mirror of
https://github.com/veracrypt/VeraCrypt.git
synced 2026-05-22 04:21:29 +00:00
Allow normal file-hosted containers to use quick format in the Unix volume creation path by sizing the host file with ftruncate before backup headers are written. Enable the GUI checkbox for normal file containers and honor --quick in text mode. Update the Unix HTML documentation for the weaker deniability properties of sparse or unwritten host regions.
453 lines
14 KiB
C++
453 lines
14 KiB
C++
/*
|
|
Derived from source code of TrueCrypt 7.1a, which is
|
|
Copyright (c) 2008-2012 TrueCrypt Developers Association and which is governed
|
|
by the TrueCrypt License 3.0.
|
|
|
|
Modifications and additions to the original source code (contained in this file)
|
|
and all other portions of this file are Copyright (c) 2013-2025 AM Crypto
|
|
and are governed by the Apache License 2.0 the full text of which is
|
|
contained in the file License.txt included in VeraCrypt binary and source
|
|
code distribution packages.
|
|
*/
|
|
|
|
#include "Volume/EncryptionTest.h"
|
|
#include "Volume/EncryptionModeXTS.h"
|
|
#ifdef WOLFCRYPT_BACKEND
|
|
#include "Volume/EncryptionModeWolfCryptXTS.h"
|
|
#endif
|
|
#include "Core.h"
|
|
|
|
#ifdef TC_UNIX
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <unistd.h>
|
|
#endif
|
|
|
|
#include "VolumeCreator.h"
|
|
#include "FatFormatter.h"
|
|
|
|
namespace VeraCrypt
|
|
{
|
|
VolumeCreator::VolumeCreator ()
|
|
: SizeDone (0),
|
|
Stage (ProgressStage::NotStarted),
|
|
mProgressInfo {false, 0, 0, ProgressStage::NotStarted}
|
|
{
|
|
}
|
|
|
|
VolumeCreator::~VolumeCreator ()
|
|
{
|
|
}
|
|
|
|
void VolumeCreator::Abort ()
|
|
{
|
|
AbortRequested = true;
|
|
}
|
|
|
|
void VolumeCreator::CheckResult ()
|
|
{
|
|
if (ThreadException)
|
|
ThreadException->Throw();
|
|
}
|
|
|
|
void VolumeCreator::CreationThread ()
|
|
{
|
|
try
|
|
{
|
|
uint64 endOffset;
|
|
uint64 filesystemSize = Layout->GetDataSize (HostSize);
|
|
|
|
if (filesystemSize < 1)
|
|
throw ParameterIncorrect (SRC_POS);
|
|
|
|
Stage.Set (ProgressStage::WritingData);
|
|
DataStart = Layout->GetDataOffset (HostSize);
|
|
WriteOffset = DataStart;
|
|
endOffset = DataStart + Layout->GetDataSize (HostSize);
|
|
|
|
VolumeFile->SeekAt (DataStart);
|
|
|
|
// Create filesystem
|
|
if (Options->Filesystem == VolumeCreationOptions::FilesystemType::FAT)
|
|
{
|
|
if (filesystemSize < TC_MIN_FAT_FS_SIZE || filesystemSize > TC_MAX_FAT_SECTOR_COUNT * Options->SectorSize)
|
|
throw ParameterIncorrect (SRC_POS);
|
|
|
|
struct WriteSectorCallback : public FatFormatter::WriteSectorCallback
|
|
{
|
|
WriteSectorCallback (VolumeCreator *creator) : Creator (creator), OutputBuffer (File::GetOptimalWriteSize()), OutputBufferWritePos (0) { }
|
|
|
|
virtual bool operator() (const BufferPtr §or)
|
|
{
|
|
OutputBuffer.GetRange (OutputBufferWritePos, sector.Size()).CopyFrom (sector);
|
|
OutputBufferWritePos += sector.Size();
|
|
|
|
if (OutputBufferWritePos >= OutputBuffer.Size())
|
|
FlushOutputBuffer();
|
|
|
|
return !Creator->AbortRequested;
|
|
}
|
|
|
|
void FlushOutputBuffer ()
|
|
{
|
|
if (OutputBufferWritePos > 0)
|
|
{
|
|
Creator->Options->EA->EncryptSectors (OutputBuffer.GetRange (0, OutputBufferWritePos),
|
|
Creator->WriteOffset / ENCRYPTION_DATA_UNIT_SIZE, OutputBufferWritePos / ENCRYPTION_DATA_UNIT_SIZE, ENCRYPTION_DATA_UNIT_SIZE);
|
|
|
|
Creator->VolumeFile->Write (OutputBuffer.GetRange (0, OutputBufferWritePos));
|
|
|
|
Creator->WriteOffset += OutputBufferWritePos;
|
|
Creator->SizeDone.Set (Creator->WriteOffset - Creator->DataStart);
|
|
|
|
OutputBufferWritePos = 0;
|
|
}
|
|
}
|
|
|
|
VolumeCreator *Creator;
|
|
SecureBuffer OutputBuffer;
|
|
size_t OutputBufferWritePos;
|
|
};
|
|
|
|
WriteSectorCallback sectorWriter (this);
|
|
FatFormatter::Format (sectorWriter, filesystemSize, Options->FilesystemClusterSize, Options->SectorSize);
|
|
sectorWriter.FlushOutputBuffer();
|
|
}
|
|
|
|
if (!Options->Quick)
|
|
{
|
|
// Empty sectors are encrypted with different key to randomize plaintext
|
|
Core->RandomizeEncryptionAlgorithmKey (Options->EA);
|
|
|
|
SecureBuffer outputBuffer (File::GetOptimalWriteSize());
|
|
uint64 dataFragmentLength = outputBuffer.Size();
|
|
|
|
while (!AbortRequested && WriteOffset < endOffset)
|
|
{
|
|
if (WriteOffset + dataFragmentLength > endOffset)
|
|
dataFragmentLength = endOffset - WriteOffset;
|
|
|
|
outputBuffer.Zero();
|
|
Options->EA->EncryptSectors (outputBuffer, WriteOffset / ENCRYPTION_DATA_UNIT_SIZE, dataFragmentLength / ENCRYPTION_DATA_UNIT_SIZE, ENCRYPTION_DATA_UNIT_SIZE);
|
|
VolumeFile->Write (outputBuffer, (size_t) dataFragmentLength);
|
|
|
|
WriteOffset += dataFragmentLength;
|
|
SizeDone.Set (WriteOffset - DataStart);
|
|
}
|
|
}
|
|
|
|
if (!AbortRequested)
|
|
{
|
|
SizeDone.Set (Options->Size);
|
|
|
|
Stage.Set (ProgressStage::WritingBackupHeader);
|
|
|
|
// Backup header
|
|
SecureBuffer backupHeader (Layout->GetHeaderSize());
|
|
|
|
SecureBuffer backupHeaderSalt (VolumeHeader::GetSaltSize());
|
|
RandomNumberGenerator::GetData (backupHeaderSalt);
|
|
|
|
int derivationResult = Options->VolumeHeaderKdf->DeriveKey (HeaderKey, *PasswordKey, Options->Pim, backupHeaderSalt);
|
|
if (derivationResult != 0)
|
|
throw ExternalException (SRC_POS, Options->VolumeHeaderKdf->GetDerivationFailureMessage (derivationResult));
|
|
|
|
Layout->GetHeader()->EncryptNew (backupHeader, backupHeaderSalt, HeaderKey, Options->VolumeHeaderKdf);
|
|
|
|
if (Options->Quick || Options->Type == VolumeType::Hidden)
|
|
VolumeFile->SeekEnd (Layout->GetBackupHeaderOffset());
|
|
|
|
VolumeFile->Write (backupHeader);
|
|
|
|
if (Options->Type == VolumeType::Normal)
|
|
{
|
|
// Write fake random header to space reserved for hidden volume header
|
|
VolumeLayoutV2Hidden hiddenLayout;
|
|
shared_ptr <VolumeHeader> hiddenHeader (hiddenLayout.GetHeader());
|
|
SecureBuffer hiddenHeaderBuffer (hiddenLayout.GetHeaderSize());
|
|
|
|
VolumeHeaderCreationOptions headerOptions;
|
|
headerOptions.EA = Options->EA;
|
|
headerOptions.Kdf = Options->VolumeHeaderKdf;
|
|
headerOptions.Type = VolumeType::Hidden;
|
|
|
|
headerOptions.SectorSize = Options->SectorSize;
|
|
|
|
headerOptions.VolumeDataStart = HostSize - hiddenLayout.GetHeaderSize() * 2 - Options->Size;
|
|
headerOptions.VolumeDataSize = hiddenLayout.GetMaxDataSize (Options->Size);
|
|
|
|
// Master data key
|
|
SecureBuffer hiddenMasterKey(Options->EA->GetKeySize() * 2);
|
|
RandomNumberGenerator::GetData (hiddenMasterKey);
|
|
headerOptions.DataKey = hiddenMasterKey;
|
|
|
|
// PKCS5 salt
|
|
SecureBuffer hiddenSalt (VolumeHeader::GetSaltSize());
|
|
RandomNumberGenerator::GetData (hiddenSalt);
|
|
headerOptions.Salt = hiddenSalt;
|
|
|
|
// Header key
|
|
SecureBuffer hiddenHeaderKey (VolumeHeader::GetLargestSerializedKeySize());
|
|
RandomNumberGenerator::GetData (hiddenHeaderKey);
|
|
headerOptions.HeaderKey = hiddenHeaderKey;
|
|
|
|
hiddenHeader->Create (backupHeader, headerOptions);
|
|
|
|
VolumeFile->Write (backupHeader);
|
|
}
|
|
|
|
Stage.Set (ProgressStage::FlushingData);
|
|
VolumeFile->Flush();
|
|
Stage.Set (ProgressStage::Finished);
|
|
}
|
|
else
|
|
Stage.Set (ProgressStage::Aborted);
|
|
}
|
|
catch (Exception &e)
|
|
{
|
|
Stage.Set (ProgressStage::Error);
|
|
ThreadException.reset (e.CloneNew());
|
|
}
|
|
catch (exception &e)
|
|
{
|
|
Stage.Set (ProgressStage::Error);
|
|
ThreadException.reset (new ExternalException (SRC_POS, StringConverter::ToExceptionString (e)));
|
|
}
|
|
catch (...)
|
|
{
|
|
Stage.Set (ProgressStage::Error);
|
|
ThreadException.reset (new UnknownException (SRC_POS));
|
|
}
|
|
|
|
VolumeFile.reset();
|
|
mProgressInfo.CreationInProgress = false;
|
|
}
|
|
|
|
void VolumeCreator::CreateVolume (shared_ptr <VolumeCreationOptions> options)
|
|
{
|
|
EncryptionTest::TestAll();
|
|
SizeDone.Set (0);
|
|
Stage.Set (ProgressStage::NotStarted);
|
|
ThreadException.reset();
|
|
|
|
{
|
|
#ifdef TC_UNIX
|
|
// Temporarily take ownership of a device if the user is not an administrator
|
|
UserId origDeviceOwner ((uid_t) -1);
|
|
|
|
if (!Core->HasAdminPrivileges() && options->Path.IsDevice())
|
|
{
|
|
origDeviceOwner = FilesystemPath (wstring (options->Path)).GetOwner();
|
|
Core->SetFileOwner (options->Path, UserId (getuid()));
|
|
}
|
|
|
|
finally_do_arg2 (FilesystemPath, options->Path, UserId, origDeviceOwner,
|
|
{
|
|
if (finally_arg2.SystemId != (uid_t) -1)
|
|
Core->SetFileOwner (finally_arg, finally_arg2);
|
|
});
|
|
#endif
|
|
|
|
VolumeFile.reset (new File);
|
|
VolumeFile->Open (options->Path,
|
|
(options->Path.IsDevice() || options->Type == VolumeType::Hidden) ? File::OpenReadWrite : File::CreateReadWrite,
|
|
File::ShareNone);
|
|
|
|
if (!options->Path.IsDevice() && options->Type == VolumeType::Normal)
|
|
{
|
|
HostSize = options->Size;
|
|
|
|
if (options->Quick)
|
|
VolumeFile->SetLength (options->Size);
|
|
}
|
|
else
|
|
{
|
|
HostSize = VolumeFile->Length();
|
|
}
|
|
}
|
|
|
|
try
|
|
{
|
|
// Sector size
|
|
if (options->Path.IsDevice())
|
|
{
|
|
options->SectorSize = VolumeFile->GetDeviceSectorSize();
|
|
|
|
if (options->SectorSize < TC_MIN_VOLUME_SECTOR_SIZE
|
|
|| options->SectorSize > TC_MAX_VOLUME_SECTOR_SIZE
|
|
#if !defined (TC_LINUX) && !defined (TC_MACOSX)
|
|
|| options->SectorSize != TC_SECTOR_SIZE_LEGACY
|
|
#endif
|
|
|| options->SectorSize % ENCRYPTION_DATA_UNIT_SIZE != 0)
|
|
{
|
|
throw UnsupportedSectorSize (SRC_POS);
|
|
}
|
|
}
|
|
else
|
|
options->SectorSize = TC_SECTOR_SIZE_FILE_HOSTED_VOLUME;
|
|
|
|
// Volume layout
|
|
switch (options->Type)
|
|
{
|
|
case VolumeType::Normal:
|
|
Layout.reset (new VolumeLayoutV2Normal());
|
|
break;
|
|
|
|
case VolumeType::Hidden:
|
|
Layout.reset (new VolumeLayoutV2Hidden());
|
|
|
|
if (HostSize < TC_MIN_HIDDEN_VOLUME_HOST_SIZE)
|
|
throw ParameterIncorrect (SRC_POS);
|
|
break;
|
|
|
|
default:
|
|
throw ParameterIncorrect (SRC_POS);
|
|
}
|
|
|
|
// Volume header
|
|
shared_ptr <VolumeHeader> header (Layout->GetHeader());
|
|
SecureBuffer headerBuffer (Layout->GetHeaderSize());
|
|
|
|
VolumeHeaderCreationOptions headerOptions;
|
|
headerOptions.EA = options->EA;
|
|
headerOptions.Kdf = options->VolumeHeaderKdf;
|
|
headerOptions.Type = options->Type;
|
|
|
|
headerOptions.SectorSize = options->SectorSize;
|
|
|
|
if (options->Type == VolumeType::Hidden)
|
|
headerOptions.VolumeDataStart = HostSize - Layout->GetHeaderSize() * 2 - options->Size;
|
|
else
|
|
headerOptions.VolumeDataStart = Layout->GetHeaderSize() * 2;
|
|
|
|
headerOptions.VolumeDataSize = Layout->GetMaxDataSize (options->Size);
|
|
|
|
if (headerOptions.VolumeDataSize < 1)
|
|
throw ParameterIncorrect (SRC_POS);
|
|
|
|
#ifndef VC_DCS_DISABLE_ARGON2
|
|
// New volumes are created in XTS mode; Argon2id header key material has a fixed format size.
|
|
if (options->VolumeHeaderKdf->IsArgon2() && options->EA->GetKeySize() * 2 > ARGON2_HEADER_KEYDATA_SIZE)
|
|
throw ParameterIncorrect (SRC_POS);
|
|
#endif
|
|
|
|
// Master data key
|
|
MasterKey.Allocate (options->EA->GetKeySize() * 2);
|
|
RandomNumberGenerator::GetData (MasterKey);
|
|
// check that first half of MasterKey is different from its second half. If they are the same, through an exception
|
|
// cf CCSS,NSA comment at page 3: https://csrc.nist.gov/csrc/media/Projects/crypto-publication-review-project/documents/initial-comments/sp800-38e-initial-public-comments-2021.pdf
|
|
if (memcmp (MasterKey.Ptr(), MasterKey.Ptr() + MasterKey.Size() / 2, MasterKey.Size() / 2) == 0)
|
|
throw AssertionFailed (SRC_POS);
|
|
|
|
headerOptions.DataKey = MasterKey;
|
|
|
|
// PKCS5 salt
|
|
SecureBuffer salt (VolumeHeader::GetSaltSize());
|
|
RandomNumberGenerator::GetData (salt);
|
|
headerOptions.Salt = salt;
|
|
|
|
// Header key
|
|
HeaderKey.Allocate (VolumeHeader::GetHeaderKeyDerivationSize (options->VolumeHeaderKdf));
|
|
PasswordKey = Keyfile::ApplyListToPassword (options->Keyfiles, options->Password, options->EMVSupportEnabled);
|
|
int derivationResult = options->VolumeHeaderKdf->DeriveKey (HeaderKey, *PasswordKey, options->Pim, salt);
|
|
if (derivationResult != 0)
|
|
throw ExternalException (SRC_POS, options->VolumeHeaderKdf->GetDerivationFailureMessage (derivationResult));
|
|
headerOptions.HeaderKey = HeaderKey;
|
|
|
|
header->Create (headerBuffer, headerOptions);
|
|
|
|
// Write new header
|
|
if (Layout->GetHeaderOffset() >= 0)
|
|
VolumeFile->SeekAt (Layout->GetHeaderOffset());
|
|
else
|
|
VolumeFile->SeekEnd (Layout->GetHeaderOffset());
|
|
|
|
VolumeFile->Write (headerBuffer);
|
|
|
|
if (options->Type == VolumeType::Normal)
|
|
{
|
|
// Write fake random header to space reserved for hidden volume header
|
|
VolumeLayoutV2Hidden hiddenLayout;
|
|
shared_ptr <VolumeHeader> hiddenHeader (hiddenLayout.GetHeader());
|
|
SecureBuffer hiddenHeaderBuffer (hiddenLayout.GetHeaderSize());
|
|
|
|
headerOptions.Type = VolumeType::Hidden;
|
|
|
|
headerOptions.VolumeDataStart = HostSize - hiddenLayout.GetHeaderSize() * 2 - options->Size;
|
|
headerOptions.VolumeDataSize = hiddenLayout.GetMaxDataSize (options->Size);
|
|
|
|
// Master data key
|
|
SecureBuffer hiddenMasterKey(options->EA->GetKeySize() * 2);
|
|
RandomNumberGenerator::GetData (hiddenMasterKey);
|
|
headerOptions.DataKey = hiddenMasterKey;
|
|
|
|
// PKCS5 salt
|
|
SecureBuffer hiddenSalt (VolumeHeader::GetSaltSize());
|
|
RandomNumberGenerator::GetData (hiddenSalt);
|
|
headerOptions.Salt = hiddenSalt;
|
|
|
|
// Header key
|
|
SecureBuffer hiddenHeaderKey (VolumeHeader::GetLargestSerializedKeySize());
|
|
RandomNumberGenerator::GetData (hiddenHeaderKey);
|
|
headerOptions.HeaderKey = hiddenHeaderKey;
|
|
|
|
hiddenHeader->Create (headerBuffer, headerOptions);
|
|
|
|
VolumeFile->Write (headerBuffer);
|
|
}
|
|
|
|
// Data area keys
|
|
options->EA->SetKey (MasterKey.GetRange (0, options->EA->GetKeySize()));
|
|
#ifdef WOLFCRYPT_BACKEND
|
|
shared_ptr <EncryptionMode> mode (new EncryptionModeWolfCryptXTS ());
|
|
options->EA->SetKeyXTS (MasterKey.GetRange (options->EA->GetKeySize(), options->EA->GetKeySize()));
|
|
#else
|
|
shared_ptr <EncryptionMode> mode (new EncryptionModeXTS ());
|
|
#endif
|
|
mode->SetKey (MasterKey.GetRange (options->EA->GetKeySize(), options->EA->GetKeySize()));
|
|
options->EA->SetMode (mode);
|
|
|
|
Options = options;
|
|
AbortRequested = false;
|
|
|
|
mProgressInfo.TotalSize = options->Size;
|
|
mProgressInfo.SizeDone = 0;
|
|
mProgressInfo.Stage = ProgressStage::NotStarted;
|
|
mProgressInfo.CreationInProgress = true;
|
|
|
|
struct ThreadFunctor : public Functor
|
|
{
|
|
ThreadFunctor (VolumeCreator *creator) : Creator (creator) { }
|
|
virtual void operator() ()
|
|
{
|
|
Creator->CreationThread ();
|
|
}
|
|
VolumeCreator *Creator;
|
|
};
|
|
|
|
Thread thread;
|
|
thread.Start (new ThreadFunctor (this));
|
|
}
|
|
catch (...)
|
|
{
|
|
VolumeFile.reset();
|
|
throw;
|
|
}
|
|
}
|
|
|
|
VolumeCreator::KeyInfo VolumeCreator::GetKeyInfo () const
|
|
{
|
|
KeyInfo info;
|
|
info.HeaderKey = HeaderKey;
|
|
info.MasterKey = MasterKey;
|
|
return info;
|
|
}
|
|
|
|
VolumeCreator::ProgressInfo VolumeCreator::GetProgressInfo ()
|
|
{
|
|
mProgressInfo.SizeDone = SizeDone.Get();
|
|
mProgressInfo.Stage = static_cast <ProgressStage::Enum> (Stage.Get());
|
|
return mProgressInfo;
|
|
}
|
|
}
|