Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Upstream-Name: veracrypt
Upstream-Contact: https://www.veracrypt.fr/en/Contact.html
Source: https://www.veracrypt.fr/code/VeraCrypt/

Files:     Tests/bench.bat
           Tests/test.ripemd160.hc
           Tests/test.sha256.hc
           Tests/test.sha512.hc
           Tests/test.streebog.hc
           Tests/test.whirlpool.hc
           doc/EFI-DCS/dcs_tpm_owner_02.pdf
           doc/EFI-DCS/disk_encryption_v1_2.pdf
           doc/chm/VeraCrypt.hhp
           doc/chm/create_chm.bat
           doc/html/BCH_Logo_48x30.png
           doc/html/BC_Logo_30x30.png
           doc/html/Beginner's Tutorial_Image_001.jpg
           doc/html/Beginner's Tutorial_Image_002.jpg
           doc/html/Beginner's Tutorial_Image_003.jpg
           doc/html/Beginner's Tutorial_Image_004.jpg
           doc/html/Beginner's Tutorial_Image_005.jpg
           doc/html/Beginner's Tutorial_Image_007.jpg
           doc/html/Beginner's Tutorial_Image_008.jpg
           doc/html/Beginner's Tutorial_Image_009.jpg
           doc/html/Beginner's Tutorial_Image_010.jpg
           doc/html/Beginner's Tutorial_Image_011.jpg
           doc/html/Beginner's Tutorial_Image_012.jpg
           doc/html/Beginner's Tutorial_Image_013.jpg
           doc/html/Beginner's Tutorial_Image_014.jpg
           doc/html/Beginner's Tutorial_Image_015.jpg
           doc/html/Beginner's Tutorial_Image_016.jpg
           doc/html/Beginner's Tutorial_Image_017.jpg
           doc/html/Beginner's Tutorial_Image_018.jpg
           doc/html/Beginner's Tutorial_Image_019.jpg
           doc/html/Beginner's Tutorial_Image_020.jpg
           doc/html/Beginner's Tutorial_Image_021.jpg
           doc/html/Beginner's Tutorial_Image_022.jpg
           doc/html/Beginner's Tutorial_Image_023.gif
           doc/html/Beginner's Tutorial_Image_024.gif
           doc/html/Beginner's Tutorial_Image_034.png
           doc/html/Converting TrueCrypt volumes and partitions_truecrypt_convertion.jpg
           doc/html/Default Mount Parameters_VeraCrypt_password_using_default_parameters.png
           doc/html/Donation_VC_BTC_Sigwit.png
           doc/html/Donation_VeraCrypt_BitcoinCash.png
           doc/html/Donation_VeraCrypt_Bitcoin_small.png
           doc/html/Donation_VeraCrypt_Ethereum.png
           doc/html/Donation_VeraCrypt_Litecoin.png
           doc/html/Donation_VeraCrypt_Monero.png
           doc/html/Donation_donate.gif
           doc/html/Donation_donate_CHF.gif
           doc/html/Donation_donate_Dollars.gif
           doc/html/Donation_donate_Euros.gif
           doc/html/Donation_donate_GBP.gif
           doc/html/Donation_donate_PLN.gif
           doc/html/Donation_donate_YEN.gif
           doc/html/Ethereum_Logo_19x30.png
           doc/html/Home_VeraCrypt_Default_Mount_Parameters.png
           doc/html/Home_VeraCrypt_menu_Default_Mount_Parameters.png
           doc/html/Home_facebook_veracrypt.png
           doc/html/Home_reddit.png
           doc/html/Home_utilities-file-archiver-3.png
           doc/html/Keyfiles in VeraCrypt_Image_040.gif
           doc/html/LTC_Logo_30x30.png
           doc/html/Monero_Logo_30x30.png
           doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step1.png
           doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step2.png
           doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step1.png
           doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step2.png
           doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.png
           doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step2.png
           doc/html/Protection of Hidden Volumes_Image_027.jpg
           doc/html/Protection of Hidden Volumes_Image_028.jpg
           doc/html/Protection of Hidden Volumes_Image_029.jpg
           doc/html/Protection of Hidden Volumes_Image_030.jpg
           doc/html/Protection of Hidden Volumes_Image_031.jpg
           doc/html/TrueCrypt Support_truecrypt_mode_gui.jpg
           doc/html/VeraCrypt128x128.png
           doc/html/arrow_right.gif
           doc/html/bank_30x30.png
           doc/html/flag-au-small.png
           doc/html/flag-au.png
           doc/html/flag-eu-small.png
           doc/html/flag-eu.png
           doc/html/flag-gb-small.png
           doc/html/flag-gb.png
           doc/html/flag-nz-small.png
           doc/html/flag-nz.png
           doc/html/flag-us-small.png
           doc/html/flag-us.png
           doc/html/flattr-badge-large.png
           doc/html/gf2_mul.gif
           doc/html/paypal_30x30.png
           doc/html/styles.css
           doc/html/twitter_veracrypt.PNG
           src/Boot/EFI/DcsBoot.efi
           src/Boot/EFI/DcsBoot32.efi
           src/Boot/EFI/DcsCfg.efi
           src/Boot/EFI/DcsCfg32.efi
           src/Boot/EFI/DcsInfo.efi
           src/Boot/EFI/DcsInfo32.efi
           src/Boot/EFI/DcsInt.efi
           src/Boot/EFI/DcsInt32.efi
           src/Boot/EFI/DcsRe.efi
           src/Boot/EFI/DcsRe32.efi
           src/Boot/EFI/LegacySpeaker.efi
           src/Boot/EFI/LegacySpeaker32.efi
           src/Boot/EFI/Readme.txt
           src/Boot/Windows/Boot.vcxproj
           src/Boot/Windows/Boot.vcxproj.filters
           src/Boot/Windows/Boot.vcxproj.user
           src/Boot/Windows/Release/BootLoader.com.gz
           src/Boot/Windows/Release/BootSector.bin
           src/Boot/Windows/Release/Decompressor.com
           src/Boot/Windows/Release_AES/BootLoader.com.gz
           src/Boot/Windows/Release_AES/BootSector.bin
           src/Boot/Windows/Release_AES_SHA2/BootLoader.com.gz
           src/Boot/Windows/Release_AES_SHA2/BootSector.bin
           src/Boot/Windows/Release_Camellia/BootLoader.com.gz
           src/Boot/Windows/Release_Camellia/BootSector.bin
           src/Boot/Windows/Release_Camellia_SHA2/BootLoader.com.gz
           src/Boot/Windows/Release_Camellia_SHA2/BootSector.bin
           src/Boot/Windows/Release_SHA2/BootLoader.com.gz
           src/Boot/Windows/Release_SHA2/BootSector.bin
           src/Boot/Windows/Release_Serpent/BootLoader.com.gz
           src/Boot/Windows/Release_Serpent/BootSector.bin
           src/Boot/Windows/Release_Serpent_SHA2/BootLoader.com.gz
           src/Boot/Windows/Release_Serpent_SHA2/BootSector.bin
           src/Boot/Windows/Release_Twofish/BootLoader.com.gz
           src/Boot/Windows/Release_Twofish/BootSector.bin
           src/Boot/Windows/Release_Twofish_SHA2/BootLoader.com.gz
           src/Boot/Windows/Release_Twofish_SHA2/BootSector.bin
           src/Boot/Windows/Rescue/BootLoader.com.gz
           src/Boot/Windows/Rescue/BootSector.bin
           src/Boot/Windows/Rescue_AES/BootLoader.com.gz
           src/Boot/Windows/Rescue_AES/BootSector.bin
           src/Boot/Windows/Rescue_AES_SHA2/BootLoader.com.gz
           src/Boot/Windows/Rescue_AES_SHA2/BootSector.bin
           src/Boot/Windows/Rescue_Camellia/BootLoader.com.gz
           src/Boot/Windows/Rescue_Camellia/BootSector.bin
           src/Boot/Windows/Rescue_Camellia_SHA2/BootLoader.com.gz
           src/Boot/Windows/Rescue_Camellia_SHA2/BootSector.bin
           src/Boot/Windows/Rescue_SHA2/BootLoader.com.gz
           src/Boot/Windows/Rescue_SHA2/BootSector.bin
           src/Boot/Windows/Rescue_Serpent/BootLoader.com.gz
           src/Boot/Windows/Rescue_Serpent/BootSector.bin
           src/Boot/Windows/Rescue_Serpent_SHA2/BootLoader.com.gz
           src/Boot/Windows/Rescue_Serpent_SHA2/BootSector.bin
           src/Boot/Windows/Rescue_Twofish/BootLoader.com.gz
           src/Boot/Windows/Rescue_Twofish/BootSector.bin
           src/Boot/Windows/Rescue_Twofish_SHA2/BootLoader.com.gz
           src/Boot/Windows/Rescue_Twofish_SHA2/BootSector.bin
           src/Build/CMakeLists.txt
           src/Build/Packaging/debian-control/prerm
           src/Build/Packaging/rpm-control/prerm.sh
           src/Build/Tools/MacOSX/yasm
           src/COMReg/COMReg.cpp
           src/COMReg/COMReg.rc
           src/COMReg/COMReg.vcxproj
           src/COMReg/COMReg.vcxproj.filters
           src/COMReg/COMReg.vcxproj.user
           src/COMReg/Resource.h
           src/Common/Common.rc
           src/Common/Inflate.c
           src/Common/Inflate.h
           src/Common/Language.xml
           src/Common/Lzma.vcxproj
           src/Common/Lzma.vcxproj.filters
           src/Common/Lzma.vcxproj.user
           src/Common/Lzma_vs2019.vcxproj
           src/Common/Lzma_vs2019.vcxproj.filters
           src/Common/Lzma_vs2019.vcxproj.user
           src/Common/Makefile
           src/Common/Resource.h
           src/Common/Sources
           src/Common/Textual_logo_288dpi.bmp
           src/Common/Textual_logo_96dpi.bmp
           src/Common/Textual_logo_background.bmp
           src/Common/VeraCrypt.ico
           src/Common/VeraCrypt_Volume.ico
           src/Common/VeraCrypt_mounted.ico
           src/Common/Zip.vcxproj
           src/Common/Zip.vcxproj.filters
           src/Common/Zip.vcxproj.user
           src/Common/Zip_vs2019.vcxproj
           src/Common/Zip_vs2019.vcxproj.user
           src/Common/libzip/NEWS.md
           src/Common/libzip/config.h
           src/Common/libzip/zip_err_str.c
           src/Common/libzip/zipconf.h
           src/Common/lzma/7zTypes.h
           src/Common/lzma/Alloc.c
           src/Common/lzma/Alloc.h
           src/Common/lzma/Compiler.h
           src/Common/lzma/CpuArch.c
           src/Common/lzma/CpuArch.h
           src/Common/lzma/LzFind.c
           src/Common/lzma/LzFind.h
           src/Common/lzma/LzFindMt.c
           src/Common/lzma/LzFindMt.h
           src/Common/lzma/LzFindOpt.c
           src/Common/lzma/LzHash.h
           src/Common/lzma/LzmaDec.c
           src/Common/lzma/LzmaDec.h
           src/Common/lzma/LzmaEnc.c
           src/Common/lzma/LzmaEnc.h
           src/Common/lzma/LzmaLib.c
           src/Common/lzma/LzmaLib.h
           src/Common/lzma/Precomp.h
           src/Common/lzma/Threads.c
           src/Common/lzma/Threads.h
           src/Common/lzma/lzma-history.txt
           src/Common/lzma/lzma-sdk.txt
           src/Crypto/Camellia.h
           src/Crypto/CamelliaSmall.h
           src/Crypto/Camellia_aesni_x86.S
           src/Crypto/Camellia_x86.S
           src/Crypto/Crypto.vcxproj
           src/Crypto/Crypto.vcxproj.filters
           src/Crypto/Crypto.vcxproj.user
           src/Crypto/Crypto_vs2019.vcxproj
           src/Crypto/Crypto_vs2019.vcxproj.user
           src/Crypto/Makefile
           src/Crypto/Makefile.inc
           src/Crypto/Rmd160.h
           src/Crypto/Serpent.c
           src/Crypto/Serpent.h
           src/Crypto/Sha2.c
           src/Crypto/Sha2Small.c
           src/Crypto/Sha2Small.h
           src/Crypto/Sources
           src/Crypto/Twofish.h
           src/Crypto/Twofish_x86.S
           src/Crypto/Whirlpool.h
           src/Crypto/chacha-xmm.c
           src/Crypto/chacha256.c
           src/Crypto/chacha256.h
           src/Crypto/chacha_u1.h
           src/Crypto/chacha_u4.h
           src/Crypto/config.h
           src/Crypto/cpu.c
           src/Crypto/cpu.h
           src/Crypto/gost89_x86.asm
           src/Crypto/jitterentropy.h
           src/Crypto/kuznyechik.c
           src/Crypto/kuznyechik.h
           src/Crypto/misc.h
           src/Crypto/rdrand.c
           src/Crypto/rdrand.h
           src/Crypto/sha256-x64-nayuki.S
           src/Crypto/sha256_avx1_x86.asm
           src/Crypto/sha256_avx2_x86.asm
           src/Crypto/sha256_sse4_x86.asm
           src/Crypto/sha512_avx1_x86.asm
           src/Crypto/sha512_avx2_x86.asm
           src/Crypto/sha512_sse4_x86.asm
           src/Driver/BuildDriver.cmd
           src/Driver/Driver.rc
           src/Driver/Driver.vcxproj
           src/Driver/Driver.vcxproj.filters
           src/Driver/Driver.vcxproj.user
           src/Driver/Makefile
           src/Driver/Resource.h
           src/Driver/Sources
           src/Driver/veracrypt_vs2019.vcxproj
           src/Driver/veracrypt_vs2019.vcxproj.filters
           src/ExpandVolume/ExpandVolume.rc
           src/ExpandVolume/ExpandVolume.vcxproj
           src/ExpandVolume/ExpandVolume.vcxproj.filters
           src/ExpandVolume/ExpandVolume.vcxproj.user
           src/ExpandVolume/ExpandVolume_vs2019.vcxproj
           src/ExpandVolume/ExpandVolume_vs2019.vcxproj.filters
           src/ExpandVolume/Logo_288dpi.bmp
           src/ExpandVolume/Logo_96dpi.bmp
           src/ExpandVolume/resource.h
           src/Format/Format.rc
           src/Format/Format.vcxproj
           src/Format/Format.vcxproj.filters
           src/Format/Format.vcxproj.user
           src/Format/Format_vs2019.vcxproj
           src/Format/Format_vs2019.vcxproj.user
           src/Format/Resource.h
           src/Format/VeraCrypt_Wizard.bmp
           src/Main/Forms/Forms.cpp
           src/Main/Forms/Forms.h
           src/Main/Forms/international.h
           src/Mount/Drive_icon_96dpi.bmp
           src/Mount/Drive_icon_mask_96dpi.bmp
           src/Mount/Logo_288dpi.bmp
           src/Mount/Logo_96dpi.bmp
           src/Mount/Mount.rc
           src/Mount/Mount.vcxproj
           src/Mount/Mount.vcxproj.filters
           src/Mount/Mount.vcxproj.user
           src/Mount/Mount_vs2019.vcxproj
           src/Mount/Mount_vs2019.vcxproj.user
           src/Mount/Resource.h
           src/Mount/System_drive_icon_96dpi.bmp
           src/Mount/System_drive_icon_mask_96dpi.bmp
           src/PKCS11/cryptoki.h
           src/PKCS11/pkcs11.h
           src/PKCS11/pkcs11f.h
           src/PKCS11/pkcs11t.h
           src/Release/Setup Files/build_msi_x64.bat
           src/Release/Setup Files/veracrypt-arm64.cat
           src/Release/Setup Files/veracrypt-arm64.sys
           src/Release/Setup Files/veracrypt-x64.cat
           src/Release/Setup Files/veracrypt-x64.sys
           src/Release/Setup Files/veracrypt.cat
           src/Release/Setup Files/veracrypt.sys
           src/Resources/Icons/TrueCrypt.icns
           src/Resources/Icons/VeraCrypt-128x128.xpm
           src/Resources/Icons/VeraCrypt-16x16.xpm
           src/Resources/Icons/VeraCrypt-256x256.xpm
           src/Resources/Icons/VeraCrypt-48x48.xpm
           src/Resources/Icons/VeraCrypt.icns
           src/Resources/Icons/VeraCrypt_Volume.icns
           src/Setup/ComSetup.rgs
           src/Setup/FreeBSD/veracrypt-uninstall.sh
           src/Setup/FreeBSD/veracrypt.desktop
           src/Setup/Linux/mount.veracrypt
           src/Setup/Linux/veracrypt-uninstall.sh
           src/Setup/Linux/veracrypt.desktop
           src/Setup/MacOSX/postinstall.sh
           src/Setup/Portable.rc
           src/Setup/Portable.vcxproj
           src/Setup/Portable.vcxproj.filters
           src/Setup/Portable.vcxproj.user
           src/Setup/Resource.h
           src/Setup/Setup.ico
           src/Setup/Setup.rc
           src/Setup/Setup.vcxproj
           src/Setup/Setup.vcxproj.filters
           src/Setup/Setup.vcxproj.user
           src/Setup/VeraCrypt_setup.bmp
           src/Setup/VeraCrypt_setup_background.bmp
           src/SetupDLL/ComSetup.rgs
           src/SetupDLL/Resource.h
           src/SetupDLL/Setup.ico
           src/SetupDLL/Setup.rc
           src/SetupDLL/Setup.vcxproj.filters
           src/SetupDLL/Setup.vcxproj.user
           src/SetupDLL/SetupDLL.def
           src/SetupDLL/SetupDLL.vcxproj
           src/SetupDLL/SetupDLL.vcxproj.filters
           src/SetupDLL/SetupDLL.vcxproj.user
           src/SetupDLL/VeraCrypt_setup.bmp
           src/SetupDLL/VeraCrypt_setup_background.bmp
           src/Signing/GlobalSign_R3Cross.cer
           src/Signing/GlobalSign_SHA256_EV_CodeSigning_CA.cer
           src/Signing/TestCertificate/idrix_SHA256TestRootCA.crt
           src/Signing/TestCertificate/idrix_Sha256CodeSign.pfx
           src/Signing/TestCertificate/idrix_TestRootCA.crt
           src/Signing/TestCertificate/idrix_codeSign.pfx
           src/Signing/sign.bat
           src/Signing/sign_TESTSIGNING.bat
           src/Signing/sign_test.bat
           src/Signing/sign_test_debug.bat
           src/VeraCrypt.sln
           src/VeraCrypt_vs2019.sln
Copyright: __NO_COPYRIGHT_NOR_LICENSE__
License:   __NO_COPYRIGHT_NOR_LICENSE__

Files:     src/Boot/Windows/Bios.h
           src/Boot/Windows/BootCommon.h
           src/Boot/Windows/BootConfig.cpp
           src/Boot/Windows/BootConfig.h
           src/Boot/Windows/BootConsoleIo.cpp
           src/Boot/Windows/BootConsoleIo.h
           src/Boot/Windows/BootCrt.asm
           src/Boot/Windows/BootDebug.cpp
           src/Boot/Windows/BootDebug.h
           src/Boot/Windows/BootDefs.h
           src/Boot/Windows/BootDiskIo.cpp
           src/Boot/Windows/BootDiskIo.h
           src/Boot/Windows/BootEncryptedIo.cpp
           src/Boot/Windows/BootEncryptedIo.h
           src/Boot/Windows/BootMain.cpp
           src/Boot/Windows/BootMain.h
           src/Boot/Windows/BootMemory.cpp
           src/Boot/Windows/BootMemory.h
           src/Boot/Windows/BootSector.asm
           src/Boot/Windows/BootStrings.h
           src/Boot/Windows/IntFilter.cpp
           src/Boot/Windows/IntFilter.h
           src/Boot/Windows/Makefile
           src/Boot/Windows/Platform.cpp
           src/Boot/Windows/Platform.h
           src/Build/Include/Makefile.inc
           src/Common/BaseCom.cpp
           src/Common/BaseCom.h
           src/Common/BootEncryption.cpp
           src/Common/BootEncryption.h
           src/Common/Common.h
           src/Common/Dictionary.c
           src/Common/Dictionary.h
           src/Common/EncryptionThreadPool.c
           src/Common/EncryptionThreadPool.h
           src/Common/Exception.h
           src/Common/Keyfiles.c
           src/Common/Keyfiles.h
           src/Common/Language.c
           src/Common/Language.h
           src/Common/Registry.c
           src/Common/Registry.h
           src/Common/SecurityToken.cpp
           src/Common/SecurityToken.h
           src/Common/Wipe.c
           src/Common/Wipe.h
           src/Common/Xml.c
           src/Common/Xml.h
           src/Common/Xts.c
           src/Common/Xts.h
           src/Core/Core.h
           src/Core/Core.make
           src/Core/CoreBase.cpp
           src/Core/CoreBase.h
           src/Core/CoreException.cpp
           src/Core/CoreException.h
           src/Core/FatFormatter.h
           src/Core/HostDevice.cpp
           src/Core/HostDevice.h
           src/Core/MountOptions.cpp
           src/Core/MountOptions.h
           src/Core/RandomNumberGenerator.cpp
           src/Core/RandomNumberGenerator.h
           src/Core/Unix/CoreService.cpp
           src/Core/Unix/CoreService.h
           src/Core/Unix/CoreServiceProxy.h
           src/Core/Unix/CoreServiceRequest.cpp
           src/Core/Unix/CoreServiceRequest.h
           src/Core/Unix/CoreServiceResponse.cpp
           src/Core/Unix/CoreServiceResponse.h
           src/Core/Unix/CoreUnix.cpp
           src/Core/Unix/CoreUnix.h
           src/Core/Unix/FreeBSD/CoreFreeBSD.cpp
           src/Core/Unix/FreeBSD/CoreFreeBSD.h
           src/Core/Unix/FreeBSD/System.h
           src/Core/Unix/Linux/CoreLinux.cpp
           src/Core/Unix/Linux/CoreLinux.h
           src/Core/Unix/Linux/System.h
           src/Core/Unix/MacOSX/CoreMacOSX.cpp
           src/Core/Unix/MacOSX/CoreMacOSX.h
           src/Core/Unix/MacOSX/System.h
           src/Core/Unix/MountedFilesystem.h
           src/Core/Unix/OpenBSD/CoreOpenBSD.cpp
           src/Core/Unix/OpenBSD/CoreOpenBSD.h
           src/Core/Unix/OpenBSD/System.h
           src/Core/Unix/Solaris/CoreSolaris.cpp
           src/Core/Unix/Solaris/CoreSolaris.h
           src/Core/Unix/Solaris/System.h
           src/Core/Unix/System.h
           src/Core/VolumeCreator.cpp
           src/Core/VolumeCreator.h
           src/Crypto/Aes_hw_cpu.h
           src/Crypto/Rmd160.c
           src/Driver/DriveFilter.c
           src/Driver/DriveFilter.h
           src/Driver/DumpFilter.c
           src/Driver/DumpFilter.h
           src/Driver/EncryptedIoQueue.c
           src/Driver/EncryptedIoQueue.h
           src/Driver/Fuse/Driver.make
           src/Driver/Fuse/FuseService.cpp
           src/Driver/Fuse/FuseService.h
           src/Driver/VolumeFilter.c
           src/Driver/VolumeFilter.h
           src/ExpandVolume/InitDataArea.h
           src/Format/FormatCom.cpp
           src/Format/FormatCom.h
           src/Format/FormatCom.idl
           src/Format/InPlace.c
           src/Format/InPlace.h
           src/Main/Application.cpp
           src/Main/Application.h
           src/Main/CommandLineInterface.cpp
           src/Main/CommandLineInterface.h
           src/Main/FatalErrorHandler.cpp
           src/Main/FatalErrorHandler.h
           src/Main/FavoriteVolume.cpp
           src/Main/FavoriteVolume.h
           src/Main/Forms/AboutDialog.cpp
           src/Main/Forms/AboutDialog.h
           src/Main/Forms/BenchmarkDialog.cpp
           src/Main/Forms/BenchmarkDialog.h
           src/Main/Forms/ChangePasswordDialog.cpp
           src/Main/Forms/ChangePasswordDialog.h
           src/Main/Forms/DeviceSelectionDialog.cpp
           src/Main/Forms/DeviceSelectionDialog.h
           src/Main/Forms/EncryptionOptionsWizardPage.cpp
           src/Main/Forms/EncryptionOptionsWizardPage.h
           src/Main/Forms/EncryptionTestDialog.cpp
           src/Main/Forms/EncryptionTestDialog.h
           src/Main/Forms/FavoriteVolumesDialog.cpp
           src/Main/Forms/FavoriteVolumesDialog.h
           src/Main/Forms/InfoWizardPage.cpp
           src/Main/Forms/InfoWizardPage.h
           src/Main/Forms/KeyfileGeneratorDialog.cpp
           src/Main/Forms/KeyfileGeneratorDialog.h
           src/Main/Forms/KeyfilesDialog.cpp
           src/Main/Forms/KeyfilesDialog.h
           src/Main/Forms/KeyfilesPanel.cpp
           src/Main/Forms/KeyfilesPanel.h
           src/Main/Forms/LegalNoticesDialog.cpp
           src/Main/Forms/LegalNoticesDialog.h
           src/Main/Forms/MainFrame.cpp
           src/Main/Forms/MainFrame.h
           src/Main/Forms/MountOptionsDialog.cpp
           src/Main/Forms/MountOptionsDialog.h
           src/Main/Forms/NewSecurityTokenKeyfileDialog.cpp
           src/Main/Forms/NewSecurityTokenKeyfileDialog.h
           src/Main/Forms/PreferencesDialog.cpp
           src/Main/Forms/PreferencesDialog.h
           src/Main/Forms/ProgressWizardPage.cpp
           src/Main/Forms/ProgressWizardPage.h
           src/Main/Forms/RandomPoolEnrichmentDialog.cpp
           src/Main/Forms/RandomPoolEnrichmentDialog.h
           src/Main/Forms/SecurityTokenKeyfilesDialog.cpp
           src/Main/Forms/SecurityTokenKeyfilesDialog.h
           src/Main/Forms/SelectDirectoryWizardPage.cpp
           src/Main/Forms/SelectDirectoryWizardPage.h
           src/Main/Forms/SingleChoiceWizardPage.h
           src/Main/Forms/VolumeCreationProgressWizardPage.cpp
           src/Main/Forms/VolumeCreationProgressWizardPage.h
           src/Main/Forms/VolumeCreationWizard.cpp
           src/Main/Forms/VolumeCreationWizard.h
           src/Main/Forms/VolumeFormatOptionsWizardPage.cpp
           src/Main/Forms/VolumeFormatOptionsWizardPage.h
           src/Main/Forms/VolumeLocationWizardPage.cpp
           src/Main/Forms/VolumeLocationWizardPage.h
           src/Main/Forms/VolumePasswordPanel.cpp
           src/Main/Forms/VolumePasswordPanel.h
           src/Main/Forms/VolumePasswordWizardPage.cpp
           src/Main/Forms/VolumePasswordWizardPage.h
           src/Main/Forms/VolumePropertiesDialog.cpp
           src/Main/Forms/VolumePropertiesDialog.h
           src/Main/Forms/VolumeSizeWizardPage.cpp
           src/Main/Forms/VolumeSizeWizardPage.h
           src/Main/Forms/WizardFrame.cpp
           src/Main/Forms/WizardFrame.h
           src/Main/Forms/WizardPage.h
           src/Main/GraphicUserInterface.cpp
           src/Main/GraphicUserInterface.h
           src/Main/Hotkey.cpp
           src/Main/Hotkey.h
           src/Main/LanguageStrings.cpp
           src/Main/LanguageStrings.h
           src/Main/Main.h
           src/Main/Main.make
           src/Main/Resources.cpp
           src/Main/Resources.h
           src/Main/StringFormatter.cpp
           src/Main/StringFormatter.h
           src/Main/System.h
           src/Main/SystemPrecompiled.h
           src/Main/TextUserInterface.cpp
           src/Main/TextUserInterface.h
           src/Main/Unix/Main.cpp
           src/Main/UserInterface.cpp
           src/Main/UserInterface.h
           src/Main/UserInterfaceException.h
           src/Main/UserInterfaceType.h
           src/Main/UserPreferences.cpp
           src/Main/UserPreferences.h
           src/Main/VolumeHistory.cpp
           src/Main/VolumeHistory.h
           src/Main/Xml.cpp
           src/Main/Xml.h
           src/Makefile
           src/Mount/Favorites.cpp
           src/Mount/Favorites.h
           src/Mount/Hotkeys.c
           src/Mount/Hotkeys.h
           src/Mount/MainCom.cpp
           src/Mount/MainCom.h
           src/Mount/MainCom.idl
           src/Platform/Buffer.cpp
           src/Platform/Buffer.h
           src/Platform/Directory.h
           src/Platform/Event.cpp
           src/Platform/Event.h
           src/Platform/Exception.cpp
           src/Platform/Exception.h
           src/Platform/File.h
           src/Platform/FileCommon.cpp
           src/Platform/FileStream.h
           src/Platform/FilesystemPath.h
           src/Platform/Finally.h
           src/Platform/ForEach.h
           src/Platform/Functor.h
           src/Platform/Memory.cpp
           src/Platform/Memory.h
           src/Platform/MemoryStream.cpp
           src/Platform/MemoryStream.h
           src/Platform/Mutex.h
           src/Platform/Platform.h
           src/Platform/Platform.make
           src/Platform/PlatformBase.h
           src/Platform/PlatformTest.cpp
           src/Platform/PlatformTest.h
           src/Platform/Serializable.cpp
           src/Platform/Serializable.h
           src/Platform/Serializer.cpp
           src/Platform/Serializer.h
           src/Platform/SerializerFactory.cpp
           src/Platform/SerializerFactory.h
           src/Platform/SharedPtr.h
           src/Platform/SharedVal.h
           src/Platform/Stream.h
           src/Platform/StringConverter.cpp
           src/Platform/StringConverter.h
           src/Platform/SyncEvent.h
           src/Platform/System.h
           src/Platform/SystemException.h
           src/Platform/SystemInfo.h
           src/Platform/SystemLog.h
           src/Platform/TextReader.cpp
           src/Platform/TextReader.h
           src/Platform/Thread.h
           src/Platform/Time.h
           src/Platform/Unix/Directory.cpp
           src/Platform/Unix/File.cpp
           src/Platform/Unix/FilesystemPath.cpp
           src/Platform/Unix/Mutex.cpp
           src/Platform/Unix/Pipe.cpp
           src/Platform/Unix/Pipe.h
           src/Platform/Unix/Poller.cpp
           src/Platform/Unix/Poller.h
           src/Platform/Unix/Process.cpp
           src/Platform/Unix/Process.h
           src/Platform/Unix/SyncEvent.cpp
           src/Platform/Unix/System.h
           src/Platform/Unix/SystemException.cpp
           src/Platform/Unix/SystemInfo.cpp
           src/Platform/Unix/SystemLog.cpp
           src/Platform/Unix/Thread.cpp
           src/Platform/Unix/Time.cpp
           src/Platform/User.h
           src/Setup/ComSetup.cpp
           src/Setup/ComSetup.h
           src/Setup/FreeBSD/veracrypt_install_template.sh
           src/Setup/Linux/veracrypt_install_template.sh
           src/Setup/SelfExtract.c
           src/Setup/SelfExtract.h
           src/SetupDLL/ComSetup.cpp
           src/SetupDLL/ComSetup.h
           src/Volume/Cipher.cpp
           src/Volume/Cipher.h
           src/Volume/Crc32.h
           src/Volume/EncryptionAlgorithm.cpp
           src/Volume/EncryptionAlgorithm.h
           src/Volume/EncryptionMode.cpp
           src/Volume/EncryptionMode.h
           src/Volume/EncryptionModeXTS.cpp
           src/Volume/EncryptionModeXTS.h
           src/Volume/EncryptionTest.cpp
           src/Volume/EncryptionTest.h
           src/Volume/EncryptionThreadPool.cpp
           src/Volume/EncryptionThreadPool.h
           src/Volume/Hash.cpp
           src/Volume/Hash.h
           src/Volume/Keyfile.cpp
           src/Volume/Keyfile.h
           src/Volume/Pkcs5Kdf.cpp
           src/Volume/Pkcs5Kdf.h
           src/Volume/Version.h
           src/Volume/Volume.cpp
           src/Volume/Volume.h
           src/Volume/Volume.make
           src/Volume/VolumeException.cpp
           src/Volume/VolumeException.h
           src/Volume/VolumeHeader.cpp
           src/Volume/VolumeHeader.h
           src/Volume/VolumeInfo.cpp
           src/Volume/VolumeInfo.h
           src/Volume/VolumeLayout.cpp
           src/Volume/VolumeLayout.h
           src/Volume/VolumePassword.cpp
           src/Volume/VolumePassword.h
           src/Volume/VolumePasswordCache.cpp
           src/Volume/VolumePasswordCache.h
           src/Volume/VolumeSlot.h
Copyright: 2008-2012 TrueCrypt Developers Association and which is governed  the TrueCrypt License 3.0, and also derived from source code of extcv which is Copyright (c) 2009-2010  Kih-Oskh or Copyright (c) 2012-2013 Josef Schneider <josef@netpage.dk>
           2008-2012 TrueCrypt Developers Association and which is governed  the TrueCrypt License 3.0.
License:   __UNKNOWN__
 Modifications and additions to the original source code (contained in this file)
 and all other portions of this file are Copyright (c) 2013-2017 IDRIX
 and are governed by the Apache License 2.0 the full text of which is
 contained in the file License.txt included in VeraCrypt binary and source
 code distribution packages.

Files:     src/Common/libzip/*
Copyright: 1999-2020 Dieter Baron and Thomas Klausner
License:   BSD-3-Clause
 This file is part of libzip, a library to manipulate ZIP archives.
 The authors can be contacted at <libzip@nih.at>
 .
 Redistribution and use in source and binary forms, with or without
 modification, are permitted provided that the following conditions
 are met:
 1. Redistributions of source code must retain the above copyright
 notice, this list of conditions and the following disclaimer.
 2. Redistributions in binary form must reproduce the above copyright
 notice, this list of conditions and the following disclaimer in
 the documentation and/or other materials provided with the
 distribution.
 3. The names of the authors may not be used to endorse or promote
 products derived from this software without specific prior
 written permission.
 .
 THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS
 OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
 DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
 GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
 IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
 OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
 IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 .
 On Debian systems, the complete text of the BSD 3-clause "New" or "Revised"
 License can be found in `/usr/share/common-licenses/BSD'.

Files:     src/Common/Apidrvr.h
           src/Common/Cache.c
           src/Common/Cache.h
           src/Common/Cmdline.c
           src/Common/Cmdline.h
           src/Common/Combo.c
           src/Common/Combo.h
           src/Common/Crc.c
           src/Common/Crc.h
           src/Common/Crypto.c
           src/Common/Dlgcode.c
           src/Common/Dlgcode.h
           src/Common/Endian.c
           src/Common/Endian.h
           src/Common/Fat.c
           src/Common/Fat.h
           src/Common/Format.c
           src/Common/Format.h
           src/Common/Password.c
           src/Common/Password.h
           src/Common/Pkcs5.c
           src/Common/Pkcs5.h
           src/Common/Progress.c
           src/Common/Progress.h
           src/Common/Random.c
           src/Common/Random.h
           src/Common/Tcdefs.h
           src/Common/Tests.c
           src/Common/Tests.h
           src/Common/Volumes.c
           src/Common/Volumes.h
           src/Core/FatFormatter.cpp
           src/Driver/Ntdriver.c
           src/Driver/Ntdriver.h
           src/Driver/Ntvol.c
           src/Driver/Ntvol.h
           src/Format/Tcformat.c
           src/Format/Tcformat.h
           src/Mount/Mount.c
           src/Mount/Mount.h
           src/Setup/Dir.c
           src/Setup/Dir.h
           src/Setup/Setup.h
           src/Setup/Wizard.c
           src/Setup/Wizard.h
           src/SetupDLL/Dir.c
           src/SetupDLL/Dir.h
           src/SetupDLL/Setup.h
Copyright: 2003-2012 TrueCrypt Developers Association and which is governed  the TrueCrypt License 3.0, also from the source code of
License:   __UNKNOWN__
 Encryption for the Masses 2.02a, which is Copyright (c) 1998-2000 Paul Le Roux
 and which is governed by the 'License Agreement for Encryption for the Masses'
 Modifications and additions to the original source code (contained in this file)
 and all other portions of this file are Copyright (c) 2013-2017 IDRIX
 and are governed by the Apache License 2.0 the full text of which is
 contained in the file License.txt included in VeraCrypt binary and source
 code distribution packages.

Files:     src/Common/GfMul.c
           src/Common/GfMul.h
           src/Crypto/Aes.h
           src/Crypto/AesSmall.c
           src/Crypto/AesSmall_x86.asm
           src/Crypto/Aes_x64.asm
           src/Crypto/Aes_x86.asm
           src/Crypto/Aescrypt.c
           src/Crypto/Aeskey.c
           src/Crypto/Aesopt.h
           src/Crypto/Aestab.c
           src/Crypto/Aestab.h
           src/Crypto/Twofish.c
Copyright: 1998-2007 Brian Gladman, Worcester, UK.
           1999-2003 Dr Brian Gladman, Worcester, UK.
License:   __UNKNOWN__
 LICENSE TERMS
 .
 The free distribution and use of this software is allowed (with or without
 changes) provided that:
 .
 1. source code distributions include the above copyright notice, this
 list of conditions and the following disclaimer;
 .
 2. binary distributions include the above copyright notice, this list
 of conditions and the following disclaimer in their documentation;
 .
 3. the name of the copyright holder is not used to endorse products
 built using this software without specific written permission.
 .
 DISCLAIMER
 .
 This software is provided 'as is' with no explicit or implied warranties
 in respect of its properties, including, but not limited to, correctness
 and/or fitness for purpose.

Files:     src/Crypto/t1ha.h
           src/Crypto/t1ha2.c
           src/Crypto/t1ha2_selfcheck.c
           src/Crypto/t1ha_bits.h
           src/Crypto/t1ha_selfcheck.c
           src/Crypto/t1ha_selfcheck.h
Copyright: 2010-2018 Leonid Yuriev <leo@yuriev.ru>, The 1Hippeus project (t1h).
           2016-2018 Positive Technologies, https://www.ptsecurity.com, Fast Positive Hash.
License:   __UNKNOWN__
 This software is provided 'as-is', without any express or implied
 warranty. In no event will the authors be held liable for any damages
 arising from the use of this software.
 .
 Permission is granted to anyone to use this software for any purpose,
 including commercial applications, and to alter it and redistribute it
 freely, subject to the following restrictions:
 .
 1. The origin of this software must not be misrepresented; you must not
 claim that you wrote the original software. If you use this software
 in a product, an acknowledgement in the product documentation would be
 appreciated but is not required.
 2. Altered source versions must be plainly marked as such, and must not be
 misrepresented as being the original software.
 3. This notice may not be removed or altered from any source distribution.

Files:     src/Crypto/sha256_avx1_x64.asm
           src/Crypto/sha256_avx2_x64.asm
           src/Crypto/sha256_sse4_x64.asm
           src/Crypto/sha512_avx1_x64.asm
           src/Crypto/sha512_avx2_x64.asm
           src/Crypto/sha512_sse4_x64.asm
Copyright: 2012 Intel Corporation
License:   BSD-3-Clause
 Redistribution and use in source and binary forms, with or without
 modification, are permitted provided that the following conditions are
 met:
 .
 * Redistributions of source code must retain the above copyright
 notice, this list of conditions and the following disclaimer.
 .
 * Redistributions in binary form must reproduce the above copyright
 notice, this list of conditions and the following disclaimer in the
 documentation and/or other materials provided with the
 distribution.
 .
 * Neither the name of the Intel Corporation nor the names of its
 contributors may be used to endorse or promote products derived from
 this software without specific prior written permission.
 .
 THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS" AND ANY
 EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION OR
 CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
 EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
 PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 .
 Example YASM command lines:
 .
 On Debian systems, the complete text of the BSD 3-clause "New" or "Revised"
 License can be found in `/usr/share/common-licenses/BSD'.

Files:     src/ExpandVolume/DlgExpandVolume.cpp
           src/ExpandVolume/ExpandVolume.c
           src/ExpandVolume/ExpandVolume.h
           src/ExpandVolume/InitDataArea.c
           src/ExpandVolume/WinMain.cpp
Copyright: 2003-2012 TrueCrypt Developers Association and which is governed  the TrueCrypt License 3.0, also from the source code of
License:   __UNKNOWN__
 Encryption for the Masses 2.02a, which is Copyright (c) 1998-2000 Paul Le Roux
 and which is governed by the 'License Agreement for Encryption for the Masses'
 and also from the source code of extcv, which is Copyright (c) 2009-2010 Kih-Oskh
 or Copyright (c) 2012-2013 Josef Schneider <josef@netpage.dk>
 .
 Modifications and additions to the original source code (contained in this file)
 and all other portions of this file are Copyright (c) 2013-2017 IDRIX
 and are governed by the Apache License 2.0 the full text of which is
 contained in the file License.txt included in VeraCrypt binary and source
 code distribution packages.

Files:     src/Build/build_veracrypt_freebsd.sh
           src/Build/build_veracrypt_linux.sh
           src/Build/build_veracrypt_linux_gtk3.sh
           src/Build/build_veracrypt_linux_no_sse2.sh
Copyright: 2013-2022 IDRIX
License:   __UNKNOWN__
 Governed by the Apache License 2.0 the full text of which is contained
 in the file License.txt included in VeraCrypt binary and source
 code distribution packages.
 .
 Absolute path to this script

Files:     src/Build/build_cmake_deb.sh
           src/Build/build_cmake_opensuse.sh
           src/Build/build_cmake_rpm_gtk2.sh
           src/Build/build_cmake_rpm_gtk3.sh
Copyright: 2013-2022 IDRIX
License:   __UNKNOWN__
 Governed by the Apache License 2.0 the full text of which is contained
 in the file License.txt included in VeraCrypt binary and source
 code distribution packages.
 .
 Errors should cause script to exit

Files:     src/Main/Forms/VolumePimWizardPage.cpp
           src/Main/Forms/VolumePimWizardPage.h
           src/NOTICE
Copyright: 2013-2018 IDRIX
           2015-2016 Mounir IDRASSI for the VeraCrypt project.
License:   Apache-2.0
 Licensed under the Apache License, Version 2.0 (the "License");
 you may not use this file except in compliance with the License.
 You may obtain a copy of the License at
 .
 http://www.apache.org/licenses/LICENSE-2.0
 .
 Unless required by applicable law or agreed to in writing, software
 distributed under the License is distributed on an "AS IS" BASIS,
 WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 See the License for the specific language governing permissions and
 limitations under the License.
 .
 On Debian systems, the complete text of the Apache License Version 2.0
  can be found in `/usr/share/common-licenses/Apache-2.0'.

Files:     src/Crypto/Sha2.h
           src/Main/Forms/WaitDialog.cpp
           src/Main/Forms/WaitDialog.h
Copyright: 2013-2017 IDRIX
           2013-2018 IDRIX.
License:   __UNKNOWN__
 Governed by the Apache License 2.0 the full text of which is
 contained in the file License.txt included in VeraCrypt binary and source
 code distribution packages.

Files:     src/Crypto/SerpentFast.c
           src/Crypto/SerpentFast.h
           src/Crypto/SerpentFast_simd.cpp
Copyright: 1999-2013 Jack Lloyd
License:   __UNKNOWN__
 Botan is released under the Simplified BSD License (see license.txt)

Files:     src/Crypto/chachaRng.c
           src/Crypto/chachaRng.h
Copyright: 1996 David Mazieres <dm@uun.org>
           2008 Damien Miller <djm@openbsd.org>
           2013 Markus Friedl <markus@openbsd.org>
           2014 Theo de Raadt <deraadt@openbsd.org>
License:   ISC
 Permission to use, copy, modify, and distribute this software for any
 purpose with or without fee is hereby granted, provided that the above
 copyright notice and this permission notice appear in all copies.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
 WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
 MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
 ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 .
 ChaCha based random number generator for OpenBSD.
 .
 Adapted for VeraCrypt

Files:     src/Crypto/sha256-x86-nayuki.S
           src/Crypto/sha512-x64-nayuki.S
Copyright: 2014-2017 Project Nayuki. (MIT License) https://www.nayuki.io/page/fast-sha2-hashes-in-x86-assembly
License:   Expat
 Permission is hereby granted, free of charge, to any person obtaining a copy of
 this software and associated documentation files (the "Software"), to deal in
 the Software without restriction, including without limitation the rights to
 use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
 the Software, and to permit persons to whom the Software is furnished to do so,
 subject to the following conditions:
 - The above copyright notice and this permission notice shall be included in
 all copies or substantial portions of the Software.
 - The Software is provided "as is", without warranty of any kind, express or
 implied, including but not limited to the warranties of merchantability,
 fitness for a particular purpose and noninfringement. In no event shall the
 authors or copyright holders be liable for any claim, damages or other
 liability, whether in an action of contract, tort or otherwise, arising from,
 out of or in connection with the Software or the use or other dealings in the
 Software.

Files:     License.txt
           src/License.txt
Copyright: license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form.
License:   __UNKNOWN__
 3. Grant of Patent License. Subject to the terms and conditions of
 this License, each Contributor hereby grants to You a perpetual,
 worldwide, non-exclusive, no-charge, royalty-free, irrevocable
 (except as stated in this section) patent license to make, have made,
 use, offer to sell, sell, import, and otherwise transfer the Work,
 where such license applies only to those patent claims licensable
 by such Contributor that are necessarily infringed by their
 Contribution(s) alone or by combination of their Contribution(s)
 with the Work to which such Contribution(s) was submitted. If You
 institute patent litigation against any entity (including a
 cross-claim or counterclaim in a lawsuit) alleging that the Work
 or a Contribution incorporated within the Work constitutes direct
 or contributory patent infringement, then any patent licenses
 granted to You under this License for that Work shall terminate
 as of the date such litigation is filed.
 .
 4. Redistribution. You may reproduce and distribute copies of the
 Work or Derivative Works thereof in any medium, with or without
 modifications, and in Source or Object form, provided that You
 meet the following conditions:
 .
 (a) You must give any other recipients of the Work or
 Derivative Works a copy of this License; and
 .
 (b) You must cause any modified files to carry prominent notices
 stating that You changed the files; and
 .
 (d) If the Work includes a "NOTICE" text file as part of its
 distribution, then any Derivative Works that You distribute must
 include a readable copy of the attribution notices contained
 within such NOTICE file, excluding those notices that do not
 pertain to any part of the Derivative Works, in at least one
 of the following places: within a NOTICE text file distributed
 as part of the Derivative Works; within the Source form or
 documentation, if provided along with the Derivative Works; or,
 within a display generated by the Derivative Works, if and
 wherever such third-party notices normally appear. The contents
 of the NOTICE file are for informational purposes only and
 do not modify the License. You may add Your own attribution
 notices within Derivative Works that You distribute, alongside
 or as an addendum to the NOTICE text from the Work, provided
 that such additional attribution notices cannot be construed
 as modifying the License.
 .
 You may add Your own copyright statement to Your modifications and
 may provide additional or different license terms and conditions
 for use, reproduction, or distribution of Your modifications, or
 for any such Derivative Works as a whole, provided Your use,
 reproduction, and distribution of the Work otherwise complies with
 the conditions stated in this License.
 .
 5. Submission of Contributions. Unless You explicitly state otherwise,
 any Contribution intentionally submitted for inclusion in the Work
 by You to the Licensor shall be under the terms and conditions of
 this License, without any additional terms or conditions.
 Notwithstanding the above, nothing herein shall supersede or modify
 the terms of any separate license agreement you may have executed
 with Licensor regarding such Contributions.
 .
 6. Trademarks. This License does not grant permission to use the trade
 names, trademarks, service marks, or product names of the Licensor,
 except as required for reasonable and customary use in describing the
 origin of the Work and reproducing the content of the NOTICE file.
 .
 7. Disclaimer of Warranty. Unless required by applicable law or
 agreed to in writing, Licensor provides the Work (and each
 Contributor provides its Contributions) on an "AS IS" BASIS,
 WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
 implied, including, without limitation, any warranties or conditions
 of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
 PARTICULAR PURPOSE. You are solely responsible for determining the
 appropriateness of using or redistributing the Work and assume any
 risks associated with Your exercise of permissions under this License.
 .
 8. Limitation of Liability. In no event and under no legal theory,
 whether in tort (including negligence), contract, or otherwise,
 unless required by applicable law (such as deliberate and grossly
 negligent acts) or agreed to in writing, shall any Contributor be
 liable to You for damages, including any direct, indirect, special,
 incidental, or consequential damages of any character arising as a
 result of this License or out of the use or inability to use the
 Work (including but not limited to damages for loss of goodwill,
 work stoppage, computer failure or malfunction, or any and all
 other commercial damages or losses), even if such Contributor
 has been advised of the possibility of such damages.
 .
 9. Accepting Warranty or Additional Liability. While redistributing
 the Work or Derivative Works thereof, You may choose to offer,
 and charge a fee for, acceptance of support, warranty, indemnity,
 or other liability obligations and/or rights consistent with this
 License. However, in accepting such obligations, You may act only
 on Your own behalf and on Your sole responsibility, not on behalf
 of any other Contributor, and only if You agree to indemnify,
 defend, and hold each Contributor harmless for any liability
 incurred by, or claims asserted against, such Contributor by reason
 of your accepting any such warranty or additional liability.

Files:     src/Build/build_veracrypt_macosx.sh
           src/Build/build_veracrypt_macosx_legacy.sh
Copyright: 2013-2019 IDRIX
License:   __UNKNOWN__
 Governed by the Apache License 2.0 the full text of which is contained
 in the file License.txt included in VeraCrypt binary and source
 code distribution packages.
 .
 Absolute path this script is in

Files:     src/Crypto/Aes_hw_cpu.asm
           src/Crypto/GostCipher.h
Copyright: 2008-2011 TrueCrypt Developers Association.
License:   __UNKNOWN__
 Governed by the TrueCrypt License 3.0 the full text of which is contained in
 the file License.txt included in TrueCrypt binary and source code distribution
 packages.

Files:     src/Crypto/Twofish_x64.S
Copyright: 2011-2013 Jussi Kivilinna <jussi.kivilinna@iki.fi>
License:   ISC
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted, provided that the above
 copyright notice and this permission notice appear in all copies.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
 AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
 OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
 PERFORMANCE OF THIS SOFTWARE.
 .
 Adapted tp VeraCrypt

Files:     src/Crypto/Camellia_aesni_x64.S
Copyright: 2012-2013 Jussi Kivilinna <jussi.kivilinna@iki.fi>
License:   ISC
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted, provided that the above
 copyright notice and this permission notice appear in all copies.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
 AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
 OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
 PERFORMANCE OF THIS SOFTWARE.
 .
 Adapted to VeraCrypt
 - original file pre-processed using "gcc -E"
 - added instructions at begining of each functiont to adapt to Windows parameters passing convention
 - Fix "'ADDR32' relocation" error when building Windows driver by explicitely using %rip addressing when
 accessing various locally defined data variables. This has no performance impact.

Files:     src/Crypto/Camellia_x64.S
Copyright: 2012-2013 Jussi Kivilinna <jussi.kivilinna@iki.fi>
License:   ISC
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted, provided that the above
 copyright notice and this permission notice appear in all copies.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
 AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
 OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
 PERFORMANCE OF THIS SOFTWARE.
 .
 Adapted to VeraCrypt
 - original file pre-processed using "gcc -E"
 - added instructions at begining of each functiont to adapt to Windows parameters passing convention
 - Fix "'ADDR32' relocation" error when building Windows driver by using lea to load address of tables into
 registers instead of using immediat form in xorq. This required saving many registers in the stack in order
 to free 7 general purpose registers %r9-%r15 and %xmm0/%xmm1 are used for the 8th table: %xmm0 stores table
 address and %xmm1 is used to save/restore %r8 each time it is used for memory addressed by %xmm0.
 These changes reduce performance compared to original code by around 8%.
 Original code did not have 'ADDR32' relocation issue because it was implemented as an executable, not a shared
 library like the case of Windows driver.

Files:     src/Common/zlib/*
Copyright: 1995-2017 Jean-loup Gailly and Mark Adler
License:   Zlib
 This software is provided 'as-is', without any express or implied
 warranty.  In no event will the authors be held liable for any damages
 arising from the use of this software.
 .
 Permission is granted to anyone to use this software for any purpose,
 including commercial applications, and to alter it and redistribute it
 freely, subject to the following restrictions:
 .
 1. The origin of this software must not be misrepresented; you must not
 claim that you wrote the original software. If you use this software
 in a product, an acknowledgment in the product documentation would be
 appreciated but is not required.
 2. Altered source versions must be plainly marked as such, and must not be
 misrepresented as being the original software.
 3. This notice may not be removed or altered from any source distribution.
 .
 Jean-loup Gailly        Mark Adler
 jloup@gzip.org          madler@alumni.caltech.edu

Files:     src/Crypto/sha512-x86-nayuki.S
Copyright: 2014 Project Nayuki http://www.nayuki.io/page/fast-sha2-hashes-in-x86-assembly
License:   Expat
 (MIT License)
 Permission is hereby granted, free of charge, to any person obtaining a copy of
 this software and associated documentation files (the "Software"), to deal in
 the Software without restriction, including without limitation the rights to
 use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
 the Software, and to permit persons to whom the Software is furnished to do so,
 subject to the following conditions:
 - The above copyright notice and this permission notice shall be included in
 all copies or substantial portions of the Software.
 - The Software is provided "as is", without warranty of any kind, express or
 implied, including but not limited to the warranties of merchantability,
 fitness for a particular purpose and noninfringement. In no event shall the
 authors or copyright holders be liable for any claim, damages or other
 liability, whether in an action of contract, tort or otherwise, arising from,
 out of or in connection with the Software or the use or other dealings in the
 Software.
 .
 Modified by kerukuro for use in cppcrypto.

Files:     src/Crypto/CamelliaSmall.c
Copyright: 2006-2015 ARM Limited, SPDX-License-Identifier: Apache-2.0
License:   Apache-2.0
 Licensed under the Apache License, Version 2.0 (the "License"); you may
 not use this file except in compliance with the License.
 You may obtain a copy of the License at
 .
 http://www.apache.org/licenses/LICENSE-2.0
 .
 Unless required by applicable law or agreed to in writing, software
 distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 See the License for the specific language governing permissions and
 limitations under the License.
 .
 This file is part of mbed TLS (https://tls.mbed.org)
 .
 The Camellia block cipher was designed by NTT and Mitsubishi Electric
 Corporation.
 .
 http://info.isl.ntt.co.jp/crypt/eng/camellia/dl/01espec.pdf
 .
 Adapted for VeraCrypt
 .
 On Debian systems, the complete text of the Apache License Version 2.0
  can be found in `/usr/share/common-licenses/Apache-2.0'.

Files:     src/Crypto/Streebog.c
Copyright: 2013 Alexey Degtyarev.
License:   __UNKNOWN__
 Adapted to VeraCrypt with assembly enhancements

Files:     src/Crypto/Streebog.h
Copyright: 2013 Alexey Degtyarev.
License:   __UNKNOWN__
 Adapted to VeraCrypt

Files:     src/Crypto/AesSmall.h
Copyright: 1998-2006 Brian Gladman, Worcester, UK.
License:   __UNKNOWN__
 LICENSE TERMS
 .
 The free distribution and use of this software in both source and binary
 form is allowed (with or without changes) provided that:
 .
 1. distributions of this source code include the above copyright
 notice, this list of conditions and the following disclaimer;
 .
 2. distributions in binary form include the above copyright
 notice, this list of conditions and the following disclaimer
 in the documentation and/or other associated materials;
 .
 3. the copyright holder's name is not used to endorse products
 built using this software without specific written permission.
 .
 ALTERNATIVELY, provided that this notice is retained in full, this product
 may be distributed under the terms of the GNU General Public License (GPL),
 in which case the provisions of the GPL apply INSTEAD OF those given above.
 .
 DISCLAIMER
 .
 This software is provided 'as is' with no explicit or implied warranties
 in respect of its properties, including, but not limited to, correctness
 and/or fitness for purpose.

Files:     src/Setup/Setup.c
Copyright: 2003-2012 TrueCrypt Developers Association and which is governed  the TrueCrypt License 3.0, also from the source code of
License:   __UNKNOWN__
 Encryption for the Masses 2.02a, which is Copyright (c) 1998-2000 Paul Le Roux
 and which is governed by the 'License Agreement for Encryption for the Masses'
 Modifications and additions to the original source code (contained in this file)
 and all other portions of this file are Copyright (c) 2013-2017 IDRIX
 and are governed by the Apache License 2.0 the full text of which is
 contained in the file License.txt included in VeraCrypt binary and source
 code distribution packages. */
 .
 #include "Tcdefs.h"
 #include <SrRestorePtApi.h>
 #include <io.h>
 #include <propkey.h>
 #include <propvarutil.h>
 #include <sys/types.h>
 #include <sys/stat.h>
 #include <tchar.h>
 .
 #include "Apidrvr.h"
 #include "BootEncryption.h"
 #include "Boot/Windows/BootCommon.h"
 #include "Combo.h"
 #include "ComSetup.h"
 #include "Dlgcode.h"
 #include "Language.h"
 #include "Registry.h"
 #include "Resource.h"
 .
 #include "Dir.h"
 #include "Setup.h"
 #include "SelfExtract.h"
 #include "Wizard.h"
 .
 #include "../Common/Resource.h"
 .
 using namespace VeraCrypt;
 .
 #pragma warning( disable : 4201 )
 #pragma warning( disable : 4115 )
 .
 #include <shlobj.h>
 .
 #pragma warning( default : 4201 )
 #pragma warning( default : 4115 )
 .
 #include <Strsafe.h>

Files:     src/SetupDLL/Setup.c
Copyright: 2003-2012 TrueCrypt Developers Association and which is governed  the TrueCrypt License 3.0, also from the source code of
License:   __UNKNOWN__
 Encryption for the Masses 2.02a, which is Copyright (c) 1998-2000 Paul Le Roux
 and which is governed by the 'License Agreement for Encryption for the Masses'
 Modifications and additions to the original source code (contained in this file)
 and all other portions of this file are Copyright (c) 2013-2017 IDRIX
 and are governed by the Apache License 2.0 the full text of which is
 contained in the file License.txt included in VeraCrypt binary and source
 code distribution packages. */
 .
 #include "Tcdefs.h"
 #include <SrRestorePtApi.h>
 #include <io.h>
 #include <propkey.h>
 #include <propvarutil.h>
 #include <sys/types.h>
 #include <sys/stat.h>
 #include <tchar.h>
 #include <Setupapi.h>
 .
 #include "Apidrvr.h"
 #include "BootEncryption.h"
 #include "Boot/Windows/BootCommon.h"
 #include "Combo.h"
 #include "ComSetup.h"
 #include "Dlgcode.h"
 #include "Language.h"
 #include "Registry.h"
 #include "Resource.h"
 .
 #include "Dir.h"
 #include "Setup.h"
 .
 #include "../Common/Resource.h"
 .
 #pragma comment(lib, "Shlwapi.lib")
 .
 using namespace VeraCrypt;
 .
 #pragma warning( disable : 4201 )
 #pragma warning( disable : 4115 )
 .
 #include <shlobj.h>
 .
 #pragma warning( default : 4201 )
 #pragma warning( default : 4115 )
 .
 #include <Strsafe.h>
 .
 #include <Msi.h>
 #include <MsiQuery.h>
 #include <wtsapi32.h>
 .
 #include <cstdarg>

Files:     src/Crypto/Whirlpool.c
Copyright: __NO_COPYRIGHT__ in: src/Crypto/Whirlpool.c
License:   __UNKNOWN__
 THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
 OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
 BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
 WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
 OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
 EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Files:     src/Crypto/GostCipher.c
Copyright: 2016 Disk Cryptography Services for EFI (DCS), Alex Kolotnikov
License:   __UNKNOWN__
 This program and the accompanying materials
 are licensed and made available under the terms and conditions
 of the Apache License, Version 2.0.
 The full text of the license may be found at
 https://opensource.org/licenses/Apache-2.0
 .
 Dynamic SBOX idea is from GostCrypt project. Copyright (c) 2008-2011 TrueCrypt Developers Association

Files:     src/Crypto/jitterentropy-base-user.h
Copyright: 2013-2019 Stephan Mueller <smueller@chronox.de>,
License:   __UNKNOWN__
 License

Files:     src/Crypto/rdseed_ml.asm
Copyright: assigned to the Crypto++ project.
License:   __UNKNOWN__
 This ASM file provides RDSEED to downlevel Microsoft tool chains.
 Everything "just works" under Visual Studio. Other platforms will
 have to run MASM/MASM-64 and then link to the object files.

Files:     src/Main/System.cpp
Copyright: 2008-2012 TrueCrypt Developers Association and which is governed  the TrueCrypt License 3.0.
License:   __UNKNOWN__
 Modifications and additions to the original source code (contained in this file)
 and all other portions of this file are Copyright (c) 2013-2017 IDRIX
 and are governed by the Apache License 2.0 the full text of which is
 contained in the file License.txt included in VeraCrypt binary and source
 code distribution packages.
 .
 Precompiled header

Files:     src/Boot/Windows/Decompressor.c
Copyright: 2002-2004 Mark Adler, version 1.8, 9 Jan 2004
License:   __UNKNOWN__
 This software is provided 'as-is', without any express or implied
 warranty.  In no event will the author be held liable for any damages
 arising from the use of this software.
 .
 Permission is granted to anyone to use this software for any purpose,
 including commercial applications, and to alter it and redistribute it
 freely, subject to the following restrictions:
 .
 1. The origin of this software must not be misrepresented; you must not
 claim that you wrote the original software. If you use this software
 in a product, an acknowledgment in the product documentation would be
 appreciated but is not required.
 2. Altered source versions must be plainly marked as such, and must not be
 misrepresented as being the original software.
 3. This notice may not be removed or altered from any source distribution.
 .
 Mark Adler    madler@alumni.caltech.edu
 .
 Adapted for TrueCrypt
 Adapted for VeraCrypt

Files:     src/Common/Crypto.h
Copyright: 2003-2012 TrueCrypt Developers Association and which is governed  the TrueCrypt License 3.0, also from the source code of
License:   __UNKNOWN__
 Encryption for the Masses 2.02a, which is Copyright (c) 1998-2000 Paul Le Roux
 and which is governed by the 'License Agreement for Encryption for the Masses'
 Modifications and additions to the original source code (contained in this file)
 and all other portions of this file are Copyright (c) 2013-2017 IDRIX
 and are governed by the Apache License 2.0 the full text of which is
 contained in the file License.txt included in VeraCrypt binary and source
 code distribution packages.
 .
 Update the following when adding a new cipher or EA:
 .
 Crypto.h:
 ID #define

Files:     src/Crypto/rdrand_ml.asm
Copyright: assigned to the Crypto++ project.
License:   __UNKNOWN__
 This ASM file provides RDRAND to downlevel Microsoft tool chains.
 Everything "just works" under Visual Studio. Other platforms will
 have to run MASM/MASM-64 and then link to the object files.

Files:     src/Crypto/Camellia.c
Copyright: 2006-2007 NTT (Nippon Telegraph and Telephone Corporation) .
License:   __UNKNOWN__
 SuperCop integration:
 Copyright © 2013 Jussi Kivilinna <jussi.kivilinna@iki.fi>
 .
 VeraCrypt integration:
 Copyright © 2017 Mounir IDRASSI <mounir.idrassi@idrix.fr>
 .
 Redistribution and use in source and binary forms, with or without
 modification, are permitted provided that the following conditions
 are met:
 1. Redistributions of source code must retain the above copyright
 notice, this list of conditions and the following disclaimer as
 the first lines of this file unmodified.
 2. Redistributions in binary form must reproduce the above copyright
 notice, this list of conditions and the following disclaimer in the
 documentation and/or other materials provided with the distribution.
 .
 THIS SOFTWARE IS PROVIDED BY NTT ``AS IS'' AND ANY EXPRESS OR
 IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 IN NO EVENT SHALL NTT BE LIABLE FOR ANY DIRECT, INDIRECT,
 INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 .
 Algorithm Specification
 http://info.isl.ntt.co.jp/crypt/eng/camellia/specifications.html
 .
 Adapted for VeraCrypt

Files:     src/Crypto/jitterentropy-base.c
Copyright: 2014-2019 Stephan Mueller <smueller@chronox.de>,
License:   __UNKNOWN__
 Design

Files:     src/Crypto/SerpentFast_sbox.h
Copyright: 1999-2013 Jack Lloyd
License:   __UNKNOWN__
 The sbox expressions used here were discovered by Dag Arne Osvik and
 are described in his paper "Speeding Up Serpent".
 .
 Botan is released under the Simplified BSD License (see license.txt)

Files:     src/Crypto/gost89_x64.asm
Copyright: 2016 Disk Cryptography Services for EFI (DCS), Alex Kolotnikov
License:   __UNKNOWN__
 This program and the accompanying materials
 are licensed and made available under the terms and conditions
 of the Apache License, Version 2.0.
 .
 The full text of the license may be found at
 https://opensource.org/licenses/Apache-2.0
 .
 Some ideas from article https://xakep.ru/2013/10/19/shifrovanie-gost-28147-89/

#----------------------------------------------------------------------------
# xml and html files (skipped):
#         Translations/Language.da.xml
#         Translations/Language.zh-hk.xml
#         Translations/Language.nn.xml
#         Translations/Language.bg.xml
#         Translations/Language.uz.xml
#         Translations/Language.id.xml
#         Translations/Language.ru.xml
#         Translations/Language.th.xml
#         Translations/Language.be.xml
#         Translations/Language.es.xml
#         Translations/Language.et.xml
#         Translations/Language.pl.xml
#         Translations/Language.pt-br.xml
#         Translations/Language.el.xml
#         Translations/Language.tr.xml
#         Translations/Language.zh-cn.xml
#         Translations/Language.ca.xml
#         Translations/Language.my.xml
#         Translations/Language.ja.xml
#         Translations/Language.vi.xml
#         Translations/Language.zh-tw.xml
#         Translations/Language.ko.xml
#         Translations/Language.ro.xml
#         Translations/Language.sl.xml
#         Translations/Language.hu.xml
#         Translations/Language.it.xml
#         Translations/Language.fr.xml
#         Translations/Language.de.xml
#         Translations/Language.ar.xml
#         Translations/Language.sv.xml
#         Translations/Language.fi.xml
#         Translations/Language.eu.xml
#         Translations/Language.uk.xml
#         Translations/Language.fa.xml
#         Translations/Language.cs.xml
#         Translations/Language.ka.xml
#         Translations/Language.nl.xml
#         Translations/Language.he.xml
#         Translations/Language.lv.xml
#         Translations/Language.sk.xml
#         doc/html/Authenticity and Integrity.html
#         doc/html/Parallelization.html
#         doc/html/Hot Keys.html
#         doc/html/Hidden Operating System.html
#         doc/html/Digital Signatures.html
#         doc/html/Authors.html
#         doc/html/Unencrypted Data in RAM.html
#         doc/html/Standard Compliance.html
#         doc/html/Encryption Algorithms.html
#         doc/html/System Encryption.html
#         doc/html/Security Tokens & Smart Cards.html
#         doc/html/Documentation.html
#         doc/html/Volume Clones.html
#         doc/html/Choosing Passwords and Keyfiles.html
#         doc/html/Portable Mode.html
#         doc/html/Incompatibilities.html
#         doc/html/Legal Information.html
#         doc/html/Introduction.html
#         doc/html/Reallocated Sectors.html
#         doc/html/Defragmenting.html
#         doc/html/Whirlpool.html
#         doc/html/AES.html
#         doc/html/VeraCrypt License.html
#         doc/html/Keyfiles in VeraCrypt.html
#         doc/html/Modes of Operation.html
#         doc/html/Streebog.html
#         doc/html/Notation.html
#         doc/html/Personal Iterations Multiplier (PIM).html
#         doc/html/Wear-Leveling.html
#         doc/html/Hibernation File.html
#         doc/html/Serpent.html
#         doc/html/Mounting VeraCrypt Volumes.html
#         doc/html/RIPEMD-160.html
#         doc/html/VeraCrypt Rescue Disk.html
#         doc/html/Acknowledgements.html
#         doc/html/TrueCrypt Support.html
#         doc/html/Encryption Scheme.html
#         doc/html/Multi-User Environment.html
#         doc/html/Header Key Derivation.html
#         doc/html/Random Number Generator.html
#         doc/html/Security Requirements and Precautions.html
#         doc/html/Pipelining.html
#         doc/html/SHA-256.html
#         doc/html/Supported Systems for System Encryption.html
#         doc/html/Keyfiles.html
#         doc/html/VeraCrypt Background Task.html
#         doc/html/System Favorite Volumes.html
#         doc/html/Issues and Limitations.html
#         doc/html/Journaling File Systems.html
#         doc/html/Release Notes.html
#         doc/html/liberapay_donate.svg
#         doc/html/Data Leaks.html
#         doc/html/Source Code.html
#         doc/html/Malware.html
#         doc/html/Changing Passwords and Keyfiles.html
#         doc/html/Default Mount Parameters.html
#         doc/html/Donation.html
#         doc/html/VeraCrypt Volume.html
#         doc/html/Trim Operation.html
#         doc/html/Cascades.html
#         doc/html/Uninstalling VeraCrypt.html
#         doc/html/Disclaimers.html
#         doc/html/Beginner's Tutorial.html
#         doc/html/Converting TrueCrypt volumes and partitions.html
#         doc/html/Using VeraCrypt Without Administrator Privileges.html
#         doc/html/Favorite Volumes.html
#         doc/html/Technical Details.html
#         doc/html/Hash Algorithms.html
#         doc/html/Program Menu.html
#         doc/html/Security Requirements for Hidden Volumes.html
#         doc/html/Contributed Resources.html
#         doc/html/Donation_Bank.html
#         doc/html/VeraCrypt Volume Format Specification.html
#         doc/html/Language Packs.html
#         doc/html/Contact.html
#         doc/html/Additional Security Requirements and Precautions.html
#         doc/html/FAQ.html
#         doc/html/Sharing over Network.html
#         doc/html/Camellia.html
#         doc/html/Miscellaneous.html
#         doc/html/Memory Dump Files.html
#         doc/html/Creating New Volumes.html
#         doc/html/VeraCrypt System Files.html
#         doc/html/Hidden Volume.html
#         doc/html/Hardware Acceleration.html
#         doc/html/Troubleshooting.html
#         doc/html/Twofish.html
#         doc/html/Removable Medium Volume.html
#         doc/html/Removing Encryption.html
#         doc/html/References.html
#         doc/html/How to Back Up Securely.html
#         doc/html/Kuznyechik.html
#         doc/html/SHA-512.html
#         doc/html/Physical Security.html
#         doc/html/Main Program Window.html
#         doc/html/Supported Operating Systems.html
#         doc/html/Security Model.html
#         doc/html/Plausible Deniability.html
#         doc/html/VeraCrypt Hidden Operating System.html
#         doc/html/Protection of Hidden Volumes.html
#         doc/html/Command Line Usage.html
#         doc/html/Preface.html
#         doc/html/Paging File.html
#         doc/chm/VeraCrypt.hhk
#         doc/chm/VeraCrypt.hhc
#         src/License.html
#         src/Main/Forms/TrueCrypt.fbp
#         src/Mount/Mount.manifest
#         src/Mount/Mount.vcproj
#         src/Build/Resources/MacOSX/Info.plist.xml
#         src/Build/Resources/MacOSX/Info.plist.legacy.xml
#         src/Boot/Windows/Boot.vcproj
#         src/Crypto/Crypto.vcproj
#         src/Format/Format.vcproj
#         src/Format/Format.manifest
#         src/Setup/Portable.manifest
#         src/Setup/Setup.manifest
#         src/Setup/Setup.vcproj
#         src/Setup/Linux/veracrypt.xml
#         src/Setup/MacOSX/veracrypt.pkgproj
#         src/Setup/MacOSX/veracrypt_Legacy.pkgproj
#         src/SetupDLL/Setup.manifest
#         src/SetupDLL/SetupDLL.vcproj
#         src/Driver/Driver.vcproj
#         src/Release/Setup Files/Custom_InstallDirDlg.wxs
#         src/Release/Setup Files/Strings-en.wxl
#         src/Release/Setup Files/Product64.wxs
#         src/Release/Setup Files/Custom_InstallDir.wxs
#         src/ExpandVolume/VeraCryptExpander.manifest
#         src/ExpandVolume/ExpandVolume.vcproj

#----------------------------------------------------------------------------
# huge files   (skipped):
#         doc/chm/VeraCrypt User Guide.chm
#         src/Crypto/kuznyechik_simd.c
#         src/Setup/MacOSX/template.dmg.bz2

#----------------------------------------------------------------------------
# Files marked as NO_LICENSE_TEXT_FOUND may be covered by the following
# license/copyright files.

#----------------------------------------------------------------------------
# License file: License.txt
 VeraCrypt License
 Software distributed under this license is distributed on an "AS
 IS" BASIS WITHOUT WARRANTIES OF ANY KIND. THE AUTHORS AND
 DISTRIBUTORS OF THE SOFTWARE DISCLAIM ANY LIABILITY. ANYONE WHO
 USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART OF THE
 SOFTWARE IS, BY SUCH ACTION(S), ACCEPTING AND AGREEING TO BE
 BOUND BY ALL TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT
 ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE
 SOFTWARE, NOR ANY PART(S) THEREOF.
 .
 VeraCrypt is multi-licensed under Apache License 2.0 and
 the TrueCrypt License version 3.0, a verbatim copy of both
 licenses can be found below.
 .
 This license does not grant you rights to use any
 contributors' name, logo, or trademarks, including IDRIX,
 VeraCrypt and all derivative names.
 For example, the following names are not allowed: VeraCrypt,
 VeraCrypt+, VeraCrypt Professional, iVeraCrypt, etc. Nor any
 other names confusingly similar to the name VeraCrypt (e.g.,
 Vera-Crypt, Vera Crypt, VerKrypt, etc.)
 ____________________________________________________________
 .
 							Apache License
 					   Version 2.0, January 2004
 					https://www.apache.org/licenses/
 .
 TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
 .
 1. Definitions.
 .
   "License" shall mean the terms and conditions for use, reproduction,
   and distribution as defined by Sections 1 through 9 of this document.
 .
   "Licensor" shall mean the copyright owner or entity authorized by
   the copyright owner that is granting the License.
 .
   "Legal Entity" shall mean the union of the acting entity and all
   other entities that control, are controlled by, or are under common
   control with that entity. For the purposes of this definition,
   "control" means (i) the power, direct or indirect, to cause the
   direction or management of such entity, whether by contract or
   otherwise, or (ii) ownership of fifty percent (50%) or more of the
   outstanding shares, or (iii) beneficial ownership of such entity.
 .
   "You" (or "Your") shall mean an individual or Legal Entity
   exercising permissions granted by this License.
 .
   "Source" form shall mean the preferred form for making modifications,
   including but not limited to software source code, documentation
   source, and configuration files.
 .
   "Object" form shall mean any form resulting from mechanical
   transformation or translation of a Source form, including but
   not limited to compiled object code, generated documentation,
   and conversions to other media types.
 .
   "Work" shall mean the work of authorship, whether in Source or
   Object form, made available under the License, as indicated by a
   copyright notice that is included in or attached to the work
   (an example is provided in the Appendix below).
 .
   "Derivative Works" shall mean any work, whether in Source or Object
   form, that is based on (or derived from) the Work and for which the
   editorial revisions, annotations, elaborations, or other modifications
   represent, as a whole, an original work of authorship. For the purposes
   of this License, Derivative Works shall not include works that remain
   separable from, or merely link (or bind by name) to the interfaces of,
   the Work and Derivative Works thereof.
 .
   "Contribution" shall mean any work of authorship, including
   the original version of the Work and any modifications or additions
   to that Work or Derivative Works thereof, that is intentionally
   submitted to Licensor for inclusion in the Work by the copyright owner
   or by an individual or Legal Entity authorized to submit on behalf of
   the copyright owner. For the purposes of this definition, "submitted"
   means any form of electronic, verbal, or written communication sent
   to the Licensor or its representatives, including but not limited to
   communication on electronic mailing lists, source code control systems,
   and issue tracking systems that are managed by, or on behalf of, the
   Licensor for the purpose of discussing and improving the Work, but
   excluding communication that is conspicuously marked or otherwise
   designated in writing by the copyright owner as "Not a Contribution."
 .
   "Contributor" shall mean Licensor and any individual or Legal Entity
   on behalf of whom a Contribution has been received by Licensor and
   subsequently incorporated within the Work.
 .
 2. Grant of Copyright License. Subject to the terms and conditions of
   this License, each Contributor hereby grants to You a perpetual,
   worldwide, non-exclusive, no-charge, royalty-free, irrevocable
   copyright license to reproduce, prepare Derivative Works of,
   publicly display, publicly perform, sublicense, and distribute the
   Work and such Derivative Works in Source or Object form.
 .
 3. Grant of Patent License. Subject to the terms and conditions of
   this License, each Contributor hereby grants to You a perpetual,
   worldwide, non-exclusive, no-charge, royalty-free, irrevocable
   (except as stated in this section) patent license to make, have made,
   use, offer to sell, sell, import, and otherwise transfer the Work,
   where such license applies only to those patent claims licensable
   by such Contributor that are necessarily infringed by their
   Contribution(s) alone or by combination of their Contribution(s)
   with the Work to which such Contribution(s) was submitted. If You
   institute patent litigation against any entity (including a
   cross-claim or counterclaim in a lawsuit) alleging that the Work
   or a Contribution incorporated within the Work constitutes direct
   or contributory patent infringement, then any patent licenses
   granted to You under this License for that Work shall terminate
   as of the date such litigation is filed.
 .
 4. Redistribution. You may reproduce and distribute copies of the
   Work or Derivative Works thereof in any medium, with or without
   modifications, and in Source or Object form, provided that You
   meet the following conditions:
 .
   (a) You must give any other recipients of the Work or
 	  Derivative Works a copy of this License; and
 .
   (b) You must cause any modified files to carry prominent notices
 	  stating that You changed the files; and
 .
   (c) You must retain, in the Source form of any Derivative Works
 	  that You distribute, all copyright, patent, trademark, and
 	  attribution notices from the Source form of the Work,
 	  excluding those notices that do not pertain to any part of
 	  the Derivative Works; and
 .
   (d) If the Work includes a "NOTICE" text file as part of its
 	  distribution, then any Derivative Works that You distribute must
 	  include a readable copy of the attribution notices contained
 	  within such NOTICE file, excluding those notices that do not
 	  pertain to any part of the Derivative Works, in at least one
 	  of the following places: within a NOTICE text file distributed
 	  as part of the Derivative Works; within the Source form or
 	  documentation, if provided along with the Derivative Works; or,
 	  within a display generated by the Derivative Works, if and
 	  wherever such third-party notices normally appear. The contents
 	  of the NOTICE file are for informational purposes only and
 	  do not modify the License. You may add Your own attribution
 	  notices within Derivative Works that You distribute, alongside
 	  or as an addendum to the NOTICE text from the Work, provided
 	  that such additional attribution notices cannot be construed
 	  as modifying the License.
 .
   You may add Your own copyright statement to Your modifications and
   may provide additional or different license terms and conditions
   for use, reproduction, or distribution of Your modifications, or
   for any such Derivative Works as a whole, provided Your use,
   reproduction, and distribution of the Work otherwise complies with
   the conditions stated in this License.
 .
 5. Submission of Contributions. Unless You explicitly state otherwise,
   any Contribution intentionally submitted for inclusion in the Work
   by You to the Licensor shall be under the terms and conditions of
   this License, without any additional terms or conditions.
   Notwithstanding the above, nothing herein shall supersede or modify
   the terms of any separate license agreement you may have executed
   with Licensor regarding such Contributions.
 .
 6. Trademarks. This License does not grant permission to use the trade
   names, trademarks, service marks, or product names of the Licensor,
   except as required for reasonable and customary use in describing the
   origin of the Work and reproducing the content of the NOTICE file.
 .
 7. Disclaimer of Warranty. Unless required by applicable law or
   agreed to in writing, Licensor provides the Work (and each
   Contributor provides its Contributions) on an "AS IS" BASIS,
   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
   implied, including, without limitation, any warranties or conditions
   of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
   PARTICULAR PURPOSE. You are solely responsible for determining the
   appropriateness of using or redistributing the Work and assume any
   risks associated with Your exercise of permissions under this License.
 .
 8. Limitation of Liability. In no event and under no legal theory,
   whether in tort (including negligence), contract, or otherwise,
   unless required by applicable law (such as deliberate and grossly
   negligent acts) or agreed to in writing, shall any Contributor be
   liable to You for damages, including any direct, indirect, special,
   incidental, or consequential damages of any character arising as a
   result of this License or out of the use or inability to use the
   Work (including but not limited to damages for loss of goodwill,
   work stoppage, computer failure or malfunction, or any and all
   other commercial damages or losses), even if such Contributor
   has been advised of the possibility of such damages.
 .
 9. Accepting Warranty or Additional Liability. While redistributing
   the Work or Derivative Works thereof, You may choose to offer,
   and charge a fee for, acceptance of support, warranty, indemnity,
   or other liability obligations and/or rights consistent with this
   License. However, in accepting such obligations, You may act only
   on Your own behalf and on Your sole responsibility, not on behalf
   of any other Contributor, and only if You agree to indemnify,
   defend, and hold each Contributor harmless for any liability
   incurred by, or claims asserted against, such Contributor by reason
   of your accepting any such warranty or additional liability.
 ____________________________________________________________
 .
 TrueCrypt License Version 3.0
 .
 Software distributed under this license is distributed on an "AS
 IS" BASIS WITHOUT WARRANTIES OF ANY KIND. THE AUTHORS AND
 DISTRIBUTORS OF THE SOFTWARE DISCLAIM ANY LIABILITY. ANYONE WHO
 USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART OF THE
 SOFTWARE IS, BY SUCH ACTION(S), ACCEPTING AND AGREEING TO BE
 BOUND BY ALL TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT
 ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE
 SOFTWARE, NOR ANY PART(S) THEREOF.
 .
 .
 I. Definitions
 .
 1. "This Product" means the work (including, but not limited to,
 source code, graphics, texts, and accompanying files) made
 available under and governed by this version of this license
 ("License"), as may be indicated by, but is not limited to,
 copyright notice(s) attached to or included in the work.
 .
 2. "You" means (and "Your" refers to) an individual or a legal
 entity (e.g., a non-profit organization, commercial
 organization, government agency, etc.) exercising permissions
 granted by this License.
 .
 3. "Modification" means (and "modify" refers to) any alteration
 of This Product, including, but not limited to, addition to or
 deletion from the substance or structure of This Product,
 translation into another language, repackaging, alteration or
 removal of any file included with This Product, and addition of
 any new files to This Product.
 .
 4. "Your Product" means This Product modified by You, or any
 work You derive from (or base on) any part of This Product. In
 addition, "Your Product" means any work in which You include any
 (modified or unmodified) portion of This Product. However, if
 the work in which you include it is an aggregate software
 distribution (such as an operating system distribution or a
 cover CD-ROM of a magazine) containing multiple separate
 products, then the term "Your Product" includes only those
 products (in the aggregate software distribution) that use,
 include, or depend on a modified or unmodified version of This
 Product (and the term "Your Product" does not include the whole
 aggregate software distribution). For the purposes of this
 License, a product suite consisting of two or more products is
 considered a single product (operating system distributions and
 cover media of magazines are not considered product suites).
 .
 5. "Distribution" means (and "distribute" refers to), regardless
 of means or methods, conveyance, transfer, providing, or making
 available of This/Your Product or portions thereof to third
 parties (including, but not limited to, making This/Your
 Product, or portions thereof, available for download to third
 parties, whether or not any third party has downloaded the
 product, or any portion thereof, made available for download).
 .
 .
 .
 II. Use, Copying, and Distribution of This Product
 .
 1. Provided that You comply with all applicable terms and
 conditions of this License, You may make copies of This Product
 (unmodified) and distribute copies of This Product (unmodified)
 that are not included in another product forming Your Product
 (except as permitted under Chapter III). Note: For terms and
 conditions for copying and distribution of modified versions of
 This Product, see Chapter III.
 .
 2. Provided that You comply with all applicable terms and
 conditions of this License, You may use This Product freely (see
 also Chapter III) on any number of computers/systems for non-
 commercial and/or commercial purposes.
 .
 .
 .
 III. Modification, Derivation, and Inclusion in Other Products
 .
 1. If all conditions specified in the following paragraphs in
 this Chapter (III) are met (for exceptions, see Section III.2)
 and if You comply with all other applicable terms and conditions
 of this License, You may modify This Product (thus forming Your
 Product), derive new works from This Product or portions thereof
 (thus forming Your Product), include This Product or portions
 thereof in another product (thus forming Your Product, unless
 defined otherwise in Chapter I), and You may use (for non-
 commercial and/or commercial purposes), copy, and/or distribute
 Your Product.
 .
     a. The name of Your Product (or of Your modified version of
     This Product) must not contain the name TrueCrypt (for
     example, the following names are not allowed: TrueCrypt,
     TrueCrypt+, TrueCrypt Professional, iTrueCrypt, etc.) nor
     any other names confusingly similar to the name TrueCrypt
     (e.g., True-Crypt, True Crypt, TruKrypt, etc.)
 .
     All occurrences of the name TrueCrypt that could reasonably
     be considered to identify Your Product must be removed from
     Your Product and from any associated materials. Logo(s)
     included in (or attached to) Your Product (and in/to
     associated materials) must not incorporate and must not be
     confusingly similar to any of the TrueCrypt logos
     (including, but not limited to, the non-textual logo
     consisting primarily of a key in stylized form) or
     portion(s) thereof. All graphics contained in This Product
     (logos, icons, etc.) must be removed from Your Product (or
     from Your modified version of This Product) and from any
     associated materials.
 .
     b. The following phrases must be removed from Your Product
     and from any associated materials, except the text of this
     License: "A TrueCrypt Foundation Release", "Released by
     TrueCrypt Foundation", "This is a TrueCrypt Foundation
     release."
 .
     c. Phrase "Based on TrueCrypt, freely available at
     http://www.truecrypt.org/" must be displayed by Your Product
     (if technically feasible) and contained in its
     documentation. Alternatively, if This Product or its portion
     You included in Your Product constitutes only a minor
     portion of Your Product, phrase "Portions of this product
     are based in part on TrueCrypt, freely available at
     http://www.truecrypt.org/" may be displayed instead. In each
     of the cases mentioned above in this paragraph,
     "http://www.truecrypt.org/" must be a hyperlink (if
     technically feasible) pointing to http://www.truecrypt.org/
     and You may freely choose the location within the user
     interface (if there is any) of Your Product (e.g., an
     "About" window, etc.) and the way in which Your Product will
     display the respective phrase.
 .
     Your Product (and any associated materials, e.g., the
     documentation, the content of the official web site of Your
     Product, etc.) must not present any Internet address
     containing the domain name truecrypt.org (or any domain name
     that forwards to the domain name truecrypt.org) in a manner
     that might suggest that it is where information about Your
     Product may be obtained or where bugs found in Your Product
     may be reported or where support for Your Product may be
     available or otherwise attempt to indicate that the domain
     name truecrypt.org is associated with Your Product.
 .
     d. The complete source code of Your Product must be freely
     and publicly available (for exceptions, see Section III.2)
     at least until You cease to distribute Your Product. This
     condition can be met in one or both of the following ways:
     (i) You include the complete source code of Your Product
     with every copy of Your Product that You make and distribute
     and You make all such copies of Your Product available to
     the general public free of charge, and/or (ii) You include
     information (valid and correct at least until You cease to
     distribute Your Product) about where the complete source
     code of Your Product can be obtained free of charge (e.g.,
     an Internet address) or for a reasonable reproduction fee
     with every copy of Your Product that You make and distribute
     and, if there is a web site officially associated with Your
     Product, You include the aforementioned information about
     the source code on a freely and publicly accessible web
     page to which such web site links via an easily viewable
     hyperlink (at least until You cease to distribute Your
     Product).
 .
     The source code of Your Product must not be deliberately
     obfuscated and it must not be in an intermediate form (e.g.,
     the output of a preprocessor). Source code means the
     preferred form in which a programmer would usually modify
     the program.
 .
     Portions of the source code of Your Product not contained in
     This Product (e.g., portions added by You in creating Your
     Product, whether created by You or by third parties) must be
     available under license(s) that (however, see also
     Subsection III.1.e) allow(s) anyone to modify and derive new
     works from the portions of the source code that are not
     contained in This Product and to use, copy, and redistribute
     such modifications and/or derivative works. The license(s)
     must be perpetual, non-exclusive, royalty-free, no-charge,
     and worldwide, and must not invalidate, weaken, restrict,
     interpret, amend, modify, interfere with or otherwise affect
     any part, term, provision, or clause of this License. The
     text(s) of the license(s) must be included with every copy
     of Your Product that You make and distribute.
 .
     e. You must not change the license terms of This Product in
     any way (adding any new terms is considered changing the
     license terms even if the original terms are retained),
     which means, e.g., that no part of This Product may be put
     under another license. You must keep intact all the legal
     notices contained in the source code files. You must include
     the following items with every copy of Your Product that You
     make and distribute: a clear and conspicuous notice stating
     that Your Product or portion(s) thereof is/are governed by
     this version of the TrueCrypt License, a verbatim copy of
     this version of the TrueCrypt License (as contained herein),
     a clear and conspicuous notice containing information about
     where the included copy of the License can be found, and an
     appropriate copyright notice.
 .
 .
 2. You are not obligated to comply with Subsection III.1.d if
 Your Product is not distributed (i.e., Your Product is available
 only to You).
 .
 .
 .
 IV. Disclaimer of Liability, Disclaimer of Warranty,
 Indemnification
 .
 You expressly acknowledge and agree to the following:
 .
 1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY
 APPLICABLE INTELLECTUAL-PROPERTY OWNER, OR ANY OTHER PARTY WHO
 MAY COPY AND/OR (RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF,
 AS MAY BE PERMITTED HEREIN, BE LIABLE TO YOU OR TO ANY OTHER
 PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY
 DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE,
 EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
 TO, CORRUPTION OR LOSS OF DATA, ANY LOSSES SUSTAINED BY YOU OR
 THIRD PARTIES, A FAILURE OF THIS PRODUCT TO OPERATE WITH ANY
 OTHER PRODUCT, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR
 BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY,
 TORT (INCLUDING, BUT NOT LIMITED TO, NEGLIGENCE) OR OTHERWISE,
 ARISING OUT OF THE USE, COPYING, MODIFICATION, OR
 (RE)DISTRIBUTION OF THIS PRODUCT (OR A PORTION THEREOF) OR OF
 YOUR PRODUCT (OR A PORTION THEREOF), OR INABILITY TO USE THIS
 PRODUCT (OR A PORTION THEREOF), EVEN IF SUCH DAMAGES (OR THE
 POSSIBILITY OF SUCH DAMAGES) ARE/WERE PREDICTABLE OR KNOWN TO
 ANY (CO)AUTHOR, INTELLECTUAL-PROPERTY OWNER, OR ANY OTHER PARTY.
 .
 2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY
 KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT
 LIMITED TO, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
 PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE ENTIRE RISK AS TO
 THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. SHOULD
 THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
 NECESSARY SERVICING, REPAIR, OR CORRECTION.
 .
 3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC
 ALGORITHMS THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT
 CONTROL REGULATIONS) OR ILLEGAL IN SOME COUNTRIES. IT IS SOLELY
 YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR
 (RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS THEREOF) IN
 COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND
 TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT
 IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE
 REGULATIONS, RESTRICTIONS, AND LAWS.
 .
 4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS
 PRODUCT, AND APPLICABLE INTELLECTUAL-PROPERTY OWNERS, HARMLESS
 FROM AND AGAINST ANY AND ALL LIABILITY, DAMAGES, LOSSES,
 SETTLEMENTS, PENALTIES, FINES, COSTS, EXPENSES (INCLUDING
 REASONABLE ATTORNEYS' FEES), DEMANDS, CAUSES OF ACTION, CLAIMS,
 ACTIONS, PROCEEDINGS, AND SUITS, DIRECTLY RELATED TO OR ARISING
 OUT OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION,
 IMPORT AND/OR (RE)EXPORT OF THIS PRODUCT (OR PORTIONS THEREOF)
 AND/OR YOUR BREACH OF ANY TERM OF THIS LICENSE.
 .
 .
 .
 V. Trademarks
 .
 This License does not grant permission to use trademarks
 associated with (or applying to) This Product, except for fair
 use as defined by applicable law and except for use expressly
 permitted or required by this License. Any attempt otherwise to
 use trademarks associated with (or applying to) This Product
 automatically and immediately terminates Your rights under This
 License and may constitute trademark infringement (which may be
 prosecuted).
 .
 .
 .
 VI. General Terms and Conditions, Miscellaneous Provisions
 .
 1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES
 DERIVATIVE WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY
 PORTION(S) THEREOF, IS, BY SUCH ACTION(S), AGREEING TO BE BOUND
 BY AND ACCEPTING ALL TERMS AND CONDITIONS OF THIS LICENSE (AND
 THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE).
 IF YOU DO NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS AND
 CONDITIONS OF THIS LICENSE, DO NOT USE, COPY, MODIFY, CREATE
 DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY
 PORTION(S) THEREOF.
 .
 2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF,
 (RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S)
 THEREOF, EXCEPT AS EXPRESSLY PROVIDED IN THIS LICENSE (EVEN IF
 APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT (EVEN IF
 PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY,
 CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS
 PRODUCT, OR PORTION(S) THEREOF, AUTOMATICALLY AND IMMEDIATELY
 TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CONSTITUTE
 COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). ANY CONDITIONS
 AND RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS
 ON THE SCOPE OF THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR
 RIGHTS UNDER THIS LICENSE. YOUR FAILURE TO COMPLY WITH THE TERMS
 AND CONDITIONS OF THIS LICENSE OR FAILURE TO PERFORM ANY
 APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND
 IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN
 CAUSE OR BE CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE
 PROSECUTED). NOTHING IN THIS LICENSE SHALL IMPLY OR BE CONSTRUED
 AS A PROMISE, OBLIGATION, OR COVENANT NOT TO SUE FOR COPYRIGHT
 OR TRADEMARK INFRINGEMENT IF YOU DO NOT COMPLY WITH THE TERMS
 AND CONDITIONS OF THIS LICENSE.
 .
 3. This License does not constitute or imply a waiver of any
 intellectual property rights except as may be otherwise
 expressly provided in this License. This License does not
 transfer, assign, or convey any intellectual property rights
 (e.g., it does not transfer ownership of copyrights or
 trademarks).
 .
 4. Subject to the terms and conditions of this License, You may
 allow a third party to use Your copy of This Product (or a copy
 that You make and distribute, or Your Product) provided that the
 third party explicitly accepts and agrees to be bound by all
 terms and conditions of this License and the third party is not
 prohibited from using This Product (or portions thereof) by this
 License (see, e.g., Section VI.7) or by applicable law. However,
 You are not obligated to ensure that the third party accepts
 (and agrees to be bound by all terms of) this License if You
 distribute only the self-extracting package (containing This
 Product) that does not allow the user to install (nor extract)
 the files contained in the package until he or she accepts and
 agrees to be bound by all terms and conditions of this License.
 .
 5. Without specific prior written permission from the authors of
 This Product (or from their common representative), You must not
 use the name of This Product, the names of the authors of This
 Product, or the names of the legal entities (or informal groups)
 of which the authors were/are members/employees, to endorse or
 promote Your Product or any work in which You include a modified
 or unmodified version of This Product, or to endorse or promote
 You or Your affiliates, or in a way that might suggest that Your
 Product (or any work in which You include a modified or
 unmodified version of This Product), You, or Your affiliates
 is/are endorsed by one or more authors of This Product, or in a
 way that might suggest that one or more authors of This Product
 is/are affiliated with You (or Your affiliates) or directly
 participated in the creation of Your Product or of any work in
 which You include a modified or unmodified version of This
 Product.
 .
 6. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS
 LICENSE OR IF YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL
 TERMS AND CONDITIONS OF THIS LICENSE, YOU MUST NOT USE, COPY,
 MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS
 PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A
 LAWYER.
 .
 7. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS
 LICENSE IS UNENFORCEABLE, INVALID, OR PROHIBITED UNDER
 APPLICABLE LAW IN YOUR JURISDICTION, YOU HAVE NO RIGHTS UNDER
 THIS LICENSE AND YOU MUST NOT USE, COPY, MODIFY, CREATE
 DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY
 PORTION(S) THEREOF.
 .
 8. Except as otherwise provided in this License, if any
 provision of this License, or a portion thereof, is found to be
 invalid or unenforceable under applicable law, it shall not
 affect the validity or enforceability of the remainder of this
 License, and such invalid or unenforceable provision shall be
 construed to reflect the original intent of the provision and
 shall be enforced to the maximum extent permitted by applicable
 law so as to effect the original intent of the provision as
 closely as possible.
 .
 ____________________________________________________________
 .
 .
 Third-Party Licenses
 .
 This Product contains components that were created by third
 parties and that are governed by third-party licenses, which are
 contained hereinafter (separated by lines consisting of
 underscores). Each of the third-party licenses applies only to
 (portions of) the source code file(s) in which the third-party
 license is contained or in which it is explicitly referenced,
 and to compiled or otherwise processed forms of such source
 code. None of the third-party licenses applies to This Product
 as a whole, even when it uses terms such as "product",
 "program", or any other equivalent terms/phrases. This Product
 as a whole is governed by the TrueCrypt License (see above).
 Some of the third-party components have been modified by the
 authors of This Product. Unless otherwise stated, such
 modifications and additions are governed by the TrueCrypt
 License (see above). Note: Unless otherwise stated, graphics and
 files that are not part of the source code are governed by the
 TrueCrypt License.
 .
 ____________________________________________________________
 .
 License agreement for Encryption for the Masses.
 .
 Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved.
 .
 This product can be copied and distributed free of charge,
 including source code.
 .
 You may modify this product and source code, and distribute such
 modifications, and you may derive new works based on this
 product, provided that:
 .
 1. Any product which is simply derived from this product cannot
 be called E4M, or Encryption for the Masses.
 .
 2. If you use any of the source code in your product, and your
 product is distributed with source code, you must include this
 notice with those portions of this source code that you use.
 .
 Or,
 .
 If your product is distributed in binary form only, you must
 display on any packaging, and marketing materials which
 reference your product, a notice which states:
 .
 "This product uses components written by Paul Le Roux
 <pleroux@swprofessionals.com>"
 .
 3. If you use any of the source code originally by Eric Young,
 you must in addition follow his terms and conditions.
 .
 4. Nothing requires that you accept this License, as you have
 not signed it. However, nothing else grants you permission to
 modify or distribute the product or its derivative works.
 .
 These actions are prohibited by law if you do not accept this
 License.
 .
 5. If any of these license terms is found to be to broad in
 scope, and declared invalid by any court or legal process, you
 agree that all other terms shall not be so affected, and shall
 remain valid and enforceable.
 .
 6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE
 IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
 APPLICABLE LAW. UNLESS OTHERWISE STATED THE PROGRAM IS PROVIDED
 "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR
 IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
 ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS
 WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE
 COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
 .
 7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
 WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY
 MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE
 LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,
 INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
 INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS
 OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
 YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH
 ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD
 PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
 ____________________________________________________________
 .
 Copyright (c) 1998-2008, Brian Gladman, Worcester, UK.
 All rights reserved.
 .
 LICENSE TERMS
 .
 The free distribution and use of this software is allowed (with
 or without changes) provided that:
 .
  1. source code distributions include the above copyright
     notice, this list of conditions and the following
     disclaimer;
 .
  2. binary distributions include the above copyright notice,
     this list of conditions and the following disclaimer in
     their documentation;
 .
  3. the name of the copyright holder is not used to endorse
     products built using this software without specific written
     permission.
 .
 DISCLAIMER
 .
 This software is provided 'as is' with no explicit or implied
 warranties in respect of its properties, including, but not
 limited to, correctness and/or fitness for purpose.
 ____________________________________________________________
 .
 Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler
 .
   This software is provided 'as-is', without any express or implied
   warranty.  In no event will the authors be held liable for any damages
   arising from the use of this software.
 .
   Permission is granted to anyone to use this software for any purpose,
   including commercial applications, and to alter it and redistribute it
   freely, subject to the following restrictions:
 .
   1. The origin of this software must not be misrepresented; you must not
      claim that you wrote the original software. If you use this software
      in a product, an acknowledgment in the product documentation would be
      appreciated but is not required.
   2. Altered source versions must be plainly marked as such, and must not be
      misrepresented as being the original software.
   3. This notice may not be removed or altered from any source distribution.
 .
   Jean-loup Gailly        Mark Adler
   jloup@gzip.org          madler@alumni.caltech.edu
 ____________________________________________________________
 Copyright (C) 1999-2017 Dieter Baron and Thomas Klausner
 .
 The authors can be contacted at <libzip@nih.at>
 .
 Redistribution and use in source and binary forms, with or without
 modification, are permitted provided that the following conditions
 are met:
 .
 1. Redistributions of source code must retain the above copyright
   notice, this list of conditions and the following disclaimer.
 .
 2. Redistributions in binary form must reproduce the above copyright
   notice, this list of conditions and the following disclaimer in
   the documentation and/or other materials provided with the
   distribution.
 .
 3. The names of the authors may not be used to endorse or promote
   products derived from this software without specific prior
   written permission.
 .
 THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS
 OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
 DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
 GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
 IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
 OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
 IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 ____________________________________________________________
 Copyright (c) 2013, Alexey Degtyarev. All rights reserved.
 .
 ____________________________________________________________
 Copyright (c) 2016. Disk Cryptography Services for EFI (DCS), Alex Kolotnikov
 This program and the accompanying materials are licensed and made available
 under the terms and conditions of the GNU Lesser General Public License,
 version 3.0 (LGPL-3.0).
 .
 The full text of the license may be found at https://opensource.org/licenses/LGPL-3.0
 ____________________________________________________________
 Copyright (c) 1999-2016 Jack Lloyd.
 .
 All rights reserved.
 .
 Redistribution and use in source and binary forms, with or without
 modification, are permitted provided that the following conditions
 are met:
 .
 1. Redistributions of source code must retain the above copyright
   notice, this list of conditions and the following disclaimer.
 .
 2. Redistributions in binary form must reproduce the above copyright
   notice, this list of conditions and the following disclaimer in
   the documentation and/or other materials provided with the
   distribution.
 .
 THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS
 OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
 DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
 GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
 IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
 OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
 IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 ____________________________________________________________
 Copyright (c) 2013-2018 Stephan Mueller <smueller@chronox.de>
 .
 Redistribution and use in source and binary forms, with or without
 modification, are permitted provided that the following conditions
 are met:
 .
 1. Redistributions of source code must retain the above copyright
    notice, and the entire permission notice in its entirety,
    including the disclaimer of warranties.
 .
 2. Redistributions in binary form must reproduce the above copyright
    notice, this list of conditions and the following disclaimer in
    the documentation and/or other materials provided with the
    distribution.
 .
 3. The name of the author may not be used to endorse or promote
    products derived from this software without specific prior
    written permission.
 .
 ALTERNATIVELY, this product may be distributed under the terms of
 the GNU General Public License, in which case the provisions of the
 GPL2 are required INSTEAD OF the above restrictions. (This clause is
 necessary due to a potential bad interaction between the GPL and the
 restrictions contained in a BSD-style copyright.)
 .
 THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
 WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, ALL OF WHICH
 ARE HEREBY DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
 ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
 BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
 SOFTWARE, EVEN IF NOT ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 ____________________________________________________________
