diff options
author | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2014-06-08 00:49:06 +0200 |
---|---|---|
committer | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2014-11-08 23:19:34 +0100 |
commit | 31fd16979fa56eda856d93754b388e73eae69f9f (patch) | |
tree | f8353dc7617b5c481db92ee235f33d84b27fe62f | |
parent | 4d12001e10c3c7a1a97bf47428bdebfab54bac91 (diff) | |
download | VeraCrypt-31fd16979fa56eda856d93754b388e73eae69f9f.tar.gz VeraCrypt-31fd16979fa56eda856d93754b388e73eae69f9f.zip |
Change TrueCrypt to VeraCrypt in some comments
-rw-r--r-- | src/Driver/Ntdriver.c | 8 | ||||
-rw-r--r-- | src/Volume/Volume.cpp | 4 |
2 files changed, 6 insertions, 6 deletions
diff --git a/src/Driver/Ntdriver.c b/src/Driver/Ntdriver.c index f50c0976..2456383b 100644 --- a/src/Driver/Ntdriver.c +++ b/src/Driver/Ntdriver.c @@ -905,9 +905,9 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex ntStatus = STATUS_INSUFFICIENT_RESOURCES;
}
else
{
- // Determine if the first sector contains a portion of the TrueCrypt Boot Loader
+ // Determine if the first sector contains a portion of the VeraCrypt Boot Loader
offset.QuadPart = 0;
ntStatus = ZwReadFile (NtFileHandle,
@@ -925,9 +925,9 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex size_t i;
if (opentest->bDetectTCBootLoader && IoStatus.Information >= TC_SECTOR_SIZE_BIOS)
{
- // Search for the string "TrueCrypt"
+ // Search for the string "VeraCrypt"
for (i = 0; i < TC_SECTOR_SIZE_BIOS - strlen (TC_APP_NAME); ++i)
{
if (memcmp (readBuffer + i, TC_APP_NAME, strlen (TC_APP_NAME)) == 0)
{
@@ -994,9 +994,9 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ | FILE_SHARE_WRITE, FILE_OPEN, FILE_SYNCHRONOUS_IO_NONALERT | FILE_RANDOM_ACCESS, NULL, 0);
if (NT_SUCCESS (ntStatus))
{
- // Determine if the first sector contains a portion of the TrueCrypt Boot Loader
+ // Determine if the first sector contains a portion of the VeraCrypt Boot Loader
offset.QuadPart = 0; // MBR
ntStatus = ZwReadFile (NtFileHandle,
NULL,
@@ -1032,9 +1032,9 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex request->Configuration = 0;
request->UserConfiguration = 0;
request->CustomUserMessage[0] = 0;
- // Search for the string "TrueCrypt"
+ // Search for the string "VeraCrypt"
for (i = 0; i < sizeof (readBuffer) - strlen (TC_APP_NAME); ++i)
{
if (memcmp (readBuffer + i, TC_APP_NAME, strlen (TC_APP_NAME)) == 0)
{
diff --git a/src/Volume/Volume.cpp b/src/Volume/Volume.cpp index 0acdbb2e..ead76ed9 100644 --- a/src/Volume/Volume.cpp +++ b/src/Volume/Volume.cpp @@ -274,18 +274,18 @@ namespace TrueCrypt throw PasswordOrKeyboardLayoutIncorrect (SRC_POS); if (!partitionInSystemEncryptionScope && GetPath().IsDevice()) { - // Check if the device contains TrueCrypt Boot Loader + // Check if the device contains VeraCrypt Boot Loader try { File driveDevice; driveDevice.Open (DevicePath (wstring (GetPath())).ToHostDriveOfPartition()); Buffer mbr (VolumeFile->GetDeviceSectorSize()); driveDevice.ReadAt (mbr, 0); - // Search for the string "TrueCrypt" + // Search for the string "VeraCrypt" size_t nameLen = strlen (TC_APP_NAME); for (size_t i = 0; i < mbr.Size() - nameLen; ++i) { if (memcmp (mbr.Ptr() + i, TC_APP_NAME, nameLen) == 0) |