/* Derived from source code of TrueCrypt 7.1a, which is Copyright (c) 2008-2012 TrueCrypt Developers Association and which is governed by the TrueCrypt License 3.0. Modifications and additions to the original source code (contained in this file) and all other portions of this file are Copyright (c) 2013-2017 IDRIX and are governed by the Apache License 2.0 the full text of which is contained in the file License.txt included in VeraCrypt binary and source code distribution packages. */ #ifndef TC_HEADER_Volume_Volume #define TC_HEADER_Volume_Volume #include "Platform/Platform.h" #include "Platform/StringConverter.h" #include "EncryptionAlgorithm.h" #include "EncryptionMode.h" #include "Keyfile.h" #include "VolumePassword.h" #include "VolumeException.h" #include "VolumeLayout.h" namespace VeraCrypt { class VolumePath { public: VolumePath () { } VolumePath (const wstring &path) { Data = path; } VolumePath (const FilesystemPath &path) { Data = path; } bool operator== (const VolumePath &other) const { return Data == other.Data; } bool operator!= (const VolumePath &other) const { return Data != other.Data; } operator FilesystemPath () const { return FilesystemPath (Data); } operator string () const { return StringConverter::ToSingle (Data); } operator wstring () const { return Data; } bool IsDevice () const { return FilesystemPath (Data).IsBlockDevice() || FilesystemPath (Data).IsCharacterDevice(); } bool IsEmpty () const { return Data.empty(); } wstring GetExtension () const { if (Data.empty() || (Data.size() == 1)) return L""; else { size_t pos = Data.find_last_of (L'.'); if (pos == string::npos) return L""; return Data.substr (pos + 1); } } bool HasTrueCryptExtension () const { wstring sExt = GetExtension (); if ((sExt.size () == 2) && (sExt[0] == L't' || sExt[0] == L'T') && (sExt[1] == L'c' || sExt[1] == L'C') ) { return true; } else return false; } protected: wstring Data; }; typedef list VolumePathList; struct VolumeHostType { enum Enum { Unknown, File, Device }; }; struct VolumeProtection { enum Enum { None, ReadOnly, HiddenVolumeReadOnly }; }; class Volume { public: Volume (); virtual ~Volume (); void Close (); shared_ptr GetEncryptionAlgorithm () const; shared_ptr GetEncryptionMode () const; shared_ptr GetFile () const { return VolumeFile; } shared_ptr GetHeader () const { return Header; } uint64 GetHeaderCreationTime () const { return Header->GetHeaderCreationTime(); } uint64 GetHostSize () const { return VolumeHostSize; } shared_ptr GetLayout () const { return Layout; } VolumePath GetPath () const { return VolumeFile->GetPath(); } VolumeProtection::Enum GetProtectionType () const { return Protection; } shared_ptr GetPkcs5Kdf () const { return Header->GetPkcs5Kdf(); } uint32 GetSaltSize () const { return Header->GetSaltSize(); } size_t GetSectorSize () const { return SectorSize; } uint64 GetSize () const { return VolumeDataSize; } uint64 GetEncryptedSize () const { return EncryptedDataSize; } uint64 GetTopWriteOffset () const { return TopWriteOffset; } uint64 GetTotalDataRead () const { return TotalDataRead; } uint64 GetTotalDataWritten () const { return TotalDataWritten; } VolumeType::Enum GetType () const { return Type; } bool GetTrueCryptMode() const { return TrueCryptMode; } int GetPim() const { return Pim;} uint64 GetVolumeCreationTime () const { return Header->GetVolumeCreationTime(); } bool IsHiddenVolumeProtectionTriggered () const { return HiddenVolumeProtectionTriggered; } bool IsInSystemEncryptionScope () const { return SystemEncryption; } void Open (const VolumePath &volumePath, bool preserveTimestamps, shared_ptr password, int pim, shared_ptr kdf, bool truecryptMode, shared_ptr keyfiles, VolumeProtection::Enum protection = VolumeProtection::None, shared_ptr protectionPassword = shared_ptr (), int protectionPim = 0, shared_ptr protectionKdf = shared_ptr (),shared_ptr protectionKeyfiles = shared_ptr (), bool sharedAccessAllowed = false, VolumeType::Enum volumeType = VolumeType::Unknown, bool useBackupHeaders = false, bool partitionInSystemEncryptionScope = false); void Open (shared_ptr volumeFile, shared_ptr password, int pim, shared_ptr kdf, bool truecryptMode, shared_ptr keyfiles, VolumeProtection::Enum protection = VolumeProtection::None, shared_ptr protectionPassword = shared_ptr (), int protectionPim = 0, shared_ptr protectionKdf = shared_ptr (), shared_ptr protectionKeyfiles = shared_ptr (), VolumeType::Enum volumeType = VolumeType::Unknown, bool useBackupHeaders = false, bool partitionInSystemEncryptionScope = false); void ReadSectors (const BufferPtr &buffer, uint64 byteOffset); void ReEncryptHeader (bool backupHeader, const ConstBufferPtr &newSalt, const ConstBufferPtr &newHeaderKey, shared_ptr newPkcs5Kdf); void WriteSectors (const ConstBufferPtr &buffer, uint64 byteOffset); bool IsEncryptionNotCompleted () const { return EncryptionNotCompleted; } protected: void CheckProtectedRange (uint64 writeHostOffset, uint64 writeLength); void ValidateState () const; shared_ptr EA; shared_ptr Header; bool HiddenVolumeProtectionTriggered; shared_ptr Layout; uint64 ProtectedRangeStart; uint64 ProtectedRangeEnd; VolumeProtection::Enum Protection; size_t SectorSize; bool SystemEncryption; VolumeType::Enum Type; shared_ptr VolumeFile; uint64 VolumeHostSize; uint64 VolumeDataOffset; uint64 VolumeDataSize; uint64 EncryptedDataSize; uint64 TopWriteOffset; uint64 TotalDataRead; uint64 TotalDataWritten; bool TrueCryptMode; int Pim; bool EncryptionNotCompleted; private: Volume (const Volume &); Volume &operator= (const Volume &); }; } #endif // TC_HEADER_Volume_Volume 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231