mirror of
https://github.com/veracrypt/VeraCrypt.git
synced 2025-11-11 19:08:26 -06:00
Windows: Remove TrueCrypt support. Increment version to 1.26.4.
This commit is contained in:
@@ -520,7 +520,7 @@ static NTSTATUS MountDrive (DriveFilterExtension *Extension, Password *password,
|
||||
|
||||
pim = (int) (BootArgs.Flags >> 16);
|
||||
|
||||
if (ReadVolumeHeader (!hiddenVolume, header, password, pkcs5_prf, pim, FALSE, &Extension->Queue.CryptoInfo, Extension->HeaderCryptoInfo) == 0)
|
||||
if (ReadVolumeHeader (!hiddenVolume, header, password, pkcs5_prf, pim, &Extension->Queue.CryptoInfo, Extension->HeaderCryptoInfo) == 0)
|
||||
{
|
||||
// Header decrypted
|
||||
status = STATUS_SUCCESS;
|
||||
@@ -1193,7 +1193,7 @@ void ReopenBootVolumeHeader (PIRP irp, PIO_STACK_LOCATION irpSp)
|
||||
}
|
||||
#endif
|
||||
|
||||
if (ReadVolumeHeader (!BootDriveFilterExtension->HiddenSystem, header, &request->VolumePassword, request->pkcs5_prf, request->pim, FALSE, NULL, BootDriveFilterExtension->HeaderCryptoInfo) == 0)
|
||||
if (ReadVolumeHeader (!BootDriveFilterExtension->HiddenSystem, header, &request->VolumePassword, request->pkcs5_prf, request->pim, NULL, BootDriveFilterExtension->HeaderCryptoInfo) == 0)
|
||||
{
|
||||
Dump ("Header reopened\n");
|
||||
#ifdef _WIN64
|
||||
|
||||
@@ -27,8 +27,8 @@ LANGUAGE LANG_ENGLISH, SUBLANG_ENGLISH_US
|
||||
//
|
||||
|
||||
VS_VERSION_INFO VERSIONINFO
|
||||
FILEVERSION 1,26,0,0
|
||||
PRODUCTVERSION 1,26,0,0
|
||||
FILEVERSION 1,26,4,0
|
||||
PRODUCTVERSION 1,26,4,0
|
||||
FILEFLAGSMASK 0x17L
|
||||
#ifdef _DEBUG
|
||||
FILEFLAGS 0x1L
|
||||
|
||||
@@ -1941,7 +1941,7 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
|
||||
switch (irpSp->Parameters.DeviceIoControl.IoControlCode)
|
||||
{
|
||||
case TC_IOCTL_GET_DRIVER_VERSION:
|
||||
case TC_IOCTL_LEGACY_GET_DRIVER_VERSION:
|
||||
|
||||
if (ValidateIOBufferSize (Irp, sizeof (LONG), ValidateOutput))
|
||||
{
|
||||
LONG tmp = VERSION_NUM;
|
||||
@@ -2375,7 +2375,6 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
|
||||
list->volumeType[ListExtension->nDosDriveNo] = PROP_VOL_TYPE_OUTER; // Normal/outer volume (hidden volume protected)
|
||||
else
|
||||
list->volumeType[ListExtension->nDosDriveNo] = PROP_VOL_TYPE_NORMAL; // Normal volume
|
||||
list->truecryptMode[ListExtension->nDosDriveNo] = ListExtension->cryptoInfo->bTrueCryptMode;
|
||||
}
|
||||
}
|
||||
|
||||
@@ -2384,21 +2383,6 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
|
||||
}
|
||||
break;
|
||||
|
||||
case TC_IOCTL_LEGACY_GET_MOUNTED_VOLUMES:
|
||||
if (ValidateIOBufferSize (Irp, sizeof (uint32), ValidateOutput))
|
||||
{
|
||||
// Prevent the user from downgrading to versions lower than 5.0 by faking mounted volumes.
|
||||
// The user could render the system unbootable by downgrading when boot encryption
|
||||
// is active or being set up.
|
||||
|
||||
memset (Irp->AssociatedIrp.SystemBuffer, 0, irpSp->Parameters.DeviceIoControl.OutputBufferLength);
|
||||
*(uint32 *) Irp->AssociatedIrp.SystemBuffer = 0xffffFFFF;
|
||||
|
||||
Irp->IoStatus.Status = STATUS_SUCCESS;
|
||||
Irp->IoStatus.Information = irpSp->Parameters.DeviceIoControl.OutputBufferLength;
|
||||
}
|
||||
break;
|
||||
|
||||
case TC_IOCTL_GET_VOLUME_PROPERTIES:
|
||||
if (ValidateIOBufferSize (Irp, sizeof (VOLUME_PROPERTIES_STRUCT), ValidateInputOutput))
|
||||
{
|
||||
@@ -2674,7 +2658,6 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
|
||||
|| mount->pkcs5_prf < 0 || mount->pkcs5_prf > LAST_PRF_ID
|
||||
|| mount->VolumePim < -1 || mount->VolumePim == INT_MAX
|
||||
|| mount->ProtectedHidVolPkcs5Prf < 0 || mount->ProtectedHidVolPkcs5Prf > LAST_PRF_ID
|
||||
|| (mount->bTrueCryptMode != FALSE && mount->bTrueCryptMode != TRUE)
|
||||
)
|
||||
{
|
||||
Irp->IoStatus.Status = STATUS_INVALID_PARAMETER;
|
||||
@@ -2692,7 +2675,6 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
|
||||
burn (&mount->ProtectedHidVolPassword, sizeof (mount->ProtectedHidVolPassword));
|
||||
burn (&mount->pkcs5_prf, sizeof (mount->pkcs5_prf));
|
||||
burn (&mount->VolumePim, sizeof (mount->VolumePim));
|
||||
burn (&mount->bTrueCryptMode, sizeof (mount->bTrueCryptMode));
|
||||
burn (&mount->ProtectedHidVolPkcs5Prf, sizeof (mount->ProtectedHidVolPkcs5Prf));
|
||||
burn (&mount->ProtectedHidVolPim, sizeof (mount->ProtectedHidVolPim));
|
||||
}
|
||||
|
||||
@@ -610,7 +610,6 @@ NTSTATUS TCOpenVolume (PDEVICE_OBJECT DeviceObject,
|
||||
&mount->ProtectedHidVolPassword,
|
||||
mount->ProtectedHidVolPkcs5Prf,
|
||||
mount->ProtectedHidVolPim,
|
||||
mount->bTrueCryptMode,
|
||||
&tmpCryptoInfo);
|
||||
}
|
||||
else
|
||||
@@ -623,7 +622,6 @@ NTSTATUS TCOpenVolume (PDEVICE_OBJECT DeviceObject,
|
||||
&mount->VolumePassword,
|
||||
mount->pkcs5_prf,
|
||||
mount->VolumePim,
|
||||
mount->bTrueCryptMode,
|
||||
&Extension->cryptoInfo);
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user