VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/BootEncryption.h
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2023-08-05 00:45:39 +0200
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2023-08-05 00:45:39 +0200
commite8f83544ead2011112788d48bff610574f5d6395 (patch)
tree4f61fbc0b3364d6b529a86f4155b1b412b9e3e8d /src/Common/BootEncryption.h
parent5a6b445f0ed51b0f06c4f0212f060ab45113b670 (diff)
downloadVeraCrypt-e8f83544ead2011112788d48bff610574f5d6395.tar.gz
VeraCrypt-e8f83544ead2011112788d48bff610574f5d6395.zip
Windows: Fix false positive detection of new device insertion when clear keys option is enable
When this option is enabled, we first build the list of currently inserted devices then we start listening to insertion events. When a device insertion occurs, we check if this device is on our list and if yes, we ignore its insertion. We also ignore devices whose Device ID starts with "SWD\" and "ROOT\" since these are not real devices.
Diffstat (limited to 'src/Common/BootEncryption.h')
-rw-r--r--src/Common/BootEncryption.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/Common/BootEncryption.h b/src/Common/BootEncryption.h
index 03c30ea7..ddf6f3e5 100644
--- a/src/Common/BootEncryption.h
+++ b/src/Common/BootEncryption.h
@@ -314,6 +314,7 @@ namespace VeraCrypt
static void UpdateSetupConfigFile (bool bForInstall);
void GetSecureBootConfig (BOOL* pSecureBootEnabled, BOOL *pVeraCryptKeysLoaded);
bool IsUsingUnsupportedAlgorithm(LONG driverVersion);
+ void NotifyService (DWORD dwNotifyCmd);
protected:
static const uint32 RescueIsoImageSize = 1835008; // Size of ISO9660 image with bootable emulated 1.44MB floppy disk image