Volume

Encrypted partition format

Encrypted DiskCryptor partition does not have visible signatures or any
other identifiable data. Without knowing the proper password it is
indistinguishable from random numbers, and the structure of the
partition can only be discovered by providing right password.

Encrypted partition has the housekeeping data area (volume header) that
is followed by the user data.

DiskCryptor - Encrypted partition format

Volume header

The first 2048 bytes of the partition are occupied by volume header. It
contains the information about partition and keys to all user data.
Volume header is encrypted with a chosen cryptographic algorithm in XTS
mode, with a key derived from a user's password. User data that has been
residing in the first 2048 bytes of a partition is moved to a relocation
area, which is a contiguous sequence of sectors in user area (please
read details below). Volume header does not have visible signatures, and
without knowing the correct password is indistinguishable from random
numbers.

Volume header format

typedef struct _dc_header {
    u8  salt[PKCS5_SALT_SIZE]; /* pkcs5.2 salt */
    u32 sign;                  /* signature 'DCRP' */
    u32 hdr_crc;               /* crc32 of decrypted volume header */
    u16 version;               /* volume format version */
    u32 flags;                 /* volume flags */
    u32 disk_id;               /* unique volume identifier */
    int alg_1;                 /* crypt algo 1 */
    u8  key_1[DISKKEY_SIZE];   /* crypt key 1  */
    int alg_2;                 /* crypt algo 2 */
    u8  key_2[DISKKEY_SIZE];   /* crypt key 2  */

    u64 stor_off;              /* temporary storage offset */
    u64 use_size;              /* user available volume size */
    u64 tmp_size;              /* temporary part size */
    u8  tmp_wp_mode;           /* data wipe mode */

    u8  reserved[1422 - 1];
} dc_header;
Offset Size Encryption Description
0 64 No Salt. Random number used when deriving volume header key.
64 4 Yes DiskCryptor volume signature. Has the value of 0x50524344 (ascii 'DCRP').
68 4 Yes CRC32 of the remaining part of the header (bytes 72-2047).
72 2 Yes Header format version. Has the value of 1 for DiskCryptor 0.5 volumes.
74 4 Yes Volume flags. Used for indicating volume's state.
78 4 Yes Unique volume identifier. Used to search for a partition when choosing to boot from the specified partition.
82 4 Yes Identifier of a main cryptoalgorithm, with which partition is encrypted.
86 256 Yes Main encryption key of user data on a volume.
342 4 Yes Identifier of an additional cryptoalgorithm, with which partition is encrypted. Indicates about a previously used cryptoalgorithm on re-encryption.
346 256 Yes Additional encryption key of user data on a volume. Used for storing the previous key on re-encryption.
602 8 Yes Offset in user data area, by which the first 2048 bytes of partition data have been relocated.
610 8 Yes Size of a user data area.
618 8 Yes Size of the encrypted area. Present only in a partially encrypted state.
626 1 Yes Partition wipe mode used on encryption. Present only in a partially encrypted state.
627 1421 Yes Reserved. Zero-filled.

Relocation area

Relocation area - is a contiguous sequence of sectors where the first
2048 bytes of partition are stored.

Currently there are two methods of placement of this area that are being
used: in $dcsys$ file, or at the end of partition. On encryption of
partition that has data on it, this area is being placed in $dcsys$
file, which is located in a contiguous sequence of clusters. On
formatting a new partition, this area is being placed at the end of
partition, after user data.

In order to protect the $dcsys$ file from being deleted, fragmented or
moved, its access is forbidden by the driver.