/* Copyright (c) 2008-2009 TrueCrypt Developers Association. All rights reserved. Governed by the TrueCrypt License 3.0 the full text of which is contained in the file License.txt included in TrueCrypt binary and source code distribution packages. */ #ifdef TC_UNIX # include #endif #ifdef TC_MACOSX # include # include #endif #include "Platform/SyncEvent.h" #include "Platform/SystemLog.h" #include "Common/Crypto.h" #include "EncryptionThreadPool.h" namespace TrueCrypt { void EncryptionThreadPool::DoWork (WorkType::Enum type, const EncryptionMode *encryptionMode, byte *data, uint64 startUnitNo, uint64 unitCount, size_t sectorSize) { size_t fragmentCount; size_t unitsPerFragment; size_t remainder; byte *fragmentData; uint64 fragmentStartUnitNo; WorkItem *workItem; WorkItem *firstFragmentWorkItem; if (unitCount == 0) return; if (!ThreadPoolRunning || unitCount == 1) { switch (type) { case WorkType::DecryptDataUnits: encryptionMode->DecryptSectorsCurrentThread (data, startUnitNo, unitCount, sectorSize); break; case WorkType::EncryptDataUnits: encryptionMode->EncryptSectorsCurrentThread (data, startUnitNo, unitCount, sectorSize); break; default: throw ParameterIncorrect (SRC_POS); } return; } if (unitCount <= ThreadCount) { fragmentCount = (size_t) unitCount; unitsPerFragment = 1; remainder = 0; } else { fragmentCount = ThreadCount; unitsPerFragment = (size_t) unitCount / ThreadCount; remainder = (size_t) unitCount % ThreadCount; if (remainder > 0) ++unitsPerFragment; } fragmentData = data; fragmentStartUnitNo = startUnitNo; { ScopeLock lock (EnqueueMutex); firstFragmentWorkItem = &WorkItemQueue[EnqueuePosition]; while (firstFragmentWorkItem->State != WorkItem::State::Free) { WorkItemCompletedEvent.Wait(); } firstFragmentWorkItem->OutstandingFragmentCount.Set (fragmentCount); firstFragmentWorkItem->ItemException.reset(); while (fragmentCount-- > 0) { workItem = &WorkItemQueue[EnqueuePosition++]; if (EnqueuePosition >= QueueSize) EnqueuePosition = 0; while (workItem->State != WorkItem::State::Free) { WorkItemCompletedEvent.Wait(); } workItem->Type = type; workItem->FirstFragment = firstFragmentWorkItem; workItem->Encryption.Mode = encryptionMode; workItem->Encryption.Data = fragmentData; workItem->Encryption.UnitCount = unitsPerFragment; workItem->Encryption.StartUnitNo = fragmentStartUnitNo; workItem->Encryption.SectorSize = sectorSize; fragmentData += unitsPerFragment * ENCRYPTION_DATA_UNIT_SIZE; fragmentStartUnitNo += unitsPerFragment; if (remainder > 0 && --remainder == 0) --unitsPerFragment; workItem->State.Set (WorkItem::State::Ready); WorkItemReadyEvent.Signal(); } } firstFragmentWorkItem->ItemCompletedEvent.Wait(); auto_ptr itemException; if (firstFragmentWorkItem->ItemException.get()) itemException = firstFragmentWorkItem->ItemException; firstFragmentWorkItem->State.Set (WorkItem::State::Free); WorkItemCompletedEvent.Signal(); if (itemException.get()) itemException->Throw(); } void EncryptionThreadPool::Start () { if (ThreadPoolRunning) return; size_t cpuCount; #ifdef TC_WINDOWS SYSTEM_INFO sysInfo; GetSystemInfo (&sysInfo); cpuCount = sysInfo.dwNumberOfProcessors; #elif defined (_SC_NPROCESSORS_ONLN) cpuCount = (size_t) sysconf (_SC_NPROCESSORS_ONLN); if (cpuCount == (size_t) -1) cpuCount = 1; #elif defined (TC_MACOSX) int cpuCountSys; int mib[2] = { CTL_HW, HW_NCPU }; size_t len = sizeof (cpuCountSys); if (sysctl (mib, 2, &cpuCountSys, &len, nullptr, 0) == -1) cpuCountSys = 1; cpuCount = (size_t) cpuCountSys; #else # error Cannot determine CPU count #endif if (cpuCount < 2) return; if (cpuCount > MaxThreadCount) cpuCount = MaxThreadCount; StopPending = false; DequeuePosition = 0; EnqueuePosition = 0; for (size_t i = 0; i < sizeof (WorkItemQueue) / sizeof (WorkItemQueue[0]); ++i) { WorkItemQueue[i].State.Set (WorkItem::State::Free); } try { for (ThreadCount = 0; ThreadCount < cpuCount; ++ThreadCount) { struct ThreadFunctor : public Functor { virtual void operator() () { WorkThreadProc(); } }; make_shared_auto (Thread, thread); thread->Start (new ThreadFunctor ()); RunningThreads.push_back (thread); } } catch (...) { try { ThreadPoolRunning = true; Stop(); } catch (...) { } throw; } ThreadPoolRunning = true; } void EncryptionThreadPool::Stop () { if (!ThreadPoolRunning) return; StopPending = true; WorkItemReadyEvent.Signal(); foreach_ref (const Thread &thread, RunningThreads) { thread.Join(); } ThreadCount = 0; ThreadPoolRunning = false; } void EncryptionThreadPool::WorkThreadProc () { try { WorkItem *workItem; while (!StopPending) { { ScopeLock lock (DequeueMutex); workItem = &WorkItemQueue[DequeuePosition++]; if (DequeuePosition >= QueueSize) DequeuePosition = 0; while (!StopPending && workItem->State != WorkItem::State::Ready) { WorkItemReadyEvent.Wait(); } workItem->State.Set (WorkItem::State::Busy); } if (StopPending) break; try { switch (workItem->Type) { case WorkType::DecryptDataUnits: workItem->Encryption.Mode->DecryptSectorsCurrentThread (workItem->Encryption.Data, workItem->Encryption.StartUnitNo, workItem->Encryption.UnitCount, workItem->Encryption.SectorSize); break; case WorkType::EncryptDataUnits: workItem->Encryption.Mode->EncryptSectorsCurrentThread (workItem->Encryption.Data, workItem->Encryption.StartUnitNo, workItem->Encryption.UnitCount, workItem->Encryption.SectorSize); break; default: throw ParameterIncorrect (SRC_POS); } } catch (Exception &e) { workItem->FirstFragment->ItemException.reset (e.CloneNew()); } catch (exception &e) { workItem->FirstFragment->ItemException.reset (new ExternalException (SRC_POS, StringConverter::ToExceptionString (e))); } catch (...) { workItem->FirstFragment->ItemException.reset (new UnknownException (SRC_POS)); } if (workItem != workItem->FirstFragment) { workItem->State.Set (WorkItem::State::Free); WorkItemCompletedEvent.Signal(); } if (workItem->FirstFragment->OutstandingFragmentCount.Decrement() == 0) workItem->FirstFragment->ItemCompletedEvent.Signal(); } } catch (exception &e) { SystemLog::WriteException (e); } catch (...) { SystemLog::WriteException (UnknownException (SRC_POS)); } } volatile bool EncryptionThreadPool::ThreadPoolRunning = false; volatile bool EncryptionThreadPool::StopPending = false; size_t EncryptionThreadPool::ThreadCount; EncryptionThreadPool::WorkItem EncryptionThreadPool::WorkItemQueue[QueueSize]; volatile size_t EncryptionThreadPool::EnqueuePosition; volatile size_t EncryptionThreadPool::DequeuePosition; Mutex EncryptionThreadPool::EnqueueMutex; Mutex EncryptionThreadPool::DequeueMutex; SyncEvent EncryptionThreadPool::WorkItemReadyEvent; SyncEvent EncryptionThreadPool::WorkItemCompletedEvent; list < shared_ptr > EncryptionThreadPool::RunningThreads; } /* Name.Constant */ .highlight .nd { color: #555555 } /* Name.Decorator */ .highlight .ne { color: #bb0066; font-weight: bold } /* Name.Exception */ .highlight .nf { color: #0066bb; font-weight: bold } /* Name.Function */ .highlight .nl { color: #336699; font-style: italic } /* Name.Label */ .highlight .nn { color: #bb0066; font-weight: bold } /* Name.Namespace */ .highlight .py { color: #336699; font-weight: bold } /* Name.Property */ .highlight .nt { color: #bb0066; font-weight: bold } /* Name.Tag */ .highlight .nv { color: #336699 } /* Name.Variable */ .highlight .ow { color: #008800 } /* Operator.Word */ .highlight .w { color: #bbbbbb } /* Text.Whitespace */ .highlight .mb { color: #0000DD; font-weight: bold } /* Literal.Number.Bin */ .highlight .mf { color: #0000DD; font-weight: bold } /* Literal.Number.Float */ .highlight .mh { color: #0000DD; font-weight: bold } /* Literal.Number.Hex */ .highlight .mi { color: #0000DD; font-weight: bold } /* Literal.Number.Integer */ .highlight .mo { color: #0000DD; font-weight: bold } /* Literal.Number.Oct */ .highlight .sa { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Affix */ .highlight .sb { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Backtick */ .highlight .sc { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Char */ .highlight .dl { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Delimiter */ .highlight .sd { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Doc */ .highlight .s2 { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Double */ .highlight .se { color: #0044dd; background-color: #fff0f0 } /* Literal.String.Escape */ .highlight .sh { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Heredoc */ .highlight .si { color: #3333bb; background-color: #fff0f0 } /* Literal.String.Interpol */ .highlight .sx { color: #22bb22; background-color: #f0fff0 } /* Literal.String.Other */ .highlight .sr { color: #008800; background-color: #fff0ff } /* Literal.String.Regex */ .highlight .s1 { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Single */ .highlight .ss { color: #aa6600; background-color: #fff0f0 } /* Literal.String.Symbol */ .highlight .bp { color: #003388 } /* Name.Builtin.Pseudo */ .highlight .fm { color: #0066bb; font-weight: bold } /* Name.Function.Magic */ .highlight .vc { color: #336699 } /* Name.Variable.Class */ .highlight .vg { color: #dd7700 } /* Name.Variable.Global */ .highlight .vi { color: #3333bb } /* Name.Variable.Instance */ .highlight .vm { color: #336699 } /* Name.Variable.Magic */ .highlight .il { color: #0000DD; font-weight: bold } /* Literal.Number.Integer.Long */
/*
 Derived from source code of TrueCrypt 7.1a, which is
 Copyright (c) 2008-2012 TrueCrypt Developers Association and which is governed
 by the TrueCrypt License 3.0.

 Modifications and additions to the original source code (contained in this file) 
 and all other portions of this file are Copyright (c) 2013-2017 IDRIX
 and are governed by the Apache License 2.0 the full text of which is
 contained in the file License.txt included in VeraCrypt binary and source
 code distribution packages.
*/

import "wtypes.idl";
import "..\Common\Password.h";

[
	uuid(56327DDA-F1A7-4e13-B128-520D129BDEF6),
	helpstring("VeraCrypt Format UAC Support Library"),
	version(2.8)	// Update ComSetup.cpp when changing version number
]
library TrueCryptFormatCom
{
	[
		uuid(7AB357D9-A17F-466e-BCD6-F49E97C218D8),
		object,
		oleautomation,
		helpstring("VeraCrypt Format UAC Support Interface")
	]
	interface ITrueCryptFormatCom : IUnknown
	{
		int AnalyzeHiddenVolumeHost (LONG_PTR hwndDlg, int *driveNo, __int64 hiddenVolHostSize, int *realClusterSize, __int64 *nbrFreeClusters);
		DWORD CallDriver (DWORD ioctl, BSTR input, BSTR *output);
		DWORD CopyFile (BSTR sourceFile, BSTR destinationFile);
		DWORD DeleteFile (BSTR file);
		BOOL FormatNtfs (int driveNo, int clusterSize);
		BOOL IsPagingFileActive (BOOL checkNonWindowsPartitionsOnly);
		DWORD ReadWriteFile (BOOL write, BOOL device, BSTR filePath, BSTR *bufferBstr, unsigned __int64 offset, unsigned __int32 size, DWORD *sizeDone);
		DWORD RegisterFilterDriver (BOOL registerDriver, int filterType);
		DWORD RegisterSystemFavoritesService (BOOL registerService);
		DWORD SetDriverServiceStartType (DWORD startType);
		DWORD WriteLocalMachineRegistryDwordValue (BSTR keyPath, BSTR valueName, DWORD value);
		BOOL FormatFs (int driveNo, int clusterSize, int fsType);
		DWORD GetFileSize (BSTR filePath, unsigned __int64* pSize);
		DWORD DeviceIoControl (BOOL readOnly, BOOL device, BSTR filePath, DWORD dwIoControlCode, BSTR input, BSTR *output);
		DWORD InstallEfiBootLoader (BOOL preserveUserConfig, BOOL hiddenOSCreation, int pim, int hashAlg);
		DWORD BackupEfiSystemLoader ();
		DWORD RestoreEfiSystemLoader ();
		DWORD GetEfiBootDeviceNumber (BSTR* pSdn);
		DWORD WriteEfiBootSectorUserConfig (DWORD userConfig, BSTR customUserMessage, int pim, int hashAlg);
		DWORD UpdateSetupConfigFile (BOOL bForInstall);
		DWORD GetSecureBootConfig (BOOL* pSecureBootEnabled, BOOL *pVeraCryptKeysLoaded);
	};

	[
		uuid(A96D3797-9F31-49f4-A0CE-9657392CF789),
		helpstring("VeraCrypt Format UAC Support Coclass")
	]
	coclass TrueCryptFormatCom
	{
		[default] interface ITrueCryptFormatCom;
	}
}