VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
Diffstat (limited to 'src')
-rw-r--r--src/Driver/Ntdriver.c8
-rw-r--r--src/Volume/Volume.cpp4
2 files changed, 6 insertions, 6 deletions
diff --git a/src/Driver/Ntdriver.c b/src/Driver/Ntdriver.c
index f50c0976..2456383b 100644
--- a/src/Driver/Ntdriver.c
+++ b/src/Driver/Ntdriver.c
@@ -906,7 +906,7 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
}
else
{
- // Determine if the first sector contains a portion of the TrueCrypt Boot Loader
+ // Determine if the first sector contains a portion of the VeraCrypt Boot Loader
offset.QuadPart = 0;
@@ -926,7 +926,7 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
if (opentest->bDetectTCBootLoader && IoStatus.Information >= TC_SECTOR_SIZE_BIOS)
{
- // Search for the string "TrueCrypt"
+ // Search for the string "VeraCrypt"
for (i = 0; i < TC_SECTOR_SIZE_BIOS - strlen (TC_APP_NAME); ++i)
{
if (memcmp (readBuffer + i, TC_APP_NAME, strlen (TC_APP_NAME)) == 0)
@@ -995,7 +995,7 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
if (NT_SUCCESS (ntStatus))
{
- // Determine if the first sector contains a portion of the TrueCrypt Boot Loader
+ // Determine if the first sector contains a portion of the VeraCrypt Boot Loader
offset.QuadPart = 0; // MBR
ntStatus = ZwReadFile (NtFileHandle,
@@ -1033,7 +1033,7 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
request->UserConfiguration = 0;
request->CustomUserMessage[0] = 0;
- // Search for the string "TrueCrypt"
+ // Search for the string "VeraCrypt"
for (i = 0; i < sizeof (readBuffer) - strlen (TC_APP_NAME); ++i)
{
if (memcmp (readBuffer + i, TC_APP_NAME, strlen (TC_APP_NAME)) == 0)
diff --git a/src/Volume/Volume.cpp b/src/Volume/Volume.cpp
index 0acdbb2e..ead76ed9 100644
--- a/src/Volume/Volume.cpp
+++ b/src/Volume/Volume.cpp
@@ -275,7 +275,7 @@ namespace TrueCrypt
if (!partitionInSystemEncryptionScope && GetPath().IsDevice())
{
- // Check if the device contains TrueCrypt Boot Loader
+ // Check if the device contains VeraCrypt Boot Loader
try
{
File driveDevice;
@@ -284,7 +284,7 @@ namespace TrueCrypt
Buffer mbr (VolumeFile->GetDeviceSectorSize());
driveDevice.ReadAt (mbr, 0);
- // Search for the string "TrueCrypt"
+ // Search for the string "VeraCrypt"
size_t nameLen = strlen (TC_APP_NAME);
for (size_t i = 0; i < mbr.Size() - nameLen; ++i)
{