VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2014-06-08 00:49:06 +0200
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2014-11-08 23:19:34 +0100
commit31fd16979fa56eda856d93754b388e73eae69f9f (patch)
treef8353dc7617b5c481db92ee235f33d84b27fe62f /src
parent4d12001e10c3c7a1a97bf47428bdebfab54bac91 (diff)
downloadVeraCrypt-31fd16979fa56eda856d93754b388e73eae69f9f.tar.gz
VeraCrypt-31fd16979fa56eda856d93754b388e73eae69f9f.zip
Change TrueCrypt to VeraCrypt in some comments
Diffstat (limited to 'src')
-rw-r--r--src/Driver/Ntdriver.c8
-rw-r--r--src/Volume/Volume.cpp4
2 files changed, 6 insertions, 6 deletions
diff --git a/src/Driver/Ntdriver.c b/src/Driver/Ntdriver.c
index f50c0976..2456383b 100644
--- a/src/Driver/Ntdriver.c
+++ b/src/Driver/Ntdriver.c
@@ -905,9 +905,9 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
ntStatus = STATUS_INSUFFICIENT_RESOURCES;
}
else
{
- // Determine if the first sector contains a portion of the TrueCrypt Boot Loader
+ // Determine if the first sector contains a portion of the VeraCrypt Boot Loader
offset.QuadPart = 0;
ntStatus = ZwReadFile (NtFileHandle,
@@ -925,9 +925,9 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
size_t i;
if (opentest->bDetectTCBootLoader && IoStatus.Information >= TC_SECTOR_SIZE_BIOS)
{
- // Search for the string "TrueCrypt"
+ // Search for the string "VeraCrypt"
for (i = 0; i < TC_SECTOR_SIZE_BIOS - strlen (TC_APP_NAME); ++i)
{
if (memcmp (readBuffer + i, TC_APP_NAME, strlen (TC_APP_NAME)) == 0)
{
@@ -994,9 +994,9 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ | FILE_SHARE_WRITE, FILE_OPEN, FILE_SYNCHRONOUS_IO_NONALERT | FILE_RANDOM_ACCESS, NULL, 0);
if (NT_SUCCESS (ntStatus))
{
- // Determine if the first sector contains a portion of the TrueCrypt Boot Loader
+ // Determine if the first sector contains a portion of the VeraCrypt Boot Loader
offset.QuadPart = 0; // MBR
ntStatus = ZwReadFile (NtFileHandle,
NULL,
@@ -1032,9 +1032,9 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
request->Configuration = 0;
request->UserConfiguration = 0;
request->CustomUserMessage[0] = 0;
- // Search for the string "TrueCrypt"
+ // Search for the string "VeraCrypt"
for (i = 0; i < sizeof (readBuffer) - strlen (TC_APP_NAME); ++i)
{
if (memcmp (readBuffer + i, TC_APP_NAME, strlen (TC_APP_NAME)) == 0)
{
diff --git a/src/Volume/Volume.cpp b/src/Volume/Volume.cpp
index 0acdbb2e..ead76ed9 100644
--- a/src/Volume/Volume.cpp
+++ b/src/Volume/Volume.cpp
@@ -274,18 +274,18 @@ namespace TrueCrypt
throw PasswordOrKeyboardLayoutIncorrect (SRC_POS);
if (!partitionInSystemEncryptionScope && GetPath().IsDevice())
{
- // Check if the device contains TrueCrypt Boot Loader
+ // Check if the device contains VeraCrypt Boot Loader
try
{
File driveDevice;
driveDevice.Open (DevicePath (wstring (GetPath())).ToHostDriveOfPartition());
Buffer mbr (VolumeFile->GetDeviceSectorSize());
driveDevice.ReadAt (mbr, 0);
- // Search for the string "TrueCrypt"
+ // Search for the string "VeraCrypt"
size_t nameLen = strlen (TC_APP_NAME);
for (size_t i = 0; i < mbr.Size() - nameLen; ++i)
{
if (memcmp (mbr.Ptr() + i, TC_APP_NAME, nameLen) == 0)