VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/Dlgcode.h
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2019-03-02 14:43:39 +0100
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2019-03-02 14:45:38 +0100
commitf7bc58b38f3e61a387849ff1d840bb32a7b9b4c4 (patch)
treed278554b377c267de68d9c885aad2754e3577dc8 /src/Common/Dlgcode.h
parent321715202aed04dd9892d1c0686d080763ab212d (diff)
downloadVeraCrypt-f7bc58b38f3e61a387849ff1d840bb32a7b9b4c4.tar.gz
VeraCrypt-f7bc58b38f3e61a387849ff1d840bb32a7b9b4c4.zip
Windows: mitigate some memory attacks by making VeraCrypt applications memory inaccessible by non-admin users. Implementation borrowed from KeePassXC source code (https://github.com/keepassxreboot/keepassxc/blob/release/2.4.0/src/core/Bootstrap.cpp#L150)
Diffstat (limited to 'src/Common/Dlgcode.h')
-rw-r--r--src/Common/Dlgcode.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/Common/Dlgcode.h b/src/Common/Dlgcode.h
index 8a75f264..eccb8e87 100644
--- a/src/Common/Dlgcode.h
+++ b/src/Common/Dlgcode.h
@@ -537,6 +537,7 @@ BOOL VerifyModuleSignature (const wchar_t* path);
void GetInstallationPath (HWND hwndDlg, wchar_t* szInstallPath, DWORD cchSize, BOOL* pbInstallPathDetermined);
BOOL GetSetupconfigLocation (wchar_t* path, DWORD cchSize);
BOOL BufferHasPattern (const unsigned char* buffer, size_t bufferLen, const void* pattern, size_t patternLen);
+BOOL EnableProcessProtection();
#ifdef _WIN64
void GetAppRandomSeed (unsigned char* pbRandSeed, size_t cbRandSeed);
#endif