mirror of
https://github.com/veracrypt/VeraCrypt.git
synced 2025-11-11 11:08:02 -06:00
157 lines
4.6 KiB
C++
157 lines
4.6 KiB
C++
/*
|
|
Derived from source code of TrueCrypt 7.1a, which is
|
|
Copyright (c) 2008-2012 TrueCrypt Developers Association and which is governed
|
|
by the TrueCrypt License 3.0.
|
|
|
|
Modifications and additions to the original source code (contained in this file)
|
|
and all other portions of this file are Copyright (c) 2013-2025 IDRIX
|
|
and are governed by the Apache License 2.0 the full text of which is
|
|
contained in the file License.txt included in VeraCrypt binary and source
|
|
code distribution packages.
|
|
*/
|
|
|
|
#ifndef TC_HEADER_Core_Windows_CoreServiceProxy
|
|
#define TC_HEADER_Core_Windows_CoreServiceProxy
|
|
|
|
#include "CoreService.h"
|
|
#include "Volume/VolumePasswordCache.h"
|
|
|
|
namespace VeraCrypt
|
|
{
|
|
template <class T>
|
|
class CoreServiceProxy : public T
|
|
{
|
|
public:
|
|
CoreServiceProxy () { }
|
|
virtual ~CoreServiceProxy () { }
|
|
|
|
virtual void CheckFilesystem (shared_ptr <VolumeInfo> mountedVolume, bool repair) const
|
|
{
|
|
CoreService::RequestCheckFilesystem (mountedVolume, repair);
|
|
}
|
|
|
|
virtual void DismountFilesystem (const DirectoryPath &mountPoint, bool force) const
|
|
{
|
|
CoreService::RequestDismountFilesystem (mountPoint, force);
|
|
}
|
|
|
|
virtual shared_ptr <VolumeInfo> DismountVolume (shared_ptr <VolumeInfo> mountedVolume, bool ignoreOpenFiles = false, bool syncVolumeInfo = false)
|
|
{
|
|
shared_ptr <VolumeInfo> dismountedVolumeInfo = CoreService::RequestDismountVolume (mountedVolume, ignoreOpenFiles, syncVolumeInfo);
|
|
|
|
VolumeEventArgs eventArgs (dismountedVolumeInfo);
|
|
T::VolumeDismountedEvent.Raise (eventArgs);
|
|
|
|
return dismountedVolumeInfo;
|
|
}
|
|
|
|
virtual uint32 GetDeviceSectorSize (const DevicePath &devicePath) const
|
|
{
|
|
return CoreService::RequestGetDeviceSectorSize (devicePath);
|
|
}
|
|
|
|
virtual uint64 GetDeviceSize (const DevicePath &devicePath) const
|
|
{
|
|
return CoreService::RequestGetDeviceSize (devicePath);
|
|
}
|
|
|
|
#ifndef TC_LINUX
|
|
virtual HostDeviceList GetHostDevices (bool pathListOnly = false) const
|
|
{
|
|
if (pathListOnly)
|
|
return T::GetHostDevices (pathListOnly);
|
|
else
|
|
return CoreService::RequestGetHostDevices (pathListOnly);
|
|
}
|
|
#endif
|
|
virtual bool IsPasswordCacheEmpty () const { return VolumePasswordCache::IsEmpty(); }
|
|
|
|
virtual shared_ptr <VolumeInfo> MountVolume (MountOptions &options)
|
|
{
|
|
shared_ptr <VolumeInfo> mountedVolume;
|
|
|
|
if (!VolumePasswordCache::IsEmpty()
|
|
&& (!options.Password || options.Password->IsEmpty())
|
|
&& (!options.Keyfiles || options.Keyfiles->empty()))
|
|
{
|
|
finally_do_arg (MountOptions*, &options, { if (finally_arg->Password) finally_arg->Password.reset(); });
|
|
|
|
PasswordIncorrect passwordException;
|
|
foreach (shared_ptr <VolumePassword> password, VolumePasswordCache::GetPasswords())
|
|
{
|
|
try
|
|
{
|
|
options.Password = password;
|
|
mountedVolume = CoreService::RequestMountVolume (options);
|
|
break;
|
|
}
|
|
catch (PasswordIncorrect &e)
|
|
{
|
|
passwordException = e;
|
|
}
|
|
}
|
|
|
|
if (!mountedVolume)
|
|
passwordException.Throw();
|
|
}
|
|
else
|
|
{
|
|
MountOptions newOptions = options;
|
|
|
|
newOptions.Password = Keyfile::ApplyListToPassword (options.Keyfiles, options.Password, options.EMVSupportEnabled);
|
|
if (newOptions.Keyfiles)
|
|
newOptions.Keyfiles->clear();
|
|
|
|
newOptions.ProtectionPassword = Keyfile::ApplyListToPassword (options.ProtectionKeyfiles, options.ProtectionPassword, options.EMVSupportEnabled);
|
|
if (newOptions.ProtectionKeyfiles)
|
|
newOptions.ProtectionKeyfiles->clear();
|
|
|
|
try
|
|
{
|
|
mountedVolume = CoreService::RequestMountVolume (newOptions);
|
|
}
|
|
catch (ProtectionPasswordIncorrect &e)
|
|
{
|
|
if (options.ProtectionKeyfiles && !options.ProtectionKeyfiles->empty())
|
|
throw ProtectionPasswordKeyfilesIncorrect (e.what());
|
|
throw;
|
|
}
|
|
catch (PasswordIncorrect &e)
|
|
{
|
|
if (options.Keyfiles && !options.Keyfiles->empty())
|
|
throw PasswordKeyfilesIncorrect (e.what());
|
|
throw;
|
|
}
|
|
|
|
if (options.CachePassword
|
|
&& ((options.Password && !options.Password->IsEmpty()) || (options.Keyfiles && !options.Keyfiles->empty())))
|
|
{
|
|
VolumePasswordCache::Store (*Keyfile::ApplyListToPassword (options.Keyfiles, options.Password, options.EMVSupportEnabled));
|
|
}
|
|
}
|
|
|
|
VolumeEventArgs eventArgs (mountedVolume);
|
|
T::VolumeMountedEvent.Raise (eventArgs);
|
|
|
|
return mountedVolume;
|
|
}
|
|
|
|
virtual void SetAdminPasswordCallback (shared_ptr <GetStringFunctor> functor)
|
|
{
|
|
CoreService::SetAdminPasswordCallback (functor);
|
|
}
|
|
|
|
virtual void SetFileOwner (const FilesystemPath &path, const UserId &owner) const
|
|
{
|
|
CoreService::RequestSetFileOwner (path, owner);
|
|
}
|
|
|
|
virtual void WipePasswordCache () const
|
|
{
|
|
VolumePasswordCache::Clear();
|
|
}
|
|
};
|
|
}
|
|
|
|
#endif // TC_HEADER_Core_Windows_CoreServiceProxy
|