/* Copyright (c) 2008-2009 TrueCrypt Developers Association. All rights reserved. Governed by the TrueCrypt License 3.0 the full text of which is contained in the file License.txt included in TrueCrypt binary and source code distribution packages. */ #ifndef TC_HEADER_Volume_VolumeInfo #define TC_HEADER_Volume_VolumeInfo #include "Platform/Platform.h" #include "Platform/Serializable.h" #include "Volume/Volume.h" #include "Volume/VolumeSlot.h" namespace VeraCrypt { class VolumeInfo; typedef list < shared_ptr > VolumeInfoList; class VolumeInfo : public Serializable { public: VolumeInfo () { } virtual ~VolumeInfo () { } TC_SERIALIZABLE (VolumeInfo); static bool FirstVolumeMountedAfterSecond (shared_ptr first, shared_ptr second); void Set (const Volume &volume); // Modifying this structure can introduce incompatibility with previous versions DirectoryPath AuxMountPoint; uint32 EncryptionAlgorithmBlockSize; uint32 EncryptionAlgorithmKeySize; uint32 EncryptionAlgorithmMinBlockSize; wstring EncryptionAlgorithmName; wstring EncryptionModeName; VolumeTime HeaderCreationTime; bool HiddenVolumeProtectionTriggered; DevicePath LoopDevice; uint32 MinRequiredProgramVersion; DirectoryPath MountPoint; VolumePath Path; uint32 Pkcs5IterationCount; wstring Pkcs5PrfName; uint32 ProgramVersion; VolumeProtection::Enum Protection; uint64 SerialInstanceNumber; uint64 Size; VolumeSlotNumber SlotNumber; bool SystemEncryption; uint64 TopWriteOffset; uint64 TotalDataRead; uint64 TotalDataWritten; VolumeType::Enum Type; DevicePath VirtualDevice; VolumeTime VolumeCreationTime; bool TrueCryptMode; private: VolumeInfo (const VolumeInfo &); VolumeInfo &operator= (const VolumeInfo &); }; } #endif // TC_HEADER_Volume_VolumeInfo onal%20Security%20Requirements%20and%20Precautions.html?h=VeraCrypt_1.24&id=cbfd9ba1d1301b04cbb871ba72e238fb805331e1'>treecommitdiff
blob: c7b5f067c7de3773a14fd56c1ea005eec8d73d5a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title>
<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>
<meta name="keywords" content="encryption, security"/>
<link href="styles.css" rel="stylesheet" type="text/css" />
</head>
<body>

<div>                      
<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
</div>

<div id="menu">
	<ul>
	  <li><a href="Home.html">Home</a></li>
	  <li><a href="/code/">Source Code</a></li>
	  <li><a href="Downloads.html">Downloads</a></li>
	  <li><a class="active" href="Documentation.html">Documentation</a></li>
	  <li><a href="Donation.html">Donate</a></li>
	  <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
	</ul>
</div>

<div>
<p>
<a href="Documentation.html">Documentation</a>           
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a>
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
<a href="Additional%20Security%20Requirements%20and%20Precautions.html">Additional Security Requirements and Precautions</a>
</p></div>

<div class="wikidoc">
<div>
<h1>Additional Security Requirements and Precautions</h1>
<p>In addition to the requirements and precautions described in this chapter (<a href="Security%20Requirements%20and%20Precautions.html"><em>Security Requirements and Precautions</em></a>), you must follow and keep in
 mind the security requirements, precautions, and limitations listed in the following chapters and sections:</p>
<ul>
<li><a href="How%20to%20Back%20Up%20Securely.html"><em><strong>How to Back Up Securely</strong></em></a>
</li><li><a href="Issues%20and%20Limitations.html"><em><strong>Limitations</strong></em></a>
</li><li><a href="Security%20Model.html"><em><strong>Security Model</strong></em></a>
</li><li><a href="Security%20Requirements%20for%20Hidden%20Volumes.html"><em><strong>Security Requirements and Precautions Pertaining to Hidden Volumes</strong></em></a>
</li><li><a href="Plausible%20Deniability.html"><em><strong>Plausible Deniability</strong></em></a>
</li></ul>
<p>See also: <a href="Digital%20Signatures.html">
<em>Digital Signatures</em></a></p>
</div>
</div><div class="ClearBoth"></div></body></html>