diff options
author | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2020-06-20 15:10:28 +0200 |
---|---|---|
committer | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2020-06-21 00:27:15 +0200 |
commit | 0121dc0b81722ac07abac27d8215c524260bb3f2 (patch) | |
tree | f24b4f2b1fe5eac91bcbf684a1520c570baa5ebb /src/ExpandVolume | |
parent | d031addc2cfe93c40b4b7a7a20be31a86c39033f (diff) | |
download | VeraCrypt-0121dc0b81722ac07abac27d8215c524260bb3f2.tar.gz VeraCrypt-0121dc0b81722ac07abac27d8215c524260bb3f2.zip |
Windows: Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected by user.
Diffstat (limited to 'src/ExpandVolume')
-rw-r--r-- | src/ExpandVolume/InitDataArea.c | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/src/ExpandVolume/InitDataArea.c b/src/ExpandVolume/InitDataArea.c index 618358d1..709f44b9 100644 --- a/src/ExpandVolume/InitDataArea.c +++ b/src/ExpandVolume/InitDataArea.c @@ -116,6 +116,11 @@ int FormatNoFs (HWND hwndDlg, unsigned __int64 startSector, __int64 num_sectors, goto fail; } +#ifdef _WIN64 + if (IsRamEncryptionEnabled ()) + VcProtectKeys (cryptoInfo, VcGetEncryptionID (cryptoInfo)); +#endif + while (num_sectors--) { if (WriteSector (dev, sector, write_buf, &write_buf_cnt, &nSecNo, |