From 32052f214b052531cc55d5d52c0283adabf838ca Mon Sep 17 00:00:00 2001 From: a1346054 <36859588+a1346054@users.noreply.github.com> Date: Sat, 4 Sep 2021 19:59:25 +0000 Subject: Minor cleanup of the repo (#822) * *: source files should not be executable * *: make sure files have final newline * *: remove BOM from text files * translations: unify headers * *: fix typos * *: trim excess whitespace --- doc/html/AES.html | 6 +++--- doc/html/Acknowledgements.html | 4 ++-- doc/html/Additional Security Requirements and Precautions.html | 6 +++--- doc/html/Authenticity and Integrity.html | 6 +++--- doc/html/Authors.html | 6 +++--- doc/html/Beginner's Tutorial.html | 4 ++-- doc/html/Camellia.html | 6 +++--- doc/html/Cascades.html | 6 +++--- doc/html/Changing Passwords and Keyfiles.html | 6 +++--- doc/html/Choosing Passwords and Keyfiles.html | 6 +++--- doc/html/Command Line Usage.html | 6 +++--- doc/html/Contact.html | 4 ++-- doc/html/Contributed Resources.html | 4 ++-- doc/html/Converting TrueCrypt volumes and partitions.html | 6 +++--- doc/html/Creating New Volumes.html | 4 ++-- doc/html/Data Leaks.html | 10 +++++----- doc/html/Default Mount Parameters.html | 6 +++--- doc/html/Defragmenting.html | 6 +++--- doc/html/Digital Signatures.html | 8 ++++---- doc/html/Disclaimers.html | 6 +++--- doc/html/Documentation.html | 4 ++-- doc/html/Donation.html | 4 ++-- doc/html/Donation_Bank.html | 4 ++-- doc/html/Encryption Algorithms.html | 6 +++--- doc/html/Encryption Scheme.html | 6 +++--- doc/html/FAQ.html | 6 +++--- doc/html/Favorite Volumes.html | 4 ++-- doc/html/Hardware Acceleration.html | 6 +++--- doc/html/Hash Algorithms.html | 6 +++--- doc/html/Header Key Derivation.html | 6 +++--- doc/html/Hibernation File.html | 6 +++--- doc/html/Hidden Operating System.html | 4 ++-- doc/html/Hidden Volume.html | 4 ++-- doc/html/Hot Keys.html | 6 +++--- doc/html/How to Back Up Securely.html | 6 +++--- doc/html/Incompatibilities.html | 6 +++--- doc/html/Introduction.html | 4 ++-- doc/html/Issues and Limitations.html | 6 +++--- doc/html/Journaling File Systems.html | 6 +++--- doc/html/Keyfiles in VeraCrypt.html | 6 +++--- doc/html/Keyfiles.html | 4 ++-- doc/html/Kuznyechik.html | 6 +++--- doc/html/Language Packs.html | 6 +++--- doc/html/Legal Information.html | 6 +++--- doc/html/Main Program Window.html | 6 +++--- doc/html/Malware.html | 6 +++--- doc/html/Memory Dump Files.html | 6 +++--- doc/html/Miscellaneous.html | 6 +++--- doc/html/Modes of Operation.html | 6 +++--- doc/html/Mounting VeraCrypt Volumes.html | 6 +++--- doc/html/Multi-User Environment.html | 6 +++--- doc/html/Notation.html | 6 +++--- doc/html/Paging File.html | 6 +++--- doc/html/Parallelization.html | 6 +++--- doc/html/Personal Iterations Multiplier (PIM).html | 6 +++--- doc/html/Physical Security.html | 6 +++--- doc/html/Pipelining.html | 6 +++--- doc/html/Plausible Deniability.html | 4 ++-- doc/html/Portable Mode.html | 6 +++--- doc/html/Preface.html | 6 +++--- doc/html/Program Menu.html | 6 +++--- doc/html/Protection of Hidden Volumes.html | 6 +++--- doc/html/RIPEMD-160.html | 6 +++--- doc/html/Random Number Generator.html | 6 +++--- doc/html/Reallocated Sectors.html | 6 +++--- doc/html/References.html | 6 +++--- doc/html/Release Notes.html | 8 ++++---- doc/html/Removable Medium Volume.html | 6 +++--- doc/html/Removing Encryption.html | 6 +++--- doc/html/SHA-256.html | 6 +++--- doc/html/SHA-512.html | 6 +++--- doc/html/Security Model.html | 6 +++--- doc/html/Security Requirements and Precautions.html | 6 +++--- doc/html/Security Requirements for Hidden Volumes.html | 6 +++--- doc/html/Security Tokens & Smart Cards.html | 6 +++--- doc/html/Serpent.html | 6 +++--- doc/html/Sharing over Network.html | 6 +++--- doc/html/Source Code.html | 6 +++--- doc/html/Standard Compliance.html | 6 +++--- doc/html/Streebog.html | 6 +++--- doc/html/Supported Operating Systems.html | 6 +++--- doc/html/Supported Systems for System Encryption.html | 4 ++-- doc/html/System Encryption.html | 6 +++--- doc/html/System Favorite Volumes.html | 4 ++-- doc/html/Technical Details.html | 6 +++--- doc/html/Trim Operation.html | 6 +++--- doc/html/Troubleshooting.html | 6 +++--- doc/html/TrueCrypt Support.html | 6 +++--- doc/html/Twofish.html | 6 +++--- doc/html/Unencrypted Data in RAM.html | 6 +++--- doc/html/Uninstalling VeraCrypt.html | 6 +++--- doc/html/Using VeraCrypt Without Administrator Privileges.html | 6 +++--- doc/html/VeraCrypt Background Task.html | 6 +++--- doc/html/VeraCrypt Hidden Operating System.html | 6 +++--- doc/html/VeraCrypt License.html | 6 +++--- doc/html/VeraCrypt Rescue Disk.html | 4 ++-- doc/html/VeraCrypt System Files.html | 6 +++--- doc/html/VeraCrypt Volume Format Specification.html | 6 +++--- doc/html/VeraCrypt Volume.html | 4 ++-- doc/html/Volume Clones.html | 6 +++--- doc/html/Wear-Leveling.html | 6 +++--- doc/html/Whirlpool.html | 6 +++--- doc/html/styles.css | 4 ++-- 103 files changed, 294 insertions(+), 294 deletions(-) (limited to 'doc/html') diff --git a/doc/html/AES.html b/doc/html/AES.html index 38a56a30..3410cd18 100644 --- a/doc/html/AES.html +++ b/doc/html/AES.html @@ -10,7 +10,7 @@
--Documentation +Documentation Encryption Algorithms @@ -48,4 +48,4 @@ In June 2003, after the NSA (US National Security Agency) conducted a review and associated with the protection of national security systems and/or national security information [1].