mirror of
https://github.com/veracrypt/VeraCrypt.git
synced 2025-11-13 11:58:26 -06:00
Windows: remove 32-bit logic from the code since we support only 64-bit. remove 32-bit EFI bootloader files.
We also fix intermediary files folder for Portable and Setup projects
This commit is contained in:
@@ -776,9 +776,7 @@ int EncryptPartitionInPlaceResume (HANDLE dev,
|
||||
int pim = volParams->pim;
|
||||
DISK_GEOMETRY driveGeometry;
|
||||
HWND hwndDlg = volParams->hwndDlg;
|
||||
#ifdef _WIN64
|
||||
BOOL bIsRamEncryptionEnabled = IsRamEncryptionEnabled();
|
||||
#endif
|
||||
|
||||
|
||||
bInPlaceEncNonSysResumed = TRUE;
|
||||
@@ -874,13 +872,11 @@ int EncryptPartitionInPlaceResume (HANDLE dev,
|
||||
if (nStatus != ERR_SUCCESS)
|
||||
goto closing_seq;
|
||||
|
||||
#ifdef _WIN64
|
||||
if (bIsRamEncryptionEnabled)
|
||||
{
|
||||
VcProtectKeys (masterCryptoInfo, VcGetEncryptionID (masterCryptoInfo));
|
||||
VcProtectKeys (headerCryptoInfo, VcGetEncryptionID (headerCryptoInfo));
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
remainingBytes = masterCryptoInfo->VolumeSize.Value - masterCryptoInfo->EncryptedAreaLength.Value;
|
||||
@@ -1102,7 +1098,6 @@ inplace_enc_read:
|
||||
{
|
||||
PCRYPTO_INFO dummyInfo = NULL;
|
||||
|
||||
#ifdef _WIN64
|
||||
CRYPTO_INFO tmpCI;
|
||||
PCRYPTO_INFO cryptoInfoBackup = NULL;
|
||||
if (bIsRamEncryptionEnabled)
|
||||
@@ -1113,7 +1108,6 @@ inplace_enc_read:
|
||||
cryptoInfoBackup = masterCryptoInfo;
|
||||
masterCryptoInfo = &tmpCI;
|
||||
}
|
||||
#endif
|
||||
|
||||
nStatus = CreateVolumeHeaderInMemory (hwndDlg, FALSE,
|
||||
header,
|
||||
@@ -1133,14 +1127,12 @@ inplace_enc_read:
|
||||
masterCryptoInfo->SectorSize,
|
||||
wipeAlgorithm == TC_WIPE_NONE ? FALSE : (wipePass < PRAND_HEADER_WIPE_PASSES - 1));
|
||||
|
||||
#ifdef _WIN64
|
||||
if (bIsRamEncryptionEnabled)
|
||||
{
|
||||
masterCryptoInfo = cryptoInfoBackup;
|
||||
burn (&tmpCI, sizeof (CRYPTO_INFO));
|
||||
VirtualUnlock (&tmpCI, sizeof(tmpCI));
|
||||
}
|
||||
#endif
|
||||
|
||||
if (nStatus != ERR_SUCCESS)
|
||||
goto closing_seq;
|
||||
@@ -1155,7 +1147,6 @@ inplace_enc_read:
|
||||
goto closing_seq;
|
||||
}
|
||||
|
||||
#ifdef _WIN64
|
||||
if (bIsRamEncryptionEnabled)
|
||||
{
|
||||
VirtualLock (&tmpCI, sizeof(tmpCI));
|
||||
@@ -1164,18 +1155,16 @@ inplace_enc_read:
|
||||
cryptoInfoBackup = headerCryptoInfo;
|
||||
headerCryptoInfo = &tmpCI;
|
||||
}
|
||||
#endif
|
||||
|
||||
// Fill the reserved sectors of the header area with random data
|
||||
nStatus = WriteRandomDataToReservedHeaderAreas (hwndDlg, dev, headerCryptoInfo, masterCryptoInfo->VolumeSize.Value, TRUE, FALSE);
|
||||
|
||||
#ifdef _WIN64
|
||||
if (bIsRamEncryptionEnabled)
|
||||
{
|
||||
headerCryptoInfo = cryptoInfoBackup;
|
||||
burn (&tmpCI, sizeof (CRYPTO_INFO));
|
||||
VirtualUnlock (&tmpCI, sizeof(tmpCI));
|
||||
}
|
||||
#endif
|
||||
|
||||
if (nStatus != ERR_SUCCESS)
|
||||
goto closing_seq;
|
||||
@@ -1336,9 +1325,7 @@ int DecryptPartitionInPlace (volatile FORMAT_VOL_PARAMETERS *volParams, volatile
|
||||
int pkcs5_prf = volParams->pkcs5;
|
||||
int pim = volParams->pim;
|
||||
DISK_GEOMETRY driveGeometry;
|
||||
#ifdef _WIN64
|
||||
BOOL bIsRamEncryptionEnabled = IsRamEncryptionEnabled();
|
||||
#endif
|
||||
|
||||
|
||||
buf = (char *) TCalloc (TC_MAX_NONSYS_INPLACE_ENC_WORK_CHUNK_SIZE);
|
||||
@@ -1445,13 +1432,11 @@ int DecryptPartitionInPlace (volatile FORMAT_VOL_PARAMETERS *volParams, volatile
|
||||
if (nStatus != ERR_SUCCESS)
|
||||
goto closing_seq;
|
||||
|
||||
#ifdef _WIN64
|
||||
if (bIsRamEncryptionEnabled)
|
||||
{
|
||||
VcProtectKeys (masterCryptoInfo, VcGetEncryptionID (masterCryptoInfo));
|
||||
VcProtectKeys (headerCryptoInfo, VcGetEncryptionID (headerCryptoInfo));
|
||||
}
|
||||
#endif
|
||||
|
||||
if (masterCryptoInfo->LegacyVolume)
|
||||
{
|
||||
@@ -1848,9 +1833,7 @@ int FastVolumeHeaderUpdate (HANDLE dev, CRYPTO_INFO *headerCryptoInfo, CRYPTO_IN
|
||||
uint32 headerCrc32;
|
||||
uint8 *fieldPos;
|
||||
PCRYPTO_INFO pCryptoInfo = headerCryptoInfo;
|
||||
#ifdef _WIN64
|
||||
BOOL bIsRamEncryptionEnabled = IsRamEncryptionEnabled();
|
||||
#endif
|
||||
|
||||
header = (uint8 *) TCalloc (TC_VOLUME_HEADER_EFFECTIVE_SIZE);
|
||||
|
||||
@@ -1871,7 +1854,6 @@ int FastVolumeHeaderUpdate (HANDLE dev, CRYPTO_INFO *headerCryptoInfo, CRYPTO_IN
|
||||
goto closing_seq;
|
||||
}
|
||||
|
||||
#ifdef _WIN64
|
||||
if (bIsRamEncryptionEnabled)
|
||||
{
|
||||
pCryptoInfo = crypto_open();
|
||||
@@ -1884,7 +1866,6 @@ int FastVolumeHeaderUpdate (HANDLE dev, CRYPTO_INFO *headerCryptoInfo, CRYPTO_IN
|
||||
memcpy (pCryptoInfo, headerCryptoInfo, sizeof (CRYPTO_INFO));
|
||||
VcUnprotectKeys (pCryptoInfo, VcGetEncryptionID (headerCryptoInfo));
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
DecryptBuffer (header + HEADER_ENCRYPTED_DATA_OFFSET, HEADER_ENCRYPTED_DATA_SIZE, pCryptoInfo);
|
||||
@@ -1925,12 +1906,10 @@ closing_seq:
|
||||
|
||||
dwError = GetLastError();
|
||||
|
||||
#ifdef _WIN64
|
||||
if (bIsRamEncryptionEnabled && pCryptoInfo)
|
||||
{
|
||||
crypto_close(pCryptoInfo);
|
||||
}
|
||||
#endif
|
||||
|
||||
burn (header, TC_VOLUME_HEADER_EFFECTIVE_SIZE);
|
||||
VirtualUnlock (header, TC_VOLUME_HEADER_EFFECTIVE_SIZE);
|
||||
|
||||
Reference in New Issue
Block a user