VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/DcsInt/DcsInt.c
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2016-10-08 11:12:20 +0200
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2016-10-17 18:17:49 +0200
commit012c9134d4f6e29c2e13e56490e47a8547d41af7 (patch)
tree2175a5b43db90c323793b35627639bfa3268a8ae /DcsInt/DcsInt.c
parentc97186ae96d4835841b02d377a9002d078a6f83b (diff)
downloadVeraCrypt-DCS-012c9134d4f6e29c2e13e56490e47a8547d41af7.tar.gz
VeraCrypt-DCS-012c9134d4f6e29c2e13e56490e47a8547d41af7.zip
define and use own version of secure memory erase macro instead of the one coming from VeraCrypt.
Diffstat (limited to 'DcsInt/DcsInt.c')
-rw-r--r--DcsInt/DcsInt.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/DcsInt/DcsInt.c b/DcsInt/DcsInt.c
index b2fa76c..5d91936 100644
--- a/DcsInt/DcsInt.c
+++ b/DcsInt/DcsInt.c
@@ -156,8 +156,8 @@ PrepareBootParams(
SetSecRegionParamsMemory();
// Clean auth data
- burn(&gAuthPassword, sizeof(gAuthPassword));
- burn(&gAuthPim, sizeof(gAuthPim));
+ MEM_BURN(&gAuthPassword, sizeof(gAuthPassword));
+ MEM_BURN(&gAuthPim, sizeof(gAuthPim));
return EFI_SUCCESS;
}
@@ -536,7 +536,7 @@ SecRegionChangePwd() {
}
VCAskPwd(AskPwdConfirm, &confirmPassword);
if (gAuthPwdCode == AskPwdRetCancel) {
- burn(&newPassword, sizeof(newPassword));
+ MEM_BURN(&newPassword, sizeof(newPassword));
return EFI_NOT_READY;
}
if (newPassword.Length == confirmPassword.Length) {
@@ -591,8 +591,8 @@ SecRegionChangePwd() {
ERR_PRINT(L"Update (%r)\n", Status);
ret:
- burn(&newPassword, sizeof(newPassword));
- burn(&confirmPassword, sizeof(confirmPassword));
+ MEM_BURN(&newPassword, sizeof(newPassword));
+ MEM_BURN(&confirmPassword, sizeof(confirmPassword));
return Status;
}
@@ -922,15 +922,15 @@ VirtualNotifyEvent(
{
// Clean all sensible info and keys before transfer to OS
if (SecRegionCryptInfo != NULL) {
- burn(SecRegionCryptInfo, sizeof(*SecRegionCryptInfo));
+ MEM_BURN(SecRegionCryptInfo, sizeof(*SecRegionCryptInfo));
}
if (gRnd != NULL) {
- burn(gRnd, sizeof(*gRnd));
+ MEM_BURN(gRnd, sizeof(*gRnd));
}
if (SecRegionData != NULL) {
- burn(SecRegionData, SecRegionSize);
+ MEM_BURN(SecRegionData, SecRegionSize);
}
}