From edc9f36322e44bc0b164cf27ca03cf970ef48091 Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Sat, 31 May 2014 23:09:24 +0200 Subject: [PATCH] Replace TrueCrypt references in added sources and resources by VeraCrypt ones. --- src/Build/Resources/MacOSX/Info.plist.xml | 10 +++--- src/Core/Unix/CoreService.cpp | 2 +- src/Core/Unix/CoreUnix.cpp | 4 +-- src/Core/Unix/Linux/CoreLinux.cpp | 4 +-- src/Core/Unix/MacOSX/CoreMacOSX.h | 2 +- src/Driver/Fuse/FuseService.h | 2 +- src/Driver/Ntdriver.c | 2 +- src/Main/Application.cpp | 2 +- src/Main/Application.h | 2 +- src/Main/CommandLineInterface.cpp | 2 +- src/Main/FatalErrorHandler.cpp | 12 +++---- src/Main/Forms/AboutDialog.cpp | 6 ++-- src/Main/Forms/Forms.cpp | 10 +++--- src/Main/Forms/Forms.h | 12 +++---- src/Main/Forms/MainFrame.cpp | 2 +- src/Main/Forms/PreferencesDialog.cpp | 2 +- src/Main/Forms/TrueCrypt.fbp | 26 +++++++------- src/Main/Forms/VolumeCreationWizard.cpp | 6 ++-- src/Main/Forms/VolumePropertiesDialog.cpp | 2 +- src/Main/GraphicUserInterface.cpp | 10 +++--- src/Main/LanguageStrings.cpp | 18 +++++----- src/Main/Resources.cpp | 6 ++-- src/Main/UserInterface.cpp | 42 +++++++++++----------- src/Main/Xml.cpp | 4 +-- src/Makefile | 2 +- src/Platform/PlatformTest.cpp | 2 +- src/Platform/Unix/SystemLog.cpp | 4 +-- src/Resources/Icons/TrueCrypt-16x16.xpm | Bin 4396 -> 0 bytes src/Resources/Icons/TrueCrypt-48x48.xpm | Bin 8073 -> 0 bytes src/Resources/Icons/VeraCrypt-16x16.xpm | Bin 0 -> 2796 bytes src/Resources/Icons/VeraCrypt-48x48.xpm | Bin 0 -> 14278 bytes 31 files changed, 99 insertions(+), 99 deletions(-) delete mode 100644 src/Resources/Icons/TrueCrypt-16x16.xpm delete mode 100644 src/Resources/Icons/TrueCrypt-48x48.xpm create mode 100644 src/Resources/Icons/VeraCrypt-16x16.xpm create mode 100644 src/Resources/Icons/VeraCrypt-48x48.xpm diff --git a/src/Build/Resources/MacOSX/Info.plist.xml b/src/Build/Resources/MacOSX/Info.plist.xml index 29e114fa..2255770b 100644 --- a/src/Build/Resources/MacOSX/Info.plist.xml +++ b/src/Build/Resources/MacOSX/Info.plist.xml @@ -6,19 +6,19 @@ 6.0 CFBundleIdentifier - org.TrueCryptFoundation.TrueCrypt + org.idrix.VeraCrypt CFBundleDevelopmentRegion English CFBundleExecutable - TrueCrypt + VeraCrypt CFBundleIconFile - TrueCrypt.icns + VeraCrypt.icns CFBundleName - TrueCrypt + VeraCrypt CFBundlePackageType APPL @@ -33,7 +33,7 @@ _VERSION_ CFBundleLongVersionString - TrueCrypt _VERSION_ + VeraCrypt _VERSION_ LSRequiresCarbon diff --git a/src/Core/Unix/CoreService.cpp b/src/Core/Unix/CoreService.cpp index 0ec636c7..9d2fd2a4 100644 --- a/src/Core/Unix/CoreService.cpp +++ b/src/Core/Unix/CoreService.cpp @@ -357,7 +357,7 @@ namespace TrueCrypt string appPath = request.ApplicationExecutablePath; if (appPath.empty()) - appPath = "truecrypt"; + appPath = "veracrypt"; const char *args[] = { "sudo", "-S", "-p", "", appPath.c_str(), TC_CORE_SERVICE_CMDLINE_OPTION, nullptr }; execvp (args[0], ((char* const*) args)); diff --git a/src/Core/Unix/CoreUnix.cpp b/src/Core/Unix/CoreUnix.cpp index 89f34e20..41ebe969 100644 --- a/src/Core/Unix/CoreUnix.cpp +++ b/src/Core/Unix/CoreUnix.cpp @@ -210,10 +210,10 @@ namespace TrueCrypt return envPrefix; if (FilesystemPath ("/media").IsDirectory()) - return "/media/truecrypt"; + return "/media/veracrypt"; if (FilesystemPath ("/mnt").IsDirectory()) - return "/mnt/truecrypt"; + return "/mnt/veracrypt"; return GetTempDirectory() + "/truecrypt_mnt"; } diff --git a/src/Core/Unix/Linux/CoreLinux.cpp b/src/Core/Unix/Linux/CoreLinux.cpp index 634a3a23..777ccb77 100644 --- a/src/Core/Unix/Linux/CoreLinux.cpp +++ b/src/Core/Unix/Linux/CoreLinux.cpp @@ -114,7 +114,7 @@ namespace TrueCrypt { string devPath = mountedVolume->VirtualDevice; - if (devPath.find ("/dev/mapper/truecrypt") != 0) + if (devPath.find ("/dev/mapper/veracrypt") != 0) throw NotApplicable (SRC_POS); size_t devCount = 0; @@ -380,7 +380,7 @@ namespace TrueCrypt } stringstream nativeDevName; - nativeDevName << "truecrypt" << options.SlotNumber; + nativeDevName << "veracrypt" << options.SlotNumber; if (nativeDevCount != cipherCount - 1) nativeDevName << "_" << cipherCount - nativeDevCount - 2; diff --git a/src/Core/Unix/MacOSX/CoreMacOSX.h b/src/Core/Unix/MacOSX/CoreMacOSX.h index eee11d6f..37ebd1d6 100644 --- a/src/Core/Unix/MacOSX/CoreMacOSX.h +++ b/src/Core/Unix/MacOSX/CoreMacOSX.h @@ -22,7 +22,7 @@ namespace TrueCrypt virtual void CheckFilesystem (shared_ptr mountedVolume, bool repair = false) const; virtual shared_ptr DismountVolume (shared_ptr mountedVolume, bool ignoreOpenFiles = false, bool syncVolumeInfo = false); - virtual string GetDefaultMountPointPrefix () const { return "/Volumes/truecrypt"; } + virtual string GetDefaultMountPointPrefix () const { return "/Volumes/veracrypt"; } protected: virtual void MountAuxVolumeImage (const DirectoryPath &auxMountPoint, const MountOptions &options) const; diff --git a/src/Driver/Fuse/FuseService.h b/src/Driver/Fuse/FuseService.h index 5ff2dd72..e81567ea 100644 --- a/src/Driver/Fuse/FuseService.h +++ b/src/Driver/Fuse/FuseService.h @@ -43,7 +43,7 @@ namespace TrueCrypt static int ExceptionToErrorCode (); static const char *GetControlPath () { return "/control"; } static const char *GetVolumeImagePath (); - static string GetDeviceType () { return "truecrypt"; } + static string GetDeviceType () { return "veracrypt"; } static uid_t GetGroupId () { return GroupId; } static uid_t GetUserId () { return UserId; } static shared_ptr GetVolumeInfo (); diff --git a/src/Driver/Ntdriver.c b/src/Driver/Ntdriver.c index 64abf7c2..f50c0976 100644 --- a/src/Driver/Ntdriver.c +++ b/src/Driver/Ntdriver.c @@ -3049,7 +3049,7 @@ BOOL IsVolumeClassFilterRegistered () { if (data->Type == REG_MULTI_SZ && data->DataLength >= 9 * sizeof (wchar_t)) { - // Search for the string "truecrypt" + // Search for the string "veracrypt" ULONG i; for (i = 0; i <= data->DataLength - 9 * sizeof (wchar_t); ++i) { diff --git a/src/Main/Application.cpp b/src/Main/Application.cpp index f6d692cb..8c6dea18 100644 --- a/src/Main/Application.cpp +++ b/src/Main/Application.cpp @@ -42,7 +42,7 @@ namespace TrueCrypt if (!Core->IsInPortableMode()) { #ifdef TC_MACOSX - wxFileName configPath (L"~/Library/Application Support/TrueCrypt"); + wxFileName configPath (L"~/Library/Application Support/VeraCrypt"); configPath.Normalize(); configDir = wstring (configPath.GetFullPath()); #else diff --git a/src/Main/Application.h b/src/Main/Application.h index 07ed3d03..67493c13 100644 --- a/src/Main/Application.h +++ b/src/Main/Application.h @@ -24,7 +24,7 @@ namespace TrueCrypt static DirectoryPath GetExecutableDirectory (); static FilePath GetExecutablePath (); static int GetExitCode () { return ExitCode; } - static wstring GetName () { return L"TrueCrypt"; } + static wstring GetName () { return L"VeraCrypt"; } static UserInterface *GetUserInterface () { return mUserInterface; } static UserInterfaceType::Enum GetUserInterfaceType () { return mUserInterfaceType; } static void Initialize (UserInterfaceType::Enum type); diff --git a/src/Main/CommandLineInterface.cpp b/src/Main/CommandLineInterface.cpp index ab5f90b2..ccb03170 100644 --- a/src/Main/CommandLineInterface.cpp +++ b/src/Main/CommandLineInterface.cpp @@ -55,7 +55,7 @@ namespace TrueCrypt parser.AddSwitch (L"", L"list-token-keyfiles", _("List security token keyfiles")); parser.AddSwitch (L"", L"load-preferences", _("Load user preferences")); parser.AddSwitch (L"", L"mount", _("Mount volume interactively")); - parser.AddOption (L"m", L"mount-options", _("TrueCrypt volume mount options")); + parser.AddOption (L"m", L"mount-options", _("VeraCrypt volume mount options")); parser.AddOption (L"", L"new-keyfiles", _("New keyfiles")); parser.AddOption (L"", L"new-password", _("New password")); parser.AddSwitch (L"", L"non-interactive", _("Do not interact with user")); diff --git a/src/Main/FatalErrorHandler.cpp b/src/Main/FatalErrorHandler.cpp index d84a717d..dd9b2838 100644 --- a/src/Main/FatalErrorHandler.cpp +++ b/src/Main/FatalErrorHandler.cpp @@ -76,9 +76,9 @@ namespace TrueCrypt url.Replace (L"=0X0x", L"=0x"); url.Replace (L"=0X", L"=0x"); - wxString msg = L"A critical error has occurred and TrueCrypt must be terminated. If this is caused by a bug in TrueCrypt, we would like to fix it. To help us, you can send us an automatically generated error report containing the following items:\n\n- Program version\n- Operating system version\n- Hardware architecture\n- Checksum of TrueCrypt executable\n- Error category\n- Error address\n"; + wxString msg = L"A critical error has occurred and VeraCrypt must be terminated. If this is caused by a bug in VeraCrypt, we would like to fix it. To help us, you can send us an automatically generated error report containing the following items:\n\n- Program version\n- Operating system version\n- Hardware architecture\n- Checksum of VeraCrypt executable\n- Error category\n- Error address\n"; #if wxUSE_STACKWALKER == 1 - msg += L"- TrueCrypt call stack\n"; + msg += L"- VeraCrypt call stack\n"; #endif msg += L"\nIf you select 'Yes', the following URL (which contains the entire error report) will be opened in your default Internet browser.\n\n"; @@ -198,11 +198,11 @@ namespace TrueCrypt wxString vars; wxString exName = StringConverter::ToWide (StringConverter::GetTypeName (typeid (e))); - if (exName.find (L"TrueCrypt::") != string::npos) + if (exName.find (L"VeraCrypt::") != string::npos) exName = exName.Mid (11); wxString exPos = StringConverter::ToWide (e.what()); - if (exPos.find (L"TrueCrypt::") != string::npos) + if (exPos.find (L"VeraCrypt::") != string::npos) exPos = exPos.Mid (11); vars << L"cpus=" << wxThread::GetCPUCount(); @@ -219,9 +219,9 @@ namespace TrueCrypt url.Replace (L"=0X0x", L"=0x"); url.Replace (L"=0X", L"=0x"); - wxString msg = L"An unhandled exception has occurred and TrueCrypt must be terminated. If this is caused by a bug in TrueCrypt, we would like to fix it. To help us, you can send us an automatically generated error report containing the following items:\n\n- Program version\n- Operating system version\n- Hardware architecture\n- Checksum of TrueCrypt executable\n- Error description\n- Error location\n"; + wxString msg = L"An unhandled exception has occurred and VeraCrypt must be terminated. If this is caused by a bug in VeraCrypt, we would like to fix it. To help us, you can send us an automatically generated error report containing the following items:\n\n- Program version\n- Operating system version\n- Hardware architecture\n- Checksum of VeraCrypt executable\n- Error description\n- Error location\n"; #if wxUSE_STACKWALKER == 1 - msg += L"- TrueCrypt call stack\n"; + msg += L"- VeraCrypt call stack\n"; #endif msg += L"\nIf you select 'Yes', the following URL (which contains the entire error report) will be opened in your default Internet browser.\n\n"; diff --git a/src/Main/Forms/AboutDialog.cpp b/src/Main/Forms/AboutDialog.cpp index 736a669a..c8384457 100644 --- a/src/Main/Forms/AboutDialog.cpp +++ b/src/Main/Forms/AboutDialog.cpp @@ -25,7 +25,7 @@ namespace TrueCrypt VersionStaticText->SetLabel (Application::GetName() + L" " + StringConverter::ToWide (Version::String())); CopyrightStaticText->SetLabel (StringConverter::ToWide (TC_STR_RELEASED_BY)); - WebsiteHyperlink->SetLabel (L"www.truecrypt.org"); + WebsiteHyperlink->SetLabel (L"www.idrix.fr"); CreditsTextCtrl->SetMinSize (wxSize ( Gui->GetCharWidth (CreditsTextCtrl) * 70, @@ -57,10 +57,10 @@ namespace TrueCrypt L"Copyright \xA9 1998-2008 Brian Gladman. All Rights Reserved.\n" L"\nThis software as a whole:\n" - L"Copyright \xA9 2012 TrueCrypt Developers Association. All rights reserved.\n\n" + L"Copyright \xA9 2014 IDRIX. All rights reserved.\n\n" L"This software uses wxWidgets library, which is copyright \xA9 1998-2011 Julian Smart, Robert Roebling et al.\n\n" - L"A TrueCrypt Foundation Release"); + L"An IDRIX Release"); } } diff --git a/src/Main/Forms/Forms.cpp b/src/Main/Forms/Forms.cpp index 5825381c..efad4168 100644 --- a/src/Main/Forms/Forms.cpp +++ b/src/Main/Forms/Forms.cpp @@ -168,7 +168,7 @@ MainFrameBase::MainFrameBase( wxWindow* parent, wxWindowID id, const wxString& t HelpMenu->AppendSeparator(); wxMenuItem* WebsiteMenuItem; - WebsiteMenuItem = new wxMenuItem( HelpMenu, wxID_ANY, wxString( _("TrueCrypt Website") ) , wxEmptyString, wxITEM_NORMAL ); + WebsiteMenuItem = new wxMenuItem( HelpMenu, wxID_ANY, wxString( _("VeraCrypt Website") ) , wxEmptyString, wxITEM_NORMAL ); HelpMenu->Append( WebsiteMenuItem ); wxMenuItem* DownloadsMenuItem; @@ -1654,7 +1654,7 @@ PreferencesDialogBase::PreferencesDialogBase( wxWindow* parent, wxWindowID id, c wxStaticBoxSizer* sbSizer14; sbSizer14 = new wxStaticBoxSizer( new wxStaticBox( SecurityPage, wxID_ANY, _("Password Cache") ), wxVERTICAL ); - WipeCacheOnCloseCheckBox = new wxCheckBox( SecurityPage, wxID_ANY, _("Wipe after TrueCrypt window has been closed"), wxDefaultPosition, wxDefaultSize, 0 ); + WipeCacheOnCloseCheckBox = new wxCheckBox( SecurityPage, wxID_ANY, _("Wipe after VeraCrypt window has been closed"), wxDefaultPosition, wxDefaultSize, 0 ); sbSizer14->Add( WipeCacheOnCloseCheckBox, 0, wxALL, 5 ); @@ -1728,7 +1728,7 @@ PreferencesDialogBase::PreferencesDialogBase( wxWindow* parent, wxWindowID id, c bSizer62 = new wxBoxSizer( wxVERTICAL ); wxStaticBoxSizer* sbSizer18; - sbSizer18 = new wxStaticBoxSizer( new wxStaticBox( BackgroundTaskPanel, wxID_ANY, _("TrueCrypt Background Task") ), wxVERTICAL ); + sbSizer18 = new wxStaticBoxSizer( new wxStaticBox( BackgroundTaskPanel, wxID_ANY, _("VeraCrypt Background Task") ), wxVERTICAL ); BackgroundTaskEnabledCheckBox = new wxCheckBox( BackgroundTaskPanel, wxID_ANY, _("Enabled"), wxDefaultPosition, wxDefaultSize, 0 ); @@ -1772,7 +1772,7 @@ PreferencesDialogBase::PreferencesDialogBase( wxWindow* parent, wxWindowID id, c LogOnSizer = new wxStaticBoxSizer( new wxStaticBox( SystemIntegrationPage, wxID_ANY, _("Actions to Perform when User Logs On") ), wxVERTICAL ); - StartOnLogonCheckBox = new wxCheckBox( SystemIntegrationPage, wxID_ANY, _("Start TrueCrypt Background Task"), wxDefaultPosition, wxDefaultSize, 0 ); + StartOnLogonCheckBox = new wxCheckBox( SystemIntegrationPage, wxID_ANY, _("Start VeraCrypt Background Task"), wxDefaultPosition, wxDefaultSize, 0 ); LogOnSizer->Add( StartOnLogonCheckBox, 0, wxALL, 5 ); @@ -1780,7 +1780,7 @@ PreferencesDialogBase::PreferencesDialogBase( wxWindow* parent, wxWindowID id, c LogOnSizer->Add( MountFavoritesOnLogonCheckBox, 0, wxALL, 5 ); - MountDevicesOnLogonCheckBox = new wxCheckBox( SystemIntegrationPage, wxID_ANY, _("Mount all device-hosted TrueCrypt volumes"), wxDefaultPosition, wxDefaultSize, 0 ); + MountDevicesOnLogonCheckBox = new wxCheckBox( SystemIntegrationPage, wxID_ANY, _("Mount all device-hosted VeraCrypt volumes"), wxDefaultPosition, wxDefaultSize, 0 ); LogOnSizer->Add( MountDevicesOnLogonCheckBox, 0, wxALL, 5 ); diff --git a/src/Main/Forms/Forms.h b/src/Main/Forms/Forms.h index cbc6f6e1..7ecfa1c3 100644 --- a/src/Main/Forms/Forms.h +++ b/src/Main/Forms/Forms.h @@ -147,7 +147,7 @@ namespace TrueCrypt public: - MainFrameBase( wxWindow* parent, wxWindowID id = wxID_ANY, const wxString& title = _("TrueCrypt"), const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxSize( -1,496 ), long style = wxCAPTION|wxCLOSE_BOX|wxMINIMIZE_BOX|wxSYSTEM_MENU|wxTAB_TRAVERSAL ); + MainFrameBase( wxWindow* parent, wxWindowID id = wxID_ANY, const wxString& title = _("VeraCrypt"), const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxSize( -1,496 ), long style = wxCAPTION|wxCLOSE_BOX|wxMINIMIZE_BOX|wxSYSTEM_MENU|wxTAB_TRAVERSAL ); ~MainFrameBase(); }; @@ -242,7 +242,7 @@ namespace TrueCrypt public: - BenchmarkDialogBase( wxWindow* parent, wxWindowID id = wxID_ANY, const wxString& title = _("TrueCrypt - Encryption Algorithm Benchmark"), const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxDefaultSize, long style = wxDEFAULT_DIALOG_STYLE ); + BenchmarkDialogBase( wxWindow* parent, wxWindowID id = wxID_ANY, const wxString& title = _("VeraCrypt - Encryption Algorithm Benchmark"), const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxDefaultSize, long style = wxDEFAULT_DIALOG_STYLE ); ~BenchmarkDialogBase(); }; @@ -330,7 +330,7 @@ namespace TrueCrypt public: - EncryptionTestDialogBase( wxWindow* parent, wxWindowID id = wxID_ANY, const wxString& title = _("TrueCrypt - Test Vectors"), const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxDefaultSize, long style = wxDEFAULT_DIALOG_STYLE ); + EncryptionTestDialogBase( wxWindow* parent, wxWindowID id = wxID_ANY, const wxString& title = _("VeraCrypt - Test Vectors"), const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxDefaultSize, long style = wxDEFAULT_DIALOG_STYLE ); ~EncryptionTestDialogBase(); }; @@ -441,7 +441,7 @@ namespace TrueCrypt wxTextCtrl* LegalNoticesTextCtrl; public: - LegalNoticesDialogBase( wxWindow* parent, wxWindowID id = wxID_ANY, const wxString& title = _("TrueCrypt - Legal Notices"), const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxDefaultSize, long style = wxDEFAULT_DIALOG_STYLE ); + LegalNoticesDialogBase( wxWindow* parent, wxWindowID id = wxID_ANY, const wxString& title = _("VeraCrypt - Legal Notices"), const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxDefaultSize, long style = wxDEFAULT_DIALOG_STYLE ); ~LegalNoticesDialogBase(); }; @@ -492,7 +492,7 @@ namespace TrueCrypt public: - MountOptionsDialogBase( wxWindow* parent, wxWindowID id = wxID_ANY, const wxString& title = _("Enter TrueCrypt Volume Password"), const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxSize( -1,-1 ), long style = wxDEFAULT_DIALOG_STYLE ); + MountOptionsDialogBase( wxWindow* parent, wxWindowID id = wxID_ANY, const wxString& title = _("Enter VeraCrypt Volume Password"), const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxSize( -1,-1 ), long style = wxDEFAULT_DIALOG_STYLE ); ~MountOptionsDialogBase(); }; @@ -643,7 +643,7 @@ namespace TrueCrypt public: - RandomPoolEnrichmentDialogBase( wxWindow* parent, wxWindowID id = wxID_ANY, const wxString& title = _("TrueCrypt - Random Pool Enrichment"), const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxDefaultSize, long style = wxDEFAULT_DIALOG_STYLE ); + RandomPoolEnrichmentDialogBase( wxWindow* parent, wxWindowID id = wxID_ANY, const wxString& title = _("VeraCrypt - Random Pool Enrichment"), const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxDefaultSize, long style = wxDEFAULT_DIALOG_STYLE ); ~RandomPoolEnrichmentDialogBase(); }; diff --git a/src/Main/Forms/MainFrame.cpp b/src/Main/Forms/MainFrame.cpp index cf313a8e..6100a7ab 100644 --- a/src/Main/Forms/MainFrame.cpp +++ b/src/Main/Forms/MainFrame.cpp @@ -1420,7 +1420,7 @@ namespace TrueCrypt else if (show && !mTaskBarIcon->IsIconInstalled()) { #ifndef TC_MACOSX - mTaskBarIcon->SetIcon (Resources::GetTrueCryptIcon(), L"TrueCrypt"); + mTaskBarIcon->SetIcon (Resources::GetTrueCryptIcon(), L"VeraCrypt"); #endif } } diff --git a/src/Main/Forms/PreferencesDialog.cpp b/src/Main/Forms/PreferencesDialog.cpp index b10a5cdd..163a06fb 100644 --- a/src/Main/Forms/PreferencesDialog.cpp +++ b/src/Main/Forms/PreferencesDialog.cpp @@ -114,7 +114,7 @@ namespace TrueCrypt #ifdef TC_MACOSX DismountOnScreenSaverCheckBox->Show (false); - DismountOnLogOffCheckBox->SetLabel (_("TrueCrypt quits")); + DismountOnLogOffCheckBox->SetLabel (_("VeraCrypt quits")); OpenExplorerWindowAfterMountCheckBox->SetLabel (_("Open Finder window for successfully mounted volume")); MountRemovableCheckBox->Show (false); diff --git a/src/Main/Forms/TrueCrypt.fbp b/src/Main/Forms/TrueCrypt.fbp index 9d8fb6f9..de0ea709 100644 --- a/src/Main/Forms/TrueCrypt.fbp +++ b/src/Main/Forms/TrueCrypt.fbp @@ -11,8 +11,8 @@ 1000 none 1 - TrueCrypt - "TrueCrypt" + VeraCrypt + "VeraCrypt" . #include "System.h" 1 @@ -35,7 +35,7 @@ -1,496 wxCAPTION|wxCLOSE_BOX|wxMINIMIZE_BOX|wxSYSTEM_MENU - TrueCrypt + VeraCrypt @@ -646,7 +646,7 @@ wxID_ANY wxITEM_NORMAL - TrueCrypt Website + VeraCrypt Website WebsiteMenuItem none @@ -3059,7 +3059,7 @@ wxDEFAULT_DIALOG_STYLE - TrueCrypt - Encryption Algorithm Benchmark + VeraCrypt - Encryption Algorithm Benchmark @@ -3958,7 +3958,7 @@ wxDEFAULT_DIALOG_STYLE - TrueCrypt - Test Vectors + VeraCrypt - Test Vectors @@ -6752,7 +6752,7 @@ wxDEFAULT_DIALOG_STYLE - TrueCrypt - Legal Notices + VeraCrypt - Legal Notices @@ -6929,7 +6929,7 @@ -1,-1 wxDEFAULT_DIALOG_STYLE - Enter TrueCrypt Volume Password + Enter VeraCrypt Volume Password wxWS_EX_VALIDATE_RECURSIVELY @@ -9007,7 +9007,7 @@ 0 wxID_ANY - Wipe after TrueCrypt window has been closed + Wipe after VeraCrypt window has been closed WipeCacheOnCloseCheckBox @@ -9544,7 +9544,7 @@ 0 wxID_ANY - TrueCrypt Background Task + VeraCrypt Background Task sbSizer18 wxVERTICAL @@ -9916,7 +9916,7 @@ 0 wxID_ANY - Start TrueCrypt Background Task + Start VeraCrypt Background Task StartOnLogonCheckBox @@ -10020,7 +10020,7 @@ 0 wxID_ANY - Mount all device-hosted TrueCrypt volumes + Mount all device-hosted VeraCrypt volumes MountDevicesOnLogonCheckBox @@ -11698,7 +11698,7 @@ wxDEFAULT_DIALOG_STYLE - TrueCrypt - Random Pool Enrichment + VeraCrypt - Random Pool Enrichment diff --git a/src/Main/Forms/VolumeCreationWizard.cpp b/src/Main/Forms/VolumeCreationWizard.cpp index 1219fc20..127880a1 100644 --- a/src/Main/Forms/VolumeCreationWizard.cpp +++ b/src/Main/Forms/VolumeCreationWizard.cpp @@ -152,7 +152,7 @@ namespace TrueCrypt else if (SelectedVolumeType == VolumeType::Hidden) { pageTitle = LangString["SIZE_HIDVOL_TITLE"]; - pageText = LangString["SIZE_HELP_HIDDEN_VOL"] + L"\n\n" + _("Please note that if your operating system does not allocate files from the beginning of the free space, the maximum possible hidden volume size may be much smaller than the size of the free space on the outer volume. This not a bug in TrueCrypt but a limitation of the operating system."); + pageText = LangString["SIZE_HELP_HIDDEN_VOL"] + L"\n\n" + _("Please note that if your operating system does not allocate files from the beginning of the free space, the maximum possible hidden volume size may be much smaller than the size of the free space on the outer volume. This not a bug in VeraCrypt but a limitation of the operating system."); freeSpaceText = StringFormatter (_("Maximum possible hidden volume size for this volume is {0}."), Gui->SizeToString (MaxHiddenVolumeSize)); } else @@ -579,7 +579,7 @@ namespace TrueCrypt { if (partition.MountPoint == "/") { - Gui->ShowError (_("Error: You are trying to encrypt a system drive.\n\nTrueCrypt can encrypt a system drive only under Windows.")); + Gui->ShowError (_("Error: You are trying to encrypt a system drive.\n\nVeraCrypt can encrypt a system drive only under Windows.")); return GetCurrentStep(); } } @@ -614,7 +614,7 @@ namespace TrueCrypt { if (mountPoint == "/") { - Gui->ShowError (_("Error: You are trying to encrypt a system partition.\n\nTrueCrypt can encrypt system partitions only under Windows.")); + Gui->ShowError (_("Error: You are trying to encrypt a system partition.\n\nVeraCrypt can encrypt system partitions only under Windows.")); return GetCurrentStep(); } diff --git a/src/Main/Forms/VolumePropertiesDialog.cpp b/src/Main/Forms/VolumePropertiesDialog.cpp index 65685ba0..2c2ae114 100644 --- a/src/Main/Forms/VolumePropertiesDialog.cpp +++ b/src/Main/Forms/VolumePropertiesDialog.cpp @@ -69,7 +69,7 @@ namespace TrueCrypt AppendToList ("BACKUP_HEADER", LangString[volumeInfo.MinRequiredProgramVersion >= 0x600 ? "UISTR_YES" : "UISTR_NO"]); #ifdef TC_LINUX - if (string (volumeInfo.VirtualDevice).find ("/dev/mapper/truecrypt") != 0) + if (string (volumeInfo.VirtualDevice).find ("/dev/mapper/veracrypt") != 0) { #endif AppendToList ("TOTAL_DATA_READ", Gui->SizeToString (volumeInfo.TotalDataRead)); diff --git a/src/Main/GraphicUserInterface.cpp b/src/Main/GraphicUserInterface.cpp index 04426bd4..41eb7808 100644 --- a/src/Main/GraphicUserInterface.cpp +++ b/src/Main/GraphicUserInterface.cpp @@ -860,7 +860,7 @@ namespace TrueCrypt wxLog::FlushActive(); Application::SetExitCode (1); - Gui->ShowInfo (_("TrueCrypt is already running.")); + Gui->ShowInfo (_("VeraCrypt is already running.")); return false; } @@ -1079,13 +1079,13 @@ namespace TrueCrypt wxString docPath = wstring (Application::GetExecutableDirectory()); #ifdef TC_RESOURCE_DIR - docPath = StringConverter::ToWide (string (TC_TO_STRING (TC_RESOURCE_DIR)) + "/doc/TrueCrypt User Guide.pdf"); + docPath = StringConverter::ToWide (string (TC_TO_STRING (TC_RESOURCE_DIR)) + "/doc/VeraCrypt User Guide.pdf"); #elif defined (TC_WINDOWS) - docPath += L"\\TrueCrypt User Guide.pdf"; + docPath += L"\\VeraCrypt User Guide.pdf"; #elif defined (TC_MACOSX) - docPath += L"/../Resources/TrueCrypt User Guide.pdf"; + docPath += L"/../Resources/VeraCrypt User Guide.pdf"; #elif defined (TC_UNIX) - docPath = L"/usr/share/truecrypt/doc/TrueCrypt User Guide.pdf"; + docPath = L"/usr/share/veracrypt/doc/VeraCrypt User Guide.pdf"; #else # error TC_RESOURCE_DIR undefined #endif diff --git a/src/Main/LanguageStrings.cpp b/src/Main/LanguageStrings.cpp index 873e6ede..f6b76fe9 100644 --- a/src/Main/LanguageStrings.cpp +++ b/src/Main/LanguageStrings.cpp @@ -55,31 +55,31 @@ namespace TrueCrypt Map["MOUNT_POINT"] = _("Mount Directory"); Map["NO"] = _("No"); Map["NO_VOLUMES_MOUNTED"] = _("No volumes mounted."); - Map["OPEN_NEW_VOLUME"] = _("Specify a New TrueCrypt Volume"); + Map["OPEN_NEW_VOLUME"] = _("Specify a New VeraCrypt Volume"); Map["PARAMETER_INCORRECT"] = _("Parameter incorrrect"); Map["SELECT_KEYFILES"] = _("Select Keyfiles"); - Map["START_TC"] = _("Start TrueCrypt"); + Map["START_TC"] = _("Start VeraCrypt"); Map["VOLUME_ALREADY_MOUNTED"] = _("The volume \"{0}\" is already mounted."); Map["UNKNOWN_OPTION"] = _("Unknown option"); Map["VOLUME_LOCATION"] = _("Volume Location"); Map["YES"] = _("Yes"); Map["VOLUME_HOST_IN_USE"] = _("WARNING: The host file/device \"{0}\" is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?"); Map["VIRTUAL_DEVICE"] = _("Virtual Device"); - Map["CONFIRM_BACKGROUND_TASK_DISABLED"] = _("WARNING: If the TrueCrypt Background Task is disabled, the following functions, depending on the platform, will be disabled whenever you exit TrueCrypt:\n\n1) Auto-dismount (e.g., upon logoff, time-out, etc.)\n2) Notifications (e.g., when damage to hidden volume is prevented)\n3) Tray icon\n\nNote: You may shut down the Background Task anytime by right-clicking the TrueCrypt tray icon and selecting 'Exit'.\n\nAre you sure you want to disable the TrueCrypt Background Task?"); - Map["CONFIRM_EXIT"] = _("WARNING: If TrueCrypt exits now, the following functions, depending on the platform, will be disabled:\n\n1) Auto-dismount (e.g., upon logoff, time-out, etc.)\n2) Notifications (e.g., when damage to hidden volume is prevented)\n3) Tray icon\n\nNote: If you do not wish TrueCrypt to continue running in background after you close its window, disable the Background Task in the Preferences.\n\nAre you sure you want TrueCrypt to exit?"); - Map["DAMAGE_TO_HIDDEN_VOLUME_PREVENTED"] = _("WARNING: Data were attempted to be saved to the hidden volume area of the volume \"{0}\"!\n\nTrueCrypt prevented these data from being saved in order to protect the hidden volume. This may have caused filesystem corruption on the outer volume and the operating system may have reported a write error (\"Delayed Write Failed\", \"The parameter is incorrect\", etc.). The entire volume (both the outer and the hidden part) will be write-protected until it is dismounted.\n\nWe strongly recommend that you restart the operating system now."); + Map["CONFIRM_BACKGROUND_TASK_DISABLED"] = _("WARNING: If the VeraCrypt Background Task is disabled, the following functions, depending on the platform, will be disabled whenever you exit VeraCrypt:\n\n1) Auto-dismount (e.g., upon logoff, time-out, etc.)\n2) Notifications (e.g., when damage to hidden volume is prevented)\n3) Tray icon\n\nNote: You may shut down the Background Task anytime by right-clicking the VeraCrypt tray icon and selecting 'Exit'.\n\nAre you sure you want to disable the VeraCrypt Background Task?"); + Map["CONFIRM_EXIT"] = _("WARNING: If VeraCrypt exits now, the following functions, depending on the platform, will be disabled:\n\n1) Auto-dismount (e.g., upon logoff, time-out, etc.)\n2) Notifications (e.g., when damage to hidden volume is prevented)\n3) Tray icon\n\nNote: If you do not wish VeraCrypt to continue running in background after you close its window, disable the Background Task in the Preferences.\n\nAre you sure you want VeraCrypt to exit?"); + Map["DAMAGE_TO_HIDDEN_VOLUME_PREVENTED"] = _("WARNING: Data were attempted to be saved to the hidden volume area of the volume \"{0}\"!\n\nVeraCrypt prevented these data from being saved in order to protect the hidden volume. This may have caused filesystem corruption on the outer volume and the operating system may have reported a write error (\"Delayed Write Failed\", \"The parameter is incorrect\", etc.). The entire volume (both the outer and the hidden part) will be write-protected until it is dismounted.\n\nWe strongly recommend that you restart the operating system now."); Map["ENTER_PASSWORD"] = _("Enter password"); Map["ENTER_PASSWORD_FOR"] = _("Enter password for \"{0}\""); - Map["ENTER_TC_VOL_PASSWORD"] = _("Enter TrueCrypt Volume Password"); + Map["ENTER_TC_VOL_PASSWORD"] = _("Enter VeraCrypt Volume Password"); Map["SELECT_KEYFILE_PATH"] = _("Select Keyfile Search Path"); Map["MORE_INFO_ABOUT"] = _("More information on {0}"); Map["TWO_LAYER_CASCADE_HELP"] = _("Two ciphers in a cascade operating in XTS mode. Each block is first encrypted with {0} ({1}-bit key) and then with {2} ({3}-bit key). Each cipher uses its own key. All keys are mutually independent."); Map["THREE_LAYER_CASCADE_HELP"] = _("Three ciphers in a cascade operating in XTS mode. Each block is first encrypted with {0} ({1}-bit key), then with {2} ({3}-bit key), and finally with {4} ({5}-bit key). Each cipher uses its own key. All keys are mutually independent."); - Map["CHECKING_FS"] = _("Checking the file system on the TrueCrypt volume mounted as {0}..."); - Map["REPAIRING_FS"] = _("Attempting to repair the file system on the TrueCrypt volume mounted as {0}..."); + Map["CHECKING_FS"] = _("Checking the file system on the VeraCrypt volume mounted as {0}..."); + Map["REPAIRING_FS"] = _("Attempting to repair the file system on the VeraCrypt volume mounted as {0}..."); Map["UNMOUNT_LOCK_FAILED"] = _("Volume \"{0}\" contains files or folders being used by applications or system.\n\nForce dismount?"); Map["VOLUME_SIZE_HELP"] = _("Please specify the size of the container to create. Note that the minimum possible size of a volume is 292 KB."); - Map["ENCRYPTION_MODE_NOT_SUPPORTED_BY_KERNEL"] = _("The volume you have mounted uses a mode of operation that is not supported by the Linux kernel. You may experience slow performance when using this volume. To achieve full performance, you should move the data from this volume to a new volume created by TrueCrypt 5.0 or later."); + Map["ENCRYPTION_MODE_NOT_SUPPORTED_BY_KERNEL"] = _("The volume you have mounted uses a mode of operation that is not supported by the Linux kernel. You may experience slow performance when using this volume. To achieve full performance, you should move the data from this volume to a new volume created by VeraCrypt 5.0 or later."); } LanguageStrings LangString; diff --git a/src/Main/Resources.cpp b/src/Main/Resources.cpp index 2891134c..c9187d72 100644 --- a/src/Main/Resources.cpp +++ b/src/Main/Resources.cpp @@ -151,8 +151,8 @@ namespace TrueCrypt #ifdef TC_WINDOWS return wxIcon (L"IDI_TRUECRYPT_ICON", wxBITMAP_TYPE_ICO_RESOURCE, 16, 16); #else -# include "Resources/Icons/TrueCrypt-16x16.xpm" - return wxIcon (TrueCryptIcon16x16); +# include "Resources/Icons/VeraCrypt-16x16.xpm" + return wxIcon (VeraCryptIcon16x16); #endif } @@ -163,7 +163,7 @@ namespace TrueCrypt #else static const byte VolumeWizardIcon[] = { -# include "Format/TrueCrypt_Wizard.bmp.h" +# include "Format/VeraCrypt_Wizard.bmp.h" }; wxMemoryInputStream stream (VolumeWizardIcon, sizeof (VolumeWizardIcon)); diff --git a/src/Main/UserInterface.cpp b/src/Main/UserInterface.cpp index 9e8179f1..168a35ae 100644 --- a/src/Main/UserInterface.cpp +++ b/src/Main/UserInterface.cpp @@ -48,7 +48,7 @@ namespace TrueCrypt if (!Preferences.NonInteractive) { if (!SystemInfo::IsVersionAtLeast (2, 6, 24)) - ShowWarning (_("Your system uses an old version of the Linux kernel.\n\nDue to a bug in the Linux kernel, your system may stop responding when writing data to a TrueCrypt volume. This problem can be solved by upgrading the kernel to version 2.6.24 or later.")); + ShowWarning (_("Your system uses an old version of the Linux kernel.\n\nDue to a bug in the Linux kernel, your system may stop responding when writing data to a VeraCrypt volume. This problem can be solved by upgrading the kernel to version 2.6.24 or later.")); } #endif // TC_LINUX } @@ -280,7 +280,7 @@ namespace TrueCrypt prop << LangString["BACKUP_HEADER"] << L": " << LangString[volume.MinRequiredProgramVersion >= 0x600 ? "UISTR_YES" : "UISTR_NO"] << L'\n'; #ifdef TC_LINUX - if (string (volume.VirtualDevice).find ("/dev/mapper/truecrypt") != 0) + if (string (volume.VirtualDevice).find ("/dev/mapper/veracrypt") != 0) { #endif prop << LangString["TOTAL_DATA_READ"] << L": " << SizeToString (volume.TotalDataRead) << L'\n'; @@ -354,10 +354,10 @@ namespace TrueCrypt // Unresolved exceptions string typeName (StringConverter::GetTypeName (typeid (ex))); - size_t pos = typeName.find ("TrueCrypt::"); + size_t pos = typeName.find ("VeraCrypt::"); if (pos != string::npos) { - return StringConverter::ToWide (typeName.substr (pos + string ("TrueCrypt::").size())) + return StringConverter::ToWide (typeName.substr (pos + string ("VeraCrypt::").size())) + L" at " + StringConverter::ToWide (ex.what()); } @@ -475,7 +475,7 @@ namespace TrueCrypt EX2MSG (UnsupportedSectorSizeHiddenVolumeProtection, _("Error: The drive uses a sector size other than 512 bytes.\n\nDue to limitations of components available on your platform, outer volumes hosted on the drive cannot be mounted using hidden volume protection.\n\nPossible solutions:\n- Use a drive with 512-byte sectors.\n- Create a file-hosted volume (container) on the drive.\n- Backup the contents of the hidden volume and then update the outer volume.")); EX2MSG (UnsupportedSectorSizeNoKernelCrypto, _("Error: The drive uses a sector size other than 512 bytes.\n\nDue to limitations of components available on your platform, partition/device-hosted volumes on the drive can only be mounted using kernel cryptographic services.\n\nPossible solutions:\n- Enable use of the kernel cryptographic services (Preferences > System Integration).\n- Use a drive with 512-byte sectors.\n- Create a file-hosted volume (container) on the drive.")); #else - EX2MSG (UnsupportedSectorSize, _("Error: The drive uses a sector size other than 512 bytes.\n\nDue to limitations of components available on your platform, partition/device-hosted volumes cannot be created/used on the drive.\n\nPossible solutions:\n- Create a file-hosted volume (container) on the drive.\n- Use a drive with 512-byte sectors.\n- Use TrueCrypt on another platform.")); + EX2MSG (UnsupportedSectorSize, _("Error: The drive uses a sector size other than 512 bytes.\n\nDue to limitations of components available on your platform, partition/device-hosted volumes cannot be created/used on the drive.\n\nPossible solutions:\n- Create a file-hosted volume (container) on the drive.\n- Use a drive with 512-byte sectors.\n- Use VeraCrypt on another platform.")); #endif EX2MSG (VolumeAlreadyMounted, LangString["VOL_ALREADY_MOUNTED"]); @@ -484,7 +484,7 @@ namespace TrueCrypt EX2MSG (VolumeSlotUnavailable, _("Volume slot unavailable.")); #ifdef TC_MACOSX - EX2MSG (HigherFuseVersionRequired, _("TrueCrypt requires MacFUSE 1.3 or later.")); + EX2MSG (HigherFuseVersionRequired, _("VeraCrypt requires MacFUSE 1.3 or later.")); #endif #undef EX2MSG @@ -1018,8 +1018,8 @@ namespace TrueCrypt wstring helpText = StringConverter::ToWide ( "Synopsis:\n" "\n" - "truecrypt [OPTIONS] COMMAND\n" - "truecrypt [OPTIONS] VOLUME_PATH [MOUNT_DIRECTORY]\n" + "veracrypt [OPTIONS] COMMAND\n" + "veracrypt [OPTIONS] VOLUME_PATH [MOUNT_DIRECTORY]\n" "\n" "\n" "Commands:\n" @@ -1103,7 +1103,7 @@ namespace TrueCrypt "\n" "MOUNTED_VOLUME:\n" " Specifies a mounted volume. One of the following forms can be used:\n" - " 1) Path to the encrypted TrueCrypt volume.\n" + " 1) Path to the encrypted VeraCrypt volume.\n" " 2) Mount directory of the volume's filesystem (if mounted).\n" " 3) Slot number of the mounted volume (requires --slot).\n" "\n" @@ -1129,7 +1129,7 @@ namespace TrueCrypt "\n" "--fs-options=OPTIONS\n" " Filesystem mount options. The OPTIONS argument is passed to mount(8)\n" - " command with option -o when a filesystem on a TrueCrypt volume is mounted.\n" + " command with option -o when a filesystem on a VeraCrypt volume is mounted.\n" " This option is not available on some platforms.\n" "\n" "--hash=HASH\n" @@ -1151,7 +1151,7 @@ namespace TrueCrypt " Load user preferences.\n" "\n" "-m, --mount-options=OPTION1[,OPTION2,OPTION3,...]\n" - " Specifies comma-separated mount options for a TrueCrypt volume:\n" + " Specifies comma-separated mount options for a VeraCrypt volume:\n" " headerbak: Use backup headers when mounting a volume.\n" " nokernelcrypto: Do not use kernel cryptographic services.\n" " readonly|ro: Mount volume as read-only.\n" @@ -1227,37 +1227,37 @@ namespace TrueCrypt "\n" "IMPORTANT:\n" "\n" - "If you want to use TrueCrypt, you must follow the security requirements and\n" + "If you want to use VeraCrypt, you must follow the security requirements and\n" "security precautions listed in chapter 'Security Requirements and Precautions'\n" - "in the TrueCrypt documentation (file 'TrueCrypt User Guide.pdf').\n" + "in the VeraCrypt documentation (file 'VeraCrypt User Guide.pdf').\n" "\n" "\nExamples:\n\n" "Create a new volume:\n" - "truecrypt -t -c\n" + "veracrypt -t -c\n" "\n" "Mount a volume:\n" - "truecrypt volume.tc /media/truecrypt1\n" + "veracrypt volume.tc /media/truecrypt1\n" "\n" "Mount a volume as read-only, using keyfiles:\n" - "truecrypt -m ro -k keyfile1,keyfile2 volume.tc\n" + "veracrypt -m ro -k keyfile1,keyfile2 volume.tc\n" "\n" "Mount a volume without mounting its filesystem:\n" - "truecrypt --filesystem=none volume.tc\n" + "veracrypt --filesystem=none volume.tc\n" "\n" "Mount a volume prompting only for its password:\n" - "truecrypt -t -k \"\" --protect-hidden=no volume.tc /media/truecrypt1\n" + "veracrypt -t -k \"\" --protect-hidden=no volume.tc /media/truecrypt1\n" "\n" "Dismount a volume:\n" - "truecrypt -d volume.tc\n" + "veracrypt -d volume.tc\n" "\n" "Dismount all mounted volumes:\n" - "truecrypt -d\n" + "veracrypt -d\n" ); #ifndef TC_NO_GUI if (Application::GetUserInterfaceType() == UserInterfaceType::Graphic) { - wxDialog dialog (nullptr, wxID_ANY, _("TrueCrypt Command Line Help"), wxDefaultPosition); + wxDialog dialog (nullptr, wxID_ANY, _("VeraCrypt Command Line Help"), wxDefaultPosition); wxTextCtrl *textCtrl = new wxTextCtrl (&dialog, wxID_ANY, wxEmptyString, wxDefaultPosition, wxDefaultSize, wxTE_MULTILINE | wxTE_READONLY); textCtrl->SetFont (wxFont (wxNORMAL_FONT->GetPointSize(), wxFONTFAMILY_DEFAULT, wxFONTSTYLE_NORMAL, wxFONTWEIGHT_NORMAL, false, L"Courier")); diff --git a/src/Main/Xml.cpp b/src/Main/Xml.cpp index d70c0f76..027062cb 100644 --- a/src/Main/Xml.cpp +++ b/src/Main/Xml.cpp @@ -93,7 +93,7 @@ namespace TrueCrypt TextOutStream.reset (new wxTextOutputStream (*MemOutStream)); OutFile.Open (fileName, File::CreateWrite); - *TextOutStream << L"" << endl << L"" << endl; + *TextOutStream << L"" << endl << L"" << endl; CurrentIndentLevel = 0; } @@ -101,7 +101,7 @@ namespace TrueCrypt { if (MemOutStream.get()) { - *TextOutStream << L"" << endl; + *TextOutStream << L"" << endl; wxStreamBuffer *buf = MemOutStream->GetOutputStreamBuffer(); OutFile.Write (ConstBufferPtr (reinterpret_cast (buf->GetBufferStart()), buf->GetBufferSize())); diff --git a/src/Makefile b/src/Makefile index 265bb6f2..bc3431b8 100644 --- a/src/Makefile +++ b/src/Makefile @@ -25,7 +25,7 @@ #------ Build configuration ------ -export APPNAME := truecrypt +export APPNAME := veracrypt export BASE_DIR := $(CURDIR) export BUILD_INC := $(BASE_DIR)/Build/Include diff --git a/src/Platform/PlatformTest.cpp b/src/Platform/PlatformTest.cpp index 26d07495..83febe4f 100644 --- a/src/Platform/PlatformTest.cpp +++ b/src/Platform/PlatformTest.cpp @@ -33,7 +33,7 @@ namespace TrueCrypt try { - file->Open ("truecrypt-serializer-test.tmp", File::CreateReadWrite); + file->Open ("veracrypt-serializer-test.tmp", File::CreateReadWrite); stream = shared_ptr (new FileStream (file)); } catch (...) { } diff --git a/src/Platform/Unix/SystemLog.cpp b/src/Platform/Unix/SystemLog.cpp index eea94e0c..ee0e990d 100644 --- a/src/Platform/Unix/SystemLog.cpp +++ b/src/Platform/Unix/SystemLog.cpp @@ -13,14 +13,14 @@ namespace TrueCrypt { void SystemLog::WriteDebug (const string &debugMessage) { - openlog ("truecrypt", LOG_PID, LOG_USER); + openlog ("veracrypt", LOG_PID, LOG_USER); syslog (LOG_DEBUG, "%s", debugMessage.c_str()); closelog(); } void SystemLog::WriteError (const string &errorMessage) { - openlog ("truecrypt", LOG_PID, LOG_USER); + openlog ("veracrypt", LOG_PID, LOG_USER); syslog (LOG_ERR, "%s", errorMessage.c_str()); closelog(); } diff --git a/src/Resources/Icons/TrueCrypt-16x16.xpm b/src/Resources/Icons/TrueCrypt-16x16.xpm deleted file mode 100644 index c4b5664c6be8bd24c4a7dd82acad75ce7193471e..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 4396 zcmYM%Ygg1d6b9h${E8^zWq{DMY106*%%xG`co0R6x=;bRBaAa3AaZ{DN%uRo;$=N# zXJ=<8EzZJ##n-RcU}0)}v3+s0%XZJt#use&aC^iCo1@D;H@X>KyiDH})wQTTZ?UKB zc4}de;!ZDroQ>J&{A%3de3br4v&Qqoz0v&e=z8z8&3a!{Ed9<4!SefaQ}-ETyKLul zd-tRjZ#A9eS&_-s5iYYTt6QJLRi;GNdL34o7Dek>*ko2v_Ghrqf>7=FbU&_JKY(4< zh|qe5EHWVkt@jYlMIk7D01F{S)5brAr6`4IJr8SPgm1kBJK+$&*xAD?a3j)J8$Uk z>8q`08#cKusGnn4<-VkPzfZuq$Lm`#pf0LMiegxyTBwDBm$$OQGm|PGBc< zjGuNEiuU)LEDLEB)q9QcvIsTh--TW}M9^?vH+YfaCK>E;_l>%Z+y_tV2cT2r?51hUMf z)wG}Ia3-Cm{=DeyHLbS_S2Cc!HQ1)>NcH^#mt~H8uehBXcl-|<%U;A-7zi<6G&3{BLi_#k!-|8IT&u~>`hT?BwT`5E7aRhHte6h9!VENzdTho^9^yrKH$J2%L;1Pj$*y+v}`Z|>+k zR^Y0V@Eq(b>!_d0uuG=;1i2DbaJ1jNvv>476mV8~#LM1Pe+lPlK0SXGT&N8BRA=F6 ze>JR>baY<28!xb425VJey`OMUjiY{Cb>qs@{5{yJ%G3TwowcX^T>PEy=|0?$Q@_2V z^SHKy(Yxq|eKN;VFn_45^8M)Saa=(AT zqPD2-6`a+Lr}Ow1cDllO+HStYeR~fZU83I(4q7|f-zQjVf%OfXep(>^Ti9yl>HX#5 zT9=;s9bm01PtVu$KA!sf0&cWMKUZO&O#NAdovxAZpDx~F{nun&=+Mx8dkJeJ(eHPi zOT>SKy-}X-*Cycdw9?}Am7v8)USEiID!5x!7BZSk@~*~YnS7^ zS77f-+_yQ{xyk)lhU@eJfzDHO^C$W8&P7AdN72pCQJ;hxSHNXAUN%&3)s0t}ugI=& z>44gwuQgn|&`^IgTsj}<`N-gqK2Fei{)DZUf$sAa?0p{S{_l}};Z>mfJAzB^;fu~L z(D~oM>1hx2yj;T82joA3)6)@X{UIEhD$x0FlN;HnK=*6hSqHj5-(l4ljPJv`X)ynQ z9MZ=j_zKH|%9Ii`m@Uh;9gir-Q_j-5@`T4CdO5f@_>XH(2&{GDpP1J%F?~c-+ Rxs+i#{e8~vPu(p|{SR?Xeii@# diff --git a/src/Resources/Icons/TrueCrypt-48x48.xpm b/src/Resources/Icons/TrueCrypt-48x48.xpm deleted file mode 100644 index 26837fbcc43fbc18d6477851bf69aa92bd2138bc..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 8073 zcmai&Yg-dZ6NbO2;XC z**8zj&p#e_%+>Jl;@BJ?4L==UnA5@8$=Uf>myO?kJvx8;b$ESrBHP{%Q^Ws$7Mt$< zMOoR-l`&(?z&!BuKL+m`>*TH%S1R{Kj{VGQ5|z(%JPEQaRe4Kfzlr0zP@!`!x^GgE<0^|A7w=5R ziC*PoPvkPHqISP;B70u9N?m-ebbcD;Rjm6Rsoca-ovVDV^P?cnoPIJ7`vA1v??&X1 z-5R(4Qs;Xh;N}lS_Pwwy+x;YNMx@Hqry}9L}jm=B+lL+B4d5GcJj53=Ruvj zcu{|h=TT8Pd%wH&ei6IWTduA{X6qg7>D*52J4B z_Af;Cx`CHE`K8Edmgj9gmOAdC-|2hZ${?!xbCIJs&D!`r7dh!>d7Cel$eEWn?S74} z7kzI1s>r?{R)wqgry|!82)Ot@6FH6Zv|ZoR^^*UtKG$`98l{zs&$fSa#kvaZTDp8FzuMd;@)pWlewO=1{H@%$-rO*XglZ$(b?ylCV9OXM<~)Vo#w z4uhn0@w3X`Ra3Y2Smp1mED~q0RsIgLBx&a>f5V?~ruJCn@60ber_U;X7hc)&i=FVd z7ixZ3he{M{r?;rz8Ne^cIWz4ABN@6~R; z@^|8qK$<^R`J4Q$3pZc++mm|Me6-5n@L`#{^~&E-krpn0tnzn~V6NLw`P<7w{uex~ z@^@O~Wg8FWZ}=rC+_>X!sekQHR{1+hfA6pS?RkD2x&0k~$5B{nK3e5(@)rYDpYnGS zW@T%S@;BMg_9N@~yNDXsU#;?YoM%w1u2=rf6T<1@q5O^ib?Wd{{?>X|zO|0OrGIOE zS>gYtLn*ATewr~C~cfr!e=-&xH8$>F8^Eoij!mA}CwO1FKUw8(@bp55zw&pUmhE}RDu2uAu5$UU{9Qx; ztv$-$YQNL3{9V<*`AYd)?REK}{N2zl+V#rcG@nVnDSu;MkUM?K-+A+!uav*LRpPb& zDSwxFHHoM4H|-P3)_5v^!yjel;;sBG=ZW0O%HN!hCip0S7jZe+Px)KV7Y={rZ}>IJ z9RDbP6TdK0zV9o4N8L1b=bOIrxAL9VOJDh0_^s6SedX^o$YD&ex3Byihm-Sp-|=@- z5CR=n{#L%y{Oc=!(~jHoNniO}`APGsul%j{I{TErgKiSIeC`W>Z=RhVu{k#hy=08_ zmeKD_9y4zvGwiR}hPQ@i&dwpt*)?-$M*S5tw6&S%o5f!Y>R7{$ z*SfRpC^3q$sLyvDnXwI~`N3SeJvNe2<{O_wy5W@#IWs)9 z7v_z5W>4*oePz$=`~Cx4arQaFp98x=jF-SHA)<}lLd(un9lqc}48}y^+PtyzcGkxB zjs0%Fn+x;KuISra)3=Z0&F8bCvmikrgxVgM4T!TG>p%xS?MzNy*)(7 z7h?0sK4Iq%_QXE6PkDR9sp<#16Rdiuh!JITX5ZPhX?`%)fO*HhCJ%kQmQ2lve`;P> zpOFnt4lm3aeEq@xWxug|2G&=0iR#f@03YzMi}qlujsyH1;0rZG2CWc@SL`rm_hX_x zLSskbPCPub0PbX*jZJO`MD?fS9P182+3}j^QeyQVcnsKs>;;(xaFxs&61Q`D*%g?+A!=LbiOoOuTs%R~f)Tr} zm3^0CmGe7eb%4bKc89aEe#YELMw-9PNBh()5}iqPub78+lket0YC-Bl*a6>1tRM9s z!Y)(m9G>Omi)B)U8Ebv1U{~k%3bfnm=DxHfNQ0IS4 zKA4m|rem3oIR%4xvk%sn=A5oDCO>-g`-iNZ%2&*fsoVtYB09|ijCf=No*@>?8Rt1S z+Y4AdLBo4KR}8g8OkZIaJfxlox8K3L%oA?k1o?UV{Y*S&$@CQ>eg@*l=2nqDG|!1& z(l^BL7WR6nta89QIyCm(;?>k1MO@_uD7|%u9wl0Sl7~GQaf7$9$;~gi)f?AW1I_MbGtJKCSccL?Jl)k2H_t{#~Y zkd1rTF^6@x)APz4l0z}pBye|+PO-rgz(4Eo?EyYMhyT8tKk=mprwBWKAqV9=u_>I* zJN<*K+A{vMSb?;3%^Ktz{M{ld17a{DW8bmQ6&*#`{w@2@z+X50SI86s$kJ(91dm}tvM$4`uu>^Omqrc0k`!9HW3qMcE?AUA*(Iaz&9V1~mbj)Gh z9W^MCyJZusUI`oV(=TGJZ5{4X8gwaGc;k~j~k zjTNfQfO!nYJaDYz_V3)K$OiKco-9G{jL{=Ff^(u;M~|9bA6U;B5iItILTMvu_m&oV=8duqUo7oF^)MG981?jcq^K{Ht!DCfUfy(W|y94TCS&*jk(ze6yz{Y!e z&f37ARn6xkc!3)gYv=Id-1Mg96*-h>eSinn91-^uYI0c_{fT*O3$62y+(O1M$tNmh zn=D`N&w|{RR26va*e`e1$3C`PNe(je28{#oSwz!?ePsTIyApma{nvyVs~IA+4-VUS zGDEF?(aNO;!Rh=CPTVJ=SLoRz!?+(wwor+$>495BpB~9s>xf=8lv?H#bt`u*sd=7& z98a)m4h?tYu5c$0H)DKG;90pDa%SRb$TYc!x_eB+xZJ3PXXQR$!`FhP+~47nyD*oX zSVyOItHEDy-FP5c_+!NJyWRO66V0o`4{;rt>b``o)e+*QV63`+JS_%l_)m*iSqU_&4S67r&-HFt7Q| zhH;f;#tUYob{l){s6leVCl`0&hi!CS@^{aC=PC91&W_*Jg08ax9s0)3tyRpEuC+M* z3`cg1V1+Yc!!H1^9S?8%Dd!Xz>>Ergaw*^QDblula(ej6yPRPBJMV*%BlBSQj(KC5 ttu-Q&-0`RvSgFVNXP_ddT6y?YflvAK8C&Fc1oux;hd?H_#~#~k!n3%gEtGC_K|s?qEwpS+LV>dU_B%PR6X;c? z>Jk*<$M4zCI5cYXZfk>TjnR>Auh~0nQS0=i+oRS&vqQD*cBg4NS7*I-PeXMXs-0b0 zq3h9+M$HS4&W}&J)H%KA_AgF5{*O27*3a6V`q|-S`-uIHhl={Yk)&vRVRU4i=${sC zo}RS%O7yQL3SHPDXE4t|E1hcS*8pOV044?sr6rq80;D?AF@vcANGmW6ka(vssSUuu z>B;~kRg^jdPAp@mOAJhCq%Ik(0%&7Q%3uK?Hi-!t%m5hU42qiraHcc`E5-n<2T&nCiMzhH-Kwu*680<07p_Teuz`(?VW-Pb z^b zbb+<3Pz+q)LW?|7C^DN@d1L^wO)RR-0aCAk(*U5KIwsd-U?L+8^7sTr==*_Tw-~tC zB@SEo8471hiw3m;jI|a${c^8BPrm~6Gey_~fZXZ|95QgBi>l(jL6Hvo@tuL+!ol>9 z7-*}VM%ZI0Qj?j4J9YveiSGweKV{%+Q4Xi!48Xf^@bLp6bD4vW4uJGV=xG-qa?+t= zy#a_UI(E*$I{(7-e=;acQ5IP33kH61;{vn2gd+2&4uiU4V3e-~nf?OEO;N3O!N5j- zgOHd8NNj3hVgRhq1I1YezE(qW}a24&)3$m0)?MQYOO z>_34*`^n&VJY`Viz5xKwU=o?wU@jXBtn`CIPdB0HKQ0jEITUJG+!jE8KQO2l0EJ&E zH2Eb!e@`)&R}6e5xrX9310583hOln{q>c)-a2qD22~!N}Er9gwRZjO9`0tKL zAxeWmS(aIfXV5GZ)|e{weFoYUI)KR{1C#0`Kpx8sk}%FA6t@E(u~7=szhzLGGRlzY z4FmsJlL<^h1}4*4gq4Z_{8C0JpZ@a0&$hp4=>LiY&C?o9&?HUKG}ZinJM}8W15Zn| zN((eYb2LVGbnQRw{#Ud|4VtBWTJ*R3f@RvFTe@M{&{IeeNs9fAgcPNeQBDChe;0kC z7Ja5ReW9;(K!@~=zS9vM|1LVAQ#zv`)S)i*=$wAi1zpnBL(wlPNR#omEjcRb5k01L zdO}a>nU_^LHEDx3={arD3wlYf=rz5eZF)=Z=>5Iu1AQbCLd=UbF(D?!l$aJZu_EeX zNen%$iUlzv=ERt|6W3x_?1_e$75idQEZ>VbzXxwS;#S;e89fJr9jY{F;1rTVL9)@yIL=ef_j zwYI&(Z%S2CsZ=F39v%=M7iPu4@UOqz+-~0l ze*rzs-v)pEmFvmEC0Lr||Au$S26>gq$mx&I5#Gvicmgr?rxC9FB z(htxm8hOc}3!qsvEqLpIiY1jE7u28GwQ5&;B7STuNGF+fvLY|wX<=P#%=^~ z!XR$NQS9?LP8pDU3hR$EfQrHaOL@*9^Rrfl>0dy?&jaiAO9q9BLd3@vB;34_LB}<8 zWLc468EzoaqJ_dZZULe^wJUcA5a(GQ@<{IiQW`5F=mEg2Ex=<93Jab(U7+I|fSE1E zkuu2KtdU|zWen0d%~SX^N0*|#kqZWK8s{<0mgo|strQNb7*PDQ3T%(bjt&If6o5$= z2#0Bav_0E*b(eaiGYn`Mf(&8#9-wMFc@|xAiVqBZt^+XJd4Q}v{RM!u4Hg07wojJ; z8o8IjLCXxXoT3a?Rv1tW7B&i38Kfz>5N6jHL|Ifs03V>EmBksh=||`=$p8!Wi2)6( zp3CPNRCaP-08E@Bw1qaMAop_Lj#M*9Ga3gLN>n+y9fGZHzWq?6$auDV+4jm?;ARLAu(QJ=&lmP`@n!+Cw0A}d$*dTPc?Jd^Z z0T@_+4eEW{#UL-+4tj%x83*F@8K6Z;7@KgT2C)U30A*1X@YpZ|${(@KAAJncM(V|g zk1cdDnGRM)02+m7Yt$G6Dh0VM1?$iercnw9y#i!uVK?Cm14=k`qHi!Lj8deWCO}b? zg{=($CM*Gb25FFn)=I!2Yi3@G(iozP$*1so3laszI&?$;jjUK+XFgW=@ab0ul#wI5feskNZrqIEk3$9&gQ<+iiiyA-y3A3XBN=VQ#$a<`TgxOKpx03)S^;?tk62Rn=4uFKLK|Otk z0as-Bw3|WPh&{Urdl*Dj+=yUy01_FU9T2$V02N&%ATh*%NLw^HkmURR@12hO=`Wp<=X6oBSzsZ2& zqiGMD!whKGmNw<|0c2Ef5rta-E@ey1c7#FdQ|8Ce#~9Ehp{Q#^Em2SI6%sMk5A2s0 z1~e0|#B3W3DvuhJHX%_}Zi%^g04>^;*rq;!U;0)@0N}Mj*a7fZ3!vF{VZ?y0h>;D; zm;oi}EJJy98Bi{)?D=$?0R?~42LBFpn6o83whLgCVlI2=lBK0R)a)~$!kF5-*jEO$ z)(u;<4xq!OD73YK0d3O2X51rmiRe6rtbL3wCX(T?69#-9!^)j9pbS*hwE+_5Y>Ci5 zheWG=!Mk8kHK@UbmjHg{SJ=o`3`&|?iRoVhgj5^g!W#fHbok?z0Uagko5dZ2)J>Z) zW_!5g!Jw$xDW`-EQyQ@=D+ZK5n%3)+(Baax8snIP4pThn^G7vcQ1m8mCy7MFun#*Y3(CNR;G4gu^m` zM+Y!Cd4&Px?D|T)3W+?eQut#HAS5eT><)lO=$OWJov+XxG-~6?D7-m{%qk*fRq<^wa^f0bq`SSh-CA8c2!N9|oX&YELMA45&1^HYsf} z;B5*WBMj)&=h;)=7$j)B*jEJW4EVhRT=-h+sCVT{-K8!`4RkTp6jqv$Xwk|bEWKL7 zx6}6-@P!vK7NAR$uA1l)GT@h8P}+hHI-c4njG!Z?QUHI%&=HVXtgQ>+(H#d$x6#F1 zG@*2d0p$)VQ7`!F-XHW4dAhR2DDAn7;F0g5Vyf21M;Y6o&3arg06lo z_YJ^YMWHlhKquHBM=8hv%)2dE$pOr3D1<{%gZeI3GBBZS&+8R~Ru#7FTqYS*S=F@3 zaf$)I>x0s129$70d)#;j3F9$r^%(|q6Lalx<2?h4ur$V8W&yI2-fr<*xH*8bY}vd% z58%_*$3iVIpwRbh#$9AU$-%R;U1C7hv|-;$E;FbCdZmPbS%D67O+fIkqDvfS_NChz zgD|C|fxR~{;I}=P{zvGbsI1>90aWd)*XIsEru)Kxc2vE^gyh;_ULwGXX26k*ZK@bl zRYgZOc2L5As!OB(eFKBY>;|m9!+`EDp^ejS24z4lgq0o!Ram+9b?E>=TKV>@J>CJx z$wL59RiDO30sOLlPdC9J_2^)PupDH-ujMeXUIygi%wAXep~ItF6V|p1I?N>z>+;4R z%)%b(Phlu8yEyB9ogXIO$M!;Zq1nOFarw8!v3zH55R0>NNfQV1Yl(Zz`WOn z(lG#Y(}LOcTB1JmzA}hC@;j#g!hoWozRfoP$||>~&n7^N0uv7MYKgk6`8CMx!6>Lf zX1jy{MOA}V4N`mehye1c25|>qo4Np5728wrHUOQYZCLKq5|Pc?y8tE}Y;9l=`e7@C z(tQSA<~Mx!<0}JtL*RMXga?rDz1YKI9|Gj)lVGy{1A0U!% zAyEX402}!ZAfq!JBIv#Y5MvJ=9Z>qnfIOPo()h%n)oA%GNPJ^Z#Z|+m&lI3l#v#mR z0A=ObSkG-2%CIn70Jvo{fImtGCA~4S9;*Q8_k?!OO)@CxMB-r_Qvfbi3#`jDgFMPw z4Q#P@0B%|~Ft8a0S(Jt@0_Hs==ocj}BxV^pqLzqn%1X)l7kdO>G zJ}?dkfU0;1rQHA~KG3DdcA@w{tPcRtsV{(o#u@l6KeO>M#DHcNTNjQ31msgFod7US z1{eg0+b-h{6K6DHNm}Gzm z>SGX8VKYS9+G0QzsIV1igaP@~wR>)?qXSM}XW+SB=wUa!GH9lR;Pn?sn7~C?HUNx+ z5Mxb%R=du50I7NH#6jn`fpt&-khMJ)0+{Jzwk-y{a#+d;z$1i_#sCeU5*b@@0gO)p zwmV&rlXn0LN`6?VT?RoIL;?J<$ACSCaqKgogJtE}+5k{e3_IN1ZXCEm()cIfE*qwZ&X67&PPdNG}0$N;;U!6+qDj z*8nC5LE@$cb(h<^OD%B+P_@(6eMbVbePB>UWo6&gJk}t#ar#t)(w?=y0njbl?%Ncg zpsfy{W&m+nv;cAdQwp#f3I=&2t?Z?!WI*TBz$WR6K}o+n2+?H{I#Rkfz=cx)WmW%v ze;OdGJp1PA9Y9zX_TR(I05r;$J$}7sK(~E2Lcq)d_(g0h;T!|{JwP)=B+mmxbeYF~ zSpe|zFo47&1G)n=Y*k-sOW1<54A9C08>cG_!XRkc>8~YW z2~Im{=FDr20iPL{oUe z7l8;#T}wnF7A`&8^l3-Xzucs@C-&*5ui}7=9Eu}x{DYaF8aWZC;!K>23vnr~#I?8) zx8jc4y?79h-0sDbZFltl2{Qjpq#_eJ&9nGtMoLkMNiij+#XB)0-iujkbKK^|f|#fF zKnBqk$w)|Z*$_)&ndY)0R{x2SHSs}w6raRr@kI!&wI`HLbVz19?K6FEOrt4n+*k>z zE8*yFJ@yAPKXF%&9?;`@jvO$gNA-lB6oc9{T4LQ#?TlP$+NkK#6EpxtKFY&i~5z+m^MP+nAXr6_OppHGlUIVjf%phsXgug zy^%nNH2Ri~bWG}`e$y_uee%52AH}xb(XTXeW4bnO2C%C~#hyMC`}*tO89C4wBGiZa zNFUSmjRQtZlG-8}U!+-X zvdL3B1T&0KJBre#>QMt~Tn(uk@t{Z5gz9+g4@L$_?K6dBqIy-o>QZmiX2?yZJu5U# zGN$3rpy<&XYEuoXKDDJr)Ug;-l~~m4e{SSey{KcoN8Y{G4b@bhTGqZYE#N1h??Y-` z)LPUQb);hDs%^EScGaHRS6|hEIunQL=+BHCs}psq&eXa3Mow7P7wVD>U8!7Ot7|fA z+M&9kwoKoecB}5xz3LGU>QOzZb^T4HDpR>CRH>@AneW^+sixF8C6z0RE03N{QaY^~ z>YbWVOS+%Ty{9&-=G2A0(DU^3f?8BdYFVAqlCO}PR@IvNpgyWW@kxFDxsfmGOn*`b z;*i4Bgy#ws#}NwXMLnygDN8m?B+%bUBB?cK-JGO5=}88XeG2M9%3(`lJQ+&5)o606 zCz5*Ue>an3F_>KF-lRY2N|wZ1;^}?LMH%Nx#}8+2N!w*-A!| zv1C1YOHL@Sx5oEjx@;wIb4dp$+&+es3&o6P9Fq(zIq zpX?`JlY`_i3Di+?oScx6)8s5UPcEokCRfRI;w3l9ZE}}v>H8mzJS3;;F?mXI@hv$M zX_6&*QX~g7r#`CY{Z!v)b(y@;r#>pRXR1mjlc{7nd6?~~bNE}2gj$jD-{lq@Gz zvXZR+Xk;zo1cSoU$-l4v7xM2>M=r%!0>@>Sj^TE57JY)Vi1 zGLWHc$w0itIW6DG8Tnq$(zkPR{zoGVa*^ACT%xutSLCW(BeNgmM`}m% zll&~d@F|aym6JG{JmomuPLDI-{LIL>^HU>3&M37BXO+}H%R#5t>36!EkMhkqkKK=;$X+sZ=p50Ej-5ezJm-WypE_q`O3U-V zG*X)oKf9P-IG46vIakg#w;Sh{n)$pS7vvrN|DKFIIFEm^CUBMc`*$JSf&c82mQT(% zCv`F>|HHx;j)|_0mjA#==~T|7Gv!P>@0=Ouy))~~IrGkfv*;{2%T8(6!g-0^px{)3tPo$Ai_{~GD|;vana?RE6mU;Y=7Tp}g_ literal 0 HcmV?d00001