1
0
mirror of https://github.com/veracrypt/VeraCrypt.git synced 2025-11-11 19:08:26 -06:00

Add TrueCrypt 7.1a MacOSX/Linux specific source files.

This commit is contained in:
Mounir IDRASSI
2014-05-31 18:44:53 +02:00
parent 97011f179c
commit 7ffce028d0
203 changed files with 52120 additions and 0 deletions

388
src/Volume/Volume.cpp Normal file
View File

@@ -0,0 +1,388 @@
/*
Copyright (c) 2008-2010 TrueCrypt Developers Association. All rights reserved.
Governed by the TrueCrypt License 3.0 the full text of which is contained in
the file License.txt included in TrueCrypt binary and source code distribution
packages.
*/
#ifndef TC_WINDOWS
#include <errno.h>
#endif
#include "EncryptionModeLRW.h"
#include "EncryptionModeXTS.h"
#include "Volume.h"
#include "VolumeHeader.h"
#include "VolumeLayout.h"
#include "Common/Crypto.h"
namespace TrueCrypt
{
Volume::Volume ()
: HiddenVolumeProtectionTriggered (false),
SystemEncryption (false),
VolumeDataSize (0),
TopWriteOffset (0),
TotalDataRead (0),
TotalDataWritten (0)
{
}
Volume::~Volume ()
{
}
void Volume::CheckProtectedRange (uint64 writeHostOffset, uint64 writeLength)
{
uint64 writeHostEndOffset = writeHostOffset + writeLength - 1;
if ((writeHostOffset < ProtectedRangeStart) ? (writeHostEndOffset >= ProtectedRangeStart) : (writeHostOffset <= ProtectedRangeEnd - 1))
{
HiddenVolumeProtectionTriggered = true;
throw VolumeProtected (SRC_POS);
}
}
void Volume::Close ()
{
if (VolumeFile.get() == nullptr)
throw NotInitialized (SRC_POS);
VolumeFile.reset();
}
shared_ptr <EncryptionAlgorithm> Volume::GetEncryptionAlgorithm () const
{
if_debug (ValidateState ());
return EA;
}
shared_ptr <EncryptionMode> Volume::GetEncryptionMode () const
{
if_debug (ValidateState ());
return EA->GetMode();
}
void Volume::Open (const VolumePath &volumePath, bool preserveTimestamps, shared_ptr <VolumePassword> password, shared_ptr <KeyfileList> keyfiles, VolumeProtection::Enum protection, shared_ptr <VolumePassword> protectionPassword, shared_ptr <KeyfileList> protectionKeyfiles, bool sharedAccessAllowed, VolumeType::Enum volumeType, bool useBackupHeaders, bool partitionInSystemEncryptionScope)
{
make_shared_auto (File, file);
File::FileOpenFlags flags = (preserveTimestamps ? File::PreserveTimestamps : File::FlagsNone);
try
{
if (protection == VolumeProtection::ReadOnly)
file->Open (volumePath, File::OpenRead, File::ShareRead, flags);
else
file->Open (volumePath, File::OpenReadWrite, File::ShareNone, flags);
}
catch (SystemException &e)
{
if (e.GetErrorCode() ==
#ifdef TC_WINDOWS
ERROR_SHARING_VIOLATION)
#else
EAGAIN)
#endif
{
if (!sharedAccessAllowed)
throw VolumeHostInUse (SRC_POS);
file->Open (volumePath, protection == VolumeProtection::ReadOnly ? File::OpenRead : File::OpenReadWrite, File::ShareReadWriteIgnoreLock, flags);
}
else
throw;
}
return Open (file, password, keyfiles, protection, protectionPassword, protectionKeyfiles, volumeType, useBackupHeaders, partitionInSystemEncryptionScope);
}
void Volume::Open (shared_ptr <File> volumeFile, shared_ptr <VolumePassword> password, shared_ptr <KeyfileList> keyfiles, VolumeProtection::Enum protection, shared_ptr <VolumePassword> protectionPassword, shared_ptr <KeyfileList> protectionKeyfiles, VolumeType::Enum volumeType, bool useBackupHeaders, bool partitionInSystemEncryptionScope)
{
if (!volumeFile)
throw ParameterIncorrect (SRC_POS);
Protection = protection;
VolumeFile = volumeFile;
SystemEncryption = partitionInSystemEncryptionScope;
try
{
VolumeHostSize = VolumeFile->Length();
shared_ptr <VolumePassword> passwordKey = Keyfile::ApplyListToPassword (keyfiles, password);
bool skipLayoutV1Normal = false;
bool deviceHosted = GetPath().IsDevice();
size_t hostDeviceSectorSize = 0;
if (deviceHosted)
hostDeviceSectorSize = volumeFile->GetDeviceSectorSize();
// Test volume layouts
foreach (shared_ptr <VolumeLayout> layout, VolumeLayout::GetAvailableLayouts (volumeType))
{
if (skipLayoutV1Normal && typeid (*layout) == typeid (VolumeLayoutV1Normal))
{
// Skip VolumeLayoutV1Normal as it shares header location with VolumeLayoutV2Normal
continue;
}
if (useBackupHeaders && !layout->HasBackupHeader())
continue;
if (typeid (*layout) == typeid (VolumeLayoutV1Hidden)
&& deviceHosted
&& hostDeviceSectorSize != TC_SECTOR_SIZE_LEGACY)
{
continue;
}
SecureBuffer headerBuffer (layout->GetHeaderSize());
if (layout->HasDriveHeader())
{
if (!partitionInSystemEncryptionScope)
continue;
if (!GetPath().IsDevice())
throw PartitionDeviceRequired (SRC_POS);
File driveDevice;
driveDevice.Open (DevicePath (wstring (GetPath())).ToHostDriveOfPartition());
int headerOffset = layout->GetHeaderOffset();
if (headerOffset >= 0)
driveDevice.SeekAt (headerOffset);
else
driveDevice.SeekEnd (headerOffset);
if (driveDevice.Read (headerBuffer) != layout->GetHeaderSize())
continue;
}
else
{
if (partitionInSystemEncryptionScope)
continue;
int headerOffset = useBackupHeaders ? layout->GetBackupHeaderOffset() : layout->GetHeaderOffset();
if (headerOffset >= 0)
VolumeFile->SeekAt (headerOffset);
else
VolumeFile->SeekEnd (headerOffset);
if (VolumeFile->Read (headerBuffer) != layout->GetHeaderSize())
continue;
}
EncryptionAlgorithmList layoutEncryptionAlgorithms = layout->GetSupportedEncryptionAlgorithms();
EncryptionModeList layoutEncryptionModes = layout->GetSupportedEncryptionModes();
if (typeid (*layout) == typeid (VolumeLayoutV2Normal))
{
skipLayoutV1Normal = true;
// Test all algorithms and modes of VolumeLayoutV1Normal as it shares header location with VolumeLayoutV2Normal
layoutEncryptionAlgorithms = EncryptionAlgorithm::GetAvailableAlgorithms();
layoutEncryptionModes = EncryptionMode::GetAvailableModes();
}
shared_ptr <VolumeHeader> header = layout->GetHeader();
if (header->Decrypt (headerBuffer, *passwordKey, layout->GetSupportedKeyDerivationFunctions(), layoutEncryptionAlgorithms, layoutEncryptionModes))
{
// Header decrypted
if (typeid (*layout) == typeid (VolumeLayoutV2Normal) && header->GetRequiredMinProgramVersion() < 0x600)
{
// VolumeLayoutV1Normal has been opened as VolumeLayoutV2Normal
layout.reset (new VolumeLayoutV1Normal);
header->SetSize (layout->GetHeaderSize());
layout->SetHeader (header);
}
Type = layout->GetType();
SectorSize = header->GetSectorSize();
VolumeDataOffset = layout->GetDataOffset (VolumeHostSize);
VolumeDataSize = layout->GetDataSize (VolumeHostSize);
Header = header;
Layout = layout;
EA = header->GetEncryptionAlgorithm();
EncryptionMode &mode = *EA->GetMode();
if (layout->HasDriveHeader())
{
if (header->GetEncryptedAreaLength() != header->GetVolumeDataSize())
throw VolumeEncryptionNotCompleted (SRC_POS);
uint64 partitionStartOffset = VolumeFile->GetPartitionDeviceStartOffset();
if (partitionStartOffset < header->GetEncryptedAreaStart()
|| partitionStartOffset >= header->GetEncryptedAreaStart() + header->GetEncryptedAreaLength())
throw PasswordIncorrect (SRC_POS);
mode.SetSectorOffset (partitionStartOffset / ENCRYPTION_DATA_UNIT_SIZE);
}
else if (typeid (mode) == typeid (EncryptionModeLRW))
{
mode.SetSectorOffset (VolumeDataOffset / SectorSize);
}
// Volume protection
if (Protection == VolumeProtection::HiddenVolumeReadOnly)
{
if (Type == VolumeType::Hidden)
throw PasswordIncorrect (SRC_POS);
else
{
try
{
Volume protectedVolume;
protectedVolume.Open (VolumeFile,
protectionPassword, protectionKeyfiles,
VolumeProtection::ReadOnly,
shared_ptr <VolumePassword> (), shared_ptr <KeyfileList> (),
VolumeType::Hidden,
useBackupHeaders);
if (protectedVolume.GetType() != VolumeType::Hidden)
ParameterIncorrect (SRC_POS);
ProtectedRangeStart = protectedVolume.VolumeDataOffset;
ProtectedRangeEnd = protectedVolume.VolumeDataOffset + protectedVolume.VolumeDataSize;
if (typeid (*protectedVolume.Layout) == typeid (VolumeLayoutV1Hidden))
ProtectedRangeEnd += protectedVolume.Layout->GetHeaderSize();
}
catch (PasswordException&)
{
if (protectionKeyfiles && !protectionKeyfiles->empty())
throw ProtectionPasswordKeyfilesIncorrect (SRC_POS);
throw ProtectionPasswordIncorrect (SRC_POS);
}
}
}
return;
}
}
if (partitionInSystemEncryptionScope)
throw PasswordOrKeyboardLayoutIncorrect (SRC_POS);
if (!partitionInSystemEncryptionScope && GetPath().IsDevice())
{
// Check if the device contains TrueCrypt Boot Loader
try
{
File driveDevice;
driveDevice.Open (DevicePath (wstring (GetPath())).ToHostDriveOfPartition());
Buffer mbr (VolumeFile->GetDeviceSectorSize());
driveDevice.ReadAt (mbr, 0);
// Search for the string "TrueCrypt"
size_t nameLen = strlen (TC_APP_NAME);
for (size_t i = 0; i < mbr.Size() - nameLen; ++i)
{
if (memcmp (mbr.Ptr() + i, TC_APP_NAME, nameLen) == 0)
throw PasswordOrMountOptionsIncorrect (SRC_POS);
}
}
catch (PasswordOrMountOptionsIncorrect&) { throw; }
catch (...) { }
}
if (keyfiles && !keyfiles->empty())
throw PasswordKeyfilesIncorrect (SRC_POS);
throw PasswordIncorrect (SRC_POS);
}
catch (...)
{
Close();
throw;
}
}
void Volume::ReadSectors (const BufferPtr &buffer, uint64 byteOffset)
{
if_debug (ValidateState ());
uint64 length = buffer.Size();
uint64 hostOffset = VolumeDataOffset + byteOffset;
if (length % SectorSize != 0 || byteOffset % SectorSize != 0)
throw ParameterIncorrect (SRC_POS);
if (VolumeFile->ReadAt (buffer, hostOffset) != length)
throw MissingVolumeData (SRC_POS);
EA->DecryptSectors (buffer, hostOffset / SectorSize, length / SectorSize, SectorSize);
TotalDataRead += length;
}
void Volume::ReEncryptHeader (bool backupHeader, const ConstBufferPtr &newSalt, const ConstBufferPtr &newHeaderKey, shared_ptr <Pkcs5Kdf> newPkcs5Kdf)
{
if_debug (ValidateState ());
if (Protection == VolumeProtection::ReadOnly)
throw VolumeReadOnly (SRC_POS);
SecureBuffer newHeaderBuffer (Layout->GetHeaderSize());
Header->EncryptNew (newHeaderBuffer, newSalt, newHeaderKey, newPkcs5Kdf);
int headerOffset = backupHeader ? Layout->GetBackupHeaderOffset() : Layout->GetHeaderOffset();
if (headerOffset >= 0)
VolumeFile->SeekAt (headerOffset);
else
VolumeFile->SeekEnd (headerOffset);
VolumeFile->Write (newHeaderBuffer);
}
void Volume::ValidateState () const
{
if (VolumeFile.get() == nullptr)
throw NotInitialized (SRC_POS);
}
void Volume::WriteSectors (const ConstBufferPtr &buffer, uint64 byteOffset)
{
if_debug (ValidateState ());
uint64 length = buffer.Size();
uint64 hostOffset = VolumeDataOffset + byteOffset;
if (length % SectorSize != 0
|| byteOffset % SectorSize != 0
|| byteOffset + length > VolumeDataSize)
throw ParameterIncorrect (SRC_POS);
if (Protection == VolumeProtection::ReadOnly)
throw VolumeReadOnly (SRC_POS);
if (HiddenVolumeProtectionTriggered)
throw VolumeProtected (SRC_POS);
if (Protection == VolumeProtection::HiddenVolumeReadOnly)
CheckProtectedRange (hostOffset, length);
SecureBuffer encBuf (buffer.Size());
encBuf.CopyFrom (buffer);
EA->EncryptSectors (encBuf, hostOffset / SectorSize, length / SectorSize, SectorSize);
VolumeFile->WriteAt (encBuf, hostOffset);
TotalDataWritten += length;
uint64 writeEndOffset = byteOffset + buffer.Size();
if (writeEndOffset > TopWriteOffset)
TopWriteOffset = writeEndOffset;
}
}