VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Volume/VolumeHeader.cpp
AgeCommit message (Collapse)AuthorFilesLines
2016-05-10Remove trailing whitespaceDavid Foerster1-6/+6
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI1-1/+1
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 ↵Mounir IDRASSI1-5/+9
and TrueCrypt 3.0.
2015-06-24Linux/MacOSX: restore normal file mode to some source filesMounir IDRASSI1-0/+0
2015-06-24Linux/MacOSX: first dynamic mode implementationMounir IDRASSI1-2/+2
2015-01-04Linux/MacOSX: Add support for TrueCrypt 6.x as it was done on Windows.Mounir IDRASSI1-1/+1
2014-12-30Linux/MacOSX: Implement TrueCrypt conversion and loading support. Correct ↵Mounir IDRASSI1-6/+19
many GTK issues linked to multi-threaded origine of events by implementing an automatic mechanism for handling such requests in the main thread.
2014-12-19Linux/MacOSX: Enhance performance by implementing the possibility to choose ↵Mounir IDRASSI1-1/+4
the correct hash algorithm of volumes during various operations (mount, change password...), both using the GUI and the command line.
2014-11-08MacOSX : Support hard drives with a large sector size ( > 512).Mounir IDRASSI1-1/+1
2014-11-08Change namespace from TrueCrypt to VeraCrypt. Rename method from Resources ↵Mounir IDRASSI1-1/+1
Resources::GetTrueCryptIcon to Resources::GetVeraCryptIcon.
2014-11-08Set volume header to 'VERA' instead of 'TRUE' in newly added Linux/MacOSX codeMounir IDRASSI1-8/+8
2014-11-08Add TrueCrypt 7.1a MacOSX/Linux specific source files.Mounir IDRASSI1-0/+340
.gs { font-weight: bold } /* Generic.Strong */ .highlight .gu { color: #666666 } /* Generic.Subheading */ .highlight .gt { color: #aa0000 } /* Generic.Traceback */ .highlight .kc { color: #008800; font-weight: bold } /* Keyword.Constant */ .highlight .kd { color: #008800; font-weight: bold } /* Keyword.Declaration */ .highlight .kn { color: #008800; font-weight: bold } /* Keyword.Namespace */ .highlight .kp { color: #008800 } /* Keyword.Pseudo */ .highlight .kr { color: #008800; font-weight: bold } /* Keyword.Reserved */ .highlight .kt { color: #888888; font-weight: bold } /* Keyword.Type */ .highlight .m { color: #0000DD; font-weight: bold } /* Literal.Number */ .highlight .s { color: #dd2200; background-color: #fff0f0 } /* Literal.String */ .highlight .na { color: #336699 } /* Name.Attribute */ .highlight .nb { color: #003388 } /* Name.Builtin */ .highlight .nc { color: #bb0066; font-weight: bold } /* Name.Class */ .highlight .no { color: #003366; font-weight: bold } /* Name.Constant */ .highlight .nd { color: #555555 } /* Name.Decorator */ .highlight .ne { color: #bb0066; font-weight: bold } /* Name.Exception */ .highlight .nf { color: #0066bb; font-weight: bold } /* Name.Function */ .highlight .nl { color: #336699; font-style: italic } /* Name.Label */ .highlight .nn { color: #bb0066; font-weight: bold } /* Name.Namespace */ .highlight .py { color: #336699; font-weight: bold } /* Name.Property */ .highlight .nt { color: #bb0066; font-weight: bold } /* Name.Tag */ .highlight .nv { color: #336699 } /* Name.Variable */ .highlight .ow { color: #008800 } /* Operator.Word */ .highlight .w { color: #bbbbbb } /* Text.Whitespace */ .highlight .mb { color: #0000DD; font-weight: bold } /* Literal.Number.Bin */ .highlight .mf { color: #0000DD; font-weight: bold } /* Literal.Number.Float */ .highlight .mh { color: #0000DD; font-weight: bold } /* Literal.Number.Hex */ .highlight .mi { color: #0000DD; font-weight: bold } /* Literal.Number.Integer */ .highlight .mo { color: #0000DD; font-weight: bold } /* Literal.Number.Oct */ .highlight .sa { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Affix */ .highlight .sb { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Backtick */ .highlight .sc { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Char */ .highlight .dl { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Delimiter */ .highlight .sd { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Doc */ .highlight .s2 { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Double */ .highlight .se { color: #0044dd; background-color: #fff0f0 } /* Literal.String.Escape */ .highlight .sh { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Heredoc */ .highlight .si { color: #3333bb; background-color: #fff0f0 } /* Literal.String.Interpol */ .highlight .sx { color: #22bb22; background-color: #f0fff0 } /* Literal.String.Other */ .highlight .sr { color: #008800; background-color: #fff0ff } /* Literal.String.Regex */ .highlight .s1 { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Single */ .highlight .ss { color: #aa6600; background-color: #fff0f0 } /* Literal.String.Symbol */ .highlight .bp { color: #003388 } /* Name.Builtin.Pseudo */ .highlight .fm { color: #0066bb; font-weight: bold } /* Name.Function.Magic */ .highlight .vc { color: #336699 } /* Name.Variable.Class */ .highlight .vg { color: #dd7700 } /* Name.Variable.Global */ .highlight .vi { color: #3333bb } /* Name.Variable.Instance */ .highlight .vm { color: #336699 } /* Name.Variable.Magic */ .highlight .il { color: #0000DD; font-weight: bold } /* Literal.Number.Integer.Long */
<?xml version="1.0" encoding="utf-8"?>
<VeraCrypt>
  <!-- EFI boot DCS configuration -->
  <configuration>
    <!-- PasswordType 0/1
         0 - text message is displayed
         PasswordMsg to specify message
         1 - touch picture password if touch is supported by EFI. check PlatformInfo
         PasswordPicture to specify bitmap
    -->
    <config key="PasswordType">0</config>
    <config key="PasswordMsg">Password:</config>
    <config key="PasswordPicture">EFI\VeraCrypt\login.bmp</config>

    <!-- Show "*" on each key pressed or picture zone touched -->
    <config key="AuthorizeProgress">1</config>
    <!-- Show chars on each key press -->
    <config key="AuthorizeVisible">0</config>
    <!-- Show zones touched -->
    <config key="AuthorizeMarkTouch">0</config>

    <!-- Number of authorization retries -->
    <config key="AuthorizeRetry">10</config>
    <!-- Timeout in seconds before <ESC> from password prompt -->
    <config key="PasswordTimeout">0</config>

    <!-- authorization start message -->
    <config key="AuthStartMsg">Authorizing...</config>
    <!-- authorization error message -->
    <config key="AuthErrorMsg">Authorization failed. Wrong password, PIM or hash.</config>
    
    <!-- PictureChars specifies PasswordPicture alphabet order
         It is possible to save it on external USB if SecRegionSearch selected
     --> 
    <!-- config key="PictureChars">MN/[aQ-eyPr}GT: |V^UqiI_gbdA9YwZ%f8t6S@D\"7uXl\\30R#+zH*,W4J?= BLFv]hx~E;$ .o'sp1`(>C)O{!5j2nmkcK</config -->

    <!-- AutoLogin 0/1 
    Posibility to avoid password prompt
    AutoPassword is  password by default
    Use it with PlatformLocked or TPMLocked enabled to lock password to the computer.
    -->
    <config key="AutoLogin">0</config>
    <config key="AutoPassword"></config>

    <!-- PimRqt 0/1 
    Request PIM during authorization
    PimMsg - message
    Pim - default value
    -->
    <config key="PimMsg">Pim:</config>
    <config key="Pim">0</config>
    <config key="PimRqt">1</config>

    <!-- HashRqt 0/1 
    Request hash during authorization
    HashMsg - message. It is generated if not specified
    Hash - default value
    -->
    <!-- config key="HashMsg">(0) TEST ALL (1) SHA512 (2) WHIRLPOOL (3) SHA256 (4) RIPEMD160 (5) STREEBOG
Hash:</config-->
    <config key="Hash">0</config>
    <config key="HashRqt">0</config>

    <!-- PlatformLocked 0/1 (it is controled by <F7>)
    Password is mixed with data from SMBIOS and USB serial structures
    to avoid authorization on another computer
    -->
    <config key="PlatformLocked">0</config>

    <!-- TPMLocked 0/1 (it is controled by <F8>)
    Password is mixed with data from TPM
    data is in TPM NVRAM and the data is locked to PCRs selected (use configuration <F2> and "c" "t")
    BIOS modification or any other boot module blocks authorization with TPMLocked=1
    DcsProp is measured to PCR8 also.
    TPM 1.2 support only.
    -->
    <config key="TPMLocked">0</config>
    <!-- Display error if TPM configured and locked before password to inform user with pause (sec) -->
    <config key="TPMLockedInfoDelay">0</config>
    
    <!-- Random generator to generate salt to change password <F2> function key
    2 RDRAND
    3 PRNDGEN but state hast to be saved on external USB
    5 TPM 1.2 if pressent
    -->
    <config key="Random">2</config>

    <!-- RUD - Require USB device (authorization started if the USB is attached. "what I have")
    0 - skip
    NNNN - CRC32 decimal value of USB "VID_PID_SERIAL" string
    It is possible to configure via DcsWinCfg
    or from EFI shell: DcsCfg.dcs -ul
    -->
    <config key="RUD">0</config>

    <!-- Try to find security region -->
    <config key="SecRegionSearch">0</config>
    <!-- Display device of RUD or SecRegion found with pause (sec) -->
    <config key="SecRegionInfoDelay">0</config>

    <!-- Ask password even no USB with SecRegions found 
    ForcePasswordMsg, ForcePasswordType,ForcePasswordProgress keys can overide default values
    -->
    <config key="DcsBootForce">1</config>

    <!-- 
    to find OS partition GUID if ESP and OS uses diffrent disks
    -->
    <!-- config key="PartitionGuidOS">XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX</config-->


    <!-- Actions
    Success  - authorization OK
    NotFound - RUD of SecRegion search failed
    Failed   - <ESC> pressed or AuthorizeRetry limit

    It can contain several keywords space separated

    Keywords:
    Exit           – simple exit (default)
    Status(code)   – override exit status code (0 is OK)
    File(path)     – path to file to be executed
    Guid(xxx-x..)  – GUID of partition with file to be executed
    Printinfo      – print guid, file and status.
    Message(msg)   – message to display for the action
    Postexec       – send loader path to DcsBoot to execute after exit
    Exec           – execute module
    Halt           – CPU halt
    Delay(N)       – delay boot
    -->
    <config key="ActionSuccess">Exit</config>
    <config key="ActionNotFound">Exit</config>
    <config key="ActionFailed">Exit</config>

    <!-- Devices to configure PicturePassword if possible. Check PlatformInfo of your computer
    GraphDevice - Graphics device and mode
    TouchDevice - Touch device
    BeepDevice  - ordinary speaker to beep on touch zone
    -->
    
    <!-- GraphDevice 
    -1  - initialize + autodetect
    -2  - ignore
    <n> - number in list of devices (see PlatformInfo or use DcsCfg.dcs -gl )
    -->
    <config key="GraphDevice">-1</config>
    
    <!-- GraphMode 
    -1 default (see PlatformInfo. or use DcsCfg.dcs -gm <n> to test)
    -->
    <config key="GraphMode">-1</config>

    <!-- 
    TouchDevice 
    -1 init + autodetect
    -2 ignore; 
    <N> number in list of devices (See platformInfo or use DcsCfg -tl and to test DcsCfg -tt <N>)
    -->
    <config key="TouchDevice">-1</config>

    <!-- TouchSimulate to use keyboard arrows to move touch <F11>/<F12> speed -->
    <config key="TouchSimulate">1</config>

    <!-- 0/1 Beep if picture zone touched -->
    <config key="Beep">0</config>
    
    <!-- BeepDevice (LegacySpeaker.dcs driver is used to support)
    -1  - initialize + autodetect
    <n> - number in list of devices (see PlatformInfo or use DcsCfg.dcs -gl )
    -->
    <config key="BeepDevice">-1</config>
    
    <!-- Beep paramters -->
    <config key="BeepNumber">1</config>
    <config key="BeepDuration">100</config>
    <config key="BeepInterval">0</config>
    <config key="BeepTone">1280</config>
    <!-- <F4> enable/disable beeps -->
    <config key="BeepControl">1</config>

  </configuration>
</VeraCrypt>