VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/doc/html/Documentation.html
diff options
context:
space:
mode:
authorFelix Reichmann <54814163+Van-Fouran@users.noreply.github.com>2022-08-16 08:21:55 +0200
committerGitHub <noreply@github.com>2022-08-16 08:21:55 +0200
commitcc5212fdb1a9165b1b4f63ad21198172a068ee43 (patch)
tree24a57410e529c0b15dddb3d5709294f4d861e9cb /doc/html/Documentation.html
parent08716954031eb0329fbd1ad2cd3fa593d3a046ab (diff)
downloadVeraCrypt-cc5212fdb1a9165b1b4f63ad21198172a068ee43.tar.gz
VeraCrypt-cc5212fdb1a9165b1b4f63ad21198172a068ee43.zip
Documentation overwork (#953)
Github PR: https://github.com/veracrypt/VeraCrypt/pull/953 * Create CompilingGuidelinerh * Initial Upload Windows Compiling Guide * Removed RIPEMD-160 from Product64.wxs. See commit from 21.03.2022 * Completed Win compiling guideline * Added link to detailed compiling guide * Added link to detailed compiling guide * Restructured docu main page * Added sourceforge link * Added compiling guide for Linux * References to detailed instructions * Revert "Removed RIPEMD-160 from Product64.wxs. See commit from 21.03.2022" This reverts commit 024ae2a4659a6d9e65673531338e10bd10b8a3a0. * Correction of a div box
Diffstat (limited to 'doc/html/Documentation.html')
-rw-r--r--doc/html/Documentation.html489
1 files changed, 376 insertions, 113 deletions
diff --git a/doc/html/Documentation.html b/doc/html/Documentation.html
index f9315c22..0466abe4 100644
--- a/doc/html/Documentation.html
+++ b/doc/html/Documentation.html
@@ -1,5 +1,52 @@
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+
+<style>
+.textbox {
+ vertical-align: top;
+ height: auto !important;
+ font-weight: bold;
+ padding: 5px;
+ width: auto;
+ border-radius: 10px;
+}
+
+.texttohide {
+ display:none;
+ font-family: Helvetica,sans-serif;
+ font-size: 14px;
+ font-weight: normal;
+}
+
+.show {
+ display: none;
+ text-decoration: none;
+}
+
+.hide:target + .show {
+ display: inline;
+ text-decoration: none;
+}
+
+.hide:target {
+ display: none;
+ text-decoration: none;
+}
+
+.hide:target ~ .texttohide {
+ display:inline;
+ text-decoration: none;
+
+}
+
+@media print {
+ .hide, .show {
+ display: none;
+ }
+}
+
+</style>
+
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
@@ -29,119 +76,335 @@
<h1>Table of Contents</h1>
<p><em style="text-align:left">This documentation is not guaranteed to be error-free and is provided &quot;as is&quot; without warranty of any kind. For more information, see
<a href="Disclaimers.html">Disclaimers</a>.</em></p>
-<ul>
-<li><a title="Preface" href="Preface.html"><strong>Preface</strong></a>
-</li><li><strong><a href="Introduction.html">Introduction</a></strong>
-</li><li><strong><a href="Beginner%27s%20Tutorial.html">Beginner's Tutorial</a></strong>
-</li><li><strong><a href="VeraCrypt%20Volume.html">VeraCrypt Volume</a></strong>
-<ul>
-<li><a href="Creating%20New%20Volumes.html">Creating a New VeraCrypt Volume</a>
-</li><li><a href="Favorite%20Volumes.html">Favorite Volumes</a>
-</li><li><a href="System%20Favorite%20Volumes.html">System Favorite Volumes</a>
-</li></ul>
-</li><li><strong><a href="System%20Encryption.html">System Encryption</a></strong>
-<ul>
-<li><a href="Hidden%20Operating%20System.html">Hidden Operating System</a>
-</li><li><a href="Supported%20Systems%20for%20System%20Encryption.html">Operating Systems Supported for System Encryption</a>
-</li><li><a href="VeraCrypt%20Rescue%20Disk.html">VeraCrypt Rescue Disk</a>
-</li></ul>
-</li><li><strong><a href="Plausible%20Deniability.html">Plausible Deniability</a></strong><br>
-<ul>
-<li><a href="Hidden%20Volume.html">Hidden Volume</a>
-<ul>
-<li><a href="Protection%20of%20Hidden%20Volumes.html">Protection of Hidden Volumes Against Damage</a>
-</li><li><a href="Security%20Requirements%20for%20Hidden%20Volumes.html">Security Requirements and Precautions Pertaining to Hidden Volumes</a>
-</li></ul>
-</li><li><a href="VeraCrypt%20Hidden%20Operating%20System.html">Hidden Operating System</a>
-</li></ul>
-</li><li><strong><a href="Main%20Program%20Window.html">Main Program Window</a></strong>
-<ul>
-<li><a href="Program%20Menu.html">Program Menu</a>
-</li><li><a href="Mounting%20VeraCrypt%20Volumes.html">Mounting Volumes</a>
-</li></ul>
-</li><li><strong><a href="Parallelization.html">Parallelization</a></strong>
-</li><li><strong><a href="Pipelining.html">Pipelining</a></strong>
-</li><li><strong><a href="Hardware%20Acceleration.html">Hardware acceleration</a></strong>
-</li><li><strong><a href="Hot%20Keys.html">Hot keys</a></strong>
-</li><li><strong><a href="Keyfiles%20in%20VeraCrypt.html">Keyfiles</a></strong>
-</li><li><strong><a href="Security%20Tokens%20%26%20Smart%20Cards.html">Security Tokens &amp; Smart Cards</a></strong>
-</li><li><strong><a href="Portable%20Mode.html">Portable Mode</a></strong>
-</li><li><strong><a href="TrueCrypt%20Support.html">TrueCrypt Support</a></strong>
-</li><li><strong><a href="Converting%20TrueCrypt%20volumes%20and%20partitions.html">Converting TrueCrypt Volumes &amp; Partitions</a></strong>
-</li><li><strong><a href="Default%20Mount%20Parameters.html">Default Mount Parameters</a></strong>
-</li><li><strong><a href="Language%20Packs.html">Language Packs</a></strong>
-</li><li><strong><a href="Encryption%20Algorithms.html">Encryption Algorithms</a></strong>
-<ul>
-<li><a href="AES.html">AES</a> </li><li><a href="Camellia.html">Camellia</a>
-</li><li><a href="Kuznyechik.html">Kuznyechik</a>
-</li><li><a href="Serpent.html">Serpent</a> </li><li><a href="Twofish.html">Twofish</a> </li><li><a href="Cascades.html">Cascades of ciphers</a>
-</li></ul>
-</li><li><strong><a href="Hash%20Algorithms.html">Hash Algorithms</a></strong>
-<ul>
-<li><a href="BLAKE2s-256.html">BLAKE2s-256</a>
-</li><li><a href="SHA-256.html">SHA-256</a> </li><li><a href="SHA-512.html">SHA-512</a> </li><li><a href="Whirlpool.html">Whirlpool</a>
-</li><li><a href="Streebog.html">Streebog</a></li></ul>
-</li><li><strong><a href="Supported%20Operating%20Systems.html">Supported Operating Systems</a></strong>
-</li><li><strong><a href="Command%20Line%20Usage.html">Command Line Usage</a></strong>
-</li><li><strong><a href="Security%20Model.html">Security Model</a></strong>
-</li><li><strong><a href="Security%20Requirements%20and%20Precautions.html">Security Requirements And Precautions<br>
-</a></strong>
-<ul>
-<li><a href="Data%20Leaks.html">Data Leaks</a>
-<ul>
-<li><a href="Paging%20File.html">Paging File</a>
-</li><li><a href="Memory%20Dump%20Files.html">Memory Dump Files</a>
-</li><li><a href="Hibernation%20File.html">Hibernation File</a>
-</li></ul>
-</li><li><a href="Unencrypted%20Data%20in%20RAM.html">Unencrypted Data in RAM</a>
-</li><li><a href="Physical%20Security.html">Physical Security</a>
-</li><li><a href="Malware.html">Malware</a> </li><li><a href="Multi-User%20Environment.html">Multi-User Environment</a>
-</li><li><a href="Authenticity%20and%20Integrity.html">Authenticity and Integrity</a>
-</li><li><a href="Choosing%20Passwords%20and%20Keyfiles.html">Choosing Passwords and Keyfiles</a>
-</li><li><a href="Changing%20Passwords%20and%20Keyfiles.html">Changing Passwords and Keyfiles</a>
-</li><li><a href="Trim%20Operation.html">Trim Operation</a>
-</li><li><a href="Wear-Leveling.html">Wear-Leveling</a>
-</li><li><a href="Reallocated%20Sectors.html">Reallocated Sectors</a>
-</li><li><a href="Defragmenting.html">Defragmenting</a>
-</li><li><a href="Journaling%20File%20Systems.html">Journaling File Systems</a>
-</li><li><a href="Volume%20Clones.html">Volume Clones</a>
-</li><li><a href="Additional%20Security%20Requirements%20and%20Precautions.html">Additional Security Requirements and Precautions</a>
-</li></ul>
-</li><li><strong><a href="How%20to%20Back%20Up%20Securely.html">How To Back Up Securely</a></strong>
-</li><li><strong><a href="Miscellaneous.html">Miscellaneous</a></strong>
-<ul>
-<li><a href="Using%20VeraCrypt%20Without%20Administrator%20Privileges.html">Using VeraCrypt Without Administrator Privileges</a>
-</li><li><a href="Sharing%20over%20Network.html">Sharing Over Network</a>
-</li><li><a href="VeraCrypt%20Background%20Task.html">VeraCrypt Background Task</a>
-</li><li><a href="Removable%20Medium%20Volume.html">Volume Mounted as Removable Medium</a>
-</li><li><a href="VeraCrypt%20System%20Files.html">VeraCrypt System Files &amp; Application Data</a>
-</li><li><a href="Removing%20Encryption.html">How To Remove Encryption</a>
-</li><li><a href="Uninstalling%20VeraCrypt.html">Uninstalling VeraCrypt</a>
-</li><li><a href="Digital%20Signatures.html">Digital Signatures</a>
-</li></ul>
-</li><li><strong><a href="Troubleshooting.html">Troubleshooting</a></strong>
-</li><li><strong><a href="Incompatibilities.html">Incompatibilities</a></strong>
-</li><li><strong><a href="Issues%20and%20Limitations.html">Known Issues and Limitations</a></strong>
-</li><li><strong><a href="FAQ.html">Frequently Asked Questions</a></strong>
-</li><li><strong><a href="Technical%20Details.html">Technical Details</a></strong>
-<ul>
-<li><a href="Notation.html">Notation</a>
-</li><li><a href="Encryption%20Scheme.html">Encryption Scheme</a>
-</li><li><a href="Modes%20of%20Operation.html">Modes of Operation</a>
-</li><li><a href="Header%20Key%20Derivation.html">Header Key Derivation, Salt, and Iteration Count</a>
-</li><li><a href="Random%20Number%20Generator.html">Random Number Generator</a>
-</li><li><a href="Keyfiles.html">Keyfiles</a>
-</li><li><a title="PIM" href="Personal%20Iterations%20Multiplier%20(PIM).html">PIM</a>
-</li><li><a href="VeraCrypt%20Volume%20Format%20Specification.html">VeraCrypt Volume Format Specification</a>
-</li><li><a href="Standard%20Compliance.html">Compliance with Standards and Specifications</a>
-</li><li><a href="Source%20Code.html">Source Code</a>
-</li></ul>
-</li><li><strong><a href="Contact.html">Contact</a></strong>
-</li><li><strong><a href="Legal%20Information.html">Legal Information</a></strong>
-</li><li><strong><a href="Release%20Notes.html">Version History</a></strong>
-</li><li><strong><a href="Acknowledgements.html">Acknowledgements</a></strong>
-</li><li><strong><a href="References.html">References</a></strong>
-</li></ul>
+
+
+<a title="Preface" href="Preface.html"><strong>Preface</strong></a> <br>
+<a href="Introduction.html"><strong>Introduction</strong></a>
+
+<div class="wikidoc">
+ <div class="textbox" id="EndUserGuides">
+ <a href="#hide1" class="hide" id="hide1">&#9654; &nbsp; End-User Guidelines and Information</a>
+ <a href="#show1" class="show" id="show1">&#9660; &nbsp; End-User Guidelines and Information</a>
+ <div class="texttohide">
+ <ul>
+ <li>
+ <strong><a href="Beginner%27s%20Tutorial.html">Beginner's Tutorial</a></strong>
+ </li>
+
+ <li>
+ <strong><a href="Main%20Program%20Window.html">Main Program Window</a></strong>
+ <ul>
+ <li>
+ <a href="Program%20Menu.html">Program Menu</a>
+ </li>
+ <li>
+ <a href="Mounting%20VeraCrypt%20Volumes.html">Mounting Volumes</a>
+ </li>
+ </ul>
+ </li>
+
+ <li>
+ <strong><a href="Portable%20Mode.html">Portable Mode</a></strong>
+ </li>
+
+ <li>
+ <strong><a href="Language%20Packs.html">Language Packs</a></strong>
+ </li>
+ <li>
+ <strong><a href="Supported%20Operating%20Systems.html">Supported Operating Systems</a></strong>
+ </li>
+ <li>
+ <strong><a href="How%20to%20Back%20Up%20Securely.html">How To Back Up Securely</a></strong>
+ </li>
+ <li>
+ <strong><a href="Using%20VeraCrypt%20Without%20Administrator%20Privileges.html">Using VeraCrypt Without Administrator Privileges</a></strong>
+ </li>
+ <li>
+ <strong><a href="Sharing%20over%20Network.html">Sharing Over Network</a></strong>
+ </li>
+ <li>
+ <strong><a href="VeraCrypt%20Background%20Task.html">VeraCrypt Background Task</a></strong>
+ </li>
+ <li>
+ <strong><a href="Removable%20Medium%20Volume.html">Volume Mounted as Removable Medium</a></strong>
+ </li>
+ <li>
+ <strong><a href="Removing%20Encryption.html">How To Remove Encryption</a></strong>
+ </li>
+ <li>
+ <strong><a href="Uninstalling%20VeraCrypt.html">Uninstalling VeraCrypt</a></strong>
+ </li>
+
+ </ul>
+ </div>
+</div>
+
+<div class="wikidoc">
+ <div class="textbox" id="SoftwareDevGuidelines">
+ <a href="#hide2" class="hide" id="hide2">&#9654; &nbsp; Software Development Guidelines</a>
+ <a href="#show2" class="show" id="show2">&#9660; &nbsp; Software Development Guidelines</a>
+ <div class="texttohide">
+ <ul>
+ <li>
+ <strong><a href="CompilingGuidelineWin.html">Windows Compiling Guideline</a></strong>
+ </li>
+ <li>
+ <strong><a href="CompilingGuidelineLinux.html">Linux Compiling Guideline</a></strong>
+ </li>
+ </ul>
+ </div>
+ </div>
+
+<div class="wikidoc">
+ <div class="textbox" id="TechnicalDetails">
+ <a href="#hide3" class="hide" id="hide3">&#9654; &nbsp; Technical Details</a>
+ <a href="#show3" class="show" id="show3">&#9660; &nbsp; Technical Details</a>
+ <div class="texttohide">
+ <ul>
+ <li>
+ <strong><a href="VeraCrypt%20Volume.html">VeraCrypt Volume</a></strong>
+ <ul>
+ <li>
+ <a href="Creating%20New%20Volumes.html">Creating a New VeraCrypt Volume</a>
+ </li>
+ <li>
+ <a href="Favorite%20Volumes.html">Favorite Volumes</a>
+ </li>
+ <li>
+ <a href="System%20Favorite%20Volumes.html">System Favorite Volumes</a>
+ </li>
+ </ul>
+ </li>
+
+ <li>
+ <strong><a href="System%20Encryption.html">System Encryption</a></strong>
+ <ul>
+ <li>
+ <a href="Hidden%20Operating%20System.html">Hidden Operating System</a>
+ </li>
+ <li>
+ <a href="Supported%20Systems%20for%20System%20Encryption.html">Operating Systems Supported for System Encryption</a>
+ </li>
+ <li>
+ <a href="VeraCrypt%20Rescue%20Disk.html">VeraCrypt Rescue Disk</a>
+ </li>
+ </ul>
+ </li>
+
+ <li>
+ <strong><a href="Plausible%20Deniability.html">Plausible Deniability</a></strong><br>
+ <ul>
+ <li>
+ <a href="Hidden%20Volume.html">Hidden Volume</a>
+ <ul>
+ <li>
+ <a href="Protection%20of%20Hidden%20Volumes.html">Protection of Hidden Volumes Against Damage</a>
+ </li>
+ <li>
+ <a href="Security%20Requirements%20for%20Hidden%20Volumes.html">Security Requirements and Precautions Pertaining to Hidden Volumes</a>
+ </li>
+ </ul>
+ </li>
+ <li>
+ <a href="VeraCrypt%20Hidden%20Operating%20System.html">Hidden Operating System</a>
+ </li>
+ </ul>
+ </li>
+
+ <li>
+ <strong><a href="Encryption%20Algorithms.html">Encryption Algorithms</a></strong>
+ <ul>
+ <li>
+ <a href="AES.html">AES</a> </li><li><a href="Camellia.html">Camellia</a>
+ </li>
+ <li>
+ <a href="Kuznyechik.html">Kuznyechik</a>
+ </li>
+ <li>
+ <a href="Serpent.html">Serpent</a>
+ </li>
+ <li>
+ <a href="Twofish.html">Twofish</a>
+ </li>
+ <li>
+ <a href="Cascades.html">Cascades of ciphers</a>
+ </li>
+ </ul>
+ </li>
+
+ <li>
+ <strong><a href="Hash%20Algorithms.html">Hash Algorithms</a></strong>
+ <ul>
+ <li>
+ <a href="BLAKE2s-256.html">BLAKE2s-256</a>
+ </li>
+ <li>
+ <a href="SHA-256.html">SHA-256</a>
+ </li>
+ <li>
+ <a href="SHA-512.html">SHA-512</a>
+ </li>
+ <li>
+ <a href="Whirlpool.html">Whirlpool</a>
+ </li>
+ <li>
+ <a href="Streebog.html">Streebog</a>
+ </li>
+ </ul>
+ </li>
+
+
+ <li>
+ <strong><a href="Security%20Requirements%20and%20Precautions.html">Security Requirements And Precautions<br> </a></strong>
+ <ul>
+ <li>
+ <a href="Data%20Leaks.html">Data Leaks</a>
+ <ul>
+ <li>
+ <a href="Paging%20File.html">Paging File</a>
+ </li>
+ <li>
+ <a href="Memory%20Dump%20Files.html">Memory Dump Files</a>
+ </li>
+ <li>
+ <a href="Hibernation%20File.html">Hibernation File</a>
+ </li>
+ </ul>
+ </li>
+ <li>
+ <a href="Unencrypted%20Data%20in%20RAM.html">Unencrypted Data in RAM</a>
+ </li>
+ <li>
+ <a href="Physical%20Security.html">Physical Security</a>
+ </li>
+ <li>
+ <a href="Malware.html">Malware</a>
+ </li>
+ <li>
+ <a href="Multi-User%20Environment.html">Multi-User Environment</a>
+ </li>
+ <li>
+ <a href="Authenticity%20and%20Integrity.html">Authenticity and Integrity</a>
+ </li>
+ <li>
+ <a href="Choosing%20Passwords%20and%20Keyfiles.html">Choosing Passwords and Keyfiles</a>
+ </li>
+ <li>
+ <a href="Changing%20Passwords%20and%20Keyfiles.html">Changing Passwords and Keyfiles</a>
+ </li>
+ <li>
+ <a href="Trim%20Operation.html">Trim Operation</a>
+ </li>
+ <li>
+ <a href="Wear-Leveling.html">Wear-Leveling</a>
+ </li>
+ <li>
+ <a href="Reallocated%20Sectors.html">Reallocated Sectors</a>
+ </li>
+ <li>
+ <a href="Defragmenting.html">Defragmenting</a>
+ </li>
+ <li>
+ <a href="Journaling%20File%20Systems.html">Journaling File Systems</a>
+ </li>
+ <li>
+ <a href="Volume%20Clones.html">Volume Clones</a>
+ </li>
+ <li>
+ <a href="Additional%20Security%20Requirements%20and%20Precautions.html">Additional Security Requirements and Precautions</a>
+ </li>
+ </ul>
+ </li>
+
+ <li>
+ <strong><a href="Parallelization.html">Parallelization</a></strong>
+ </li>
+ <li>
+ <strong><a href="Pipelining.html">Pipelining</a></strong>
+ </li>
+ <li>
+ <strong><a href="Hardware%20Acceleration.html">Hardware acceleration</a></strong>
+ </li>
+ <li>
+ <strong><a href="Hot%20Keys.html">Hot keys</a></strong>
+ </li>
+ <li>
+ <strong><a href="Keyfiles%20in%20VeraCrypt.html">Keyfiles</a></strong>
+ </li>
+ <li>
+ <strong><a href="Security%20Tokens%20%26%20Smart%20Cards.html">Security Tokens &amp; Smart Cards</a></strong>
+ </li>
+ <li>
+ <strong><a href="TrueCrypt%20Support.html">TrueCrypt Support</a></strong>
+ </li>
+ <li>
+ <strong><a href="Converting%20TrueCrypt%20volumes%20and%20partitions.html">Converting TrueCrypt Volumes &amp; Partitions</a></strong>
+ </li>
+ <li>
+ <strong><a href="Default%20Mount%20Parameters.html">Default Mount Parameters</a></strong>
+ </li>
+ <li>
+ <strong><a href="Command%20Line%20Usage.html">Command Line Usage</a></strong>
+ </li>
+ <li>
+ <strong><a href="Security%20Model.html">Security Model</a></strong>
+ </li>
+
+ <li>
+ <strong><a href="Technical%20Details.html">Technical Details</a></strong>
+ <ul>
+ <li>
+ <a href="Notation.html">Notation</a>
+ </li>
+ <li>
+ <a href="Encryption%20Scheme.html">Encryption Scheme</a>
+ </li>
+ <li>
+ <a href="Modes%20of%20Operation.html">Modes of Operation</a>
+ </li>
+ <li>
+ <a href="Header%20Key%20Derivation.html">Header Key Derivation, Salt, and Iteration Count</a>
+ </li>
+ <li>
+ <a href="Random%20Number%20Generator.html">Random Number Generator</a>
+ </li>
+ <li>
+ <a href="Keyfiles.html">Keyfiles</a>
+ </li>
+ <li>
+ <a title="PIM" href="Personal%20Iterations%20Multiplier%20(PIM).html">PIM</a>
+ </li>
+ <li>
+ <a href="VeraCrypt%20Volume%20Format%20Specification.html">VeraCrypt Volume Format Specification</a>
+ </li>
+ <li>
+ <a href="Standard%20Compliance.html">Compliance with Standards and Specifications</a>
+ </li>
+ <li>
+ <a href="Source%20Code.html">Source Code</a>
+ </li>
+ </ul>
+ </li>
+ <li>
+ <strong><a href="VeraCrypt%20System%20Files.html">VeraCrypt System Files &amp; Application Data</a></strong>
+ </li>
+ <li>
+ <strong><a href="Digital%20Signatures.html">Digital Signatures</a></strong>
+ </li>
+
+ </ul>
+ </div>
</div>
+</div>
+
+<strong><a href="Troubleshooting.html">Troubleshooting</a></strong> <br>
+<strong><a href="Incompatibilities.html">Incompatibilities</a></strong> <br>
+<strong><a href="Issues%20and%20Limitations.html">Known Issues and Limitations</a></strong> <br>
+<strong><a href="FAQ.html">Frequently Asked Questions</a></strong> <br>
+<strong><a href="Contact.html">Contact</a></strong> <br>
+<strong><a href="Legal%20Information.html">Legal Information</a></strong> <br>
+<strong><a href="Release%20Notes.html">Version History</a></strong> <br>
+<strong><a href="Acknowledgements.html">Acknowledgements</a></strong> <br>
+<strong><a href="References.html">References</a></strong> <br>
</body></html>