULL;
|
||||
static LARGE_INTEGER BootDriveLength;
|
||||
static byte BootLoaderFingerprint[WHIRLPOOL_DIGESTSIZE + SHA512_DIGESTSIZE];
|
||||
static uint8 BootLoaderFingerprint[WHIRLPOOL_DIGESTSIZE + SHA512_DIGESTSIZE];
|
||||
|
||||
static BOOL CrashDumpEnabled = FALSE;
|
||||
static BOOL HibernationEnabled = FALSE;
|
||||
|
||||
static BOOL LegacyHibernationDriverFilterActive = FALSE;
|
||||
static byte *HibernationWriteBuffer = NULL;
|
||||
static uint8 *HibernationWriteBuffer = NULL;
|
||||
static MDL *HibernationWriteBufferMdl = NULL;
|
||||
|
||||
static uint32 HibernationPreventionCount = 0;
|
||||
@@ -82,8 +82,8 @@ NTSTATUS LoadBootArguments (BOOL bIsEfi)
|
||||
{
|
||||
NTSTATUS status = STATUS_UNSUCCESSFUL;
|
||||
PHYSICAL_ADDRESS bootArgsAddr;
|
||||
byte *mappedBootArgs;
|
||||
byte *mappedCryptoInfo = NULL;
|
||||
uint8 *mappedBootArgs;
|
||||
uint8 *mappedCryptoInfo = NULL;
|
||||
uint16 bootLoaderArgsIndex;
|
||||
uint64* BootArgsRegionsPtr = bIsEfi? BootArgsRegionsEFI : BootArgsRegionsDefault;
|
||||
size_t BootArgsRegionsCount = bIsEfi? sizeof(BootArgsRegionsEFI)/ sizeof(BootArgsRegionsEFI[0]) : sizeof(BootArgsRegionsDefault)/ sizeof(BootArgsRegionsDefault[0]);
|
||||
@@ -109,7 +109,7 @@ NTSTATUS LoadBootArguments (BOOL bIsEfi)
|
||||
DumpMem (mappedBootArgs, sizeof (BootArguments));
|
||||
|
||||
if (bootArguments->BootLoaderVersion == VERSION_NUM
|
||||
&& bootArguments->BootArgumentsCrc32 != GetCrc32 ((byte *) bootArguments, (int) ((byte *) &bootArguments->BootArgumentsCrc32 - (byte *) bootArguments)))
|
||||
&& bootArguments->BootArgumentsCrc32 != GetCrc32 ((uint8 *) bootArguments, (int) ((uint8 *) &bootArguments->BootArgumentsCrc32 - (uint8 *) bootArguments)))
|
||||
{
|
||||
Dump ("BootArguments CRC incorrect\n");
|
||||
burn (mappedBootArgs, sizeof (BootArguments));
|
||||
@@ -166,13 +166,13 @@ NTSTATUS LoadBootArguments (BOOL bIsEfi)
|
||||
uint32 crc;
|
||||
PHYSICAL_ADDRESS SecRegionAddress;
|
||||
SECREGION_BOOT_PARAMS* SecRegionParams = (SECREGION_BOOT_PARAMS*) (mappedCryptoInfo + sizeof(BOOT_CRYPTO_HEADER) + 2);
|
||||
byte *secRegionData = NULL;
|
||||
uint8 *secRegionData = NULL;
|
||||
|
||||
SecRegionAddress.QuadPart = SecRegionParams->Ptr;
|
||||
Dump ("SecRegion memory 0x%x %d\n", SecRegionAddress.LowPart, SecRegionParams->Size);
|
||||
// SecRegion correct?
|
||||
if( (SecRegionParams->Ptr != 0) && (SecRegionParams->Size > 0)) {
|
||||
crc = GetCrc32((byte*)SecRegionParams, 12);
|
||||
crc = GetCrc32((uint8*)SecRegionParams, 12);
|
||||
if(crc == SecRegionParams->Crc) {
|
||||
Dump ("SecRegion crc ok\n");
|
||||
secRegionData = MmMapIoSpace (SecRegionAddress, SecRegionParams->Size, MmCached);
|
||||
@@ -329,7 +329,7 @@ static void InvalidateDriveFilterKeys (DriveFilterExtension *Extension)
|
||||
Dump ("Drive filter encryption keys invalidated!\n");
|
||||
}
|
||||
|
||||
static void ComputeBootLoaderFingerprint(PDEVICE_OBJECT LowerDeviceObject, byte* ioBuffer /* ioBuffer must be at least 512 bytes long */)
|
||||
static void ComputeBootLoaderFingerprint(PDEVICE_OBJECT LowerDeviceObject, uint8* ioBuffer /* ioBuffer must be at least 512 bytes long */)
|
||||
{
|
||||
NTSTATUS status;
|
||||
LARGE_INTEGER offset;
|
||||
@@ -433,7 +433,7 @@ static NTSTATUS MountDrive (DriveFilterExtension *Extension, Password *password,
|
||||
|
||||
// Check disk MBR id and GPT ID if BootSecRegion is available to detect boot drive
|
||||
if (BootSecRegionData != NULL && BootSecRegionSize >= 1024) {
|
||||
byte mbr[TC_SECTOR_SIZE_BIOS];
|
||||
uint8 mbr[TC_SECTOR_SIZE_BIOS];
|
||||
DCS_DISK_ENTRY_LIST* DeList = (DCS_DISK_ENTRY_LIST*)(BootSecRegionData + 512);
|
||||
offset.QuadPart = 0;
|
||||
status = TCReadDevice (Extension->LowerDeviceObject, mbr, offset, TC_SECTOR_SIZE_BIOS);
|
||||
@@ -459,7 +459,7 @@ static NTSTATUS MountDrive (DriveFilterExtension *Extension, Password *password,
|
||||
// Check boot drive signature first (header CRC search could fail if a user restored the header to a non-boot drive)
|
||||
if (BootDriveSignatureValid)
|
||||
{
|
||||
byte mbr[TC_SECTOR_SIZE_BIOS];
|
||||
uint8 mbr[TC_SECTOR_SIZE_BIOS];
|
||||
|
||||
offset.QuadPart = 0;
|
||||
status = TCReadDevice (Extension->LowerDeviceObject, mbr, offset, TC_SECTOR_SIZE_BIOS);
|
||||
@@ -585,7 +585,7 @@ static NTSTATUS MountDrive (DriveFilterExtension *Extension, Password *password,
|
||||
uint32 crcSaved;
|
||||
crcSaved = DeList->CRC32;
|
||||
DeList->CRC32 = 0;
|
||||
crc = GetCrc32((byte*)DeList, 512);
|
||||
crc = GetCrc32((uint8*)DeList, 512);
|
||||
if(crc == crcSaved){
|
||||
if(DeList->DE[DE_IDX_PWDCACHE].Type == DE_PwdCache) {
|
||||
uint64 sector = 0;
|
||||
@@ -696,7 +696,7 @@ static NTSTATUS SaveDriveVolumeHeader (DriveFilterExtension *Extension)
|
||||
{
|
||||
NTSTATUS status = STATUS_SUCCESS;
|
||||
LARGE_INTEGER offset;
|
||||
byte *header;
|
||||
uint8 *header;
|
||||
|
||||
header = TCalloc (TC_BOOT_ENCRYPTION_VOLUME_HEADER_SIZE);
|
||||
if (!header)
|
||||
@@ -727,7 +727,7 @@ static NTSTATUS SaveDriveVolumeHeader (DriveFilterExtension *Extension)
|
||||
{
|
||||
uint32 headerCrc32;
|
||||
uint64 encryptedAreaLength = Extension->Queue.EncryptedAreaEnd + 1 - Extension->Queue.EncryptedAreaStart;
|
||||
byte *fieldPos = header + TC_HEADER_OFFSET_ENCRYPTED_AREA_LENGTH;
|
||||
uint8 *fieldPos = header + TC_HEADER_OFFSET_ENCRYPTED_AREA_LENGTH;
|
||||
PCRYPTO_INFO pCryptoInfo = Extension->HeaderCryptoInfo;
|
||||
#ifdef _WIN64
|
||||
CRYPTO_INFO tmpCI;
|
||||
@@ -1234,16 +1234,16 @@ typedef NTSTATUS (*HiberDriverWriteFunctionB) (PLARGE_INTEGER writeOffset, PMDL
|
||||
typedef struct
|
||||
{
|
||||
#ifdef _WIN64
|
||||
byte FieldPad1[64];
|
||||
uint8 FieldPad1[64];
|
||||
HiberDriverWriteFunctionB WriteFunctionB;
|
||||
byte FieldPad2[56];
|
||||
uint8 FieldPad2[56];
|
||||
#else
|
||||
byte FieldPad1[48];
|
||||
uint8 FieldPad1[48];
|
||||
HiberDriverWriteFunctionB WriteFunctionB;
|
||||
byte FieldPad2[32];
|
||||
uint8 FieldPad2[32];
|
||||
#endif
|
||||
HiberDriverWriteFunctionA WriteFunctionA;
|
||||
byte FieldPad3[24];
|
||||
uint8 FieldPad3[24];
|
||||
LARGE_INTEGER PartitionStartOffset;
|
||||
} HiberDriverContext;
|
||||
|
||||
@@ -1253,16 +1253,16 @@ typedef struct
|
||||
{
|
||||
LIST_ENTRY ModuleList;
|
||||
#ifdef _WIN64
|
||||
byte FieldPad1[32];
|
||||
uint8 FieldPad1[32];
|
||||
#else
|
||||
byte FieldPad1[16];
|
||||
uint8 FieldPad1[16];
|
||||
#endif
|
||||
PVOID ModuleBaseAddress;
|
||||
HiberDriverEntry ModuleEntryAddress;
|
||||
#ifdef _WIN64
|
||||
byte FieldPad2[24];
|
||||
uint8 FieldPad2[24];
|
||||
#else
|
||||
byte FieldPad2[12];
|
||||
uint8 FieldPad2[12];
|
||||
#endif
|
||||
UNICODE_STRING ModuleName;
|
||||
} ModuleTableItem;
|
||||
@@ -1572,10 +1572,10 @@ static VOID SetupThreadProc (PVOID threadArg)
|
||||
BOOL headerUpdateRequired = FALSE;
|
||||
int64 bytesWrittenSinceHeaderUpdate = 0;
|
||||
|
||||
byte *buffer = NULL;
|
||||
byte *wipeBuffer = NULL;
|
||||
byte wipeRandChars[TC_WIPE_RAND_CHAR_COUNT];
|
||||
byte wipeRandCharsUpdate[TC_WIPE_RAND_CHAR_COUNT];
|
||||
uint8 *buffer = NULL;
|
||||
uint8 *wipeBuffer = NULL;
|
||||
uint8 wipeRandChars[TC_WIPE_RAND_CHAR_COUNT];
|
||||
uint8 wipeRandCharsUpdate[TC_WIPE_RAND_CHAR_COUNT];
|
||||
|
||||
KIRQL irql;
|
||||
NTSTATUS status;
|
||||
@@ -1583,7 +1583,7 @@ static VOID SetupThreadProc (PVOID threadArg)
|
||||
// generate real random values for wipeRandChars and
|
||||
// wipeRandCharsUpdate instead of relying on uninitialized stack memory
|
||||
ChaCha20RngCtx rngCtx;
|
||||
byte pbSeed[CHACHA20RNG_KEYSZ + CHACHA20RNG_IVSZ];
|
||||
uint8 pbSeed[CHACHA20RNG_KEYSZ + CHACHA20RNG_IVSZ];
|
||||
|
||||
GetDriverRandomSeed (pbSeed, sizeof (pbSeed));
|
||||
ChaCha20RngInit (&rngCtx, pbSeed, GetDriverRandomSeed, 0);
|
||||
@@ -1757,7 +1757,7 @@ static VOID SetupThreadProc (PVOID threadArg)
|
||||
|
||||
if (SetupRequest.WipeAlgorithm != TC_WIPE_NONE)
|
||||
{
|
||||
byte wipePass;
|
||||
uint8 wipePass;
|
||||
int wipePassCount = GetWipePassCount (SetupRequest.WipeAlgorithm);
|
||||
if (wipePassCount <= 0)
|
||||
{
|
||||
@@ -2193,9 +2193,9 @@ static VOID DecoySystemWipeThreadProc (PVOID threadArg)
|
||||
ULONG wipeBlockSize = TC_ENCRYPTION_SETUP_IO_BLOCK_SIZE;
|
||||
|
||||
CRYPTO_INFO *wipeCryptoInfo = NULL;
|
||||
byte *wipeBuffer = NULL;
|
||||
byte *wipeRandBuffer = NULL;
|
||||
byte wipeRandChars[TC_WIPE_RAND_CHAR_COUNT];
|
||||
uint8 *wipeBuffer = NULL;
|
||||
uint8 *wipeRandBuffer = NULL;
|
||||
uint8 wipeRandChars[TC_WIPE_RAND_CHAR_COUNT];
|
||||
int wipePass, wipePassCount;
|
||||
int ea = Extension->Queue.CryptoInfo->ea;
|
||||
|
||||
|
||||
@@ -18,7 +18,7 @@
|
||||
|
||||
static DriveFilterExtension *BootDriveFilterExtension = NULL;
|
||||
static LARGE_INTEGER DumpPartitionOffset;
|
||||
static byte *WriteFilterBuffer = NULL;
|
||||
static uint8 *WriteFilterBuffer = NULL;
|
||||
static SIZE_T WriteFilterBufferSize;
|
||||
|
||||
|
||||
|
||||
@@ -191,7 +191,7 @@ static NTSTATUS CompleteOriginalIrp (EncryptedIoQueueItem *item, NTSTATUS status
|
||||
}
|
||||
|
||||
|
||||
static void AcquireFragmentBuffer (EncryptedIoQueue *queue, byte *buffer)
|
||||
static void AcquireFragmentBuffer (EncryptedIoQueue *queue, uint8 *buffer)
|
||||
{
|
||||
NTSTATUS status = STATUS_INVALID_PARAMETER;
|
||||
|
||||
@@ -209,7 +209,7 @@ static void AcquireFragmentBuffer (EncryptedIoQueue *queue, byte *buffer)
|
||||
}
|
||||
|
||||
|
||||
static void ReleaseFragmentBuffer (EncryptedIoQueue *queue, byte *buffer)
|
||||
static void ReleaseFragmentBuffer (EncryptedIoQueue *queue, uint8 *buffer)
|
||||
{
|
||||
if (buffer == queue->FragmentBufferA)
|
||||
{
|
||||
@@ -227,8 +227,8 @@ static void ReleaseFragmentBuffer (EncryptedIoQueue *queue, byte *buffer)
|
||||
|
||||
BOOL
|
||||
UpdateBuffer(
|
||||
byte* buffer,
|
||||
byte* secRegion,
|
||||
uint8* buffer,
|
||||
uint8* secRegion,
|
||||
uint64 bufferDiskOffset,
|
||||
uint32 bufferLength,
|
||||
BOOL doUpadte
|
||||
@@ -393,7 +393,7 @@ static VOID IoThreadProc (PVOID threadArg)
|
||||
{
|
||||
// Up to three subfragments may be required to handle a partially remapped fragment
|
||||
int subFragment;
|
||||
byte *subFragmentData = request->Data;
|
||||
uint8 *subFragmentData = request->Data;
|
||||
|
||||
for (subFragment = 0 ; subFragment < 3; ++subFragment)
|
||||
{
|
||||
@@ -615,7 +615,7 @@ static VOID MainThreadProc (PVOID threadArg)
|
||||
&& (item->OriginalLength & (ENCRYPTION_DATA_UNIT_SIZE - 1)) == 0
|
||||
&& (item->OriginalOffset.QuadPart & (ENCRYPTION_DATA_UNIT_SIZE - 1)) != 0)
|
||||
{
|
||||
byte *buffer;
|
||||
uint8 *buffer;
|
||||
ULONG alignedLength;
|
||||
LARGE_INTEGER alignedOffset;
|
||||
hResult = ULongAdd(item->OriginalLength, ENCRYPTION_DATA_UNIT_SIZE, &alignedLength);
|
||||
|
||||
@@ -83,8 +83,8 @@ typedef struct
|
||||
KEVENT CompletionThreadQueueNotEmptyEvent;
|
||||
|
||||
// Fragment buffers
|
||||
byte *FragmentBufferA;
|
||||
byte *FragmentBufferB;
|
||||
uint8 *FragmentBufferA;
|
||||
uint8 *FragmentBufferB;
|
||||
KEVENT FragmentBufferAFreeEvent;
|
||||
KEVENT FragmentBufferBFreeEvent;
|
||||
|
||||
@@ -94,7 +94,7 @@ typedef struct
|
||||
ULONG LastReadLength;
|
||||
LARGE_INTEGER ReadAheadOffset;
|
||||
ULONG ReadAheadLength;
|
||||
byte *ReadAheadBuffer;
|
||||
uint8 *ReadAheadBuffer;
|
||||
LARGE_INTEGER MaxReadAheadOffset;
|
||||
|
||||
LONG OutstandingIoCount;
|
||||
@@ -119,7 +119,7 @@ typedef struct
|
||||
LARGE_INTEGER LastPerformanceCounter;
|
||||
#endif
|
||||
|
||||
byte* SecRegionData;
|
||||
uint8* SecRegionData;
|
||||
SIZE_T SecRegionSize;
|
||||
|
||||
volatile BOOL ThreadBlockReadWrite;
|
||||
@@ -153,8 +153,8 @@ typedef struct
|
||||
ULONG Length;
|
||||
int64 EncryptedOffset;
|
||||
ULONG EncryptedLength;
|
||||
byte *Data;
|
||||
byte *OrigDataBufferFragment;
|
||||
uint8 *Data;
|
||||
uint8 *OrigDataBufferFragment;
|
||||
|
||||
LIST_ENTRY ListEntry;
|
||||
LIST_ENTRY CompletionListEntry;
|
||||
|
||||
@@ -223,11 +223,11 @@ namespace VeraCrypt
|
||||
SecureBuffer alignedBuffer (alignedSize);
|
||||
|
||||
FuseService::ReadVolumeSectors (alignedBuffer, alignedOffset);
|
||||
BufferPtr ((byte *) buf, size).CopyFrom (alignedBuffer.GetRange (offset % sectorSize, size));
|
||||
BufferPtr ((uint8 *) buf, size).CopyFrom (alignedBuffer.GetRange (offset % sectorSize, size));
|
||||
}
|
||||
else
|
||||
{
|
||||
FuseService::ReadVolumeSectors (BufferPtr ((byte *) buf, size), offset);
|
||||
FuseService::ReadVolumeSectors (BufferPtr ((uint8 *) buf, size), offset);
|
||||
}
|
||||
}
|
||||
catch (MissingVolumeData&)
|
||||
@@ -241,7 +241,7 @@ namespace VeraCrypt
|
||||
if (strcmp (path, FuseService::GetControlPath()) == 0)
|
||||
{
|
||||
shared_ptr <Buffer> infoBuf = FuseService::GetVolumeInfo();
|
||||
BufferPtr outBuf ((byte *)buf, size);
|
||||
BufferPtr outBuf ((uint8 *)buf, size);
|
||||
|
||||
if (offset >= (off_t) infoBuf->Size())
|
||||
return 0;
|
||||
@@ -293,7 +293,7 @@ namespace VeraCrypt
|
||||
|
||||
if (strcmp (path, FuseService::GetVolumeImagePath()) == 0)
|
||||
{
|
||||
FuseService::WriteVolumeSectors (BufferPtr ((byte *) buf, size), offset);
|
||||
FuseService::WriteVolumeSectors (BufferPtr ((uint8 *) buf, size), offset);
|
||||
return size;
|
||||
}
|
||||
|
||||
@@ -302,7 +302,7 @@ namespace VeraCrypt
|
||||
if (FuseService::AuxDeviceInfoReceived())
|
||||
return -EACCES;
|
||||
|
||||
FuseService::ReceiveAuxDeviceInfo (ConstBufferPtr ((const byte *)buf, size));
|
||||
FuseService::ReceiveAuxDeviceInfo (ConstBufferPtr ((const uint8 *)buf, size));
|
||||
return size;
|
||||
}
|
||||
}
|
||||
@@ -584,7 +584,7 @@ namespace VeraCrypt
|
||||
sigaction (SIGTERM, &action, nullptr);
|
||||
|
||||
// Wait for the exit of the main service
|
||||
byte buf[1];
|
||||
uint8 buf[1];
|
||||
if (read (SignalHandlerPipe->GetReadFD(), buf, sizeof (buf))) { } // Errors ignored
|
||||
|
||||
_exit (0);
|
||||
|
||||
@@ -216,7 +216,7 @@ BOOL IsUefiBoot ()
|
||||
void GetDriverRandomSeed (unsigned char* pbRandSeed, size_t cbRandSeed)
|
||||
{
|
||||
LARGE_INTEGER iSeed, iSeed2;
|
||||
byte digest[WHIRLPOOL_DIGESTSIZE];
|
||||
uint8 digest[WHIRLPOOL_DIGESTSIZE];
|
||||
WHIRLPOOL_CTX tctx;
|
||||
size_t count;
|
||||
|
||||
@@ -2070,7 +2070,7 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
|
||||
|
||||
if (opentest->bDetectTCBootLoader || opentest->DetectFilesystem || opentest->bComputeVolumeIDs)
|
||||
{
|
||||
byte *readBuffer = TCalloc (TC_MAX_VOLUME_SECTOR_SIZE);
|
||||
uint8 *readBuffer = TCalloc (TC_MAX_VOLUME_SECTOR_SIZE);
|
||||
if (!readBuffer)
|
||||
{
|
||||
ntStatus = STATUS_INSUFFICIENT_RESOURCES;
|
||||
@@ -2233,7 +2233,7 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
|
||||
|
||||
if (NT_SUCCESS (ntStatus))
|
||||
{
|
||||
byte *readBuffer = TCalloc (TC_MAX_VOLUME_SECTOR_SIZE);
|
||||
uint8 *readBuffer = TCalloc (TC_MAX_VOLUME_SECTOR_SIZE);
|
||||
if (!readBuffer)
|
||||
{
|
||||
Irp->IoStatus.Status = STATUS_INSUFFICIENT_RESOURCES;
|
||||
@@ -3717,7 +3717,7 @@ NTSTATUS ProbeRealDriveSize (PDEVICE_OBJECT driveDeviceObject, LARGE_INTEGER *dr
|
||||
NTSTATUS status;
|
||||
LARGE_INTEGER sysLength;
|
||||
LARGE_INTEGER offset;
|
||||
byte *sectorBuffer;
|
||||
uint8 *sectorBuffer;
|
||||
ULONGLONG startTime;
|
||||
ULONG sectorSize;
|
||||
|
||||
@@ -4919,7 +4919,7 @@ NTSTATUS ZeroUnreadableSectors (PDEVICE_OBJECT deviceObject, LARGE_INTEGER start
|
||||
NTSTATUS status;
|
||||
ULONG sectorSize;
|
||||
ULONG sectorCount;
|
||||
byte *sectorBuffer = NULL;
|
||||
uint8 *sectorBuffer = NULL;
|
||||
|
||||
*zeroedSectorCount = 0;
|
||||
|
||||
@@ -4957,7 +4957,7 @@ err:
|
||||
}
|
||||
|
||||
|
||||
NTSTATUS ReadDeviceSkipUnreadableSectors (PDEVICE_OBJECT deviceObject, byte *buffer, LARGE_INTEGER startOffset, ULONG size, uint64 *badSectorCount)
|
||||
NTSTATUS ReadDeviceSkipUnreadableSectors (PDEVICE_OBJECT deviceObject, uint8 *buffer, LARGE_INTEGER startOffset, ULONG size, uint64 *badSectorCount)
|
||||
{
|
||||
NTSTATUS status;
|
||||
ULONG sectorSize;
|
||||
|
||||
@@ -191,7 +191,7 @@ NTSTATUS WriteRegistryConfigFlags (uint32 flags);
|
||||
BOOL ValidateIOBufferSize (PIRP irp, size_t requiredBufferSize, ValidateIOBufferSizeType type);
|
||||
NTSTATUS GetDeviceSectorSize (PDEVICE_OBJECT deviceObject, ULONG *bytesPerSector);
|
||||
NTSTATUS ZeroUnreadableSectors (PDEVICE_OBJECT deviceObject, LARGE_INTEGER startOffset, ULONG size, uint64 *zeroedSectorCount);
|
||||
NTSTATUS ReadDeviceSkipUnreadableSectors (PDEVICE_OBJECT deviceObject, byte *buffer, LARGE_INTEGER startOffset, ULONG size, uint64 *badSectorCount);
|
||||
NTSTATUS ReadDeviceSkipUnreadableSectors (PDEVICE_OBJECT deviceObject, uint8 *buffer, LARGE_INTEGER startOffset, ULONG size, uint64 *badSectorCount);
|
||||
BOOL IsVolumeAccessibleByCurrentUser (PEXTENSION volumeDeviceExtension);
|
||||
void GetElapsedTimeInit (LARGE_INTEGER *lastPerfCounter);
|
||||
int64 GetElapsedTime (LARGE_INTEGER *lastPerfCounter);
|
||||
|
||||
@@ -98,7 +98,7 @@ NTSTATUS TCOpenVolume (PDEVICE_OBJECT DeviceObject,
|
||||
LARGE_INTEGER diskLengthInfo;
|
||||
DISK_GEOMETRY_EX dg;
|
||||
STORAGE_PROPERTY_QUERY storagePropertyQuery = {0};
|
||||
byte* dgBuffer;
|
||||
uint8* dgBuffer;
|
||||
STORAGE_DEVICE_NUMBER storageDeviceNumber;
|
||||
|
||||
ntStatus = IoGetDeviceObjectPointer (&FullFileName,
|
||||
|
||||
Reference in New Issue
Block a user