diff options
-rw-r--r-- | src/Driver/Ntdriver.c | 8 | ||||
-rw-r--r-- | src/Volume/Volume.cpp | 4 |
2 files changed, 6 insertions, 6 deletions
diff --git a/src/Driver/Ntdriver.c b/src/Driver/Ntdriver.c index f50c0976..2456383b 100644 --- a/src/Driver/Ntdriver.c +++ b/src/Driver/Ntdriver.c @@ -906,7 +906,7 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex }
else
{
- // Determine if the first sector contains a portion of the TrueCrypt Boot Loader
+ // Determine if the first sector contains a portion of the VeraCrypt Boot Loader
offset.QuadPart = 0;
@@ -926,7 +926,7 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex if (opentest->bDetectTCBootLoader && IoStatus.Information >= TC_SECTOR_SIZE_BIOS)
{
- // Search for the string "TrueCrypt"
+ // Search for the string "VeraCrypt"
for (i = 0; i < TC_SECTOR_SIZE_BIOS - strlen (TC_APP_NAME); ++i)
{
if (memcmp (readBuffer + i, TC_APP_NAME, strlen (TC_APP_NAME)) == 0)
@@ -995,7 +995,7 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex if (NT_SUCCESS (ntStatus))
{
- // Determine if the first sector contains a portion of the TrueCrypt Boot Loader
+ // Determine if the first sector contains a portion of the VeraCrypt Boot Loader
offset.QuadPart = 0; // MBR
ntStatus = ZwReadFile (NtFileHandle,
@@ -1033,7 +1033,7 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex request->UserConfiguration = 0;
request->CustomUserMessage[0] = 0;
- // Search for the string "TrueCrypt"
+ // Search for the string "VeraCrypt"
for (i = 0; i < sizeof (readBuffer) - strlen (TC_APP_NAME); ++i)
{
if (memcmp (readBuffer + i, TC_APP_NAME, strlen (TC_APP_NAME)) == 0)
diff --git a/src/Volume/Volume.cpp b/src/Volume/Volume.cpp index 0acdbb2e..ead76ed9 100644 --- a/src/Volume/Volume.cpp +++ b/src/Volume/Volume.cpp @@ -275,7 +275,7 @@ namespace TrueCrypt if (!partitionInSystemEncryptionScope && GetPath().IsDevice()) { - // Check if the device contains TrueCrypt Boot Loader + // Check if the device contains VeraCrypt Boot Loader try { File driveDevice; @@ -284,7 +284,7 @@ namespace TrueCrypt Buffer mbr (VolumeFile->GetDeviceSectorSize()); driveDevice.ReadAt (mbr, 0); - // Search for the string "TrueCrypt" + // Search for the string "VeraCrypt" size_t nameLen = strlen (TC_APP_NAME); for (size_t i = 0; i < mbr.Size() - nameLen; ++i) { |