VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Main/VolumeHistory.h
diff options
context:
space:
mode:
Diffstat (limited to 'src/Main/VolumeHistory.h')
0 files changed, 0 insertions, 0 deletions
text=1'>doc/html/BCH_Logo_30x30.pngbin0 -> 1918 bytes-rw-r--r--doc/html/BCH_Logo_48x30.pngbin2064 -> 0 bytes-rw-r--r--doc/html/BLAKE2s-256.html (renamed from doc/html/RIPEMD-160.html)16
-rw-r--r--doc/html/Beginner's Tutorial.html6
-rw-r--r--doc/html/Command Line Usage.html22
-rw-r--r--doc/html/CompilingGuidelineLinux.html314
-rw-r--r--doc/html/CompilingGuidelineWin.html1225
-rw-r--r--doc/html/CompilingGuidelineWin/AddNewSystemVar.jpgbin0 -> 71100 bytes-rw-r--r--doc/html/CompilingGuidelineWin/CertVerifyFails.jpgbin0 -> 15443 bytes-rw-r--r--doc/html/CompilingGuidelineWin/CertificateCannotBeVerified.jpgbin0 -> 87022 bytes-rw-r--r--doc/html/CompilingGuidelineWin/DistributionPackageDamaged.jpgbin0 -> 10581 bytes-rw-r--r--doc/html/CompilingGuidelineWin/DownloadVS2010.jpgbin0 -> 167558 bytes-rw-r--r--doc/html/CompilingGuidelineWin/DownloadVS2019.jpgbin0 -> 231800 bytes-rw-r--r--doc/html/CompilingGuidelineWin/DownloadVSBuildTools.jpgbin0 -> 187788 bytes-rw-r--r--doc/html/CompilingGuidelineWin/NasmCommandLine.jpgbin0 -> 27541 bytes-rw-r--r--doc/html/CompilingGuidelineWin/RegeditPermissions-1.jpgbin0 -> 42281 bytes-rw-r--r--doc/html/CompilingGuidelineWin/RegeditPermissions-2.jpgbin0 -> 82730 bytes-rw-r--r--doc/html/CompilingGuidelineWin/RegeditPermissions-3.jpgbin0 -> 48073 bytes-rw-r--r--doc/html/CompilingGuidelineWin/RegeditPermissions-4.jpgbin0 -> 20213 bytes-rw-r--r--doc/html/CompilingGuidelineWin/SelectAdvancedSystemSettings.jpgbin0 -> 142348 bytes-rw-r--r--doc/html/CompilingGuidelineWin/SelectEnvironmentVariables.jpgbin0 -> 41283 bytes-rw-r--r--doc/html/CompilingGuidelineWin/SelectPathVariable.jpgbin0 -> 71894 bytes-rw-r--r--doc/html/CompilingGuidelineWin/SelectThisPC.jpgbin0 -> 50245 bytes-rw-r--r--doc/html/CompilingGuidelineWin/VS2010BuildSolution.jpgbin0 -> 59737 bytes-rw-r--r--doc/html/CompilingGuidelineWin/VS2010Win32Config.jpgbin0 -> 167454 bytes-rw-r--r--doc/html/CompilingGuidelineWin/VS2010X64Config.jpgbin0 -> 149165 bytes-rw-r--r--doc/html/CompilingGuidelineWin/VS2019ARM64Config.jpgbin0 -> 58551 bytes-rw-r--r--doc/html/CompilingGuidelineWin/VS2019BuildSolution.jpgbin0 -> 49572 bytes-rw-r--r--doc/html/CompilingGuidelineWin/YasmCommandLine.jpgbin0 -> 33328 bytes-rw-r--r--doc/html/CompilingGuidelineWin/gzipCommandLine.jpgbin0 -> 28217 bytes-rw-r--r--doc/html/CompilingGuidelineWin/upxCommandLine.jpgbin0 -> 52807 bytes-rw-r--r--doc/html/CompilingGuidelines.html47
-rw-r--r--doc/html/Conversion_Guide_VeraCrypt_1.26_and_Later.html100
-rw-r--r--doc/html/Converting TrueCrypt volumes and partitions.html8
-rw-r--r--doc/html/Creating New Volumes.html2
-rw-r--r--doc/html/Documentation.html13
-rw-r--r--doc/html/Donation.html131
-rw-r--r--doc/html/Donation_Bank.html15
-rw-r--r--doc/html/Donation_VC_BTC_Sigwit.pngbin1399 -> 24361 bytes-rw-r--r--doc/html/Donation_VeraCrypt_BitcoinCash.pngbin8805 -> 24904 bytes-rw-r--r--doc/html/Donation_VeraCrypt_Bitcoin_small.pngbin9096 -> 5917 bytes-rw-r--r--doc/html/Donation_VeraCrypt_Ethereum.pngbin9694 -> 29006 bytes-rw-r--r--doc/html/Donation_VeraCrypt_Litecoin.pngbin7619 -> 6010 bytes-rw-r--r--doc/html/Donation_VeraCrypt_Monero.pngbin7073 -> 7674 bytes-rw-r--r--doc/html/EMV Smart Cards.html87
-rw-r--r--doc/html/Encryption Scheme.html2
-rw-r--r--doc/html/FAQ.html63
-rw-r--r--doc/html/Hash Algorithms.html4
-rw-r--r--doc/html/Header Key Derivation.html25
-rw-r--r--doc/html/Hibernation File.html2
-rw-r--r--doc/html/Hidden Volume.html2
-rw-r--r--doc/html/Incompatibilities.html2
-rw-r--r--doc/html/Introduction.html2
-rw-r--r--doc/html/Issues and Limitations.html8
-rw-r--r--doc/html/Keyfiles in VeraCrypt.html20
-rw-r--r--doc/html/Keyfiles.html295
-rw-r--r--doc/html/LTC_Logo_30x30.pngbin1833 -> 1756 bytes-rw-r--r--doc/html/Language Packs.html8
-rw-r--r--doc/html/Legal Information.html11
-rw-r--r--doc/html/Main Program Window.html22
-rw-r--r--doc/html/Multi-User Environment.html6
-rw-r--r--doc/html/Normal Unmount vs Force Unmount.html77
-rw-r--r--doc/html/Personal Iterations Multiplier (PIM).html16
-rw-r--r--doc/html/Portable Mode.html4
-rw-r--r--doc/html/Program Menu.html32
-rw-r--r--doc/html/Protection of Hidden Volumes.html10
-rw-r--r--doc/html/Random Number Generator.html4
-rw-r--r--doc/html/Release Notes.html294
-rw-r--r--doc/html/Removable Medium Volume.html4
-rw-r--r--doc/html/Removing Encryption.html2
-rw-r--r--doc/html/Security Model.html8
-rw-r--r--doc/html/Security Requirements and Precautions.html2
-rw-r--r--doc/html/Security Requirements for Hidden Volumes.html2
-rw-r--r--doc/html/Sharing over Network.html2
-rw-r--r--doc/html/Supported Operating Systems.html27
-rw-r--r--doc/html/Supported Systems for System Encryption.html10
-rw-r--r--doc/html/System Encryption.html13
-rw-r--r--doc/html/System Favorite Volumes.html4
-rw-r--r--doc/html/Technical Details.html9
-rw-r--r--doc/html/Trim Operation.html23
-rw-r--r--doc/html/Troubleshooting.html2
-rw-r--r--doc/html/TrueCrypt Support.html3
-rw-r--r--doc/html/Unencrypted Data in RAM.html14
-rw-r--r--doc/html/Using VeraCrypt Without Administrator Privileges.html2
-rw-r--r--doc/html/VeraCrypt Background Task.html2
-rw-r--r--doc/html/VeraCrypt Hidden Operating System.html2
-rw-r--r--doc/html/VeraCrypt License.html22
-rw-r--r--doc/html/VeraCrypt Memory Protection.html106
-rw-r--r--doc/html/VeraCrypt RAM Encryption.html158
-rw-r--r--doc/html/donation.js9
-rw-r--r--doc/html/ru/AES.html58
-rw-r--r--doc/html/ru/Acknowledgements.html60
-rw-r--r--doc/html/ru/Additional Security Requirements and Precautions.html52
-rw-r--r--doc/html/ru/Authenticity and Integrity.html54
-rw-r--r--doc/html/ru/Authors.html44
-rw-r--r--doc/html/ru/Avoid Third-Party File Extensions.html85
-rw-r--r--doc/html/ru/BCH_Logo_30x30.pngbin0 -> 1918 bytes-rw-r--r--doc/html/ru/BC_Logo_30x30.pngbin0 -> 4097 bytes-rw-r--r--doc/html/ru/BLAKE2s-256.html59
-rw-r--r--doc/html/ru/Beginner's Tutorial.html244
-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_001.pngbin0 -> 8841 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_002.pngbin0 -> 64537 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_003.pngbin0 -> 62196 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_004.pngbin0 -> 62571 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_005.pngbin0 -> 11623 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_007.pngbin0 -> 62627 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_008.pngbin0 -> 60665 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_009.pngbin0 -> 58962 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_010.pngbin0 -> 60725 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_011.pngbin0 -> 60105 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_012.pngbin0 -> 2135 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_013.pngbin0 -> 56606 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_014.pngbin0 -> 9202 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_015.pngbin0 -> 9034 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_016.pngbin0 -> 13171 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_017.pngbin0 -> 9448 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_018.pngbin0 -> 4925 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_019.pngbin0 -> 5315 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_020.pngbin0 -> 9680 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_021.pngbin0 -> 19898 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_022.pngbin0 -> 10053 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_023.pngbin0 -> 2209 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_024.pngbin0 -> 9985 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_034.pngbin0 -> 5849 bytes-rw-r--r--doc/html/ru/Camellia.html48
-rw-r--r--doc/html/ru/Cascades.html91
-rw-r--r--doc/html/ru/Changing Passwords and Keyfiles.html56
-rw-r--r--doc/html/ru/Choosing Passwords and Keyfiles.html60
-rw-r--r--doc/html/ru/Command Line Usage.html325
-rw-r--r--doc/html/ru/CompilingGuidelineLinux.html314
-rw-r--r--doc/html/ru/CompilingGuidelineWin.html1224
-rw-r--r--doc/html/ru/CompilingGuidelines.html47
-rw-r--r--doc/html/ru/Contact.html54
-rw-r--r--doc/html/ru/Contributed Resources.html65
-rw-r--r--doc/html/ru/Conversion_Guide_VeraCrypt_1.26_and_Later.html101
-rw-r--r--doc/html/ru/Converting TrueCrypt volumes and partitions.html52
-rw-r--r--doc/html/ru/Converting TrueCrypt volumes and partitions_truecrypt_convertion.pngbin0 -> 8581 bytes-rw-r--r--doc/html/ru/Creating New Volumes.html139
-rw-r--r--doc/html/ru/Data Leaks.html91
-rw-r--r--doc/html/ru/Default Mount Parameters.html54
-rw-r--r--doc/html/ru/Default Mount Parameters_VeraCrypt_password_using_default_parameters.pngbin0 -> 5283 bytes-rw-r--r--doc/html/ru/Defragmenting.html53
-rw-r--r--doc/html/ru/Digital Signatures.html122
-rw-r--r--doc/html/ru/Disclaimers.html55
-rw-r--r--doc/html/ru/Documentation.html161
-rw-r--r--doc/html/ru/Donation.html122
-rw-r--r--doc/html/ru/Donation_Bank.html117
-rw-r--r--doc/html/ru/Donation_VC_BTC_Sigwit.pngbin0 -> 24361 bytes-rw-r--r--doc/html/ru/Donation_VeraCrypt_BitcoinCash.pngbin0 -> 24904 bytes-rw-r--r--doc/html/ru/Donation_VeraCrypt_Bitcoin_small.pngbin0 -> 5917 bytes-rw-r--r--doc/html/ru/Donation_VeraCrypt_Ethereum.pngbin0 -> 29006 bytes-rw-r--r--doc/html/ru/Donation_VeraCrypt_Litecoin.pngbin0 -> 6010 bytes-rw-r--r--doc/html/ru/Donation_VeraCrypt_Monero.pngbin0 -> 7674 bytes-rw-r--r--doc/html/ru/Donation_donate.gifbin0 -> 1714 bytes-rw-r--r--doc/html/ru/Donation_donate_CHF.gifbin0 -> 1734 bytes-rw-r--r--doc/html/ru/Donation_donate_Dollars.gifbin0 -> 1788 bytes-rw-r--r--doc/html/ru/Donation_donate_Euros.gifbin0 -> 1744 bytes-rw-r--r--doc/html/ru/Donation_donate_GBP.gifbin0 -> 1766 bytes-rw-r--r--doc/html/ru/Donation_donate_PLN.gifbin0 -> 2893 bytes-rw-r--r--doc/html/ru/Donation_donate_YEN.gifbin0 -> 1765 bytes-rw-r--r--doc/html/ru/EMV Smart Cards.html85
-rw-r--r--doc/html/ru/Encryption Algorithms.html270
-rw-r--r--doc/html/ru/Encryption Scheme.html105
-rw-r--r--doc/html/ru/Ethereum_Logo_19x30.pngbin0 -> 891 bytes-rw-r--r--doc/html/ru/FAQ.html911
-rw-r--r--doc/html/ru/Favorite Volumes.html133
-rw-r--r--doc/html/ru/Hardware Acceleration.html87
-rw-r--r--doc/html/ru/Hash Algorithms.html62
-rw-r--r--doc/html/ru/Header Key Derivation.html104
-rw-r--r--doc/html/ru/Hibernation File.html85
-rw-r--r--doc/html/ru/Hidden Operating System.html51
-rw-r--r--doc/html/ru/Hidden Volume.html123
-rw-r--r--doc/html/ru/Home_VeraCrypt_Default_Mount_Parameters.pngbin0 -> 2176 bytes-rw-r--r--doc/html/ru/Home_VeraCrypt_menu_Default_Mount_Parameters.pngbin0 -> 4897 bytes-rw-r--r--doc/html/ru/Home_facebook_veracrypt.pngbin0 -> 868 bytes-rw-r--r--doc/html/ru/Home_reddit.pngbin0 -> 1456 bytes-rw-r--r--doc/html/ru/Home_utilities-file-archiver-3.pngbin0 -> 2186 bytes-rw-r--r--doc/html/ru/Hot Keys.html41
-rw-r--r--doc/html/ru/How to Back Up Securely.html137
-rw-r--r--doc/html/ru/Incompatibilities.html95
-rw-r--r--doc/html/ru/Introduction.html75
-rw-r--r--doc/html/ru/Issues and Limitations.html176
-rw-r--r--doc/html/ru/Journaling File Systems.html53
-rw-r--r--doc/html/ru/Keyfiles in VeraCrypt.html296
-rw-r--r--doc/html/ru/Keyfiles in VeraCrypt_Image_040.pngbin0 -> 5096 bytes-rw-r--r--doc/html/ru/Keyfiles.html111
-rw-r--r--doc/html/ru/Kuznyechik.html45
-rw-r--r--doc/html/ru/LTC_Logo_30x30.pngbin0 -> 1756 bytes-rw-r--r--doc/html/ru/Language Packs.html55
-rw-r--r--doc/html/ru/Legal Information.html67
-rw-r--r--doc/html/ru/Main Program Window.html136
-rw-r--r--doc/html/ru/Malware.html73
-rw-r--r--doc/html/ru/Memory Dump Files.html72
-rw-r--r--doc/html/ru/Miscellaneous.html48
-rw-r--r--doc/html/ru/Modes of Operation.html134
-rw-r--r--doc/html/ru/Monero_Logo_30x30.pngbin0 -> 1169 bytes-rw-r--r--doc/html/ru/Mounting VeraCrypt Volumes.html79
-rw-r--r--doc/html/ru/Multi-User Environment.html62
-rw-r--r--doc/html/ru/Normal Unmount vs Force Unmount.html77
-rw-r--r--doc/html/ru/Notation.html89
-rw-r--r--doc/html/ru/Paging File.html88
-rw-r--r--doc/html/ru/Parallelization.html62
-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM).html144
-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step1.pngbin0 -> 8551 bytes-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step2.pngbin0 -> 8852 bytes-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step1.pngbin0 -> 9228 bytes-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step2.pngbin0 -> 9494 bytes-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.pngbin0 -> 6027 bytes-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step2.pngbin0 -> 6853 bytes-rw-r--r--doc/html/ru/Physical Security.html67
-rw-r--r--doc/html/ru/Pipelining.html60
-rw-r--r--doc/html/ru/Plausible Deniability.html93
-rw-r--r--doc/html/ru/Portable Mode.html100
-rw-r--r--doc/html/ru/Preface.html43
-rw-r--r--doc/html/ru/Program Menu.html281
-rw-r--r--doc/html/ru/Protection of Hidden Volumes.html145
-rw-r--r--doc/html/ru/Protection of Hidden Volumes_Image_027.pngbin0 -> 5606 bytes-rw-r--r--doc/html/ru/Protection of Hidden Volumes_Image_028.pngbin0 -> 9612 bytes-rw-r--r--doc/html/ru/Protection of Hidden Volumes_Image_029.pngbin0 -> 10946 bytes-rw-r--r--doc/html/ru/Protection of Hidden Volumes_Image_030.pngbin0 -> 6189 bytes-rw-r--r--doc/html/ru/Protection of Hidden Volumes_Image_031.pngbin0 -> 9409 bytes-rw-r--r--doc/html/ru/Random Number Generator.html119
-rw-r--r--doc/html/ru/Reallocated Sectors.html58
-rw-r--r--doc/html/ru/References.html238
-rw-r--r--doc/html/ru/Release Notes.html1253
-rw-r--r--doc/html/ru/Removable Medium Volume.html67
-rw-r--r--doc/html/ru/Removing Encryption.html93
-rw-r--r--doc/html/ru/SHA-256.html45
-rw-r--r--doc/html/ru/SHA-512.html45
-rw-r--r--doc/html/ru/Security Model.html159
-rw-r--r--doc/html/ru/Security Requirements and Precautions.html95
-rw-r--r--doc/html/ru/Security Requirements for Hidden Volumes.html253
-rw-r--r--doc/html/ru/Security Tokens & Smart Cards.html44
-rw-r--r--doc/html/ru/Serpent.html64
-rw-r--r--doc/html/ru/Sharing over Network.html66
-rw-r--r--doc/html/ru/Source Code.html54
-rw-r--r--doc/html/ru/Standard Compliance.html48
-rw-r--r--doc/html/ru/Streebog.html46
-rw-r--r--doc/html/ru/Supported Operating Systems.html60
-rw-r--r--doc/html/ru/Supported Systems for System Encryption.html58
-rw-r--r--doc/html/ru/System Encryption.html103
-rw-r--r--doc/html/ru/System Favorite Volumes.html110
-rw-r--r--doc/html/ru/Technical Details.html68
-rw-r--r--doc/html/ru/Trim Operation.html74
-rw-r--r--doc/html/ru/Troubleshooting.html510
-rw-r--r--doc/html/ru/TrueCrypt Support.html45
-rw-r--r--doc/html/ru/TrueCrypt Support_truecrypt_mode_gui.pngbin0 -> 5310 bytes-rw-r--r--doc/html/ru/Twofish.html50
-rw-r--r--doc/html/ru/Unencrypted Data in RAM.html103
-rw-r--r--doc/html/ru/Uninstalling VeraCrypt.html52
-rw-r--r--doc/html/ru/Using VeraCrypt Without Administrator Privileges.html68
-rw-r--r--doc/html/ru/VeraCrypt Background Task.html62
-rw-r--r--doc/html/ru/VeraCrypt Hidden Operating System.html360
-rw-r--r--doc/html/ru/VeraCrypt License.html442
-rw-r--r--doc/html/ru/VeraCrypt Memory Protection.html106
-rw-r--r--doc/html/ru/VeraCrypt RAM Encryption.html158
-rw-r--r--doc/html/ru/VeraCrypt Rescue Disk.html217
-rw-r--r--doc/html/ru/VeraCrypt System Files.html110
-rw-r--r--doc/html/ru/VeraCrypt Volume Format Specification.html759
-rw-r--r--doc/html/ru/VeraCrypt Volume.html52
-rw-r--r--doc/html/ru/VeraCrypt128x128.pngbin0 -> 13328 bytes-rw-r--r--doc/html/ru/Volume Clones.html50
-rw-r--r--doc/html/ru/Wear-Leveling.html84
-rw-r--r--doc/html/ru/Whirlpool.html51
-rw-r--r--doc/html/ru/arrow_right.gifbin0 -> 49 bytes-rw-r--r--doc/html/ru/bank_30x30.pngbin0 -> 1946 bytes-rw-r--r--doc/html/ru/flag-au-small.pngbin0 -> 1111 bytes-rw-r--r--doc/html/ru/flag-au.pngbin0 -> 1557 bytes-rw-r--r--doc/html/ru/flag-eu-small.pngbin0 -> 935 bytes-rw-r--r--doc/html/ru/flag-eu.pngbin0 -> 1727 bytes-rw-r--r--doc/html/ru/flag-gb-small.pngbin0 -> 1081 bytes-rw-r--r--doc/html/ru/flag-gb.pngbin0 -> 2029 bytes-rw-r--r--doc/html/ru/flag-nz-small.pngbin0 -> 783 bytes-rw-r--r--doc/html/ru/flag-nz.pngbin0 -> 1494 bytes-rw-r--r--doc/html/ru/flag-us-small.pngbin0 -> 1029 bytes-rw-r--r--doc/html/ru/flag-us.pngbin0 -> 1147 bytes-rw-r--r--doc/html/ru/flattr-badge-large.pngbin0 -> 2238 bytes-rw-r--r--doc/html/ru/gf2_mul.gifbin0 -> 869 bytes-rw-r--r--doc/html/ru/liberapay_donate.svg2
-rw-r--r--doc/html/ru/paypal_30x30.pngbin0 -> 1274 bytes-rw-r--r--doc/html/ru/styles.css31
-rw-r--r--doc/html/ru/twitter_veracrypt.PNGbin0 -> 2374 bytes-rw-r--r--doc/html/styles.css51
284 files changed, 18715 insertions, 301 deletions
diff --git a/doc/html/Avoid Third-Party File Extensions.html b/doc/html/Avoid Third-Party File Extensions.html
new file mode 100644
index 00000000..b339e780
--- /dev/null
+++ b/doc/html/Avoid Third-Party File Extensions.html
@@ -0,0 +1,85 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title>
+<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>
+<meta name="keywords" content="encryption, security"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Home</a></li>
+ <li><a href="/code/">Source Code</a></li>
+ <li><a href="Downloads.html">Downloads</a></li>
+ <li><a class="active" href="Documentation.html">Documentation</a></li>
+ <li><a href="Donation.html">Donate</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Documentation</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Avoid%20Third-Party%20File%20Extensions.html">Avoid Third-Party File Extensions</a>
+</p></div>
+
+<div class="wikidoc">
+ <h1>Understanding the Risks of Using Third-Party File Extensions with VeraCrypt</h1>
+ <div>
+ <p>While VeraCrypt provides robust encryption capabilities to secure your data, using third-party file extensions for File Containers or Keyfiles could risk making the encrypted data inaccessible.<br />
+ This guide provides an in-depth explanation of the associated risks, and it outlines recommendations for best practices to mitigate these risks.</p>
+ </div>
+
+ <h2>Risks Associated with File Containers</h2>
+ <div>
+ <p>Using a third-party file extension for File Containers exposes you to several risks:</p>
+ <ul>
+ <li>Overwritten Metadata: Third-party applications may update their metadata, which could overwrite crucial parts of the File Container.</li>
+ <li>Unintentional Changes: Accidentally launching a File Container with a third-party application could modify its metadata without your consent.</li>
+ <li>Container Corruption: These actions could render the container unreadable or unusable.</li>
+ <li>Data Loss: The data within the container might be permanently lost if the container becomes corrupted.</li>
+ </ul>
+ </div>
+
+ <h2>Risks Associated with Keyfiles</h2>
+ <div>
+ <p>Similar risks are associated with Keyfiles:</p>
+ <ul>
+ <li>Keyfile Corruption: Inadvertently modifying a Keyfile with a third-party application can make it unusable for decryption.</li>
+ <li>Overwritten Data: Third-party applications may overwrite the portion of the Keyfile that VeraCrypt uses for decryption.</li>
+ <li>Unintentional Changes: Accidental changes can make it impossible to mount the volume unless you have an unaltered backup of the Keyfile.</li>
+ </ul>
+ </div>
+
+ <h2>Examples of Extensions to Avoid</h2>
+ <div>
+ <p>Avoid using the following types of third-party file extensions:</p>
+ <ul>
+ <li>Media Files: Picture, audio, and video files are subject to metadata changes by their respective software.</li>
+ <li>Archive Files: Zip files can be easily modified, which could disrupt the encrypted volume.</li>
+ <li>Executable Files: Software updates can modify these files, making them unreliable as File Containers or Keyfiles.</li>
+ <li>Document Files: Office and PDF files can be automatically updated by productivity software, making them risky to use.</li>
+ </ul>
+ </div>
+
+ <h2>Recommendations</h2>
+ <div>
+ <p>For secure usage, consider the following best practices:</p>
+ <ul>
+ <li>Use neutral file extensions for File Containers and Keyfiles to minimize the risk of automatic file association.</li>
+ <li>Keep secure backups of your File Containers and Keyfiles in locations isolated from network access.</li>
+ <li>Disable auto-open settings for the specific file extensions you use for VeraCrypt File Containers and Keyfiles.</li>
+ <li>Always double-check file associations and be cautious when using a new device or third-party application.</li>
+ </ul>
+ </div>
+
+<div class="ClearBoth"></div></body></html>
diff --git a/doc/html/BCH_Logo_30x30.png b/doc/html/BCH_Logo_30x30.png
new file mode 100644
index 00000000..00c71cb9
--- /dev/null
+++ b/doc/html/BCH_Logo_30x30.png
Binary files differ
diff --git a/doc/html/BCH_Logo_48x30.png b/doc/html/BCH_Logo_48x30.png
deleted file mode 100644
index db6a2652..00000000
--- a/doc/html/BCH_Logo_48x30.png
+++ /dev/null
Binary files differ
diff --git a/doc/html/RIPEMD-160.html b/doc/html/BLAKE2s-256.html
index a67c8dc6..097b714f 100644
--- a/doc/html/RIPEMD-160.html
+++ b/doc/html/BLAKE2s-256.html
@@ -33,3 +33,3 @@
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
-<a href="RIPEMD-160.html">RIPEMD-160</a>
+<a href="BLAKE2s-256.html">BLAKE2s-256</a>
</p></div>
@@ -37,7 +37,13 @@
<div class="wikidoc">
-<h1>RIPEMD-160</h1>
+<h1>BLAKE2s-256</h1>
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-RIPEMD-160, published in 1996, is a hash algorithm designed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel in an open academic community. The size of the output of RIPEMD-160 is 160 bits. RIPEMD-160 is a strengthened version of the RIPEMD hash algorithm
- that was developed in the framework of the European Union's project RIPE (<em style="text-align:left">RACE Integrity Primitives Evaluation</em>), 1988-1992. RIPEMD-160 was adopted by the International Organization for Standardization (ISO) and the IEC in the
- ISO/IEC 10118-3:2004 international standard [21].</div>
+<p>
+BLAKE2 is a cryptographic hash function based on BLAKE, created by Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, and Christian Winnerlein. It was announced on December 21, 2012. The design goal was to replace the widely used, but broken, MD5 and SHA-1 algorithms in applications requiring high performance in software. BLAKE2 provides better security than SHA-2 and similar to that of SHA-3 (e.g. immunity to length extension, indifferentiability from a random oracle, etc...).<br/>
+BLAKE2 removes addition of constants to message words from BLAKE round function, changes two rotation constants, simplifies padding, adds parameter block that is XOR'ed with initialization vectors, and reduces the number of rounds from 16 to 12 for BLAKE2b (successor of BLAKE-512), and from 14 to 10 for BLAKE2s (successor of BLAKE-256).<br/>
+BLAKE2b and BLAKE2s are specified in RFC 7693.
+</p>
+<p>
+VeraCrypt uses only BLAKE2s with its maximum output size of 32-bytes (256 bits).
+</p>
+</div>
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
diff --git a/doc/html/Beginner's Tutorial.html b/doc/html/Beginner's Tutorial.html
index c39ee596..531a71c2 100644
--- a/doc/html/Beginner's Tutorial.html
+++ b/doc/html/Beginner's Tutorial.html
@@ -190,5 +190,5 @@ You can copy files (or folders) to and from the VeraCrypt volume just as you wou
Note that VeraCrypt never saves any decrypted data to a disk &ndash; it only stores them temporarily in RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted. When you restart Windows or turn off your computer, the volume
- will be dismounted and all files stored on it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), all files stored on the volume will be inaccessible (and encrypted). To make them accessible
+ will be unmounted and all files stored on it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), all files stored on the volume will be inaccessible (and encrypted). To make them accessible
again, you have to mount the volume. To do so, repeat Steps 13-18.</p>
-<p>If you want to close the volume and make files stored on it inaccessible, either restart your operating system or dismount the volume. To do so, follow these steps:<br>
+<p>If you want to close the volume and make files stored on it inaccessible, either restart your operating system or unmount the volume. To do so, follow these steps:<br>
<br>
@@ -197,3 +197,3 @@ Note that VeraCrypt never saves any decrypted data to a disk &ndash; it only sto
Select the volume from the list of mounted volumes in the main VeraCrypt window (marked with a red rectangle in the screenshot above) and then click
-<strong>Dismount </strong>(also marked with a red rectangle in the screenshot above). To make files stored on the volume accessible again, you will have to mount the volume. To do so, repeat Steps 13-18.</p>
+<strong>Unmount </strong>(also marked with a red rectangle in the screenshot above). To make files stored on the volume accessible again, you will have to mount the volume. To do so, repeat Steps 13-18.</p>
<h2>How to Create and Use a VeraCrypt-Encrypted Partition/Device</h2>
diff --git a/doc/html/Command Line Usage.html b/doc/html/Command Line Usage.html
index d244df1e..004eccc8 100644
--- a/doc/html/Command Line Usage.html
+++ b/doc/html/Command Line Usage.html
@@ -51,3 +51,3 @@
<td><em>/hash</em></td>
-<td>It must be followed by a parameter indicating the PRF hash algorithm to use when mounting the volume. Possible values for /hash parameter are: sha256, sha-256, sha512, sha-512, whirlpool, ripemd160 and ripemd-160. When /hash is omitted, VeraCrypt will try
+<td>It must be followed by a parameter indicating the PRF hash algorithm to use when mounting the volume. Possible values for /hash parameter are: sha256, sha-256, sha512, sha-512, whirlpool, blake2s and blake2s-256. When /hash is omitted, VeraCrypt will try
all possible PRF algorithms thus lengthening the mount operation time.</td>
@@ -57,3 +57,3 @@
<td>
-<p>It must be followed by a parameter indicating the file and path name of a VeraCrypt volume to mount (do not use when dismounting) or the Volume ID of the disk/partition to mount.<br>
+<p>It must be followed by a parameter indicating the file and path name of a VeraCrypt volume to mount (do not use when unmounting) or the Volume ID of the disk/partition to mount.<br>
The syntax of the volume ID is <strong>ID:XXXXXX...XX</strong> where the XX part is a 64 hexadecimal characters string that represent the 32-Bytes ID of the desired volume to mount.<br>
@@ -76,3 +76,3 @@ You can also specify the Volume ID of the partition/device-hosted volume to moun
<td><em>/beep</em> or <em>/b</em></td>
-<td>Beep after a volume has been successfully mounted or dismounted.</td>
+<td>Beep after a volume has been successfully mounted or unmounted.</td>
</tr>
@@ -84,4 +84,8 @@ You can also specify the Volume ID of the partition/device-hosted volume to moun
<tr>
+<td><em>/unmount</em> or <em>/u</em></td>
+<td>Unmount volume specified by drive letter (e.g., /u x). When no drive letter is specified, unmounts all currently mounted VeraCrypt volumes.</td>
+</tr>
+<tr>
<td><em>/dismount</em> or <em>/d</em></td>
-<td>Dismount volume specified by drive letter (e.g., /d x). When no drive letter is specified, dismounts all currently mounted VeraCrypt volumes.</td>
+<td>Deprecated. Please use /unmount or /u.</td>
</tr>
@@ -89,3 +93,3 @@ You can also specify the Volume ID of the partition/device-hosted volume to moun
<td><em>/force</em> or <em>/f</em></td>
-<td>Forces dismount (if the volume to be dismounted contains files being used by the system or an application) and forces mounting in shared mode (i.e., without exclusive access).</td>
+<td>Forces unmount (if the volume to be unmounted contains files being used by the system or an application) and forces mounting in shared mode (i.e., without exclusive access).</td>
</tr>
@@ -294,3 +298,3 @@ It has no parameters and it indicates that no message box or dialog will be disp
<td>/FastCreateFile</td>
-<td>Use a faster but potentially insecure way to create file containers. This applies to both UI and command line.</td>
+<td>Enables a faster, albeit potentially insecure, method for creating file containers. This option carries security risks as it can embed existing disk content into the file container, possibly exposing sensitive data if an attacker gains access to it. Note that this switch affects all file container creation methods, whether initiated from the command line, using the /create switch, or through the UI wizard.</td>
</tr>
@@ -308,5 +312,5 @@ If it is followed by <strong>n</strong> or <strong>no</strong>: the password dia
<h4>Syntax</h4>
-<p>VeraCrypt.exe [/tc] [/hash {sha256|sha-256|sha512|sha-512|whirlpool |ripemd160|ripemd-160}][/a [devices|favorites]] [/b] [/c [y|n|f]] [/d [drive letter]] [/e] [/f] [/h [y|n]] [/k keyfile or search path] [tryemptypass [y|n]] [/l drive letter] [/m {bk|rm|recovery|ro|sm|ts|noattach}]
+<p>VeraCrypt.exe [/tc] [/hash {sha256|sha-256|sha512|sha-512|whirlpool |blake2s|blake2s-256}][/a [devices|favorites]] [/b] [/c [y|n|f]] [/d [drive letter]] [/e] [/f] [/h [y|n]] [/k keyfile or search path] [tryemptypass [y|n]] [/l drive letter] [/m {bk|rm|recovery|ro|sm|ts|noattach}]
[/p password] [/pim pimvalue] [/q [background|preferences]] [/s] [/tokenlib path] [/v volume] [/w]</p>
-<p>&quot;VeraCrypt Format.exe&quot; [/n] [/create] [/size number[{K|M|G|T}]] [/p password]&nbsp; [/encryption {AES | Serpent | Twofish | Camellia | Kuznyechik | AES(Twofish) | AES(Twofish(Serpent)) | Serpent(AES) | Serpent(Twofish(AES)) | Twofish(Serpent) | Camellia(Kuznyechik) | Kuznyechik(Twofish) | Camellia(Serpent) | Kuznyechik(AES) | Kuznyechik(Serpent(Camellia))}] [/hash {sha256|sha-256|sha512|sha-512|whirlpool|ripemd160|ripemd-160}]
+<p>&quot;VeraCrypt Format.exe&quot; [/n] [/create] [/size number[{K|M|G|T}]] [/p password]&nbsp; [/encryption {AES | Serpent | Twofish | Camellia | Kuznyechik | AES(Twofish) | AES(Twofish(Serpent)) | Serpent(AES) | Serpent(Twofish(AES)) | Twofish(Serpent) | Camellia(Kuznyechik) | Kuznyechik(Twofish) | Camellia(Serpent) | Kuznyechik(AES) | Kuznyechik(Serpent(Camellia))}] [/hash {sha256|sha-256|sha512|sha-512|whirlpool|blake2s|blake2s-256}]
[/filesystem {None|FAT|NTFS|ExFAT|ReFS}] [/dynamic] [/force] [/silent] [/noisocheck] [FastCreateFile] [/quick]</p>
@@ -316,3 +320,3 @@ If it is followed by <strong>n</strong> or <strong>no</strong>: the password dia
<p>veracrypt /q /v d:\myvolume</p>
-<p>Dismount a volume mounted as the drive letter <em>X</em> (the main program window will not be displayed):</p>
+<p>Unmount a volume mounted as the drive letter <em>X</em> (the main program window will not be displayed):</p>
<p>veracrypt /q /d x</p>
diff --git a/doc/html/CompilingGuidelineLinux.html b/doc/html/CompilingGuidelineLinux.html
new file mode 100644
index 00000000..7b0d1df3
--- /dev/null
+++ b/doc/html/CompilingGuidelineLinux.html
@@ -0,0 +1,314 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+
+<style>
+.textbox {
+ vertical-align: top;
+ height: auto !important;
+ font-family: Helvetica,sans-serif;
+ font-size: 20px;
+ font-weight: bold;
+ margin: 10px;
+ padding: 10px;
+ background-color: white;
+ width: auto;
+ border-radius: 10px;
+}
+
+.texttohide {
+ font-family: Helvetica,sans-serif;
+ font-size: 14px;
+ font-weight: normal;
+}
+
+
+</style>
+
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title>
+<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>
+<meta name="keywords" content="encryption, security"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Home</a></li>
+ <li><a href="/code/">Source Code</a></li>
+ <li><a href="Downloads.html">Downloads</a></li>
+ <li><a class="active" href="Documentation.html">Documentation</a></li>
+ <li><a href="Donation.html">Donate</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Documentation</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Technical%20Details.html">Technical Details</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="CompilingGuidelines.html">Building VeraCrypt From Source</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="CompilingGuidelineLinux.html">Linux Build Guide</a>
+</p></div>
+
+<div class="wikidoc">
+This guide describes how to set up a Linux System to build VeraCrypt from source and how to perform compilation. <br>
+The procedure for a Ubuntu 22.04 LTS system is described here as an example, the procedure for other Linux systems is analogous.
+</div>
+
+<div class="wikidoc">
+<br>
+<br>
+The following components are required for compiling VeraCrypt:
+<ol>
+ <li>GNU Make</li>
+ <li>GNU C/C++ Compiler</li>
+ <li>YASM 1.3.0</li>
+ <li>pkg-config</li>
+ <li>wxWidgets 3.x shared library and header files installed by the system or wxWidgets 3.x library source code </li>
+ <li>FUSE library and header files</li>
+ <li>PCSC-lite library and header files</li>
+</ol>
+</div>
+
+<div class="wikidoc">
+<p>Below are the procedure steps. Clicking on any of the link takes directly to the related step:
+<ul>
+<li><strong><a href="#InstallationOfGNUMake">Installation of GNU Make</a></li></strong>
+<li><strong><a href="#InstallationOfGNUCompiler">Installation of GNU C/C++ Compiler</a></li></strong>
+<li><strong><a href="#InstallationOfYASM">Installation of YASM</a></li></strong>
+<li><strong><a href="#InstallationOfPKGConfig">Installation of pkg-config</a></li></strong>
+<li><strong><a href="#InstallationOfwxWidgets">Installation of wxWidgets 3.2</a></li></strong>
+<li><strong><a href="#InstallationOfFuse">Installation of libfuse</a></li></strong>
+<li><strong><a href="#InstallationOfPCSCLite">Installation of libpcsclite</a></li></strong>
+<li><strong><a href="#DownloadVeraCrypt">Download VeraCrypt</a></li></strong>
+<li><strong><a href="#CompileVeraCrypt">Compile VeraCrypt</a></li></strong>
+</ul>
+</p>
+<p>They can also be performed by running the below list of commands in a terminal or by copying them to a script:<br>
+<code>
+sudo apt update <br>
+sudo apt install -y build-essential yasm pkg-config libwxgtk3.0-gtk3-dev <br>
+sudo apt install -y libfuse-dev git libpcsclite-dev <br>
+git clone https://github.com/veracrypt/VeraCrypt.git <br>
+cd ~/VeraCrypt/src <br>
+make
+</code>
+</p>
+</div>
+
+<div class="wikidoc">
+ <div class="textbox" id="InstallationOfGNUMake">
+ <a href="#InstallationOfGNUMake">Installation of GNU Make</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Open a terminal
+ </li>
+ <li>
+ Execute the following commands: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install build-essential
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfGNUCompiler">
+ <a href="#InstallationOfGNUCompiler">Installation of GNU C/C++ Compiler</a>
+ <div class="texttohide">
+ <p> If the build-essential were already installed in the step before, this step can be skipped.
+ <ol>
+ <li>
+ Open a terminal
+ </li>
+ <li>
+ Execute the following commands: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install build-essential
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfYASM">
+ <a href="#InstallationOfYASM">Installation of YASM</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Open a terminal
+ </li>
+ <li>
+ Execute the following commands: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install yasm
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfPKGConfig">
+ <a href="#InstallationOfPKGConfig">Installation of pkg-config</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Open a terminal
+ </li>
+ <li>
+ Execute the following commands: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install pkg-config
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfwxWidgets">
+ <a href="#InstallationOfwxWidgets">Installation of wxWidgets 3.2</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Open a terminal
+ </li>
+ <li>
+ Execute the following commands: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install libwxgtk3.0-gtk3-dev <br>
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfFuse">
+ <a href="#InstallationOfFuse">Installation of libfuse</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Open a terminal
+ </li>
+ <li>
+ Execute the following commands: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install libfuse-dev
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+<div class="textbox" id="InstallationOfPCSCLite">
+ <a href="#InstallationOfPCSCLite">Installation of libpcsclite</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Open a terminal
+ </li>
+ <li>
+ Execute the following commands: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install libpcsclite-dev
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+</div>
+
+ <div class="textbox" id="DownloadVeraCrypt">
+ <a href="#DownloadVeraCrypt">Download VeraCrypt</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Open a terminal
+ </li>
+ <li>
+ Execute the following commands: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install git <br>
+ git clone https://github.com/veracrypt/VeraCrypt.git
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="CompileVeraCrypt">
+ <a href="#CompileVeraCrypt">Compile VeraCrypt</a>
+ <div class="texttohide">
+ <p> Remarks: <br>
+ <ul>
+ <li>
+ By default, a universal executable supporting both graphical and text user interface (through the switch --text) is built. <br>
+ On Linux, a console-only executable, which requires no GUI library, can be built using the 'NOGUI' parameter. <br>
+ For that, you need to dowload wxWidgets sources, extract them to a location of your choice and then run the following commands: <br>
+ <code>
+ make NOGUI=1 WXSTATIC=1 WX_ROOT=/path/to/wxWidgetsSources wxbuild <br>
+ make NOGUI=1 WXSTATIC=1 WX_ROOT=/path/to/wxWidgetsSources
+ </code>
+ </li>
+ <li>
+ If you are not using the system wxWidgets library, you will have to download and use wxWidgets sources like the remark above but this time the following commands should be run to build GUI version of VeraCrypt (NOGUI is not specified): <br>
+ <code>
+ make WXSTATIC=1 WX_ROOT=/path/to/wxWidgetsSources wxbuild <br>
+ make WXSTATIC=1 WX_ROOT=/path/to/wxWidgetsSources
+ </code>
+ </li>
+ </ul>
+ Steps:
+ <ol>
+ <li>
+ Open a terminal
+ </li>
+ <li>
+ Execute the following commands: <br>
+ <code>
+ cd ~/VeraCrypt/src <br>
+ make
+ </code>
+ </li>
+ <li>
+ If successful, the VeraCrypt executable should be located in the directory 'Main'.
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+</div>
+</body></html>
diff --git a/doc/html/CompilingGuidelineWin.html b/doc/html/CompilingGuidelineWin.html
new file mode 100644
index 00000000..ec08af4f
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin.html
@@ -0,0 +1,1225 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+
+<style>
+.textbox {
+ vertical-align: top;
+ height: auto !important;
+ font-family: Helvetica,sans-serif;
+ font-size: 20px;
+ font-weight: bold;
+ margin: 10px;
+ padding: 10px;
+ background-color: white;
+ width: auto;
+ border-radius: 10px;
+}
+
+.texttohide {
+ font-family: Helvetica,sans-serif;
+ font-size: 14px;
+ font-weight: normal;
+}
+
+
+</style>
+
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title>
+<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>
+<meta name="keywords" content="encryption, security"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Home</a></li>
+ <li><a href="/code/">Source Code</a></li>
+ <li><a href="Downloads.html">Downloads</a></li>
+ <li><a class="active" href="Documentation.html">Documentation</a></li>
+ <li><a href="Donation.html">Donate</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Documentation</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Technical%20Details.html">Technical Details</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="CompilingGuidelines.html">Building VeraCrypt From Source</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="CompilingGuidelineWin.html">Windows Build Guide</a>
+</p></div>
+
+<div class="wikidoc">
+This guide describes how to set up a Windows system that can compile the VeraCrypt. Further it is described how VeraCrypt is going to be compiled. <br>
+The procedure for a Windows 10 system is described here as an example, but the procedure for other Windows systems is analogous.
+</div>
+
+<div class="wikidoc">
+The following components are required for compiling VeraCrypt:
+
+<ol>
+ <li>Microsoft Visual Studio 2010</li>
+ <li>Microsoft Visual Studio 2010 Service Pack 1</li>
+ <li>NASM</li>
+ <li>YASM</li>
+ <li>Visual C++ 1.52</li>
+ <li>Windows SDK 7.1</li>
+ <li>Windows Driver Kit 7.1</li>
+ <li>Windows 8.1 SDK</li>
+ <li>gzip</li>
+ <li>upx</li>
+ <li>7zip</li>
+ <li>Wix3</li>
+ <li>Microsoft Visual Studio 2019</li>
+ <li>Windows 10 SDK</li>
+ <li>Windows Driver Kit 1903</li>
+ <li>Visual Studio build tools</li>
+
+</ol>
+
+</div>
+
+<div class="wikidoc">
+Below are the procedure steps. Clicking on any of the link takes directly to the related step:
+<ul>
+<li><strong><a href="#InstallationOfMicrosoftVisualStudio2010">Installation of Microsoft Visual Studio 2010</a></li></strong>
+<li><strong><a href="#InstallationOfMicrosoftVisualStudio2010ServicePack1">Installation of Microsoft Visual Studio 2010 Service Pack 1</a></li></strong>
+<li><strong><a href="#InstallationOfNASM">Installation of NASM</a></li></strong>
+<li><strong><a href="#InstallationOfYASM">Installation of YASM</a></li></strong>
+<li><strong><a href="#InstallationOfVisualCPP">Installation of Microsoft Visual C++ 1.52</a></li></strong>
+<li><strong><a href="#InstallationOfWindowsSDK71PP">Installation of the Windows SDK 7.1</a></li></strong>
+<li><strong><a href="#InstallationOfWDK71PP">Installation of the Windows Driver Kit 7.1</a></li></strong>
+<li><strong><a href="#InstallationOfSDK81PP">Installation of the Windows 8.1 SDK</a></li></strong>
+<li><strong><a href="#InstallationOfGzip">Installation of gzip</a></li></strong>
+<li><strong><a href="#InstallationOfUpx">Installation of upx</a></li></strong>
+<li><strong><a href="#InstallationOf7zip">Installation of 7zip</a></li></strong>
+<li><strong><a href="#InstallationOfWix3">Installation of Wix3</a></li></strong>
+<li><strong><a href="#InstallationOfVS2019">Installation of Microsoft Visual Studio 2019</a></li></strong>
+<li><strong><a href="#InstallationOfWDK10">Installation of the Windows Driver Kit 2004</a></li></strong>
+<li><strong><a href="#InstallationOfVisualBuildTools">Installation of the Visual Studio build tools</a></li></strong>
+<li><strong><a href="#DownloadVeraCrypt">Download VeraCrypt Source Files</a></li></strong>
+<li><strong><a href="#CompileWin32X64">Compile the Win32/x64 Versions of VeraCrypt</a></li></strong>
+<li><strong><a href="#CompileARM64">Compile the ARM64 Version of VeraCrypt</a></li></strong>
+<li><strong><a href="#BuildVeraCryptExecutables">Build the VeraCrypt Executables</a></li></strong>
+<li><strong><a href="#ImportCertificates">Import the Certificates</a></li></strong>
+<li><strong><a href="#KnownIssues">Known Issues</a></li></strong>
+</ul>
+</div>
+
+<div class="wikidoc">
+ <div class="textbox" id="InstallationOfMicrosoftVisualStudio2010">
+ <a href="#InstallationOfMicrosoftVisualStudio2010">Installation of Microsoft Visual Studio 2010</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Visit the following Microsoft website and log in with a free Microsoft account: <br>
+ <a href="https://my.visualstudio.com/Downloads?q=Visual%20Studio%202010%20Professional&pgroup=" target="_blank">https://my.visualstudio.com/Downloads?q=Visual%20Studio%202010%20Professional&pgroup=</a>
+ </li>
+ <li>
+ Please download a (trial) version of “Visual Studio Professional 2010” <br>
+ <img src="CompilingGuidelineWin/DownloadVS2010.jpg" width="80%">
+ </li>
+ <li>
+ Mount the downloaded ISO file by doubleclicking it
+ </li>
+ <li>
+ Run the file "autorun.exe" as administrator
+ </li>
+ <li>
+ Install Microsoft Visual Studio 2010 with the default settings
+ </li>
+ </ol>
+ The installation of the Microsoft SQL Server 2008 Express Service Pack 1 (x64) may fail, but it is not required for compiling VeraCrypt.
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfMicrosoftVisualStudio2010ServicePack1">
+ <a href="#InstallationOfMicrosoftVisualStudio2010ServicePack1">Installation of Microsoft Visual Studio 2010 Service Pack 1</a>
+ <div class="texttohide">
+ <p>
+ Note: The content the official installer from Microsoft tries to download is no longer available. Therefore, it is necessary to use an offline installer.
+ <ol>
+ <li>
+ Visit the website of the internet archive and download the iso image of the Microsoft Visual Studio 2010 Service Pack 1:<br>
+ <a href="https://archive.org/details/vs-2010-sp-1dvd-1" target="_blank">https://archive.org/details/vs-2010-sp-1dvd-1</a>
+ </li>
+ <li>
+ Mount the downloaded ISO file by doubleclicking it
+ </li>
+ <li>
+ Run the file "Setup.exe" as administrator
+ </li>
+ <li>
+ Install Microsoft Visual Studio 2010 Service Pack 1 with the default settings
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfNASM">
+ <a href="#InstallationOfNASM">Installation of NASM</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Download “nasm-2.08-installer.exe” at: <br>
+ <a href="https://www.nasm.us/pub/nasm/releasebuilds/2.08/win32/" target="_blank">https://www.nasm.us/pub/nasm/releasebuilds/2.08/win32/</a>
+ </li>
+ <li>
+ Run the file as administrator
+ </li>
+ <li>
+ Install NASM with the default settings
+ </li>
+ <li>
+ Add NASM to the path Variable. This will make the command globally available on the command line. <br>
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ Open a file explorer
+ </li>
+ <li>
+ Within the left file tree, please make a right click on "This PC" and select "Properties" <br>
+ <img src="CompilingGuidelineWin/SelectThisPC.jpg" width="40%">
+ </li>
+ <li>
+ Within the right menu, please click on "Advanced system settings" <br>
+ <img src="CompilingGuidelineWin/SelectAdvancedSystemSettings.jpg" width="50%">
+ </li>
+ <li>
+ Please click on "Environment Variables" <br>
+ <img src="CompilingGuidelineWin/SelectEnvironmentVariables.jpg" width="17%">
+ </li>
+ <li>
+ Within the area of the system variables, please select the "Path" variable and click on "Edit..." <br>
+ <img src="CompilingGuidelineWin/SelectPathVariable.jpg" width="25%">
+ </li>
+ <li>
+ Click on "New" and add the following value: <br>
+ <p style="font-family: 'Courier New', monospace;">C:\Program Files (x86)\nasm</p>
+ </li>
+ <li>
+ Close the windows by clicking on "OK"
+ </li>
+ </ol>
+ </li>
+ <li>
+ To check if the configuration is working correctly, please open a command prompt and watch the output of the following command: <br>
+ <p style="font-family: 'Courier New', monospace;">nasm</p> <br>
+ <img src="CompilingGuidelineWin/NasmCommandLine.jpg" width="50%">
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfYASM">
+ <a href="#InstallationOfYASM">Installation of YASM</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Please create the following folder: <br>
+ C:\Program Files\YASM
+ </li>
+ <li>
+ Please download the file "Win64 VS2010 .zip" at: <br>
+ <a href="https://yasm.tortall.net/Download.html" target="_blank">https://yasm.tortall.net/Download.html</a>
+ </li>
+ <li>
+ Your browser might inform you that the file might be a security risk due to the low download rate or the unencrypted connection. Nevertheless, the official website is the most reliable source for this file, so we recommend to allow the download
+ </li>
+ <li>
+ Unzip the zip file and copy the files to “C:\Program Files\YASM”
+ </li>
+ <li>
+ Please download the file "Win64 .exe" at: <br>
+ <a href="https://yasm.tortall.net/Download.html" target="_blank">https://yasm.tortall.net/Download.html</a>
+ </li>
+ <li>
+ Your browser might inform you that the file might be a security risk due to the low download rate or the unencrypted connection. Nevertheless, the official website is the most reliable source for this file, so we recommend to allow the download
+ </li>
+ <li>
+ Rename the file to “yasm.exe” and copy it to “C:\Program Files\YASM”
+ </li>
+ <li>
+ Add YASM to the path Variable and create a new system variable for YASM. This will make the command globally available on the command line. <br>
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ Open a file explorer
+ </li>
+ <li>
+ Within the left file tree, please make a right click on "This PC" and select "Properties" <br>
+ <img src="CompilingGuidelineWin/SelectThisPC.jpg" width="40%">
+ </li>
+ <li>
+ Within the right menu, please click on "Advanced system settings" <br>
+ <img src="CompilingGuidelineWin/SelectAdvancedSystemSettings.jpg" width="50%">
+ </li>
+ <li>
+ Please click on "Environment Variables" <br>
+ <img src="CompilingGuidelineWin/SelectEnvironmentVariables.jpg" width="17%">
+ </li>
+ <li>
+ Within the area of the system variables, please select the "Path" variable and click on "Edit..." <br>
+ <img src="CompilingGuidelineWin/SelectPathVariable.jpg" width="25%">
+ </li>
+ <li>
+ Click on "New" and add the following value: <br>
+ <p style="font-family: 'Courier New', monospace;">C:\Program Files\YASM</p>
+ </li>
+ <li>
+ Close the top window by clicking on "OK"
+ </li>
+ <li>
+ Within the area of the system variables, please click on "New..." <br>
+ <img src="CompilingGuidelineWin/AddNewSystemVar.jpg" width="25%">
+ </li>
+ <li>
+ Fill out the form with the following values: <br>
+ <p style="font-family: 'Courier New', monospace;">Variable name: YASMPATH<br> Variable value: C:\Program Files\YASM</p>
+ </li>
+ <li>
+ Close the windows by clicking on "OK"
+ </li>
+ </ol>
+ </li>
+ <li>
+ To check if the configuration is working correctly, please open a command prompt and watch the output of the following command: <br>
+ <p style="font-family: 'Courier New', monospace;">yasm</p> <br>
+ and <br>
+ <p style="font-family: 'Courier New', monospace;">vsyasm</p> <br>
+ <img src="CompilingGuidelineWin/YasmCommandLine.jpg" width="50%">
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfVisualCPP">
+ <a href="#InstallationOfVisualCPP">Installation of Microsoft Visual C++ 1.52</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Visual C++ 1.52 is available via the paid Microsoft MSDN subscription. If you do not have a subscription, you download the ISO image via the internet archive: <br>
+ <a href="https://archive.org/details/ms-vc152" target="_blank">https://archive.org/details/ms-vc152</a>
+ </li>
+ <li>
+ Create the folder “C:\MSVC15”
+ </li>
+ <li>
+ Mount the ISO file and copy the content of the folder “MSVC” to “C:\MSVC15”
+ </li>
+ <li>
+ Create a system variable for Microsoft Visual C++ 1.52 <br>
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ Open a file explorer
+ </li>
+ <li>
+ Within the left file tree, please make a right click on "This PC" and select "Properties" <br>
+ <img src="CompilingGuidelineWin/SelectThisPC.jpg" width="40%">
+ </li>
+ <li>
+ Within the right menu, please click on "Advanced system settings" <br>
+ <img src="CompilingGuidelineWin/SelectAdvancedSystemSettings.jpg" width="50%">
+ </li>
+ <li>
+ Please click on "Environment Variables" <br>
+ <img src="CompilingGuidelineWin/SelectEnvironmentVariables.jpg" width="17%">
+ </li>
+ <li>
+ Within the area of the system variables, please click on "New..." <br>
+ <img src="CompilingGuidelineWin/AddNewSystemVar.jpg" width="25%">
+ </li>
+ <li>
+ Fill out the form with the following values: <br>
+ <p style="font-family: 'Courier New', monospace;">Variable name: MSVC16_ROOT<br> Variable value: C:\MSVC15</p>
+ </li>
+ <li>
+ Close the windows by clicking on "OK"
+ </li>
+ </ol>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfWindowsSDK71PP">
+ <a href="#InstallationOfWindowsSDK71PP">Installation of the Windows SDK 7.1</a>
+ <div class="texttohide">
+ <p>
+ The installer requires .Net Framework 4 (Not a newer one like .Net Framework 4.8!). Since a newer version is already preinstalled with Windows 10, the installer has to be tricked:
+ <ol>
+ <li>
+ Click on the start button and search for: "regedit.msc". Start the first finding.
+ </li>
+ <li>
+ Navigate to "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\NET Framework Setup\NDP\v4\"
+ </li>
+ <li>
+ Change the permissions for the "Client" folder, so you can edit the keys: <br>
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ Right click on the subfolder "Client" and select "Permissions..."
+ </li>
+ <li>
+ Click on "Advanced" <br>
+ <img src="CompilingGuidelineWin/RegeditPermissions-1.jpg" width="17%">
+ </li>
+ <li>
+ Change the owner to your user and click on "Add" <br>
+ <img src="CompilingGuidelineWin/RegeditPermissions-2.jpg" width="35%">
+ </li>
+ <li>
+ Set the principal to your user, select "Full Control" and click on "OK" <br>
+ <img src="CompilingGuidelineWin/RegeditPermissions-3.jpg" width="35%">
+ </li>
+ <li>
+ Within the folder "Client" note down the value of the entry "Version"
+ </li>
+ <li>
+ Doubleclick on the entry "Version" and change the value to "4.0.30319" <br>
+ <img src="CompilingGuidelineWin/RegeditPermissions-4.jpg" width="30%">
+ </li>
+ </ol>
+ </li>
+ <li>
+ Change the permissions for the "Full" folder, so you can edit the keys: <br>
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ Right click on the subfolder "Full" and select "Permissions..."
+ </li>
+ <li>
+ Click on "Advanced" <br>
+ <img src="CompilingGuidelineWin/RegeditPermissions-1.jpg" width="17%">
+ </li>
+ <li>
+ Change the owner to your user and click on "Add" <br>
+ <img src="CompilingGuidelineWin/RegeditPermissions-2.jpg" width="35%">
+ </li>
+ <li>
+ Set the principal to your user, select "Full Control" and click on "OK" <br>
+ <img src="CompilingGuidelineWin/RegeditPermissions-3.jpg" width="35%">
+ </li>
+ <li>
+ Within the folder "Full" note down the value of the entry "Version"
+ </li>
+ <li>
+ Doubleclick on the entry "Version" and change the value to "4.0.30319" <br>
+ <img src="CompilingGuidelineWin/RegeditPermissions-4.jpg" width="30%">
+ </li>
+ </ol>
+ </li>
+ <li>
+ Download the Windows SDK 7.1 at: <br>
+ <a href="https://www.microsoft.com/en-us/download/details.aspx?id=8279" target="_blank">https://www.microsoft.com/en-us/download/details.aspx?id=8279</a>
+ </li>
+ <li>
+ Run the downloaded file as administrator and install the application with default settings
+ </li>
+ <li>
+ After the installation, revert the changes done in the registry editor. <br>
+ <b>Note:</b> The owner "TrustedInstaller" can be restored by searching for: "NT Service\TrustedInstaller"
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfWDK71PP">
+ <a href="#InstallationOfWDK71PP">Installation of the Windows Driver Kit 7.1</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Please download the ISO of the Windows Diver Kit 7.1 at: <br>
+ <a href="https://www.microsoft.com/en-us/download/details.aspx?id=11800" target="_blank">https://www.microsoft.com/en-us/download/details.aspx?id=11800</a>
+ </li>
+ <li>
+ Mount the downloaded ISO file by doubleclicking it
+ </li>
+ <li>
+ Run the file "KitSetup.exe" as administrator. Within the installation select all features to be installed. <br>
+ <b>Note: </b>It might be that during the installed you are requested to install the .NET Framework 3.5. In this case click on "Download and install this feature".
+ </li>
+ <li>
+ Install the Driver Kit to the default location
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfSDK81PP">
+ <a href="#InstallationOfSDK81PP">Installation of the Windows 8.1 SDK</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Please download the ISO of the Windows 8.1 SDK at: <br>
+ <a href="https://developer.microsoft.com/de-de/windows/downloads/sdk-archive/" target="_blank">https://developer.microsoft.com/de-de/windows/downloads/sdk-archive/</a>
+ </li>
+ <li>
+ Run the downloaded file as administrator and install the Windows 8.1 SDK with default settings
+ </li>
+ <li>
+ Create a system variable for the Windows 8.1 SDK <br>
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ Open a file explorer
+ </li>
+ <li>
+ Within the left file tree, please make a right click on "This PC" and select "Properties" <br>
+ <img src="CompilingGuidelineWin/SelectThisPC.jpg" width="40%">
+ </li>
+ <li>
+ Within the right menu, please click on "Advanced system settings" <br>
+ <img src="CompilingGuidelineWin/SelectAdvancedSystemSettings.jpg" width="50%">
+ </li>
+ <li>
+ Please click on "Environment Variables" <br>
+ <img src="CompilingGuidelineWin/SelectEnvironmentVariables.jpg" width="17%">
+ </li>
+ <li>
+ Within the area of the system variables, please click on "New..." <br>
+ <img src="CompilingGuidelineWin/AddNewSystemVar.jpg" width="25%">
+ </li>
+ <li>
+ Fill out the form with the following values: <br>
+ <p style="font-family: 'Courier New', monospace;">Variable name: WSDK81<br> Variable value: C:\Program Files (x86)\Windows Kits\8.1\</p>
+ </li>
+ <li>
+ Close the windows by clicking on "OK"
+ </li>
+ </ol>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfGzip">
+ <a href="#InstallationOfGzip">Installation of gzip</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Please create the following folder: <br>
+ C:\Program Files (x86)\gzip
+ </li>
+ <li>
+ Please download gzip version at: <br>
+ <a href="https://sourceforge.net/projects/gnuwin32/files/gzip/1.3.12-1/gzip-1.3.12-1-bin.zip/download?use-mirror=netix&download=" target="_blank">https://sourceforge.net/projects/gnuwin32/files/gzip/1.3.12-1/gzip-1.3.12-1-bin.zip/download?use-mirror=netix&download=</a>
+ </li>
+ <li>
+ Copy the content of the downloaded zip to “C:\Program Files (x86)\gzip”
+ </li>
+ <li>
+ Add gzip to the path Variable. This will make the command globally available on the command line. <br>
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ Open a file explorer
+ </li>
+ <li>
+ Within the left file tree, please make a right click on "This PC" and select "Properties" <br>
+ <img src="CompilingGuidelineWin/SelectThisPC.jpg" width="40%">
+ </li>
+ <li>
+ Within the right menu, please click on "Advanced system settings" <br>
+ <img src="CompilingGuidelineWin/SelectAdvancedSystemSettings.jpg" width="50%">
+ </li>
+ <li>
+ Please click on "Environment Variables" <br>
+ <img src="CompilingGuidelineWin/SelectEnvironmentVariables.jpg" width="17%">
+ </li>
+ <li>
+ Within the area of the system variables, please select the "Path" variable and click on "Edit..." <br>
+ <img src="CompilingGuidelineWin/SelectPathVariable.jpg" width="25%">
+ </li>
+ <li>
+ Click on "New" and add the following value: <br>
+ <p style="font-family: 'Courier New', monospace;">C:\Program Files (x86)\gzip\bin</p>
+ </li>
+ <li>
+ Close the windows by clicking on "OK"
+ </li>
+ </ol>
+ </li>
+ <li>
+ To check if the configuration is working correctly, please open a command prompt and watch the output of the following command: <br>
+ <p style="font-family: 'Courier New', monospace;">gzip</p> <br>
+ <img src="CompilingGuidelineWin/gzipCommandLine.jpg" width="50%">
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfUpx">
+ <a href="#InstallationOfUpx">Installation of upx</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Please create the following folder: <br>
+ C:\Program Files (x86)\upx
+ </li>
+ <li>
+ Please download the latest upx-X-XX-win64.zip version at: <br>
+ <a href="https://github.com/upx/upx/releases/tag/v3.96" target="_blank">https://github.com/upx/upx/releases/tag/v3.96</a>
+ </li>
+ <li>
+ Copy the content of the downloaded zip to “C:\Program Files (x86)\upx”
+ </li>
+ <li>
+ Add gzip to the path Variable. This will make the command globally available on the command line. <br>
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ Open a file explorer
+ </li>
+ <li>
+ Within the left file tree, please make a right click on "This PC" and select "Properties" <br>
+ <img src="CompilingGuidelineWin/SelectThisPC.jpg" width="40%">
+ </li>
+ <li>
+ Within the right menu, please click on "Advanced system settings" <br>
+ <img src="CompilingGuidelineWin/SelectAdvancedSystemSettings.jpg" width="50%">
+ </li>
+ <li>
+ Please click on "Environment Variables" <br>
+ <img src="CompilingGuidelineWin/SelectEnvironmentVariables.jpg" width="17%">
+ </li>
+ <li>
+ Within the area of the system variables, please select the "Path" variable and click on "Edit..." <br>
+ <img src="CompilingGuidelineWin/SelectPathVariable.jpg" width="25%">
+ </li>
+ <li>
+ Click on "New" and add the following value: <br>
+ <p style="font-family: 'Courier New', monospace;">C:\Program Files (x86)\upx</p>
+ </li>
+ <li>
+ Close the windows by clicking on "OK"
+ </li>
+ </ol>
+ </li>
+ <li>
+ To check if the configuration is working correctly, please open a command prompt and watch the output of the following command: <br>
+ <p style="font-family: 'Courier New', monospace;">upx</p> <br>
+ <img src="CompilingGuidelineWin/upxCommandLine.jpg" width="50%">
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOf7zip">
+ <a href="#InstallationOf7zip">Installation of 7zip</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Please download the latest version of 7zip at: <br>
+ <a href="https://www.7-zip.de/" target="_blank">https://www.7-zip.de/</a>
+ </li>
+ <li>
+ Run the downloaded file as administrator and install 7zip with default settings
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfWix3">
+ <a href="#InstallationOfWix3">Installation of Wix3</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Please download wix311.exe at: <br>
+ <a href="https://github.com/wixtoolset/wix3/releases" target="_blank">https://github.com/wixtoolset/wix3/releases</a>
+ </li>
+ <li>
+ Run the downloaded file as administrator and install WiX Toolset with default settings
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfVS2019">
+ <a href="#InstallationOfVS2019">Installation of Microsoft Visual Studio 2019</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Visit the following Microsoft website and log in with a free Microsoft account: <br>
+ <a href="https://my.visualstudio.com/Downloads?q=visual%20studio%202019%20Professional" target="_blank">https://my.visualstudio.com/Downloads?q=visual%20studio%202019%20Professional</a>
+ </li>
+ <li>
+ Please download the latest (trial) version of “Visual Studio Professional 2019” <br>
+ <img src="CompilingGuidelineWin/DownloadVS2019.jpg" width="80%">
+ </li>
+ <li>
+ Run the downloaded file as administrator and go through the wizard. <br>
+ Select the following Workloads for installation: <br>
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ Desktop development with C++
+ </li>
+ <li>
+ .NET desktop development
+ </li>
+ </ol>
+ Select the following individual components for installation:
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ .NET
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ .NET 6.0 Runtime
+ </li>
+ <li>
+ .NET Core 3.1 Runtime (LTS)
+ </li>
+ <li>
+ .NET Framework 4 targeting pack
+ </li>
+ <li>
+ .NET Framework 4.5 targeting pack
+ </li>
+ <li>
+ .NET Framework 4.5.1 targeting pack
+ </li>
+ <li>
+ .NET Framework 4.5.2 targeting pack
+ </li>
+ <li>
+ .NET Framework 4.6 targeting pack
+ </li>
+ <li>
+ .NET Framework 4.6.1 targeting pack
+ </li>
+ <li>
+ .NET Framework 4.7.2 targeting pack
+ </li>
+ <li>
+ .NET Framework 4.8 SDK
+ </li>
+ <li>
+ .NET Framework 4.8 targeting pack
+ </li>
+ <li>
+ .NET SDK
+ </li>
+ <li>
+ ML.NET Model Builder (Preview)
+ </li>
+ </ol>
+ </li>
+ <li>
+ Cloud, database, and server
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ CLR data types for SQL Server
+ </li>
+ <li>
+ Connectivity and publishing tools
+ </li>
+ </ol>
+ </li>
+ <li>
+ Code tools
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ NuGet package manager
+ </li>
+ <li>
+ Text Template Transformation
+ </li>
+ </ol>
+ </li>
+ <li>
+ Compilers, build tools, and runtimes
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ .NET Compiler Platform SDK
+ </li>
+ <li>
+ C# and Visual Basic Roslyn compilers
+ </li>
+ <li>
+ C++ 2019 Redistributable Update
+ </li>
+ <li>
+ C++ CMake tools for Windows
+ </li>
+ <li>
+ C++/CLI support for v142 build tools (Latest)
+ </li>
+ <li>
+ MSBuild
+ </li>
+ <li>
+ MSVC v142 - VS 2019 C++ ARM64 build tools (Latest)
+ </li>
+ <li>
+ MSVC v142 - VS 2019 C++ ARM64 Spectre-mitigated libs (Latest)
+ </li>
+ <li>
+ MSVC v142 - VS 2019 C++ x64/x86 build tools (Latest)
+ </li>
+ <li>
+ MSVC v142 - VS 2019 C++ x64/x86 Spectre-mitigated libs (Latest)
+ </li>
+ </ol>
+ </li>
+ <li>
+ Debugging and testing
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ .NET profiling tools
+ </li>
+ <li>
+ C++ AddressSanatizer
+ </li>
+ <li>
+ C++ profiling tools
+ </li>
+ <li>
+ Just-In-Time debugger
+ </li>
+ <li>
+ Test Adapter for Boost.Test
+ </li>
+ <li>
+ Test Adapter for Google Test
+ </li>
+ </ol>
+ </li>
+ <li>
+ Development activities
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ C# and Visual Basic
+ </li>
+ <li>
+ C++ core features
+ </li>
+ <li>
+ F# language support
+ </li>
+ <li>
+ IntelliCode
+ </li>
+ <li>
+ JavaScript and TypeScript language support
+ </li>
+ <li>
+ Live Share
+ </li>
+ </ol>
+ </li>
+ <li>
+ Emulators
+ <ol style="list-style-type: upper-roman;">
+ NONE
+ </ol>
+ </li>
+ <li>
+ Games and Graphics
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ Graphics debugger and GPU profiler for DirectX
+ </li>
+ </ol>
+ </li>
+ <li>
+ SDKs, libraries, and frameworks
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ C++ ATL for latest v142 build tools (ARM64)
+ </li>
+ <li>
+ C++ ATL for latest v142 build tools (x86 & x64)
+ </li>
+ <li>
+ C++ ATL for latest v142 build tools with Spectre Mitigations (ARM64)
+ </li>
+ <li>
+ C++ ATL for latest v142 build tools with Spectre Mitigations (x86 & x64)
+ </li>
+ <li>
+ C++ MFC for latest v142 build tools (ARM64)
+ </li>
+ <li>
+ C++ MFC for latest v142 build tools (x86 & x64)
+ </li>
+ <li>
+ C++ MFC for latest v142 build tools with Spectre Mitigations (ARM64)
+ </li>
+ <li>
+ C++ MFC for latest v142 build tools with Spectre Mitigations (x86 & x64)
+ </li>
+ <li>
+ Entity Framework 6 tools
+ </li>
+ <li>
+ TypeScript 4.3 SDK
+ </li>
+ <li>
+ Windows 10 SDK (10.0.19041.0)
+ </li>
+ <li>
+ Windows Universal C Runtime
+ </li>
+ </ol>
+ </li>
+ </ol>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfWDK10">
+ <a href="#InstallationOfWDK10">Installation of the Windows Driver Kit version 2004</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Please download the Windows Driver Kit (WDK) version 2004 at: <br>
+ <a href="https://docs.microsoft.com/en-us/windows-hardware/drivers/other-wdk-downloads" target="_blank">https://docs.microsoft.com/en-us/windows-hardware/drivers/other-wdk-downloads</a>
+ </li>
+ <li>
+ Run the downloaded file as administrator and install the WDK with default settings
+ </li>
+ <li>
+ At the end of the installation you will be asked if you want to "install Windows Driver Kit Visual Studio extension". <br>
+ Please make sure, that this option is selected before closing the dialog.
+ </li>
+ <li>
+ A different setup will start automatically and will detect Visual Studio Professional 2019 as possible target for the extension. <br>
+ Please select it and proceed with the installation.
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfVisualBuildTools">
+ <a href="#InstallationOfVisualBuildTools">Installation of the Visual Studio build tools</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Visit the following Microsoft website and log in with a free Microsoft account: <br>
+ <a href="https://my.visualstudio.com/Downloads?q=visual%20studio%202019%20build%20tools" target="_blank">https://my.visualstudio.com/Downloads?q=visual%20studio%202019%20build%20tools</a>
+ </li>
+ <li>
+ Please download the latest version of “Build Tools for Visual Studio 2019” <br>
+ <img src="CompilingGuidelineWin/DownloadVSBuildTools.jpg" width="80%">
+ </li>
+ <li>
+ Run the downloaded file as administrator and go through the wizard. Select the following individual components for installation:
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ .NET
+ <ol style="list-style-type: upper-roman;">
+ NONE
+ </ol>
+ </li>
+ <li>
+ Cloud, database, and server
+ <ol style="list-style-type: upper-roman;">
+ NONE
+ </ol>
+ </li>
+ <li>
+ Code tools
+ <ol style="list-style-type: upper-roman;">
+ NONE
+ </ol>
+ </li>
+ <li>
+ Compilers, build tools, and runtimes
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ C++/CLI support for v142 build tools (Latest)
+ </li>
+ <li>
+ MSVC v142 - VS 2019 C++ ARM64 build tools (Latest)
+ </li>
+ <li>
+ MSVC v142 - VS 2019 C++ ARM64 Spectre-mitigated libs (Latest)
+ </li>
+ <li>
+ MSVC v142 - VS 2019 C++ x64/x86 build tools (Latest)
+ </li>
+ <li>
+ MSVC v142 - VS 2019 C++ x64/x86 Spectre-mitigated libs (Latest)
+ </li>
+ </ol>
+ </li>
+ <li>
+ Debugging and testing
+ <ol style="list-style-type: upper-roman;">
+ NONE
+ </ol>
+ </li>
+ <li>
+ Development activities
+ <ol style="list-style-type: upper-roman;">
+ NONE
+ </ol>
+ </li>
+ <li>
+ SDKs, libraries, and frameworks
+ <ol style="list-style-type: upper-roman;">
+ <li>
+ C++ ATL for latest v142 build tools (ARM64)
+ </li>
+ <li>
+ C++ ATL for latest v142 build tools (x86 & x64)
+ </li>
+ <li>
+ C++ ATL for latest v142 build tools with Spectre Mitigations (ARM64)
+ </li>
+ <li>
+ C++ ATL for latest v142 build tools with Spectre Mitigations (x86 & x64)
+ </li>
+ </ol>
+ </li>
+ </ol>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="DownloadVeraCrypt">
+ <a href="#DownloadVeraCrypt">Download VeraCrypt Source Files</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Visit the VeraCrypt Github repository at: <br>
+ <a href="https://github.com/veracrypt/VeraCrypt" target="_blank">https://github.com/veracrypt/VeraCrypt</a>
+ </li>
+ <li>
+ Please click on the green button with the label "Code" and download the code. <br>
+ You can download the repository as zip file, but you may consider to use the git protocol in order to track changes.
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="CompileWin32X64">
+ <a href="#CompileWin32X64">Compile the Win32/x64 Versions of VeraCrypt</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Please open the file "src/VeraCrypt.sln" in Visual Studio <b>2010</b>
+ </li>
+ <li>
+ Please select "All|Win32" as active configuration <br>
+ <img src="CompilingGuidelineWin/VS2010Win32Config.jpg" width="80%">
+ </li>
+ <li>
+ Please click on "Build -> Build Solution" <br>
+ <img src="CompilingGuidelineWin/VS2010BuildSolution.jpg" width="40%">
+ </li>
+ <li>
+ The compiling process should end with warnings, but without errors. Some projects should be skipped.
+ </li>
+ <li>
+ Please select "All|x64" as active configuration <br>
+ <img src="CompilingGuidelineWin/VS2010X64Config.jpg" width="80%">
+ </li>
+ <li>
+ Please click on "Build -> Build Solution" <br>
+ <img src="CompilingGuidelineWin/VS2010BuildSolution.jpg" width="40%">
+ </li>
+ <li>
+ The compiling process should end with warnings, but without errors. Some projects should be skipped. <br>
+ Please close Visual Studio 2010 after the compiling process finished
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="CompileARM64">
+ <a href="#CompileARM64">Compile the ARM64 Version of VeraCrypt</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Please open the file "src/VeraCrypt_vs2019.sln" in Visual Studio <b>2019</b>
+ </li>
+ <li>
+ Please select "All|ARM64" as active configuration <br>
+ <img src="CompilingGuidelineWin/VS2019ARM64Config.jpg" width="80%">
+ </li>
+ <li>
+ Please click on "Build -> Build Solution" <br>
+ <img src="CompilingGuidelineWin/VS2019BuildSolution.jpg" width="40%">
+ </li>
+ <li>
+ The compiling process should end with warnings, but without errors. One project should be skipped. <br>
+ Please close Visual Studio 2019 after the compiling process finished
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="BuildVeraCryptExecutables">
+ <a href="#BuildVeraCryptExecutables">Build the VeraCrypt Executables</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Please open a command line as administrator
+ </li>
+ <li>
+ Go into the folder "src/Signing/"
+ </li>
+ <li>
+ Run the script "sign_test.bat"
+ </li>
+ <li>
+ You will find the generated exectuables within the folder "src/Release/Setup Files"
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="ImportCertificates">
+ <a href="#ImportCertificates">Import the Certificates</a>
+ <div class="texttohide">
+ <p> With the sign_test.bat script you just signed the VeraCrypt executables. This is necessary, since Windows only accepts drivers, which are trusted by a signed Certificate Authority. <br>
+ Since you did not use the official VeraCrypt signing certificate to sign your code, but a public development version, you have to import and therefore trust the certificates used.
+ <ol>
+ <li>
+ Open the folder "src/Signing"
+ </li>
+ <li>
+ Import the following certificates to your Local Machine Certificate storage, by double clicking them:
+ <ul>
+ <li>GlobalSign_R3Cross.cer</li>
+ <li>GlobalSign_SHA256_EV_CodeSigning_CA.cer</li>
+ <li>TestCertificates/idrix_codeSign.pfx</li>
+ <li>TestCertificates/idrix_Sha256CodeSign.pfx</li>
+ <li>TestCertificates/idrix_SHA256TestRootCA.crt</li>
+ <li>TestCertificates/idrix_TestRootCA.crt</li>
+ </ul>
+ Note: If prompted, the password for .pfx certificates is <b>idrix</b>.
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="KnownIssues">
+ <a href="#KnownIssues">Known Issues</a>
+ <div class="texttohide">
+ <p>
+ <ul>
+ <li>
+ <b>This distribution package is damaged</b> <br>
+ <img src="CompilingGuidelineWin/DistributionPackageDamaged.jpg" width="20%"> <br>
+ On Windows 10 or higher you might get the error message above. In order to avoid this, you will need to:<br>
+ <ul>
+ <li>Double-check the installation of the root certificate that issued the test code signing certificate in the "Local Machine Trusted Root Certification Authorities" store.</li>
+ <li>Compute SHA512 fingerprint of the test code signing certificate and update the gpbSha512CodeSignCertFingerprint array in the file "src/Common/Dlgcode.c" accordingly.</li>
+ </ul>
+ Please see <a href="https://sourceforge.net/p/veracrypt/discussion/technical/thread/83d5a2d6e8/#db12" target="_blank">https://sourceforge.net/p/veracrypt/discussion/technical/thread/83d5a2d6e8/#db12</a> for further details.<br>
+ <br>
+ Another approach is to disable the signature verification in the VeraCrypt code. This should be done only for testing purposes and not for production use:
+ <ol>
+ <li>
+ Open the file "src/Common/Dlgcode.c"
+ </li>
+ <li>
+ Look for the function "VerifyModuleSignature"
+ </li>
+ <li>
+ Replace the following lines: <br>
+ Find:<br>
+ <p style="font-family: 'Courier New', monospace;">
+ if (!IsOSAtLeast (WIN_10)) <br>
+ return TRUE;
+ </p> <br>
+ Replace:<br>
+ <p style="font-family: 'Courier New', monospace;">
+ return TRUE;
+ </p>
+ </li>
+ <li>
+ Compile the VeraCrypt code again
+ </li>
+ </ol>
+ </li>
+ <li>
+ <b>Driver Installation Failure during VeraCrypt Setup from Custom Builds</b> <br>
+ <img src="CompilingGuidelineWin/CertVerifyFails.jpg" width="20%"> <br>
+ Windows validates the signature for every driver which is going to be installed.<br>
+ For security reasons, Windows allows only drivers signed by Microsoft to load.<br>
+ So, when using a custom build:<br>
+ <ul>
+ <li>If you have not modified the VeraCrypt driver source code, you can use the Microsoft-signed drivers included in the VeraCrypt source code (under "src\Release\Setup Files").</li>
+ <li>If you have made modifications, <strong>you will need to boot Windows into "Test Mode"</strong>. This mode allows Windows to load drivers that aren't signed by Microsoft. However, even in "Test Mode", there are certain requirements for signatures, and failures can still occur due to reasons discussed below.</li>
+ </ul>
+ Potential Causes for Installation Failure under "Test Mode":
+ <ol>
+ <li>
+ <b>The certificate used for signing is not trusted by Windows</b><br>
+ You can verify if you are affected by checking the properties of the executable:
+ <ol>
+ <li>
+ Make a right click on the VeraCrypt Setup executable: "src/Release/Setup Files/VeraCrypt Setup 1.XX.exe"
+ </li>
+ <li>
+ Click on properties
+ </li>
+ <li>
+ Go to the top menu "Digital Signatures". Her you will find two signatures in the Signature list
+ </li>
+ Check both by double clicking on it. If the headline says "The certificate in the signature cannot be verified", the corresponding signing certificate was not imported correctly.<br>
+ Click on "View Certificate" and then on "Install Certificate..." to import the certificate to Local Machine certificate storage. For the Root certificates, you may need to choose "Place all certificates in the following store", and select the "Trusted Root Certification Authorities" store.<br>
+ <img src="CompilingGuidelineWin/CertificateCannotBeVerified.jpg" width="40%"> <br>
+ <li>
+ </ol>
+ </li>
+ <li>
+ <b>The driver was modified after the signing process.</b> <br>
+ In this case, please use the script "src/Signing/sign_test.bat" to sign your code again with the test certificates
+ </li>
+ </ol>
+ </li>
+ </ul>
+ </p>
+ </div>
+ </div>
+
+</div>
+</body></html>
diff --git a/doc/html/CompilingGuidelineWin/AddNewSystemVar.jpg b/doc/html/CompilingGuidelineWin/AddNewSystemVar.jpg
new file mode 100644
index 00000000..8e4bded1
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/AddNewSystemVar.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/CertVerifyFails.jpg b/doc/html/CompilingGuidelineWin/CertVerifyFails.jpg
new file mode 100644
index 00000000..c7166ffa
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/CertVerifyFails.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/CertificateCannotBeVerified.jpg b/doc/html/CompilingGuidelineWin/CertificateCannotBeVerified.jpg
new file mode 100644
index 00000000..f5dc2f21
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/CertificateCannotBeVerified.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/DistributionPackageDamaged.jpg b/doc/html/CompilingGuidelineWin/DistributionPackageDamaged.jpg
new file mode 100644
index 00000000..e04f07c7
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/DistributionPackageDamaged.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/DownloadVS2010.jpg b/doc/html/CompilingGuidelineWin/DownloadVS2010.jpg
new file mode 100644
index 00000000..1e4ba165
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/DownloadVS2010.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/DownloadVS2019.jpg b/doc/html/CompilingGuidelineWin/DownloadVS2019.jpg
new file mode 100644
index 00000000..98428292
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/DownloadVS2019.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/DownloadVSBuildTools.jpg b/doc/html/CompilingGuidelineWin/DownloadVSBuildTools.jpg
new file mode 100644
index 00000000..37217733
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/DownloadVSBuildTools.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/NasmCommandLine.jpg b/doc/html/CompilingGuidelineWin/NasmCommandLine.jpg
new file mode 100644
index 00000000..d3a2f2f3
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/NasmCommandLine.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/RegeditPermissions-1.jpg b/doc/html/CompilingGuidelineWin/RegeditPermissions-1.jpg
new file mode 100644
index 00000000..46fcabbc
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/RegeditPermissions-1.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/RegeditPermissions-2.jpg b/doc/html/CompilingGuidelineWin/RegeditPermissions-2.jpg
new file mode 100644
index 00000000..5e3432cc
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/RegeditPermissions-2.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/RegeditPermissions-3.jpg b/doc/html/CompilingGuidelineWin/RegeditPermissions-3.jpg
new file mode 100644
index 00000000..7aa66aa0
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/RegeditPermissions-3.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/RegeditPermissions-4.jpg b/doc/html/CompilingGuidelineWin/RegeditPermissions-4.jpg
new file mode 100644
index 00000000..aa9f1c7b
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/RegeditPermissions-4.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/SelectAdvancedSystemSettings.jpg b/doc/html/CompilingGuidelineWin/SelectAdvancedSystemSettings.jpg
new file mode 100644
index 00000000..753840d5
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/SelectAdvancedSystemSettings.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/SelectEnvironmentVariables.jpg b/doc/html/CompilingGuidelineWin/SelectEnvironmentVariables.jpg
new file mode 100644
index 00000000..709589ba
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/SelectEnvironmentVariables.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/SelectPathVariable.jpg b/doc/html/CompilingGuidelineWin/SelectPathVariable.jpg
new file mode 100644
index 00000000..ef5aa44d
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/SelectPathVariable.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/SelectThisPC.jpg b/doc/html/CompilingGuidelineWin/SelectThisPC.jpg
new file mode 100644
index 00000000..439182d7
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/SelectThisPC.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/VS2010BuildSolution.jpg b/doc/html/CompilingGuidelineWin/VS2010BuildSolution.jpg
new file mode 100644
index 00000000..7870cb51
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/VS2010BuildSolution.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/VS2010Win32Config.jpg b/doc/html/CompilingGuidelineWin/VS2010Win32Config.jpg
new file mode 100644
index 00000000..f0be29b0
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/VS2010Win32Config.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/VS2010X64Config.jpg b/doc/html/CompilingGuidelineWin/VS2010X64Config.jpg
new file mode 100644
index 00000000..b8d989a2
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/VS2010X64Config.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/VS2019ARM64Config.jpg b/doc/html/CompilingGuidelineWin/VS2019ARM64Config.jpg
new file mode 100644
index 00000000..825079da
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/VS2019ARM64Config.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/VS2019BuildSolution.jpg b/doc/html/CompilingGuidelineWin/VS2019BuildSolution.jpg
new file mode 100644
index 00000000..015ab357
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/VS2019BuildSolution.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/YasmCommandLine.jpg b/doc/html/CompilingGuidelineWin/YasmCommandLine.jpg
new file mode 100644
index 00000000..9b414160
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/YasmCommandLine.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/gzipCommandLine.jpg b/doc/html/CompilingGuidelineWin/gzipCommandLine.jpg
new file mode 100644
index 00000000..958f3f6a
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/gzipCommandLine.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelineWin/upxCommandLine.jpg b/doc/html/CompilingGuidelineWin/upxCommandLine.jpg
new file mode 100644
index 00000000..cb0af820
--- /dev/null
+++ b/doc/html/CompilingGuidelineWin/upxCommandLine.jpg
Binary files differ
diff --git a/doc/html/CompilingGuidelines.html b/doc/html/CompilingGuidelines.html
new file mode 100644
index 00000000..22d30d34
--- /dev/null
+++ b/doc/html/CompilingGuidelines.html
@@ -0,0 +1,47 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title>
+<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>
+<meta name="keywords" content="encryption, security"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Home</a></li>
+ <li><a href="/code/">Source Code</a></li>
+ <li><a href="Downloads.html">Downloads</a></li>
+ <li><a class="active" href="Documentation.html">Documentation</a></li>
+ <li><a href="Donation.html">Donate</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Documentation</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Technical%20Details.html">Technical Details</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="CompilingGuidelines.html">Building VeraCrypt From Source</a>
+</p></div>
+
+<div class="wikidoc">
+<h1>Building VeraCrypt From Source</h1>
+<p>In order to build VeraCrypt from the source code, you can follow these step-by-step guidelines:
+<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
+<a href="CompilingGuidelineWin.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Windows Build Guide</a>
+</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
+<a href="CompilingGuidelineLinux.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Linux Build Guide</a>
+</li></ul>
+</p>
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/Conversion_Guide_VeraCrypt_1.26_and_Later.html b/doc/html/Conversion_Guide_VeraCrypt_1.26_and_Later.html
new file mode 100644
index 00000000..493d371c
--- /dev/null
+++ b/doc/html/Conversion_Guide_VeraCrypt_1.26_and_Later.html
@@ -0,0 +1,100 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Conversion Guide for Versions 1.26 and Later</title>
+<meta name="description" content="Guide on how to handle deprecated features and conversion of TrueCrypt volumes in VeraCrypt versions 1.26 and later."/>
+<meta name="keywords" content="VeraCrypt, TrueCrypt, Conversion, Encryption, Security"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Home</a></li>
+ <li><a href="/code/">Source Code</a></li>
+ <li><a href="Downloads.html">Downloads</a></li>
+ <li><a class="active" href="Documentation.html">Documentation</a></li>
+ <li><a href="Donation.html">Donate</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Documentation</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Conversion_Guide_VeraCrypt_1.26_and_Later.html">Conversion Guide for Versions 1.26 and Later</a>
+</p></div>
+
+<div class="wikidoc">
+<h1>Conversion Guide for VeraCrypt 1.26 and Later</h1>
+
+<h2>1. Introduction</h2>
+<p>Version 1.26 and newer of VeraCrypt have introduced significant changes by removing support for certain features. If you encounter issues while mounting volumes, this guide will help you understand and resolve them.</p>
+
+<h2>2. Deprecated Features in VeraCrypt 1.26 and Later</h2>
+<p>The following features have been deprecated:</p>
+<ul>
+<li>TrueCrypt Mode</li>
+<li>HMAC-RIPEMD-160 Hash Algorithm</li>
+<li>GOST89 Encryption Algorithm</li>
+</ul>
+<p>If you experience mounting errors with volumes created in VeraCrypt 1.25.9 or older, use VeraCrypt 1.25.9 to check if these deprecated features are in use. Highlight the volume and click on "Volume Properties" in the GUI to check.</p>
+
+<h2>3. Remediation Procedures Based on Version</h2>
+
+<h3>3.1 Scenario 1: Using VeraCrypt 1.25.9 or Older</h3>
+<p>If you are using or can upgrade to VeraCrypt 1.25.9, follow these steps:</p>
+<ul>
+<li>Convert TrueCrypt Volumes to VeraCrypt Volumes</li>
+<li>Change from Deprecated HMAC-RIPEMD-160 Hash Algorithm</li>
+<li>Recreate VeraCrypt Volume if Using GOST89 Encryption Algorithm</li>
+</ul>
+<p>Download the 1.25.9 version <a href="https://veracrypt.fr/en/Downloads_1.25.9.html">here</a>.</p>
+
+<h3>3.2 Scenario 2: Upgraded to VeraCrypt 1.26 or Newer</h3>
+<p>If you have already upgraded to VeraCrypt 1.26 or newer, follow these steps:</p>
+<ul>
+<li>Convert TrueCrypt Volumes to VeraCrypt Volumes</li>
+<li>Change from Deprecated HMAC-RIPEMD-160 Hash Algorithm</li>
+</ul>
+<p>If you are on Linux or Mac, temporarily downgrade to VeraCrypt 1.25.9. Windows users can use the VCPassChanger tool <a href="https://launchpad.net/veracrypt/trunk/1.25.9/+download/VCPassChanger_%28TrueCrypt_Convertion%29.zip">that can be downloaded from here</a>.</p>
+<ul>
+<li>Recreate VeraCrypt Volume if Using GOST89 Encryption Algorithm</li>
+</ul>
+All OSes temporarily downgrade to 1.25.9 version.
+<h2>4. Conversion and Remediation Procedures</h2>
+
+<h3>4.1 Converting TrueCrypt Volumes to VeraCrypt</h3>
+<p>TrueCrypt file containers and partitions created with TrueCrypt versions 6.x or 7.x can be converted to VeraCrypt using VeraCrypt 1.25.9 or the VCPassChanger tool on Windows. For more details, refer to the <a href="Converting%20TrueCrypt%20volumes%20and%20partitions.html">documentation</a>.</p>
+<p>After conversion, the file extension will remain as <code>.tc</code>. Manually change it to <code>.hc</code> if you want VeraCrypt 1.26 or newer to automatically recognize it.</p>
+
+<h3>4.2 Changing Deprecated HMAC-RIPEMD-160 Hash Algorithm</h3>
+<p>Use the "Set Header Key Derivation Algorithm" feature to change the HMAC-RIPEMD-160 hash algorithm to one supported in VeraCrypt 1.26. Refer to the <a href="Hash%20Algorithms.html">documentation</a> for more details.</p>
+
+<h3>4.3 Recreating VeraCrypt Volume if Using GOST89 Encryption Algorithm</h3>
+<p>If your volume uses the GOST89 encryption algorithm, you will need to copy your data elsewhere and recreate the volume using a supported encryption algorithm. More details are available in the <a href="Encryption%20Algorithms.html">encryption algorithm documentation</a>.</p>
+
+<h2>5. Important Notes</h2>
+<p><strong>Note to users who created volumes with VeraCrypt 1.17 or earlier:</strong></p>
+<blockquote>
+<p>To avoid revealing whether your volumes contain a hidden volume or not, or if you rely on plausible deniability, you must recreate both the outer and hidden volumes, including system encryption and hidden OS. Discard existing volumes created prior to VeraCrypt 1.18a.</p>
+</blockquote>
+
+<p>For more information, visit:</p>
+<ul>
+<li><a href="TrueCrypt%20Support.html">TrueCrypt Support</a></li>
+<li><a href="Converting%20TrueCrypt%20volumes%20and%20partitions.html">Converting TrueCrypt Volumes and Partitions</a></li>
+</ul>
+
+</div>
+
+<div class="ClearBoth"></div>
+</body>
+</html>
diff --git a/doc/html/Converting TrueCrypt volumes and partitions.html b/doc/html/Converting TrueCrypt volumes and partitions.html
index d2ef554c..b5485266 100644
--- a/doc/html/Converting TrueCrypt volumes and partitions.html
+++ b/doc/html/Converting TrueCrypt volumes and partitions.html
@@ -36,6 +36,10 @@
<h1>Converting TrueCrypt volumes and partitions</h1>
-<p>Starting from version 1.0f, TrueCrypt volumes and <strong>non-system</strong> partitions can be converted to VeraCrypt format using any of the following actions:</p>
+<p><strong>⚠️ Warning:</strong> <span style="color: red;">After conversion, ensure that the "TrueCrypt Mode" checkbox is not selected during the mount of the converted volume. Since it is no longer a TrueCrypt volume, mounting it with this option will lead to a mount failure.</span></p>
+<p><strong>⚠️ Important Notice:</strong> As of version 1.26, VeraCrypt has removed support for "TrueCrypt Mode." Consequently, the conversion of TrueCrypt volumes and partitions using this method is no longer possible. Please refer to <a href="Conversion_Guide_VeraCrypt_1.26_and_Later.html">this documentation page</a> for guidance on how to proceed with TrueCrypt volumes in VeraCrypt versions 1.26 and later.</p>
+<p>From version 1.0f up to and including version 1.25.9, TrueCrypt volumes and <strong>non-system</strong> partitions created with TrueCrypt versions 6.x and 7.x, starting with version 6.0 released on July 4th 2008, can be converted to VeraCrypt format using any of the following actions:</p>
<ul>
<li>Change Volume Password </li><li>Set Header Key Derivation Algorithm </li><li>Add/Remove key files </li><li>Remove all key files </li></ul>
-<p>&ldquo;TrueCrypt Mode&rdquo; must be checked in the dialog as show below:</p>
+<p>If the TrueCrypt volume contains a hidden volume, it should also be converted using the same approach, by specifying the hidden volume password and/or keyfiles.</p>
+<p>🚨 After conversion of a file container, the file extension will remain as .tc. Manually change it to .hc if you want VeraCrypt 1.26 or newer to automatically recognize it.</p>
+<p>&ldquo;TrueCrypt Mode&rdquo; must be checked in the dialog as shown below:</p>
<p>&nbsp;<img src="Converting TrueCrypt volumes and partitions_truecrypt_convertion.jpg" alt=""></p>
diff --git a/doc/html/Creating New Volumes.html b/doc/html/Creating New Volumes.html
index 5c235c10..7fe6144e 100644
--- a/doc/html/Creating New Volumes.html
+++ b/doc/html/Creating New Volumes.html
@@ -61,3 +61,3 @@ Note that the output of a hash function is <em>never </em>used directly as an en
<em>entirely </em>filled with random data. Quick format is much faster but may be less secure because until the whole volume has been filled with files, it may be possible to tell how much data it contains (if the space was not filled with random data beforehand).
- If you are not sure whether to enable or disable Quick Format, we recommend that you leave this option unchecked. Note that Quick Format can only be enabled when encrypting partitions/devices.</p>
+ If you are not sure whether to enable or disable Quick Format, we recommend that you leave this option unchecked. Note that Quick Format can only be enabled when encrypting partitions/devices, except on Windows where it is also available when creating file containers.</p>
<p>Important: When encrypting a partition/device within which you intend to create a hidden volume afterwards, leave this option unchecked.</p>
diff --git a/doc/html/Documentation.html b/doc/html/Documentation.html
index 5626301b..db4969bf 100644
--- a/doc/html/Documentation.html
+++ b/doc/html/Documentation.html
@@ -61,2 +61,4 @@
</li></ul>
+</li><li><strong><a href="Normal%20Unmount%20vs%20Force%20Unmount.html">Normal Unmount vs Force Unmount</a></strong>
+</li><li><strong><a href="Avoid%20Third-Party%20File%20Extensions.html">Avoid Third-Party File Extensions</a></strong>
</li><li><strong><a href="Parallelization.html">Parallelization</a></strong>
@@ -67,2 +69,3 @@
</li><li><strong><a href="Security%20Tokens%20%26%20Smart%20Cards.html">Security Tokens &amp; Smart Cards</a></strong>
+</li><li><strong><a href="EMV%20Smart%20Cards.html">EMV Smart Cards</a></strong>
</li><li><strong><a href="Portable%20Mode.html">Portable Mode</a></strong>
@@ -70,2 +73,3 @@
</li><li><strong><a href="Converting%20TrueCrypt%20volumes%20and%20partitions.html">Converting TrueCrypt Volumes &amp; Partitions</a></strong>
+</li><li><strong><a href="Conversion_Guide_VeraCrypt_1.26_and_Later.html">Conversion Guide for Versions 1.26 and Later</a></strong>
</li><li><strong><a href="Default%20Mount%20Parameters.html">Default Mount Parameters</a></strong>
@@ -80,3 +84,3 @@
<ul>
-<li><a href="RIPEMD-160.html">RIPEMD-160</a>
+<li><a href="BLAKE2s-256.html">BLAKE2s-256</a>
</li><li><a href="SHA-256.html">SHA-256</a> </li><li><a href="SHA-512.html">SHA-512</a> </li><li><a href="Whirlpool.html">Whirlpool</a>
@@ -96,2 +100,4 @@
</li><li><a href="Unencrypted%20Data%20in%20RAM.html">Unencrypted Data in RAM</a>
+</li><li><a href="VeraCrypt%20RAM%20Encryption.html">VeraCrypt RAM Encryption</a>
+</li><li><a href="VeraCrypt%20Memory%20Protection.html">VeraCrypt Memory Protection</a>
</li><li><a href="Physical%20Security.html">Physical Security</a>
@@ -137,2 +143,7 @@
</li><li><a href="Source%20Code.html">Source Code</a>
+</li><li><a href="CompilingGuidelines.html">Building VeraCrypt From Source</a>
+<ul>
+<li><a href="CompilingGuidelineWin.html">Windows Build Guide</a>
+</li><li><a href="CompilingGuidelineLinux.html">Linux Build Guide</a>
+</li></ul>
</li></ul>
diff --git a/doc/html/Donation.html b/doc/html/Donation.html
index 6bf151ed..9d0cd62f 100644
--- a/doc/html/Donation.html
+++ b/doc/html/Donation.html
@@ -9,2 +9,3 @@
<link href="styles.css" rel="stylesheet" type="text/css" />
+<script src="donation.js"></script>
</head>
@@ -29,3 +30,3 @@
<h1>Donation to VeraCrypt</h1>
-<p>You can support VeraCrypt development through donations using PayPal, bank transfers and cryptocurrencies (<a href="#Bitcoin">Bitcoin</a>, <a href="#BitcoinCash">Bitcoin Cash</a>, <a href="#Ethereum">Ethereum</a>, <a href="#Litecoin">Litecoin</a> and <a href="#Monero">Monero</a>). It is also possible to donate using Liberapay and Flattr.</p>
+<p>You can support VeraCrypt development through donations using PayPal, bank transfers and cryptocurrencies (<a href="#Bitcoin">Bitcoin</a>, <a href="#BitcoinCash">Bitcoin Cash</a>, <a href="#Ethereum">Ethereum</a>, <a href="#Litecoin">Litecoin</a> and <a href="#Monero">Monero</a>). It is also possible to donate using Liberapay.</p>
@@ -33,29 +34,81 @@
<h3><img src="paypal_30x30.png" style="vertical-align: middle; margin-right: 5px">PayPal</h3>
-<table>
-<tbody>
-<tr>
-<td align="center"><a title="Donate to VeraCrypt in Euros" href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=H25GJLUDHBMB6" target="_blank"><img src="Donation_donate_Euros.gif" alt="" width="92" height="26"></a></td>
-<td align="center"><a title="VeraCrypt Donation in USD" href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=B8PU86SHE2ZVA" target="_blank"><img src="Donation_donate_Dollars.gif" alt="" width="92" height="26"></a></td>
-<td align="center"><a title="VeraCrypt Donation in GBP" href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=MFAZACXK9NXT8" target="_blank"><img src="Donation_donate_GBP.gif" alt="" width="92" height="26"></a></td>
-<td align="center"><a title="VeraCrypt Donation in Canadian Dollar" href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=QAN6T5E5F7F5J" target="_blank"><img src="Donation_donate_Dollars.gif" alt="" width="92" height="26"></a></td>
-<td align="center"><a title="VeraCrypt Donation in Swiss Francs" href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=98RJHVLY5NJ5U" target="_blank"><img src="Donation_donate_CHF.gif" alt="" width="92" height="26"></a></td>
-<td align="center"><a title="VeraCrypt Donation in Japanese Yen" href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=M9DXZ83WD7S8Y" target="_blank"><img src="Donation_donate_YEN.gif" alt="" width="92" height="26"></a></td>
-<td align="center"><a title="VeraCrypt Donation in Australian Dollar" href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=S9L769QS6WAU6" target="_blank"><img src="Donation_donate_Dollars.gif" alt="" width="92" height="26"></a></td>
-<td align="center"><a title="VeraCrypt Donation in Polish złoty" href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=2WDGT7KUJ5GH8" target="_blank"><img src="Donation_donate_PLN.gif" alt="" width="92" height="26"></a></td>
-</tr>
-<tr>
-<td align="center">Euro</td>
-<td align="center">US Dollar</td>
-<td align="center">Pound Sterling</td>
-<td align="center">Canadian Dollar</td>
-<td align="center">Swiss Franc</td>
-<td align="center">Japanese Yen</td>
-<td align="center">Australian Dollar</td>
-<td align="center">Polish złoty</td>
-</tr>
-</tbody>
-</table>
-
-<p>For other currencies, click on the button below and then select your currency using the drop-down list under the amount.</p>
-<a title="VeraCrypt Donation in any currency" href="https://www.paypal.me/idrix" target="_blank"><img src="Donation_donate.gif" alt="" width="92" height="26"></a>
+<div class="donation-buttons">
+ <div class="donation-button">
+ <a title="Donate to VeraCrypt in Euros" href="https://www.paypal.com/ncp/payment/MN367WS3VY9ZU" target="_blank">
+ <img src="Donation_donate_Euros.gif" alt="Donate in Euros" width="92" height="26">
+ </a>
+ <div class="currency-label">Euro</div>
+ </div>
+ <div class="donation-button">
+ <a title="VeraCrypt Donation in USD" href="https://www.paypal.com/ncp/payment/MDY6S3XNCUQRW" target="_blank">
+ <img src="Donation_donate_Dollars.gif" alt="Donate in USD" width="92" height="26">
+ </a>
+ <div class="currency-label">US Dollar</div>
+ </div>
+ <div class="donation-button">
+ <a title="VeraCrypt Donation in GBP" href="https://www.paypal.com/ncp/payment/QLA86UP7S58H4" target="_blank">
+ <img src="Donation_donate_GBP.gif" alt="Donate in GBP" width="92" height="26">
+ </a>
+ <div class="currency-label">Pound Sterling</div>
+ </div>
+ <div class="donation-button">
+ <a title="VeraCrypt Donation in Canadian Dollar" href="https://www.paypal.com/ncp/payment/6KA5U56B9S2LS" target="_blank">
+ <img src="Donation_donate_Dollars.gif" alt="Donate in CAD" width="92" height="26">
+ </a>
+ <div class="currency-label">Canadian Dollar</div>
+ </div>
+ <div class="donation-button">
+ <a title="VeraCrypt Donation in Swiss Francs" href="https://www.paypal.com/ncp/payment/ZUD4RAVN3668G" target="_blank">
+ <img src="Donation_donate_CHF.gif" alt="Donate in CHF" width="92" height="26">
+ </a>
+ <div class="currency-label">Swiss Franc</div>
+ </div>
+ <div class="donation-button">
+ <a title="VeraCrypt Donation in Japanese Yen" href="https://www.paypal.com/ncp/payment/7VDVBU3HDMZWE" target="_blank">
+ <img src="Donation_donate_YEN.gif" alt="Donate in JPY" width="92" height="26">
+ </a>
+ <div class="currency-label">Japanese Yen</div>
+ </div>
+ <div class="donation-button">
+ <a title="VeraCrypt Donation in Australian Dollar" href="https://www.paypal.com/ncp/payment/JGW5REWFUUSJS" target="_blank">
+ <img src="Donation_donate_Dollars.gif" alt="Donate in AUD" width="92" height="26">
+ </a>
+ <div class="currency-label">Australian Dollar</div>
+ </div>
+ <div class="donation-button">
+ <a title="VeraCrypt Donation in Polish złoty" href="https://www.paypal.com/ncp/payment/YVFANME4Y9WFU" target="_blank">
+ <img src="Donation_donate_PLN.gif" alt="Donate in PLN" width="92" height="26">
+ </a>
+ <div class="currency-label">Polish złoty</div>
+ </div>
+</div>
+
+<p>For other currencies, select from the list below:</p>
+<form method="get" action="" id="currency-form" target="_blank">
+ <select name="currency" style="padding: 5px; margin-right: 10px;" required>
+ <option value="" disabled selected>Select your currency</option>
+ <option value="https://www.paypal.com/ncp/payment/MN367WS3VY9ZU">€ EUR - Euro</option>
+ <option value="https://www.paypal.com/ncp/payment/MDY6S3XNCUQRW">$ USD - US Dollar</option>
+ <option value="https://www.paypal.com/ncp/payment/JGW5REWFUUSJS">$ AUD - Australian Dollar</option>
+ <option value="https://www.paypal.com/ncp/payment/P8JABT6BWBQKG">R$ BRL - Brazilian Real</option>
+ <option value="https://www.paypal.com/ncp/payment/6KA5U56B9S2LS">$ CAD - Canadian Dollar</option>
+ <option value="https://www.paypal.com/ncp/payment/ZUD4RAVN3668G">₣ CHF - Swiss Franc</option>
+ <option value="https://www.paypal.com/ncp/payment/3LVJ8XBWNMCYQ">Kč CZK - Czech Koruna</option>
+ <option value="https://www.paypal.com/ncp/payment/542JDQZL74AZW">kr DKK - Danish Krone</option>
+ <option value="https://www.paypal.com/ncp/payment/QLA86UP7S58H4">£ GBP - British Pound</option>
+ <option value="https://www.paypal.com/ncp/payment/YXB526AAZACQ6">$ HKD - Hong Kong Dollar</option>
+ <option value="https://www.paypal.com/ncp/payment/VZBXSS49JNU6G">Ft HUF - Hungarian Forint</option>
+ <option value="https://www.paypal.com/ncp/payment/5FZRSA4VQ3UXA">₪ ILS - Israeli Shekel</option>
+ <option value="https://www.paypal.com/ncp/payment/7VDVBU3HDMZWE">¥ JPY - Japanese Yen</option>
+ <option value="https://www.paypal.com/ncp/payment/GAUPLADH3NV6S">$ MXN - Mexican Peso</option>
+ <option value="https://www.paypal.com/ncp/payment/6LGRTR5L7K5MQ">$ NZD - New Zealand Dollar</option>
+ <option value="https://www.paypal.com/ncp/payment/P5Z56HRYLSM6Q">kr NOK - Norwegian Krone</option>
+ <option value="https://www.paypal.com/ncp/payment/2AQ5GKLQJDLB8">₱ PHP - Philippine Peso</option>
+ <option value="https://www.paypal.com/ncp/payment/YVFANME4Y9WFU">zł PLN - Polish Złoty</option>
+ <option value="https://www.paypal.com/ncp/payment/542JDQZL74AZW">kr SEK - Swedish Krona</option>
+ <option value="https://www.paypal.com/ncp/payment/EFHP9Z9KL4H9N">S$ SGD - Singapore Dollar</option>
+ <option value="https://www.paypal.com/ncp/payment/QMSTMEMJ7UE3S">฿ THB - Thai Baht</option>
+ </select>
+ <input type="submit" value="Donate" style="padding: 5px 15px; background-color: #08aad7; color: white; border: none; cursor: pointer;">
+</form>
@@ -70,3 +123,2 @@
<li><strong>Liberapay: <a href="https://liberapay.com/VeraCrypt/donate" target="_blank"><img alt="Donate using Liberapay" src="liberapay_donate.svg" style="vertical-align: middle; margin-bottom: 5px"></a></strong></li>
-<li><strong>Flattr: <a title="Donate using Flattr" href="https://flattr.com/domain/veracrypt.fr" target="_blank"><img title="Flattr VeraCrypt" src="flattr-badge-large.png" alt="Flattr VeraCrypt" width="93" height="20" border="0" style="vertical-align: middle; margin-bottom: 5px"></a></strong></li>
</ul>
@@ -76,10 +128,11 @@
<ul>
-<li><strong>Legacy:</strong>
-<p><img src="Donation_VeraCrypt_Bitcoin_small.png" alt="VeraCrypt Bitcoin Address" width="150" height="150"></p>
-<p><strong>1NRoPQsm8by5iWyMMmHQy3P5takur3kYgG</strong></p>
-</li>
<li><strong>SegWit:</strong>
-<p><img src="Donation_VC_BTC_Sigwit.png" alt="VeraCrypt BTC SegWit Address" width="150" height="150"></p>
+<p><img src="Donation_VC_BTC_Sigwit.png" alt="VeraCrypt BTC SegWit Address" width="200" height="200"></p>
<p><strong>bc1q28x9udhvjp8jzwmmpsv7ehzw8za60c7g62xauh</strong></p>
</li>
+<li><strong>Legacy:</strong>
+<p><img src="Donation_VeraCrypt_Bitcoin_small.png" alt="VeraCrypt Bitcoin Address" width="200" height="200"></p>
+<p><strong>14atYG4FNGwd3F89h1wDAfeRDwYodgRLcf</strong></p>
+</li>
+
</ul>
@@ -87,4 +140,4 @@
<hr>
-<h3 id="BitcoinCash"><img src="BCH_Logo_48x30.png" style="vertical-align: middle; margin-right: 5px">Bitcoin Cash</h3>
-<p><img src="Donation_VeraCrypt_BitcoinCash.png" alt="VeraCrypt Bitcoin Cash Address" width="150" height="150"></p>
+<h3 id="BitcoinCash"><img src="BCH_Logo_30x30.png" style="vertical-align: middle; margin-right: 5px">Bitcoin Cash</h3>
+<p><img src="Donation_VeraCrypt_BitcoinCash.png" alt="VeraCrypt Bitcoin Cash Address" width="200" height="200"></p>
<p><strong>bitcoincash:qp5vrqwln247f7l9p98ucj4cqye0cjcyusc94jlpy9</strong></p>
@@ -93,3 +146,3 @@
<h3 id="Ethereum"><img src="Ethereum_Logo_19x30.png" style="vertical-align: middle; margin-right: 5px">Ethereum</h3>
-<p><img src="Donation_VeraCrypt_Ethereum.png" alt="VeraCrypt Ethereum Address" width="150" height="150"></p>
+<p><img src="Donation_VeraCrypt_Ethereum.png" alt="VeraCrypt Ethereum Address" width="200" height="200"></p>
<p><strong>0x0a7a86a3eB5f533d969500831e8CC681454a8bD2</strong></p>
@@ -98,3 +151,3 @@
<h3 id="Litecoin"><img src="LTC_Logo_30x30.png" style="vertical-align: middle; margin-right: 5px">Litecoin</h3>
-<p><img src="Donation_VeraCrypt_Litecoin.png" alt="VeraCrypt Litecoin Address" width="150" height="150"></p>
+<p><img src="Donation_VeraCrypt_Litecoin.png" alt="VeraCrypt Litecoin Address" width="200" height="200"></p>
<p><strong>LZkkfkMs4qHmWaP9DAvS1Ep1fAxaf8A2T7</strong></p>
@@ -103,3 +156,3 @@
<h3 id="Monero"><img src="Monero_Logo_30x30.png" style="vertical-align: middle; margin-right: 5px">Monero</h3>
-<p><img src="Donation_VeraCrypt_Monero.png" alt="VeraCrypt Monero Address" width="150" height="150"></p>
+<p><img src="Donation_VeraCrypt_Monero.png" alt="VeraCrypt Monero Address" width="200" height="200"></p>
<p><strong>464GGAau9CE5XiER4PSZ6SMbK4wxPCgdm2r36uqnL8NoS6zDjxUYXnyQymbUsK1QipDMY2fsSgDyZ3tMaLfpWvSr2EE8wMw</strong></p>
diff --git a/doc/html/Donation_Bank.html b/doc/html/Donation_Bank.html
index f9d64fda..b7f1f391 100644
--- a/doc/html/Donation_Bank.html
+++ b/doc/html/Donation_Bank.html
@@ -45,6 +45,6 @@ Reference: Open Source Donation<br>
Account Holder: IDRIX SARL<br>
-Account number: 9600000000026614<br>
-Routing number: 084009519<br>
+Account number: 8310085792<br>
+ACH and Wire routing number: 026073150<br>
Account Type: Checking<br>
-Address: TransferWise, 19 W 24th Street, New York, NY, 10010, United States<br>
+Address: Wise, 30 W. 26th Street, Sixth Floor, New York NY 10010, United States<br>
Reference: Open Source Donation<br>
@@ -54,4 +54,5 @@ Account Holder: IDRIX SARL<br>
Account number: 8310085792<br>
+Routing number: 026073150<br>
Bank code (SWIFT/BIC): CMFGUS33<br>
-Address: TransferWise, 19 W 24th Street, New York, NY, 10010, United States<br>
+Address: Wise, 30 W. 26th Street, Sixth Floor, New York NY 10010, United States<br>
Reference: Open Source Donation<br>
@@ -66,3 +67,3 @@ UK Sort Code: 23-14-70<br>
IBAN (to receive GBP from UK only): GB18 TRWI 2314 7056 3850 07<br>
-Address: TransferWise, 56 Shoreditch High Street, London, E1 6JJ, United Kingdom<br>
+Address: Wise, 56 Shoreditch High Street, London, E1 6JJ, United Kingdom<br>
Reference: Open Source Donation<br>
@@ -75,3 +76,3 @@ Account number: 711714051<br>
BSB Code: 802-985<br>
-Address: TransferWise, 36-38 Gipps Street, Collingwood VIC 3066, Autralia.<br>
+Address: Wise, 36-38 Gipps Street, Collingwood VIC 3066, Autralia.<br>
Reference: Open Source Donation<br>
@@ -83,3 +84,3 @@ Account Holder: IDRIX SARL<br>
Account number: 02-1291-0218919-000<br>
-Address: TransferWise, 56 Shoreditch High Street, London, E1 6JJ, United Kingdom<br>
+Address: Wise, 56 Shoreditch High Street, London, E1 6JJ, United Kingdom<br>
Reference: Open Source Donation<br>
diff --git a/doc/html/Donation_VC_BTC_Sigwit.png b/doc/html/Donation_VC_BTC_Sigwit.png
index 74a15dae..d754760e 100644
--- a/doc/html/Donation_VC_BTC_Sigwit.png
+++ b/doc/html/Donation_VC_BTC_Sigwit.png
Binary files differ
diff --git a/doc/html/Donation_VeraCrypt_BitcoinCash.png b/doc/html/Donation_VeraCrypt_BitcoinCash.png
index 49cf6eb4..c7e22e54 100644
--- a/doc/html/Donation_VeraCrypt_BitcoinCash.png
+++ b/doc/html/Donation_VeraCrypt_BitcoinCash.png
Binary files differ
diff --git a/doc/html/Donation_VeraCrypt_Bitcoin_small.png b/doc/html/Donation_VeraCrypt_Bitcoin_small.png
index 2f7f6d19..72ceae5c 100644
--- a/doc/html/Donation_VeraCrypt_Bitcoin_small.png
+++ b/doc/html/Donation_VeraCrypt_Bitcoin_small.png
Binary files differ
diff --git a/doc/html/Donation_VeraCrypt_Ethereum.png b/doc/html/Donation_VeraCrypt_Ethereum.png
index 49e69b27..fa511247 100644
--- a/doc/html/Donation_VeraCrypt_Ethereum.png
+++ b/doc/html/Donation_VeraCrypt_Ethereum.png
Binary files differ
diff --git a/doc/html/Donation_VeraCrypt_Litecoin.png b/doc/html/Donation_VeraCrypt_Litecoin.png
index 90134045..6f5d858a 100644
--- a/doc/html/Donation_VeraCrypt_Litecoin.png
+++ b/doc/html/Donation_VeraCrypt_Litecoin.png
Binary files differ
diff --git a/doc/html/Donation_VeraCrypt_Monero.png b/doc/html/Donation_VeraCrypt_Monero.png
index 9125e0a7..4085a721 100644
--- a/doc/html/Donation_VeraCrypt_Monero.png
+++ b/doc/html/Donation_VeraCrypt_Monero.png
Binary files differ
diff --git a/doc/html/EMV Smart Cards.html b/doc/html/EMV Smart Cards.html
new file mode 100644
index 00000000..d9c8716a
--- /dev/null
+++ b/doc/html/EMV Smart Cards.html
@@ -0,0 +1,87 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+ <head>
+ <meta http-equiv="content-type" content="text/html; charset=utf-8" />
+ <title>
+ VeraCrypt - Free Open source disk encryption with strong security for the
+ Paranoid
+ </title>
+ <meta
+ name="description"
+ content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."
+ />
+ <meta name="keywords" content="encryption, security" />
+ <link href="styles.css" rel="stylesheet" type="text/css" />
+ </head>
+ <body>
+ <div>
+ <a href="Documentation.html"
+ ><img src="VeraCrypt128x128.png" alt="VeraCrypt"
+ /></a>
+ </div>
+
+ <div id="menu">
+ <ul>
+ <li><a href="Home.html">Home</a></li>
+ <li><a href="/code/">Source Code</a></li>
+ <li><a href="Downloads.html">Downloads</a></li>
+ <li><a class="active" href="Documentation.html">Documentation</a></li>
+ <li><a href="Donation.html">Donate</a></li>
+ <li>
+ <a
+ href="https://sourceforge.net/p/veracrypt/discussion/"
+ target="_blank"
+ >Forums</a
+ >
+ </li>
+ </ul>
+ </div>
+
+ <div>
+ <p>
+ <a href="Documentation.html">Documentation</a>
+ <img src="arrow_right.gif" alt=">>" style="margin-top: 5px" />
+ <a href="EMV%20Smart%20Cards.html">EMV Smart Cards</a>
+ </p>
+ </div>
+
+ <div class="wikidoc">
+ <h1>EMV Smart Cards</h1>
+ <div
+ style="
+ text-align: left;
+ margin-top: 19px;
+ margin-bottom: 19px;
+ padding-top: 0px;
+ padding-bottom: 0px;
+ "
+ >
+ <p>
+ Windows and Linux versions of VeraCrypt offer to use EMV compliant
+ smart cards as a feature. Indeed, the use of PKCS#11 compliant smart
+ cards is dedicated to users with more or less cybersecurity skills.
+ However, in some situations, having such a card strongly reduces the
+ plausible deniability of the user.
+ </p>
+ <p>
+ To overcome this problem, the idea is to allow the use of a type of
+ smart card owned by anyone: EMV compliant smart cards. According to
+ the standard of the same name, these cards spread all over the world
+ are used to carry out banking operations. Using internal data of the
+ user's EMV card as keyfiles will strengthen the security of his volume
+ while keeping his denial plausible.
+ </p>
+ <p>
+ For more technical information, please see the section
+ <em style="text-align: left">EMV Smart Cards</em> in the chapter
+ <a
+ href="Keyfiles%20in%20VeraCrypt.html"
+ style="text-align: left; color: #0080c0; text-decoration: none.html"
+ >
+ <em style="text-align: left">Keyfiles</em></a
+ >.
+ </p>
+ </div>
+ </div>
+ </body>
+</html>
diff --git a/doc/html/Encryption Scheme.html b/doc/html/Encryption Scheme.html
index e159c7e8..88c586a2 100644
--- a/doc/html/Encryption Scheme.html
+++ b/doc/html/Encryption Scheme.html
@@ -56,3 +56,3 @@ Hidden Operating System</a>). If there is a hidden volume within this volume (or
<em>Header Key Derivation, Salt, and Iteration Count</em></a>), which can be one of the following:
-<p>HMAC-SHA-512, HMAC-SHA-256, HMAC-RIPEMD-160, HMAC-Whirlpool. If a PRF is explicitly specified by the user, it will be used directly without trying the other possibilities.</p>
+<p>HMAC-SHA-512, HMAC-SHA-256, HMAC-BLAKE2S-256, HMAC-Whirlpool. If a PRF is explicitly specified by the user, it will be used directly without trying the other possibilities.</p>
<p>A password entered by the user (to which one or more keyfiles may have been applied &ndash; see the section
diff --git a/doc/html/FAQ.html b/doc/html/FAQ.html
index 8b2fabc7..df1bfe8d 100644
--- a/doc/html/FAQ.html
+++ b/doc/html/FAQ.html
@@ -67,4 +67,3 @@ As an example, when the system partition is encrypted, TrueCrypt uses PBKDF2-RIP
<span style="text-decoration:underline">327661</span>. And for standard containers and other partitions, TrueCrypt uses at most 2000 iterations but VeraCrypt uses
-<span style="text-decoration:underline">655331 </span>for RIPEMD160 and <span style="text-decoration:underline">
-500000 </span>iterations for SHA-2 and Whirlpool.<br>
+<span style="text-decoration:underline">500000 </span>iterations.<br>
This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted
@@ -230,3 +229,3 @@ VeraCrypt volumes</a> are independent of the operating system. You will be able
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-Before you unplug or turn off the device, you should always dismount the VeraCrypt volume in VeraCrypt first, and then perform the '<em style="text-align:left">Eject</em>' operation if available (right-click the device in the '<em style="text-align:left">Computer</em>'
+Before you unplug or turn off the device, you should always unmount the VeraCrypt volume in VeraCrypt first, and then perform the '<em style="text-align:left">Eject</em>' operation if available (right-click the device in the '<em style="text-align:left">Computer</em>'
or '<em style="text-align:left">My Computer</em>' list), or use the '<em style="text-align:left">Safely Remove Hardware</em>' function (built in Windows, accessible via the taskbar notification area). Otherwise, data loss may occur.</div>
@@ -479,5 +478,5 @@ documentation</a>.</div>
<br style="text-align:left">
-<strong style="text-align:left">Do I have to dismount VeraCrypt volumes before shutting down or restarting Windows?</strong></div>
+<strong style="text-align:left">Do I have to unmount VeraCrypt volumes before shutting down or restarting Windows?</strong></div>
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-No. VeraCrypt automatically dismounts all mounted VeraCrypt volumes on system shutdown/restart.</div>
+No. VeraCrypt automatically unmounts all mounted VeraCrypt volumes on system shutdown/restart.</div>
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
@@ -489,3 +488,3 @@ No. VeraCrypt automatically dismounts all mounted VeraCrypt volumes on system sh
Partitions/drives</a> may be better as regards performance. Note that reading and writing to/from a file container may take significantly longer when the container is heavily fragmented. To solve this problem, defragment the file system in which the container
- is stored (when the VeraCrypt volume is dismounted).</div>
+ is stored (when the VeraCrypt volume is unmounted).</div>
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
@@ -526,10 +525,2 @@ volume header</a> and if it fails, it attempts to decrypt the area within the vo
<br style="text-align:left">
-<strong style="text-align:left">When I use HMAC-RIPEMD-160, is the size of the header encryption key only 160 bits?</strong></div>
-<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-No, VeraCrypt never uses an output of a hash function (nor of a HMAC algorithm) directly as an encryption key. See the section
-<a href="Header%20Key%20Derivation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html">
-Header Key Derivation, Salt, and Iteration Count</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none">
-documentation</a> for more information.</div>
-<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-<br style="text-align:left">
<strong style="text-align:left">How do I burn a VeraCrypt container larger than 2 GB onto a DVD?</strong><br style="text-align:left">
@@ -730,2 +721,46 @@ In order to be able to index a VeraCrypt volume through Windows Search, the volu
drives that are available when it starts.</div>
+ <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+<strong>I'm encountering an "Operation not permitted" error with VeraCrypt on macOS when trying to mount a file container. How can I resolve this?</strong></div>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+
+<p>This specific error, which appears in the form "Operation not permitted: /var/folders/w6/d2xssyzx.../T/.veracrypt_aux_mnt1/control VeraCrypt::File::Open:232", has been reported by some users. It is the result of macOS not granting the necessary permissions to VeraCrypt. Here are a couple of solutions you can try:</p>
+
+<ul>
+<li>A. Granting Full Disk Access to VeraCrypt:
+<p>
+<ol>
+ <li>Go to <code>Apple Menu</code> > <code>System Settings</code>.</li>
+ <li>Click on the <code>Privacy & Security</code> tab.</li>
+ <li>Scroll down and select <code>Full Disk Access</code>.</li>
+ <li>Click the <code>+</code> button, navigate to your Applications folder, select <code>VeraCrypt</code>, and click <code>Open</code>.</li>
+ <li>Ensure that the checkbox next to VeraCrypt is ticked.</li>
+ <li>Close the System Settings window and try using VeraCrypt again.</li>
+</p>
+</ol>
+</li>
+<li>B. Using the sudo approach to launch VeraCrypt:
+<p>You can launch VeraCrypt from the Terminal using elevated permissions:
+
+<pre>
+sudo /Applications/VeraCrypt.app/Contents/MacOS/VeraCrypt
+</pre>
+
+Running VeraCrypt with sudo often bypasses certain permission-related issues, but it's always a good practice to grant the necessary permissions via the system settings whenever possible.</p>
+</li>
+</ul>
+</div>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+<strong style="text-align:left">Why does VeraCrypt show an unknown device in its list that doesn't appear as a physical disk in Windows Disk Management or in DiskPart output?</strong></div>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+<p>
+Starting from Windows 10 version 1903 and later, Microsoft introduced a feature called <b>Windows Sandbox</b>. This is an isolated environment designed to run untrusted applications safely. As part of this feature, Windows generates a dynamic virtual hard disk (VHDX) which represents a clean Windows installation. This VHDX contains a base system image, user data, and the runtime state, and its size can vary depending on system configurations and usage.
+</p>
+<p>
+When VeraCrypt enumerates devices on a system, it identifies all available disk devices using device path formats like <b>\Device\HardDiskX\PartitionY</b>. VeraCrypt lists these devices, including virtual ones such as those associated with Windows Sandbox, without making distinctions based on their physical or virtual nature. Therefore, you might observe an unexpected device in VeraCrypt, even if it doesn't appear as a physical disk in tools like diskpart.
+</p>
+<p>
+For more details on the Windows Sandbox feature and its associated virtual hard disk, you can refer to this <a href="https://techcommunity.microsoft.com/t5/windows-os-platform-blog/windows-sandbox/ba-p/301849">official Microsoft article</a>.
+</p>
+</div>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
<strong style="text-align:left">I haven't found any answer to my question in the FAQ &ndash; what should I do?</strong></div>
diff --git a/doc/html/Hash Algorithms.html b/doc/html/Hash Algorithms.html
index 9e59aa66..ea8c19ea 100644
--- a/doc/html/Hash Algorithms.html
+++ b/doc/html/Hash Algorithms.html
@@ -46,3 +46,3 @@ VeraCrypt currently supports the following hash algorithms:</div>
<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-<a href="RIPEMD-160.html"><strong style="text-align:left.html">RIPEMD-160</strong></a>
+<a href="BLAKE2s-256.html"><strong style="text-align:left.html">BLAKE2s-256</strong></a>
</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
@@ -56,3 +56,3 @@ VeraCrypt currently supports the following hash algorithms:</div>
</li></ul>
-<p><a href="RIPEMD-160.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section &gt;&gt;</a></p>
+<p><a href="BLAKE2s-256.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section &gt;&gt;</a></p>
</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/Header Key Derivation.html b/doc/html/Header Key Derivation.html
index 860c85e0..f922d676 100644
--- a/doc/html/Header Key Derivation.html
+++ b/doc/html/Header Key Derivation.html
@@ -54,4 +54,4 @@ Modes of Operation</a>). The method that VeraCrypt uses to generate the header k
<a href="Random%20Number%20Generator.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
-VeraCrypt random number generator</a> during the volume creation process. The header key derivation function is based on HMAC-SHA-512, HMAC-SHA-256, HMAC-RIPEMD-160, or HMAC-Whirlpool (see [8, 9, 20, 22]) &ndash; the user selects which. The length of the derived
- key does not depend on the size of the output of the underlying hash function. For example, a header key for the AES-256 cipher is always 256 bits long even if HMAC-RIPEMD-160 is used (in XTS mode, an additional 256-bit secondary header key is used; hence,
+VeraCrypt random number generator</a> during the volume creation process. The header key derivation function is based on HMAC-SHA-512, HMAC-SHA-256, HMAC-BLAKE2S-256, HMAC-Whirlpool or HMAC-Streebog (see [8, 9, 20, 22]) &ndash; the user selects which. The length of the derived
+ key does not depend on the size of the output of the underlying hash function. For example, a header key for the AES-256 cipher is always 256 bits long even if HMAC-SHA-512 is used (in XTS mode, an additional 256-bit secondary header key is used; hence,
two 256-bit keys are used for AES-256 in total). For more information, refer to [7]. A large number of iterations of the key derivation function have to be performed to derive a header key, which increases the time necessary to perform an exhaustive search
@@ -59,12 +59,14 @@ VeraCrypt random number generator</a> during the volume creation process. The he
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-<p>Prior to version 1.12, VeraCrypt always used a fixed number of iterations depending on the volume type and the derivation algorithm used:</p>
-<ul>
-<li>For system partition encryption (boot encryption), <strong>200000</strong> iterations are used for the HMAC-SHA-256 derivation function and
-<strong>327661</strong> iterations are used for HMAC-RIPEMD-160. </li><li>For standard containers and other partitions, <strong>655331</strong> iterations are used for HMAC-RIPEMD-160 and
-<strong>500000</strong> iterations are used for HMAC-SHA-512,&nbsp;HMAC-SHA-256 and HMAC-Whirlpool.
-</li></ul>
-<p>Starting from version 1.12, the <a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html">
+<p>Prior to version 1.12, VeraCrypt always used a fixed number of iterations That depended only on the volume type and the derivation algorithm used.
+Starting from version 1.12, the <a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html">
PIM </a>field (<a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html">Personal Iterations Multiplier</a>) enables users to have more control over the number of iterations used by the key derivation function.</p>
+<p>
<p>When a <a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html">
-PIM </a>value is not specified or if it is equal to zero, VeraCrypt uses the default values expressed above.</p>
+PIM </a>value is not specified or if it is equal to zero, VeraCrypt uses the default values expressed below:<br/>
+<ul>
+<li>For system partition encryption (boot encryption) that uses SHA-256, BLAKE2s-256 or Streebog, <strong>200000</strong> iterations are used.</li>
+<li>For system encryption that uses SHA-512 or Whirlpool, <strong>500000</strong> iterations are used.</li>
+<li>For non-system encryption and file containers, all derivation algorithms will use <strong>500000</strong> iterations.
+</li></ul>
+</p>
<p>When a <a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html">
@@ -73,3 +75,4 @@ PIM </a>value is given by the user, the number of iterations of the key derivati
<li>For system encryption that doesn't use SHA-512 or Whirlpool: Iterations = <strong>PIM x 2048</strong>
-</li><li>For system encryption that uses SHA-512 or Whirlpool, non-system encryption and file containers: Iterations = <strong>15000 &#43; (PIM x 1000)</strong>
+</li><li>For system encryption that uses SHA-512 or Whirlpool: Iterations = <strong>15000 &#43; (PIM x 1000)</strong>
+</li><li>For non-system encryption and file containers: Iterations = <strong>15000 &#43; (PIM x 1000)</strong>
</li></ul>
diff --git a/doc/html/Hibernation File.html b/doc/html/Hibernation File.html
index cc0888f1..0641c06c 100644
--- a/doc/html/Hibernation File.html
+++ b/doc/html/Hibernation File.html
@@ -46,3 +46,3 @@
<p>When a computer hibernates (or enters a power-saving mode), the content of its system memory is written to a so-called hibernation file on the hard drive. You can configure VeraCrypt (<em>Settings</em> &gt;
-<em>Preferences</em> &gt; <em>Dismount all when: Entering power saving mode</em>) to automatically dismount all mounted VeraCrypt volumes, erase their master keys stored in RAM, and cached passwords (stored in RAM), if there are any, before a computer hibernates
+<em>Preferences</em> &gt; <em>Unmount all when: Entering power saving mode</em>) to automatically unmount all mounted VeraCrypt volumes, erase their master keys stored in RAM, and cached passwords (stored in RAM), if there are any, before a computer hibernates
(or enters a power-saving mode). However, keep in mind, that if you do not use system encryption (see the chapter
diff --git a/doc/html/Hidden Volume.html b/doc/html/Hidden Volume.html
index 56f38e2b..bb415d36 100644
--- a/doc/html/Hidden Volume.html
+++ b/doc/html/Hidden Volume.html
@@ -48,3 +48,3 @@ It may happen that you are forced by somebody to reveal the password to an encry
The principle is that a VeraCrypt volume is created within another VeraCrypt volume (within the free space on the volume). Even when the outer volume is mounted, it should be impossible to prove whether there is a hidden volume within it or not*, because free
- space on <em style="text-align:left">any </em>VeraCrypt volume is always filled with random data when the volume is created** and no part of the (dismounted) hidden volume can be distinguished from random data. Note that VeraCrypt does not modify the file
+ space on <em style="text-align:left">any </em>VeraCrypt volume is always filled with random data when the volume is created** and no part of the (unmounted) hidden volume can be distinguished from random data. Note that VeraCrypt does not modify the file
system (information about free space, etc.) within the outer volume in any way.</div>
diff --git a/doc/html/Incompatibilities.html b/doc/html/Incompatibilities.html
index 4c9e4bce..a87ed56d 100644
--- a/doc/html/Incompatibilities.html
+++ b/doc/html/Incompatibilities.html
@@ -66,3 +66,3 @@ Please note that this not a bug in VeraCrypt (the issue is caused by inappropria
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-If Outpost Firewall or Outpost Security Suite is installed with Proactive Protection enabled, the machine freezes completely for 5-10 seconds during the volume mount/dismount operation. This is caused by a conflict between Outpost System Guard option that protects "Active Desktop" objects and VeraCrypt waiting dialog displayed during mount/dismount operations.</div>
+If Outpost Firewall or Outpost Security Suite is installed with Proactive Protection enabled, the machine freezes completely for 5-10 seconds during the volume mount/unmount operation. This is caused by a conflict between Outpost System Guard option that protects "Active Desktop" objects and VeraCrypt waiting dialog displayed during mount/unmount operations.</div>
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
diff --git a/doc/html/Introduction.html b/doc/html/Introduction.html
index 1a946be2..28009ec9 100644
--- a/doc/html/Introduction.html
+++ b/doc/html/Introduction.html
@@ -52,3 +52,3 @@ Let's suppose that there is an .avi video file stored on a VeraCrypt volume (the
<p>Note that VeraCrypt never saves any decrypted data to a disk &ndash; it only stores them temporarily in RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted. When you restart Windows or turn off your computer, the volume
- will be dismounted and files stored in it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), files stored in the volume are inaccessible (and encrypted). To make them accessible again, you
+ will be unmounted and files stored in it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), files stored in the volume are inaccessible (and encrypted). To make them accessible again, you
have to mount the volume (and provide the correct password and/or keyfile). For a quick start guide, please see the chapter Beginner's Tutorial.</p>
diff --git a/doc/html/Issues and Limitations.html b/doc/html/Issues and Limitations.html
index eed2e222..4fa1e0e3 100644
--- a/doc/html/Issues and Limitations.html
+++ b/doc/html/Issues and Limitations.html
@@ -47,4 +47,4 @@ Also, there are other entries whose name start with &quot;#{&quot; and &quot;\??
</li>
-<li>On some Windows machines, VeraCrypt may hang intermittently when mounting or dismounting a volume. Similar hanging may affect other running applications during VeraCrypt mounting or dismounting operations.
-This issue is caused by a conflict between VeraCrypt waiting dialog displayed during mount/dismount operations and other software installed on the machine (e.g. Outpost Firewall Pro).
+<li>On some Windows machines, VeraCrypt may hang intermittently when mounting or unmounting a volume. Similar hanging may affect other running applications during VeraCrypt mounting or unmounting operations.
+This issue is caused by a conflict between VeraCrypt waiting dialog displayed during mount/unmount operations and other software installed on the machine (e.g. Outpost Firewall Pro).
In such situations, the issue can be solved by disabling VeraCrypt waiting dialog in the Preferences: use menu "Settings -> Preferences" and check the option "Don't show wait message dialog when performing operations".
@@ -81,3 +81,3 @@ Note: The only exception is the multi-boot configuration where a running VeraCry
systems (encrypted or unencrypted) installed on other drives connected to the computer (when drive #0 is disconnected, drive #1 becomes drive #0, etc.)
-</li><li>When the notebook battery power is low, Windows may omit sending the appropriate messages to running applications when the computer is entering power saving mode. Therefore, VeraCrypt may fail to auto-dismount volumes in such cases.
+</li><li>When the notebook battery power is low, Windows may omit sending the appropriate messages to running applications when the computer is entering power saving mode. Therefore, VeraCrypt may fail to auto-unmount volumes in such cases.
</li><li>Preserving of any timestamp of any file (e.g. a container or keyfile) is not guaranteed to be reliably and securely performed (for example, due to filesystem journals, timestamps of file attributes, or the operating system failing to perform it for various
@@ -105,3 +105,3 @@ link </a>explains how to disable it in Windows 8 and this <a href="https://www.t
</li>
-<li>Windows system Repair/Recovery Disk can't be created when a VeraCrypt volume is mounted as a fixed disk (which is the default). To solve this, either dismount all volumes or mount volumes are removable media.
+<li>Windows system Repair/Recovery Disk can't be created when a VeraCrypt volume is mounted as a fixed disk (which is the default). To solve this, either unmount all volumes or mount volumes are removable media.
</li><li>Further limitations are listed in the section <a href="Security%20Model.html">
diff --git a/doc/html/Keyfiles in VeraCrypt.html b/doc/html/Keyfiles in VeraCrypt.html
index ed940d53..5a07bf48 100644
--- a/doc/html/Keyfiles in VeraCrypt.html
+++ b/doc/html/Keyfiles in VeraCrypt.html
@@ -54,3 +54,2 @@ Allows managing multi-user <em style="text-align:left">shared</em> access (all k
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-Any kind of file (for example, .txt, .exe, mp3**, .avi) can be used as a VeraCrypt keyfile (however, we recommend that you prefer compressed files, such as .mp3, .jpg, .zip, etc).
<br style="text-align:left">
@@ -116,2 +115,21 @@ Tools</em> &gt; <em style="text-align:left">Close All Security Token Sessions</e
<p>&nbsp;</p>
+<h3 id="SmartCard" style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:13px; margin-bottom:4px">
+EMV Smart Cards</h3>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+Windows and Linux versions of VeraCrypt can use directly as keyfiles data extracted from EMV compliant smart cards, supporting Visa, Mastecard or Maestro applications. As with PKCS-11 compliant smart cards, to use such data as VeraCrypt keyfiles,
+click <em style="text-align:left">Add Token Files</em> (in the keyfile dialog window). The last four digits of the card's Primary Account Number will be displayed, allowing the selection of the card as a keyfile source.
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+The data extracted and concatenated into a single keyfile are as follow : ICC Public Key Certificate, Issuer Public Key Certificate and Card Production Life
+Cycle (CPLC) data. They are respectively identified by the tags '9F46', '90' and '9F7F' in the card's data management system. These two certificates are specific to an application deployed on the EMV card and used for the Dynamic Data Authentication of the card
+during banking transactions. CPLC data are specific to the card and not to any of its applications. They contain information on the production process of the smart card. Therefore both certificates and data are unique and static on any EMV compliant smart card.</div>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+According to the ISO/IEC 7816 standard on which the EMV standard is based, communication with an EMV smart card is done through structured commands called APDUs, allowing to extract the data from the smart card. These data are encoded in the BER-TLV format,
+defined by the ASN.1 standard, and therefore need to be parsed before being concatenated into a keyfile. No PIN is required to access and retrieve data from the card. To cope with the diversity of smart cards readers on the market, librairies compliant with the Microsoft Personal
+Computer/Smart Card communication standard are used. The Winscard library is used. Natively available on Windows in System32, it then doesn't require any installation on this operating system. However, the libpcsclite1 package has to be installed on Linux.</div>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+Since the card is read-only, it is not possible to import or delete data. However, data used as keyfiles can be exported locally in any binary file. During the entire cryptographic process of mounting or creating a volume, the certificates and CPLC data are never stored anywhere
+other than in the user's machine RAM. Once the process is complete, these RAM memory areas are rigorously erased.</div>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+It important to note that this feature is optional and disabled by default. It can be enabled in the <em style="text-align:left">Security Token Preferences</em> parameters by checking the box provided.</div>
+<p>&nbsp;</p>
<h3 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:13px; margin-bottom:4px">
diff --git a/doc/html/Keyfiles.html b/doc/html/Keyfiles.html
index db4fb52c..04dd3463 100644
--- a/doc/html/Keyfiles.html
+++ b/doc/html/Keyfiles.html
@@ -1,81 +1,222 @@
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
- "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
-<head>
-<meta http-equiv="content-type" content="text/html; charset=utf-8" />
-<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title>
-<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>
-<meta name="keywords" content="encryption, security"/>
-<link href="styles.css" rel="stylesheet" type="text/css" />
-</head>
-<body>
+ <head>
+ <meta http-equiv="content-type" content="text/html; charset=utf-8" />
+ <title>
+ VeraCrypt - Free Open source disk encryption with strong security for the
+ Paranoid
+ </title>
+ <meta
+ name="description"
+ content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."
+ />
+ <meta name="keywords" content="encryption, security" />
+ <link href="styles.css" rel="stylesheet" type="text/css" />
+ </head>
+ <body>
+ <div>
+ <a href="Documentation.html"
+ ><img src="VeraCrypt128x128.png" alt="VeraCrypt"
+ /></a>
+ </div>
-<div>
-<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
-</div>
+ <div id="menu">
+ <ul>
+ <li><a href="Home.html">Home</a></li>
+ <li><a href="/code/">Source Code</a></li>
+ <li><a href="Downloads.html">Downloads</a></li>
+ <li><a class="active" href="Documentation.html">Documentation</a></li>
+ <li><a href="Donation.html">Donate</a></li>
+ <li>
+ <a
+ href="https://sourceforge.net/p/veracrypt/discussion/"
+ target="_blank"
+ >Forums</a
+ >
+ </li>
+ </ul>
+ </div>
-<div id="menu">
- <ul>
- <li><a href="Home.html">Home</a></li>
- <li><a href="/code/">Source Code</a></li>
- <li><a href="Downloads.html">Downloads</a></li>
- <li><a class="active" href="Documentation.html">Documentation</a></li>
- <li><a href="Donation.html">Donate</a></li>
- <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
- </ul>
-</div>
+ <div>
+ <p>
+ <a href="Documentation.html">Documentation</a>
+ <img src="arrow_right.gif" alt=">>" style="margin-top: 5px" />
+ <a href="Technical%20Details.html">Technical Details</a>
+ <img src="arrow_right.gif" alt=">>" style="margin-top: 5px" />
+ <a href="Keyfiles.html">Keyfiles</a>
+ </p>
+ </div>
-<div>
-<p>
-<a href="Documentation.html">Documentation</a>
-<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
-<a href="Technical%20Details.html">Technical Details</a>
-<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
-<a href="Keyfiles.html">Keyfiles</a>
-</p></div>
-
-<div class="wikidoc">
-<h1>Keyfiles</h1>
-<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-<p>VeraCrypt keyfile is a file whose content is combined with a password. The user can use any kind of file as a VeraCrypt keyfile. The user can also generate a keyfile using the built-in keyfile generator, which utilizes the VeraCrypt RNG to generate a file
- with random content (for more information, see the section <a href="Random%20Number%20Generator.html">
-<em>Random Number Generator</em></a>).</p>
-<p>The maximum size of a keyfile is not limited; however, only its first 1,048,576 bytes (1 MiB) are processed (all remaining bytes are ignored due to performance issues connected with processing extremely large files). The user can supply one or more keyfiles
- (the number of keyfiles is not limited).</p>
-<p>Keyfiles can be stored on PKCS-11-compliant [23] security tokens and smart cards protected by multiple PIN codes (which can be entered either using a hardware PIN pad or via the VeraCrypt GUI).</p>
-<p>Keyfiles are processed and applied to a password using the following method:</p>
-<ol>
-<li>Let <em>P</em> be a VeraCrypt volume password supplied by user (may be empty)
-</li><li>Let <em>KP</em> be the keyfile pool </li><li>Let <em>kpl</em> be the size of the keyfile pool <em>KP</em>, in bytes (64, i.e., 512 bits);
-<p>kpl must be a multiple of the output size of a hash function H</p>
-</li><li>Let <em>pl</em> be the length of the password <em>P</em>, in bytes (in the current version: 0 &le;
-<em>pl</em> &le; 64) </li><li>if <em>kpl &gt; pl</em>, append (<em>kpl &ndash; pl</em>) zero bytes to the password
-<em>P</em> (thus <em>pl = kpl</em>) </li><li>Fill the keyfile pool <em>KP</em> with <em>kpl</em> zero bytes. </li><li>For each keyfile perform the following steps:
-<ol type="a">
-<li>Set the position of the keyfile pool cursor to the beginning of the pool </li><li>Initialize the hash function <em>H</em> </li><li>Load all bytes of the keyfile one by one, and for each loaded byte perform the following steps:
-<ol type="i">
-<li>Hash the loaded byte using the hash function <em>H</em> without initializing the hash, to obtain an intermediate hash (state)
-<em>M.</em> Do not finalize the hash (the state is retained for next round). </li><li>Divide the state <em>M</em> into individual bytes.<br>
-For example, if the hash output size is 4 bytes, (<em>T</em><sub>0</sub> || <em>T</em><sub>1</sub> ||
-<em>T</em><sub>2</sub> || <em>T</em><sub>3</sub>) = <em>M</em> </li><li>Write these bytes (obtained in step 7.c.ii) individually to the keyfile pool with the modulo 2<sup>8</sup> addition operation (not by replacing the old values in the pool) at the position of the pool cursor. After a byte is written, the pool cursor position
- is advanced by one byte. When the cursor reaches the end of the pool, its position is set to the beginning of the pool.
-</li></ol>
-</li></ol>
-</li><li>Apply the content of the keyfile pool to the password <em>P</em> using the following method:
-<ol type="a">
-<li>Divide the password <em>P</em> into individual bytes <em>B</em><sub>0</sub>...<em>B</em><sub>pl-1</sub>.<br>
-Note that if the password was shorter than the keyfile pool, then the password was padded with zero bytes to the length of the pool in Step 5 (hence, at this point the length of the password is always greater than or equal to the length of the keyfile pool).
-</li><li>Divide the keyfile pool <em>KP</em> into individual bytes <em>G</em><sub>0</sub>...<em>G</em><sub>kpl-1</sub>
-</li><li>For 0 &le; i &lt; kpl perform: Bi = Bi &oplus; Gi </li><li><em>P</em> = <em>B</em><sub>0</sub> || <em>B</em><sub>1</sub> || ... || <em>B</em><sub>pl-2</sub> ||
-<em>B</em><sub>pl-1</sub> </li></ol>
-</li><li>The password <em>P</em> (after the keyfile pool content has been applied to it) is now passed to the header key derivation function PBKDF2 (PKCS #5 v2), which processes it (along with salt and other data) using a cryptographically secure hash algorithm
- selected by the user (e.g., SHA-512). See the section <a href="Header%20Key%20Derivation.html">
-<em>Header Key Derivation, Salt, and Iteration Count</em></a> for more information.
-</li></ol>
-<p>The role of the hash function <em>H</em> is merely to perform diffusion [2]. CRC-32 is used as the hash function
-<em>H</em>. Note that the output of CRC-32 is subsequently processed using a cryptographically secure hash algorithm: The keyfile pool content (in addition to being hashed using CRC-32) is applied to the password, which is then passed to the header key derivation
- function PBKDF2 (PKCS #5 v2), which processes it (along with salt and other data) using a cryptographically secure hash algorithm selected by the user (e.g., SHA-512). The resultant values are used to form the header key and the secondary header key (XTS mode).</p>
-<p>&nbsp;</p>
-<p><a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section &gt;&gt;</a></p>
-</div>
-</div><div class="ClearBoth"></div></body></html>
+ <div class="wikidoc">
+ <h1>Keyfiles</h1>
+ <div
+ style="
+ text-align: left;
+ margin-top: 19px;
+ margin-bottom: 19px;
+ padding-top: 0px;
+ padding-bottom: 0px;
+ "
+ >
+ <p>
+ VeraCrypt keyfile is a file whose content is combined with a password.
+ The user can use any kind of file as a VeraCrypt keyfile. The user can
+ also generate a keyfile using the built-in keyfile generator, which
+ utilizes the VeraCrypt RNG to generate a file with random content (for
+ more information, see the section
+ <a href="Random%20Number%20Generator.html">
+ <em>Random Number Generator</em></a
+ >).
+ </p>
+ <p>
+ The maximum size of a keyfile is not limited; however, only its first
+ 1,048,576 bytes (1 MiB) are processed (all remaining bytes are ignored
+ due to performance issues connected with processing extremely large
+ files). The user can supply one or more keyfiles (the number of
+ keyfiles is not limited).
+ </p>
+ <p>
+ Keyfiles can be stored on PKCS-11-compliant [23] security tokens and
+ smart cards protected by multiple PIN codes (which can be entered
+ either using a hardware PIN pad or via the VeraCrypt GUI).
+ </p>
+ <p>
+ EMV-compliant smart cards' data can be used as keyfile, see chapter
+ <a
+ href="EMV%20Smart%20Cards.html"
+ style="text-align: left; color: #0080c0; text-decoration: none.html"
+ >
+ <em style="text-align: left">EMV Smart Cards</em></a
+ >.
+ </p>
+ <p>
+ Keyfiles are processed and applied to a password using the following
+ method:
+ </p>
+ <ol>
+ <li>
+ Let <em>P</em> be a VeraCrypt volume password supplied by user (may
+ be empty)
+ </li>
+ <li>Let <em>KP</em> be the keyfile pool</li>
+ <li>
+ Let <em>kpl</em> be the size of the keyfile pool <em>KP</em>, in
+ bytes (64, i.e., 512 bits);
+ <p>
+ kpl must be a multiple of the output size of a hash function H
+ </p>
+ </li>
+ <li>
+ Let <em>pl</em> be the length of the password <em>P</em>, in bytes
+ (in the current version: 0 &le; <em>pl</em> &le; 64)
+ </li>
+ <li>
+ if <em>kpl &gt; pl</em>, append (<em>kpl &ndash; pl</em>) zero bytes
+ to the password <em>P</em> (thus <em>pl = kpl</em>)
+ </li>
+ <li>
+ Fill the keyfile pool <em>KP</em> with <em>kpl</em> zero bytes.
+ </li>
+ <li>
+ For each keyfile perform the following steps:
+ <ol type="a">
+ <li>
+ Set the position of the keyfile pool cursor to the beginning of
+ the pool
+ </li>
+ <li>Initialize the hash function <em>H</em></li>
+ <li>
+ Load all bytes of the keyfile one by one, and for each loaded
+ byte perform the following steps:
+ <ol type="i">
+ <li>
+ Hash the loaded byte using the hash function
+ <em>H</em> without initializing the hash, to obtain an
+ intermediate hash (state) <em>M.</em> Do not finalize the
+ hash (the state is retained for next round).
+ </li>
+ <li>
+ Divide the state <em>M</em> into individual bytes.<br />
+ For example, if the hash output size is 4 bytes, (<em>T</em
+ ><sub>0</sub> || <em>T</em><sub>1</sub> || <em>T</em
+ ><sub>2</sub> || <em>T</em><sub>3</sub>) = <em>M</em>
+ </li>
+ <li>
+ Write these bytes (obtained in step 7.c.ii) individually to
+ the keyfile pool with the modulo 2<sup>8</sup> addition
+ operation (not by replacing the old values in the pool) at
+ the position of the pool cursor. After a byte is written,
+ the pool cursor position is advanced by one byte. When the
+ cursor reaches the end of the pool, its position is set to
+ the beginning of the pool.
+ </li>
+ </ol>
+ </li>
+ </ol>
+ </li>
+ <li>
+ Apply the content of the keyfile pool to the password
+ <em>P</em> using the following method:
+ <ol type="a">
+ <li>
+ Divide the password <em>P</em> into individual bytes <em>B</em
+ ><sub>0</sub>...<em>B</em><sub>pl-1</sub>.<br />
+ Note that if the password was shorter than the keyfile pool,
+ then the password was padded with zero bytes to the length of
+ the pool in Step 5 (hence, at this point the length of the
+ password is always greater than or equal to the length of the
+ keyfile pool).
+ </li>
+ <li>
+ Divide the keyfile pool <em>KP</em> into individual bytes
+ <em>G</em><sub>0</sub>...<em>G</em><sub>kpl-1</sub>
+ </li>
+ <li>For 0 &le; i &lt; kpl perform: Bi = Bi &oplus; Gi</li>
+ <li>
+ <em>P</em> = <em>B</em><sub>0</sub> || <em>B</em><sub>1</sub> ||
+ ... || <em>B</em><sub>pl-2</sub> || <em>B</em><sub>pl-1</sub>
+ </li>
+ </ol>
+ </li>
+ <li>
+ The password <em>P</em> (after the keyfile pool content has been
+ applied to it) is now passed to the header key derivation function
+ PBKDF2 (PKCS #5 v2), which processes it (along with salt and other
+ data) using a cryptographically secure hash algorithm selected by
+ the user (e.g., SHA-512). See the section
+ <a href="Header%20Key%20Derivation.html">
+ <em>Header Key Derivation, Salt, and Iteration Count</em></a
+ >
+ for more information.
+ </li>
+ </ol>
+ <p>
+ The role of the hash function <em>H</em> is merely to perform
+ diffusion [2]. CRC-32 is used as the hash function <em>H</em>. Note
+ that the output of CRC-32 is subsequently processed using a
+ cryptographically secure hash algorithm: The keyfile pool content (in
+ addition to being hashed using CRC-32) is applied to the password,
+ which is then passed to the header key derivation function PBKDF2
+ (PKCS #5 v2), which processes it (along with salt and other data)
+ using a cryptographically secure hash algorithm selected by the user
+ (e.g., SHA-512). The resultant values are used to form the header key
+ and the secondary header key (XTS mode).
+ </p>
+ <p>&nbsp;</p>
+ <p>
+ <a
+ href="Personal%20Iterations%20Multiplier%20%28PIM%29.html"
+ style="
+ text-align: left;
+ color: #0080c0;
+ text-decoration: none;
+ font-weight: bold.html;
+ "
+ >Next Section &gt;&gt;</a
+ >
+ </p>
+ </div>
+ </div>
+ <div class="ClearBoth"></div>
+ </body>
+</html>
diff --git a/doc/html/LTC_Logo_30x30.png b/doc/html/LTC_Logo_30x30.png
index 22d760a3..e707c4f0 100644
--- a/doc/html/LTC_Logo_30x30.png
+++ b/doc/html/LTC_Logo_30x30.png
Binary files differ
diff --git a/doc/html/Language Packs.html b/doc/html/Language Packs.html
index fe4a1c4a..54f7f493 100644
--- a/doc/html/Language Packs.html
+++ b/doc/html/Language Packs.html
@@ -12,3 +12,3 @@
-<div>
+<div>
<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
@@ -29,3 +29,3 @@
<p>
-<a href="Documentation.html">Documentation</a>
+<a href="Documentation.html">Documentation</a>
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
@@ -49,4 +49,4 @@ OK</em>.</div>
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-You can still download an archive containing all language packs for the latest version (1.22) from
-<a href="https://launchpad.net/veracrypt/trunk/1.22/+download/VeraCrypt_1.22_Language_Files.zip">
+You can still download an archive containing all language packs for the latest version (1.26.18) from
+<a href="https://launchpad.net/veracrypt/trunk/1.26.18/+download/VeraCrypt_1.26.18_Language_Files.zip">
the following link</a>.</div>
diff --git a/doc/html/Legal Information.html b/doc/html/Legal Information.html
index 6abf4e34..cbd3f172 100644
--- a/doc/html/Legal Information.html
+++ b/doc/html/Legal Information.html
@@ -45,6 +45,6 @@ can be found here</a>.</p>
<br>
-Copyright &copy; 2013-2019 IDRIX. All rights reserved.<br>
+Copyright &copy; 2013-2025 IDRIX. All rights reserved.<br>
<br>
Portions of this software:</p>
-<p>Copyright &copy; 2013-2019 IDRIX. All rights reserved.<br>
+<p>Copyright &copy; 2013-2025 IDRIX. All rights reserved.<br>
<br>
@@ -54,8 +54,9 @@ Copyright &copy; 2003-2012 TrueCrypt Developers Association. All rights reserved
Copyright &copy; 1998-2008 Brian Gladman, Worcester, UK. All rights reserved.</p>
-<p>Copyright &copy; 1995-2017 Jean-loup Gailly and Mark Adler.</p>
+<p>Copyright &copy; 1995-2023 Jean-loup Gailly and Mark Adler.</p>
<p>Copyright &copy; 2016 Disk Cryptography Services for EFI (DCS), Alex Kolotnikov</p>
-<p>Copyright &copy; 1999-2017 Dieter Baron and Thomas Klausner.</p>
+<p>Copyright &copy; 1999-2023 Dieter Baron and Thomas Klausner.</p>
<p>Copyright &copy; 2013, Alexey Degtyarev. All rights reserved.</p>
<p>Copyright &copy; 1999-2016 Jack Lloyd. All rights reserved.</p>
-<p>Copyright &copy; 2013-2018 Stephan Mueller &lt;smueller@chronox.de&gt;</p>
+<p>Copyright &copy; 2013-2019 Stephan Mueller &lt;smueller@chronox.de&gt;</p>
+<p>Copyright &copy; 1999-2023 Igor Pavlov.</p>
<br>
diff --git a/doc/html/Main Program Window.html b/doc/html/Main Program Window.html
index 30ee175b..c232633f 100644
--- a/doc/html/Main Program Window.html
+++ b/doc/html/Main Program Window.html
@@ -47,3 +47,3 @@ Note: There is a more comfortable way of mounting VeraCrypt partitions/devices &
the volume will be mounted.</p>
-<p>Important: Note that when you exit the VeraCrypt application, the VeraCrypt driver continues working and no VeraCrypt volume is dismounted.</p>
+<p>Important: Note that when you exit the VeraCrypt application, the VeraCrypt driver continues working and no VeraCrypt volume is unmounted.</p>
<h3 id="AutoMountDevices">Auto-Mount Devices</h3>
@@ -58,9 +58,9 @@ If the password you enter is wrong, mounting is attempted using cached passwords
Drive letters will be assigned starting from the one that is selected in the drive list in the main window.</p>
-<h3>Dismount</h3>
-<p>This function allows you to dismount the VeraCrypt volume selected in the drive list in the main window. To dismount a VeraCrypt volume means to close it and make it impossible to read/write from/to the volume.</p>
-<h3>Dismount All</h3>
+<h3>Unmount</h3>
+<p>This function allows you to unmount the VeraCrypt volume selected in the drive list in the main window. To unmount a VeraCrypt volume means to close it and make it impossible to read/write from/to the volume.</p>
+<h3>Unmount All</h3>
<p>Note: The information in this section applies to all menu items and buttons with the same or similar caption (for example, it also applies to the system tray menu item
-<em>Dismount All</em>).<br>
+<em>Unmount All</em>).<br>
<br>
-This function allows you to dismount multiple VeraCrypt volumes. To dismount a VeraCrypt volume means to close it and make it impossible to read/write from/to the volume. This function dismounts all mounted VeraCrypt volumes except the following:</p>
+This function allows you to unmount multiple VeraCrypt volumes. To unmount a VeraCrypt volume means to close it and make it impossible to read/write from/to the volume. This function unmounts all mounted VeraCrypt volumes except the following:</p>
<ul>
@@ -68,4 +68,4 @@ This function allows you to dismount multiple VeraCrypt volumes. To dismount a V
</li><li>VeraCrypt volumes that are not fully accessible to the user account (e.g. a volume mounted from within another user account).
-</li><li>VeraCrypt volumes that are not displayed in the VeraCrypt application window. For example, system favorite volumes attempted to be dismounted by an instance of VeraCrypt without administrator privileges when the option '<em>Allow only administrators to
- view and dismount system favorite volumes in VeraCrypt</em>' is enabled. </li></ul>
+</li><li>VeraCrypt volumes that are not displayed in the VeraCrypt application window. For example, system favorite volumes attempted to be unmounted by an instance of VeraCrypt without administrator privileges when the option '<em>Allow only administrators to
+ view and unmount system favorite volumes in VeraCrypt</em>' is enabled. </li></ul>
<h3>Wipe Cache</h3>
@@ -89,7 +89,7 @@ Note: You can clear the volume history by selecting <em>Tools</em> -&gt; <em>Cle
<h3>Exit</h3>
-<p>Terminates the VeraCrypt application. The driver continues working and no VeraCrypt volumes are dismounted. When running in &lsquo;portable&rsquo; mode, the VeraCrypt driver is unloaded when it is no longer needed (e.g., when all instances of the main application
- and/or of the Volume Creation Wizard are closed and no VeraCrypt volumes are mounted). However, if you force dismount on a</p>
+<p>Terminates the VeraCrypt application. The driver continues working and no VeraCrypt volumes are unmounted. When running in &lsquo;portable&rsquo; mode, the VeraCrypt driver is unloaded when it is no longer needed (e.g., when all instances of the main application
+ and/or of the Volume Creation Wizard are closed and no VeraCrypt volumes are mounted). However, if you force unmount on a</p>
<p>VeraCrypt volume when VeraCrypt runs in portable mode, or mount a writable NTFS-formatted volume on Windows Vista or later, the VeraCrypt driver may
<em>not</em> be unloaded when you exit VeraCrypt (it will be unloaded only when you shut down or restart the system). This prevents various problems caused by a bug in Windows (for instance, it would be impossible to start VeraCrypt again as long as there are
- applications using the dismounted volume).</p>
+ applications using the unmounted volume).</p>
<h3>Volume Tools</h3>
diff --git a/doc/html/Multi-User Environment.html b/doc/html/Multi-User Environment.html
index 99456293..94c0f5e0 100644
--- a/doc/html/Multi-User Environment.html
+++ b/doc/html/Multi-User Environment.html
@@ -48,7 +48,7 @@ Moreover, on Windows, the password cache is shared by all logged on users (for m
Also note that switching users in Windows XP or later (<em>Fast User Switching</em> functionality) does
-<em>not</em> dismount a successfully mounted VeraCrypt volume (unlike system restart, which dismounts all mounted VeraCrypt volumes).<br>
+<em>not</em> unmount a successfully mounted VeraCrypt volume (unlike system restart, which unmounts all mounted VeraCrypt volumes).<br>
<br>
On Windows 2000, the container file permissions are ignored when a file-hosted VeraCrypt volume is to be mounted. On all supported versions of Windows, users without administrator privileges can mount any partition/device-hosted VeraCrypt volume (provided that
- they supply the correct password and/or keyfiles). A user without administrator privileges can dismount only volumes that he or she mounted. However, this does not apply to system favorite volumes unless you enable the option (disabled by default)
-<em>Settings</em> &gt; &lsquo;<em>System Favorite Volumes</em>&rsquo; &gt; &lsquo;<em>Allow only administrators to view and dismount system favorite volumes in VeraCrypt</em>&rsquo;.</p>
+ they supply the correct password and/or keyfiles). A user without administrator privileges can unmount only volumes that he or she mounted. However, this does not apply to system favorite volumes unless you enable the option (disabled by default)
+<em>Settings</em> &gt; &lsquo;<em>System Favorite Volumes</em>&rsquo; &gt; &lsquo;<em>Allow only administrators to view and unmount system favorite volumes in VeraCrypt</em>&rsquo;.</p>
</div>
diff --git a/doc/html/Normal Unmount vs Force Unmount.html b/doc/html/Normal Unmount vs Force Unmount.html
new file mode 100644
index 00000000..72da246b
--- /dev/null
+++ b/doc/html/Normal Unmount vs Force Unmount.html
@@ -0,0 +1,77 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title>
+<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>
+<meta name="keywords" content="encryption, security"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Home</a></li>
+ <li><a href="/code/">Source Code</a></li>
+ <li><a href="Downloads.html">Downloads</a></li>
+ <li><a class="active" href="Documentation.html">Documentation</a></li>
+ <li><a href="Donation.html">Donate</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Documentation</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Normal%20Unmount%20vs%20Force%20Unmount.html">Normal Unmount vs Force Unmount</a>
+</p></div>
+
+<div class="wikidoc">
+<h1>Normal Unmount vs Force Unmount</h1>
+<p>Understanding the distinction between "Normal Unmount" and "Force Unmount" operation is important due to the potential impact on user data.</p>
+
+<h2>Normal Unmount Process</h2>
+
+<p>During a normal unmount process, VeraCrypt performs the following steps:</p>
+
+<ol>
+ <li>Requests the Windows operating system to lock the volume, prohibiting further I/O operations.</li>
+ <li>Requests Windows to gracefully eject the volume from the system. This step is analogous to user-initiated device ejection via the system tray.</li>
+ <li>Instructs the Windows Mount Manager to unmount the volume.</li>
+ <li>Deletes the link between the drive letter and the volume's virtual device.</li>
+ <li>Deletes the volume's virtual device, which includes erasing the encryption keys from RAM.</li>
+</ol>
+
+<p>In this flow, steps 1 and 2 may fail if there are open files on the volume. Notably, even if all user applications accessing files on the volume are closed, Windows might still keep the files open until the I/O cache is completely flushed.</p>
+
+<h2>Force Unmount Process</h2>
+
+<p>The Force Unmount process is distinct but largely similar to the Normal Unmount. It essentially follows the same steps but disregards any failures that might occur during steps 1 and 2, and carries on with the rest of the procedure. However, if there are files open by the user or if the volume I/O cache has not yet been flushed, this could result in potential data loss. This situation parallels forcibly removing a USB device from your computer while Windows is still indicating its active usage.</p>
+
+<p>Provided all applications using files on the mounted volume have been successfully closed and the I/O cache is fully flushed, neither data loss nor data/filesystem corruption should occur when executing a 'force unmount'. As in a normal unmount, the encryption keys are erased from RAM upon successful completion of a 'Force Unmount'.</p>
+
+<h2>How to Trigger Force Unmount</h2>
+
+<p>There are three approaches to trigger a force unmount in VeraCrypt:</p>
+
+<ol>
+ <li>Through the popup window that appears if a normal unmount attempt is unsuccessful.</li>
+ <li>Via Preferences, by checking the "force auto-unmount" option in the "Auto-Unmount" section.</li>
+ <li>Using the command line, by incorporating the /force or /f switch along with the /d or /unmount switch.</li>
+</ol>
+
+<p>In order to avoid inadvertent data loss or corruption, always ensure to follow suitable precautions when unmounting a VeraCrypt volume. This includes</p>
+<ol>
+ <li>Ensuring all files on the volume are closed before initiating a unmount.</li>
+ <li>Allowing some time after closing all files to ensure Windows has completely flushed the I/O cache.</li>
+ <li>Take note that some antivirus software may keep file handles open on the volume after performing a scan, hindering a successful Normal Unmount. If you experience this issue, you might consider excluding the VeraCrypt volume from your antivirus scans. Alternatively, consult with your antivirus software provider to understand how their product interacts with VeraCrypt volumes and how to ensure it doesn't retain open file handles.</li>
+</ol>
+
+
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/Personal Iterations Multiplier (PIM).html b/doc/html/Personal Iterations Multiplier (PIM).html
index 5271ced2..d673d431 100644
--- a/doc/html/Personal Iterations Multiplier (PIM).html
+++ b/doc/html/Personal Iterations Multiplier (PIM).html
@@ -41,9 +41,17 @@
or in the command line.</p>
-<p>If no PIM value is specified, VeraCrypt will use the default number of iterations used in versions prior to 1.12 (see
-<a href="Header%20Key%20Derivation.html">
-Header Key Derivation</a>).</p>
<p>When a PIM value is specified, the number of iterations is calculated as follows:</p>
<ul>
-<li>For system encryption that doesn't use SHA-512 or Whirlpool: Iterations = <strong>PIM x 2048</strong> </li><li>For system encryption that uses SHA-512 or Whirlpool, non-system encryption and file containers: Iterations = <strong>15000 &#43; (PIM x 1000)</strong>
+<li>For system encryption that doesn't use SHA-512 or Whirlpool: Iterations = <strong>PIM x 2048</strong>
+</li><li>For system encryption that uses SHA-512 or Whirlpool: Iterations = <strong>15000 &#43; (PIM x 1000)</strong>
+</li><li>For non-system encryption and file containers: Iterations = <strong>15000 &#43; (PIM x 1000)</strong>
</li></ul>
+<p>If no PIM value is specified, VeraCrypt will use the default number of iterations used in versions prior to 1.12 (see
+ <a href="Header%20Key%20Derivation.html">
+ Header Key Derivation</a>). This can be summarized as follows:<br/>
+ <ul>
+ <li>For system partition encryption (boot encryption) that uses SHA-256, BLAKE2s-256 or Streebog, <strong>200000</strong> iterations are used which is equivalent to a PIM value of <strong>98</strong>.</li>
+ <li>For system encryption that uses SHA-512 or Whirlpool, <strong>500000</strong> iterations are used which is equivalent to a PIM value of <strong>485</strong>.</li>
+ <li>For non-system encryption and file containers, all derivation algorithms will use <strong>500000</strong> iterations which is equivalent to a PIM value of <strong>485</strong>.</li>
+ </ul>
+</p>
<p>Prior to version 1.12, the security of a VeraCrypt volume was only based on the password strength because VeraCrypt was using a fixed number of iterations.<br>
diff --git a/doc/html/Portable Mode.html b/doc/html/Portable Mode.html
index b26cb35b..006c7d0f 100644
--- a/doc/html/Portable Mode.html
+++ b/doc/html/Portable Mode.html
@@ -66,5 +66,5 @@ Note: To extract files from the VeraCrypt self-extracting package, run it, and t
<p>Note: When running in &lsquo;portable&rsquo; mode, the VeraCrypt driver is unloaded when it is no longer needed (e.g., when all instances of the main application and/or of the Volume Creation Wizard are closed and no VeraCrypt volumes are mounted). However,
- if you force dismount on a VeraCrypt volume when VeraCrypt runs in portable mode, or mount a writable NTFS-formatted volume on Windows Vista or later, the VeraCrypt driver may
+ if you force unmount on a VeraCrypt volume when VeraCrypt runs in portable mode, or mount a writable NTFS-formatted volume on Windows Vista or later, the VeraCrypt driver may
<em>not</em> be unloaded when you exit VeraCrypt (it will be unloaded only when you shut down or restart the system). This prevents various problems caused by a bug in Windows (for instance, it would be impossible to start VeraCrypt again as long as there are
- applications using the dismounted volume).</p>
+ applications using the unmounted volume).</p>
<h3>Tools -&gt; Traveler Disk Setup</h3>
diff --git a/doc/html/Program Menu.html b/doc/html/Program Menu.html
index caed5f40..cbc52b84 100644
--- a/doc/html/Program Menu.html
+++ b/doc/html/Program Menu.html
@@ -43,5 +43,5 @@
<em>Auto-Mount Devices.</em></a></p>
-<h3>Volumes -&gt; Dismount All Mounted Volumes</h3>
+<h3>Volumes -&gt; Unmount All Mounted Volumes</h3>
<p>See the section <a href="Main%20Program%20Window.html">
-<em>Dismount All.</em></a></p>
+<em>Unmount All.</em></a></p>
<h3>Volumes -&gt; Change Volume Password</h3>
@@ -75,3 +75,3 @@ Note: When VeraCrypt re-encrypts a volume header, the original volume header is
<h3>Volumes -&gt; Set Header Key Derivation Algorithm</h3>
-<p>This function allows you to re-encrypt a volume header with a header key derived using a different PRF function (for example, instead of HMAC-RIPEMD-160 you could use HMAC-Whirlpool). Note that the volume header contains the master encryption key with which
+<p>This function allows you to re-encrypt a volume header with a header key derived using a different PRF function (for example, instead of HMAC-BLAKE2S-256 you could use HMAC-Whirlpool). Note that the volume header contains the master encryption key with which
the volume is encrypted. Therefore, the data stored on the volume will <em>not</em> be lost after you use this function. For more information, see the section
@@ -136,3 +136,3 @@ Rescue Disk</a>.</p>
<br>
-WARNING: Restoring a volume header also restores the volume password that was valid when the backup was created. Moreover, if keyfile(s) are/is necessary to mount a volume when the backup is created, the same keyfile(s) will be necessary to mount the volume
+WARNING: Restoring a volume header also restores the volume password and PIM that were valid when the backup was created. Moreover, if keyfile(s) are/is necessary to mount a volume when the backup is created, the same keyfile(s) will be necessary to mount the volume
again after the volume header is restored. For more information, see the section
@@ -141,3 +141,3 @@ WARNING: Restoring a volume header also restores the volume password that was va
<br>
-After you create a volume header backup, you might need to create a new one only when you change the volume password and/or keyfiles. Otherwise, the volume header remains unmodified so the volume header backup remains up-to-date.</p>
+After you create a volume header backup, you might need to create a new one only when you change the volume password and/or keyfiles, or when you change the PIM value. Otherwise, the volume header remains unmodified so the volume header backup remains up-to-date.</p>
<p>Note: Apart from salt (which is a sequence of random numbers), external header backup files do not contain any unencrypted information and they cannot be decrypted without knowing the correct password and/or supplying the correct keyfile(s). For more information,
@@ -149,6 +149,6 @@ After you create a volume header backup, you might need to create a new one only
When <em>restoring</em> a volume header, you need to choose the type of volume whose header you wish to restore (a standard or hidden volume). Only one volume header can be restored at a time. To restore both headers, you need to use the function twice (<em>Tools</em>
- -&gt; <em>Restore Volume Header</em>). You will need to enter the correct password (and/or to supply the correct keyfiles) that was/were valid when the volume header backup was created. The password (and/or keyfiles) will also automatically determine the type
+ -&gt; <em>Restore Volume Header</em>). You will need to enter the correct password (and/or to supply the correct keyfiles) and the non-default PIM value, if applicable, that were valid when the volume header backup was created. The password (and/or keyfiles) and PIM will also automatically determine the type
of the volume header to restore, i.e. standard or hidden (note that VeraCrypt determines the type through the process of trial and error).<br>
<br>
-Note: If the user fails to supply the correct password (and/or keyfiles) twice in a row when trying to mount a volume, VeraCrypt will automatically try to mount the volume using the embedded backup header (in addition to trying to mount it using the primary
+Note: If the user fails to supply the correct password (and/or keyfiles) and/or the correct non-default PIM value twice in a row when trying to mount a volume, VeraCrypt will automatically try to mount the volume using the embedded backup header (in addition to trying to mount it using the primary
header) each subsequent time that the user attempts to mount the volume (until he or she clicks
@@ -166,6 +166,6 @@ Disable this option if you experience stability issues (like volume access issue
<h4>Wipe cached passwords on exit</h4>
-<p>If enabled, passwords (which may also contain processed keyfile contents) cached in driver memory will be cleared when VeraCrypt exits.</p>
+<p>If enabled, passwords (which may also contain processed keyfile contents) and PIM values cached in driver memory will be cleared when VeraCrypt exits.</p>
<h4>Cache passwords in driver memory</h4>
-<p>When checked, passwords and/or processed keyfile contents for up to last four successfully mounted VeraCrypt volumes are cached. This allows mounting volumes without having to type their passwords (and selecting keyfiles) repeatedly. VeraCrypt never saves
- any password to a disk (however, see the chapter <a href="Security%20Requirements%20and%20Precautions.html">
+<p>When checked, passwords and/or processed keyfile contents for up to last four successfully mounted VeraCrypt volumes are cached. If the 'Include PIM when caching a password' option is enabled in the Preferences, non-default PIM values are cached alongside the passwords. This allows mounting volumes without having to type their passwords (and selecting keyfiles) repeatedly. VeraCrypt never saves
+ any password or PIM values to a disk (however, see the chapter <a href="Security%20Requirements%20and%20Precautions.html">
<em>Security Requirements and Precautions</em></a>). Password caching can be enabled/disabled in the Preferences (<em>Settings</em> -&gt;
@@ -188,4 +188,4 @@ If this option is checked and if there are two or more favorite volumes, then du
</li><li>VeraCrypt volumes that are not fully accessible to the user account (e.g. a volume mounted from within another user account).
-</li><li>VeraCrypt volumes that are not displayed in the VeraCrypt application window. For example, system favorite volumes attempted to be dismounted by an instance of VeraCrypt without administrator privileges when the option '<em>Allow only administrators to
- view and dismount system favorite volumes in VeraCrypt</em>' is enabled. </li></ul>
+</li><li>VeraCrypt volumes that are not displayed in the VeraCrypt application window. For example, system favorite volumes attempted to be unmounted by an instance of VeraCrypt without administrator privileges when the option '<em>Allow only administrators to
+ view and unmount system favorite volumes in VeraCrypt</em>' is enabled. </li></ul>
<h4>VeraCrypt Background Task &ndash; Enabled</h4>
@@ -197,6 +197,6 @@ If this option is checked and if there are two or more favorite volumes, then du
<em>VeraCrypt Background Task</em></a>. Note that this option cannot be disabled when VeraCrypt runs in portable mode.</p>
-<h4>Auto-dismount volume after no data has been read/written to it for</h4>
-<p>After no data has been written/read to/from a VeraCrypt volume for <em>n</em> minutes, the volume is automatically dismounted.</p>
-<h4>Force auto-dismount even if volume contains open files or directories</h4>
-<p>This option applies only to auto-dismount (not to regular dismount). It forces dismount (without prompting) on the volume being auto-dismounted in case it contains open files or directories (i.e., file/directories that are in use by the system or applications).</p>
+<h4>Auto-unmount volume after no data has been read/written to it for</h4>
+<p>After no data has been written/read to/from a VeraCrypt volume for <em>n</em> minutes, the volume is automatically unmounted.</p>
+<h4>Force auto-unmount even if volume contains open files or directories</h4>
+<p>This option applies only to auto-unmount (not to regular unmount). It forces unmount (without prompting) on the volume being auto-unmounted in case it contains open files or directories (i.e., file/directories that are in use by the system or applications).</p>
<p>&nbsp;</p>
diff --git a/doc/html/Protection of Hidden Volumes.html b/doc/html/Protection of Hidden Volumes.html
index 3e3e5890..ce320d21 100644
--- a/doc/html/Protection of Hidden Volumes.html
+++ b/doc/html/Protection of Hidden Volumes.html
@@ -63,4 +63,4 @@ Both passwords must be correct; otherwise, the outer volume will not be mounted.
<em style="text-align:left">not</em> actually mount the hidden volume. It only decrypts its header (in RAM) and retrieves information about the size of the hidden volume (from the decrypted header). Then, the outer volume is mounted and any attempt to save
- data to the area of the hidden volume will be rejected (until the outer volume is dismounted).
-<strong style="text-align:left">Note that VeraCrypt never modifies the filesystem (e.g., information about allocated clusters, amount of free space, etc.) within the outer volume in any way. As soon as the volume is dismounted, the protection is lost. When
+ data to the area of the hidden volume will be rejected (until the outer volume is unmounted).
+<strong style="text-align:left">Note that VeraCrypt never modifies the filesystem (e.g., information about allocated clusters, amount of free space, etc.) within the outer volume in any way. As soon as the volume is unmounted, the protection is lost. When
the volume is mounted again, it is not possible to determine whether the volume has used hidden volume protection or not. The hidden volume protection can be activated only by users who supply the correct password (and/or keyfiles) for the hidden volume (each
@@ -68,3 +68,3 @@ Both passwords must be correct; otherwise, the outer volume will not be mounted.
</strong><br style="text-align:left">
-As soon as a write operation to the hidden volume area is denied/prevented (to protect the hidden volume), the entire host volume (both the outer and the hidden volume) becomes write-protected until dismounted (the VeraCrypt driver reports the 'invalid parameter'
+As soon as a write operation to the hidden volume area is denied/prevented (to protect the hidden volume), the entire host volume (both the outer and the hidden volume) becomes write-protected until unmounted (the VeraCrypt driver reports the 'invalid parameter'
error to the system upon each attempt to write data to the volume). This preserves plausible deniability (otherwise certain kinds of inconsistency within the file system could indicate that this volume has used hidden volume protection). When damage to hidden
@@ -83,3 +83,3 @@ Moreover, the field <em style="text-align:left">Hidden Volume Protected </em>in
Note that when damage to hidden volume is prevented, <em style="text-align:left">
-no</em> information about the event is written to the volume. When the outer volume is dismounted and mounted again, the volume properties will
+no</em> information about the event is written to the volume. When the outer volume is unmounted and mounted again, the volume properties will
<em style="text-align:left">not </em>display the string &quot;<em style="text-align:left">damage prevented</em>&quot;.<em style="text-align:left"><br style="text-align:left">
@@ -102,3 +102,3 @@ The type of the mounted outer volume is <em style="text-align:left">Outer</em>:
type &quot;Outer&quot; but &quot;Normal&quot;). The reason is that, during the time when an outer volume is mounted with the hidden volume protection enabled, the adversary
-</strong></em><strong style="text-align:left">can</strong><em style="text-align:left"><strong style="text-align:left"> find out that a hidden volume exists within the outer volume (he/she will be able to find it out until the volume is dismounted and possibly
+</strong></em><strong style="text-align:left">can</strong><em style="text-align:left"><strong style="text-align:left"> find out that a hidden volume exists within the outer volume (he/she will be able to find it out until the volume is unmounted and possibly
even some time after the computer has been powered off - see <a href="Unencrypted%20Data%20in%20RAM.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
diff --git a/doc/html/Random Number Generator.html b/doc/html/Random Number Generator.html
index e5080389..8b9d934c 100644
--- a/doc/html/Random Number Generator.html
+++ b/doc/html/Random Number Generator.html
@@ -53,5 +53,5 @@
<ol>
-<li>Let <em>R</em> be the randomness pool. </li><li>Let <em>H</em> be the hash function selected by the user (SHA-512, RIPEMD-160, or Whirlpool).
+<li>Let <em>R</em> be the randomness pool. </li><li>Let <em>H</em> be the hash function selected by the user (SHA-512, BLAKE2S-256, or Whirlpool).
</li><li><em>l</em> = byte size of the output of the hash function <em>H</em> (i.e., if
-<em>H</em> is RIPEMD-160, then <em>l</em> = 20; if <em>H</em> is SHA-512, <em>l</em> = 64)
+<em>H</em> is BLAKE2S-256, then <em>l</em> = 20; if <em>H</em> is SHA-512, <em>l</em> = 64)
</li><li><em>z</em> = byte size of the randomness pool <em>R </em>(320 bytes) </li><li><em>q</em> = <em>z</em> / <em>l</em> &ndash; 1 (e.g., if <em>H</em> is Whirlpool, then
diff --git a/doc/html/Release Notes.html b/doc/html/Release Notes.html
index 6dcae52f..a35d2f3d 100644
--- a/doc/html/Release Notes.html
+++ b/doc/html/Release Notes.html
@@ -41,2 +41,286 @@
</p>
+
+<p><strong style="text-align:left">1.26.20</strong> (February 3<sup>rd</sup>, 2025):</p>
+<ul>
+<li><strong>All OSes:</strong>
+ <ul>
+ <li>Implement SHA-256 acceleration on ARM64 platforms using CPU instructions.</li>
+ <li>Update translations.</li>
+ <li>Replace "Dismount" with "Unmount" across the UI and documentation to align with IT standards.</li>
+ </ul>
+</li>
+<li><strong>Windows:</strong>
+ <ul>
+ <li>Fix regression in driver that always allowed defragmentation and caused other side effects.</li>
+ <li>Revert to the previous method of gathering system entropy due to stability issues reported by users.</li>
+ </ul>
+</li>
+<li><strong>Linux:</strong>
+ <ul>
+ <li>Fix a regression in Linux Mint affecting administrator password authentication (GH #1473).</li>
+ </ul>
+</li>
+<li><strong>macOS:</strong>
+<ul>
+<li>Fix a regression that prevented volume unmounting (GH #1467).</li>
+<li>Resolve a wxWidgets 3.2.6 assertion error related to the undefined switch <code>use-dummy-sudo-password</code> (GH #1470).</li>
+</ul>
+</li>
+</ul>
+
+<p><strong style="text-align:left">1.26.18</strong> (January 20<sup>th</sup>, 2025):</p>
+<ul>
+<li><strong>All OSes:</strong>
+<ul>
+<li>Added support for SHA-256 x86 intrinsic to enhance the performance of PBKDF2-HMAC-SHA256.</li>
+<li>Added support for AES hardware on ARM64 platforms (e.g. Windows ARM64, macOS on Apple Silicon Mx).</li>
+<li>Updated translations</li>
+</ul>
+</li>
+<li><strong>Windows:</strong>
+ <ul>
+ <li>Dropped support for Windows 32-bit.</li>
+ <li>Set Windows 10 October 2018 Update (version 1809) as the minimum supported version.</li>
+ <li>Reduce driver deadlock occurences under low-memory scenarios caused by re-entrant IRP completions.</li>
+ <li>Fixed failed EFI detection on some PCs where the BootOrder variable is not defined (proposed by @kriegste, GH #360).</li>
+ <li>Fixed "Access Denied" error when updating VeraCrypt using EXE setup following a Windows upgrade.</li>
+ <li>Fixed various issues affecting the EFI system encryption configuration editor.</li>
+ <li>Fixed regression in Traveler Disk creation (GH #886)</li>
+ <li>Replaced the deprecated CryptGenRandom with BCryptGenRandom for generating secure random bytes.</li>
+ <li>Use modern API to gather system entropy for random generation instead of obsolete ones.</li>
+ <li> Update LZMA SDK to version 24.09</li>
+ <li>Update libzip to version 1.11.2</li>
+ </ul>
+</li>
+<li><strong>Linux:</strong>
+ <ul>
+ <li>CVE-2024-54187: Added absolute paths when executing system binaries to prevent path hijacking (collaboration with SivertPL @__tfr)</li>
+ <li>CVE-2025-23021: Prevent mounting volumes on system directories and PATH (reported by SivertPL @__tfr)</li>
+ <li>Fixed an assertion issue with the wxWidgets library included in Ubuntu.</li>
+ <li>Improved directory-opening logic by prioritizing xdg-open and adding fallback mechanisms.</li>
+ <li>Ensure that volume exists before starting the mount operation.</li>
+ <li>Fix "Password too long" error message not expanded to include max length (GH #1456)</li>
+ <li>Simplify sudo session detection logic.</li>
+ </ul>
+</li>
+<li><strong>macOS:</strong>
+ <ul>
+ <li>CVE-2024-54187: Added absolute paths when executing system binaries to prevent path hijacking (collaboration with SivertPL @__tfr)</li>
+ <li>CVE-2025-23021: Prevent mounting volumes on system directories and PATH (reported by SivertPL @__tfr)</li>
+ <li>Disabled screen capture by default. Added the --allow-screencapture CLI switch to enable it if needed.</li>
+ <li>Ensure that volume exists before starting the mount operation.</li>
+ <li>Implement sudo session detection logic</li>
+ </ul>
+</li>
+</ul>
+
+<p><strong style="text-align:left">1.26.15</strong> (September 2<sup>nd</sup>, 2024):</p>
+<ul>
+<li><strong>Windows:</strong>
+<ul>
+ <li>Fix MSI install/uninstall issues:
+ <ul>
+ <li>Fixed error 1603 returned by MSI silent install when REBOOT=ReallySuppress is specified and a reboot is required.</li>
+ <li>Fixed missing documentation and language files from the MSI package.</li>
+ <li>Fixed MSI not installing new documentation and language files when upgrading from an EXE-based installation.</li>
+ <li>Fixed installation folder not being removed after MSI uninstall in some cases.</li>
+ </ul>
+ </li>
+ <li>Fix regression during UEFI system decryption that caused the bootloader to persist.</li>
+</ul>
+</li>
+</ul>
+
+<p><strong style="text-align:left">1.26.14</strong> (August 25<sup>th</sup>, 2024):</p>
+<ul>
+<li><strong>All OSes:</strong>
+<ul>
+<li>Update translations and documentation</li>
+<li>Implement language selection settings in non-Windows versions.</li>
+<li>Make codebase compatible with wxWidgets 3.3 in non-Windows versions.</li>
+<li>Implement detection of volumes affected by XTS master key vulnerability and warn user about it.</li>
+<li>Update mount failure error messages to mention removal of TrueCrypt support and old algorithms.</li>
+</ul>
+</li>
+<li><strong>Windows:</strong>
+ <ul>
+ <li>Better fix for Secure Desktop issues under Windows 11 22H2
+ <ul>
+ <li>IME is now disabled in Secure Desktop because it is known to cause issues</li>
+ </ul>
+ </li>
+ <li>VeraCrypt Expander: Fix expansion of volumes on disks with a sector size different from 512 (by skl0n6)</li>
+ <li>Fix writing wrong EFI System Encryption Advanced Options to registry</li>
+ <li>Don't close Setup when exiting VeraCrypt process through system tray Exit menu</li>
+ <li>Fix failure to format some disks (e.g. VHDX) caused by virtual partition offset not 4K aligned</li>
+ <li>Fallback to absolute positioning when accessing disks if relative positioning fails</li>
+ <li>Update zlib to version 1.3.1</li>
+ </ul>
+</li>
+<li><strong>Linux:</strong>
+ <ul>
+ <li>Focus PIM field when selected (#1239)</li>
+ <li>Fix generic installation script on Konsole in Wayland (#1244)</li>
+ <li>Added the ability to build using wolfCrypt as the cryptographic backend. Disabled by default. (Contributed by wolfSSL, GH PR #1227)</li>
+ <li>Allows GUI to launch in a Wayland-only environment (GH #1264)</li>
+ <li>CLI: Don't initially re-ask PIM if it was already specified (GH #1288)</li>
+ <li>CLI: Fix incorrect max hidden volume size for file containers (GH #1338))</li>
+ <li>Enhance ASLR security of generic installer binaries by adding linked flag for old GCC version (reported by @morton-f on Sourceforge)</li>
+ </ul>
+</li>
+<li><strong>macOS:</strong>
+ <ul>
+ <li>Fix corrupted disk icon in main UI (GH #1218)</li>
+ <li>Fix near zero width PIM input box and simplify wxTextValidator logic (GH #1274)</li>
+ <li>Use correct Disk Utility location when "check filesystem" is ran (GH #1273)</li>
+ <li>Add support for FUSE-T as an alternative to MacFUSE (GH #1055)</li>
+ </ul>
+</li>
+<li><strong>FreeBSD:</strong>
+ <ul>
+ <li>Fix privilege escalation prompts not showing up (GH #1349)</li>
+ <li>Support automatic detection and mounting of ext2/3/4, exFAT, NTFS filesystems (GH #1350)</li>
+ <li>Use correct Disk Utility location when "check filesystem" is ran (GH #1273)</li>
+ </ul>
+</li>
+</ul>
+
+<p><strong style="text-align:left">1.26.7</strong> (October 1<sup>st</sup>, 2023):</p>
+<ul>
+<li><strong>All OSes:</strong>
+<ul>
+<li>Security: Ensure that XTS primary key is different from the secondary key when creating volumes
+ <ul>
+ <li>Issue unlikely to happen thanks to random generator properties but this check must be added to prevent attacks</li>
+ <li>Reference: CCSS,NSA comment at page 3: <a href="https://csrc.nist.gov/csrc/media/Projects/crypto-publication-review-project/documents/initial-comments/sp800-38e-initial-public-comments-2021.pdf">https://csrc.nist.gov/csrc/media/Projects/crypto-publication-review-project/documents/initial-comments/sp800-38e-initial-public-comments-2021.pdf</a></li>
+ </ul>
+</li>
+<li>Remove TrueCrypt Mode support. Version 1.25.9 can be used to mount or convert TrueCrypt volumes.</li>
+<li>Complete removal of RIPEMD160 and GOST89 algorithms. Legacy volumes using any of them cannot be mounted by VeraCrypt anymore.</li>
+<li>Add support for BLAKE2s as new PRF algorithm for both system encryption and standard volumes.</li>
+<li>Introducing support for EMV banking smart cards as keyfiles for non-system volumes.
+ <ul>
+ <li>No need for a separate PKCS#11 module configuration.</li>
+ <li>Card PIN isn't required.</li>
+ <li>Generates secure keyfile content from unique, encoded data present on the banking card.</li>
+ <li>Supports all EMV standard-compliant banking cards.</li>
+ <li>Can be enabled in settings (go to Settings->Security Tokens).</li>
+ <li>Developed by a team of students from the <a href="https://www.insa-rennes.fr">Institut national des sciences appliquées de Rennes</a>.</li>
+ <li>More details about the team and the project are available at <a href="https://projets-info.insa-rennes.fr/projets/2022/VeraCrypt/index_en.html">https://projets-info.insa-rennes.fr/projets/2022/VeraCrypt/index_en.html</a>.</li>
+ </ul>
+</li>
+<li>When overwriting an existing file container during volume creation, add its current size to the available free space</li>
+<li>Add Corsican language support. Update several translations. </li>
+<li>Update documentation</li>
+</ul>
+</li>
+<li><strong>Windows:</strong>
+<ul>
+<li>Officially, the minimum supported version is now <strong>Windows 10</strong>. VeraCrypt may still run on Windows 7 and Windows 8/8.1, but no active tests are done on these platforms.</li>
+<li>EFI Bootloader:
+<ul>
+<li>Fix bug in PasswordTimeout value handling that caused it to be limited to 255 seconds.</li>
+<li>Rescue Disk: enhance "Boot Original Windows Loader" by using embedded backup of original Windows loader if it is missing from disk</li>
+<li>Addition of Blake2s and removal of RIPEMD160 & GOST89</li>
+</ul>
+</li>
+<li>Enable memory protection by default. Add option under Performance/Driver Configuration to disable it if needed.
+<ul>
+ <li>Memory protection blocks non-admin processes from reading VeraCrypt memory</li>
+ <li>It may block Screen Readers (Accessibility support) from reading VeraCrypt UI, in which case it can be disabled</li>
+ <li>It can be disabled by setting registry value "VeraCryptEnableMemoryProtection" to 0 under "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt"</li>
+</ul>
+</li>
+<li>Add process mitigation policy to prevent VeraCrypt from being injected by other processes</li>
+<li>Minor enhancements to RAM Encryption implementation</li>
+<li>Fix Secure Desktop issues under Windows 11 22H2</li>
+<li>Implement support for mounting partially encrypted system partitions.</li>
+<li>Fix false positive detection of new device insertion when Clear Encryption Keys option is enable (System Encryption case only)</li>
+<li>Better implementation of Fast Create when creating file containers that uses UAC to request required privilege if not already held</li>
+<li>Allow choosing Fast Create in Format Wizard UI when creating file containers</li>
+<li>Fix formatting issues during volume creation on some machines.</li>
+<li>Fix stall issue caused by Quick Format of large file containers</li>
+<li>Add dropdown menu to Mount button to allow mounting without using the cache.</li>
+<li>Possible workaround for logarithmic slowdown for Encrypt-In-Place on large volumes.</li>
+<li>Make Expander first check file existence before proceeding further</li>
+<li>Allow selecting size unit (KB/MB/GB) for generated keyfiles</li>
+<li>Display full list of supported cluster sizes for NTFS, ReFS and exFAT filesystems when creating volumes</li>
+<li>Support drag-n-drop of files and keyfiles in Expander.</li>
+<li>Implement translation of Expander UI</li>
+<li>Replace legacy file/dir selection APIs with modern IFileDialog interface for better Windows 11 compatibility</li>
+<li>Enhancements to dependency dlls safe loading, including delay loading.</li>
+<li>Remove recommendation of keyfiles files extensions and update documentation to mention risks of third-party file extensions.</li>
+<li>Add support for more language in the setup installer</li>
+<li>Update LZMA library to version 23.01</li>
+<li>Update libzip to version 1.10.1 and zlib to version 1.3</li>
+</ul>
+</li>
+<li><strong>Linux:</strong>
+<ul>
+<li>Fix bug in Random generator on Linux when used with Blake2s that was triggering a self test failure.</li>
+<li>Modify Random Generator on Linux to exactly match official documentation and the Windows implementation.</li>
+<li>Fix compatibility issues with Ubuntu 23.04.</li>
+<li>Fix assert messages displayed when using wxWidgets 3.1.6 and newer.</li>
+<li>Fix issues launching fsck on Linux.</li>
+<li>Fix privilege escalation prompts being ignored.</li>
+<li>Fix wrong size for hidden volume when selecting the option to use all free space.</li>
+<li>Fix failure to create hidden volume on a disk using CLI caused by wrong maximum size detection.</li>
+<li>Fix various issues when running in Text mode:
+<ul>
+<li>Don't allow selecting exFAT/BTRFS filesytem if they are not present or not compatible with the created volume.</li>
+<li>Fix wrong unmount message displayed when mounting a volume.</li>
+<li>Hide PIM during entry and re-ask PIM when user entered a wrong value.</li>
+<li>Fix printing error when checking free space during volume creation in path doesn't exist.</li>
+</ul>
+</li>
+<li>Use wxWidgets 3.2.2.1 for static builds (e.g. console only version)</li>
+<li>Fix compatibility of generic installers with old Linux distros</li>
+<li>Update help message to indicate that when cascading algorithms they must be separated by dash</li>
+<li>Better compatibility with building under Alpine Linux and musl libc</li>
+</ul>
+</li>
+<li><strong>macOS:</strong>
+ <ul>
+ <li>Fix issue of VeraCrypt window becoming unusable in use cases involving multiple monitors and change in resolution.</li>
+ </ul>
+</li>
+</ul>
+
+<p><strong style="text-align:left">1.25.9</strong> (February 19<sup>th</sup>, 2022):</p>
+<ul>
+<li><strong>All OSes:</strong>
+<ul>
+<li>Update translations (Chinese, Dutch, French, German, Turkish).</li>
+</ul>
+</li>
+<li><strong>Windows:</strong>
+<ul>
+<li>Make MSI installer compatible with system encryption.</li>
+<li>Set minimum support for MSI installation to Windows 7.</li>
+<li>Fix failure to create Traveler Disk when VeraCrypt is installed using MSI.</li>
+<li>Don't cache the outer volume password when mounting with hidden volume protection if wrong hidden volume password was specified.</li>
+<li>Reduce the size of EXE installers by almost 50% by using LZMA compression instead of DEFLATE.</li>
+<li>Fix double-clicking mounted drive in VeraCrypt UI not working in some special Windows configurations.</li>
+<li>Add registry key to fix BSOD during shutdown/reboot on some machines when using system encryption.
+<ul>
+<li>Under "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt", create a REG_DWORD value named "VeraCryptEraseKeysShutdown".</li>
+<li>Setting this registry value to 0 disables erasing system encryption keys which is the cause of BSOD during shutdown on some machines.</li>
+</ul>
+</li>
+</ul>
+</li>
+<li><strong>Linux:</strong>
+<ul>
+<li>Fix hidden volume settings not correctly displayed when enabling hidden volume protection in mount options window.</li>
+<li>Fix generic Linux installer overwriting /usr/sbin if it is a symlink.</li>
+<li>Fix crash when building with _GLIBCXX_ASSERTIONS defined.</li>
+<li>Enable building from source without AES-NI support.</li>
+</ul>
+</li>
+<li><strong>MacOSX:</strong>
+<ul>
+<li>Fix hidden volume settings not correctly displayed when enabling hidden volume protection in mount options window.</li>
+</ul>
+</li>
+</ul>
<p><strong style="text-align:left">1.25.7</strong> (January 7<sup>th</sup>, 2022):</p>
@@ -234,3 +518,3 @@
<li>Add switch /signalExit to support notifying <a href="https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/waitfor" target="_blank">WAITFOR</a> Windows command when VeraCrypt.exe exits if /q was specified in CLI (cf documentation for usage).</li>
-<li>Don't display mount/dismount examples in help dialog for command line in Format and Expander.</li>
+<li>Don't display mount/unmount examples in help dialog for command line in Format and Expander.</li>
<li>Documentation and translation updates.</li>
@@ -508,3 +792,3 @@
<li>Fix current application losing focus when VeraCrypt is run in command line with /quit /silent switches.</li>
-<li>Fix some cases of external applications freezing during mount/dismount.</li>
+<li>Fix some cases of external applications freezing during mount/unmount.</li>
<li>Fix rare cases of secure desktop for password dialog not visible which caused UI to block.</li>
@@ -797,3 +1081,3 @@ incorrect Impersonation Token Handling. </li></ul>
</li><li>Add possibility to show system encryption password in Windows GUI and bootloader
-</li><li>Solve &quot;Class Already exists&quot; error that was happening for some users. </li><li>Solve some menu items and GUI fields not translatable </li><li>Make volumes correctly report Physical Sector size to Windows. </li><li>Correctly detect switch user/RDP disconnect operations for autodismount on session locked.
+</li><li>Solve &quot;Class Already exists&quot; error that was happening for some users. </li><li>Solve some menu items and GUI fields not translatable </li><li>Make volumes correctly report Physical Sector size to Windows. </li><li>Correctly detect switch user/RDP disconnect operations for autounmount on session locked.
</li><li>Add manual selection of partition when resuming in-place encryption. </li><li>Add command line option (/cache f) to temporarily cache password during favorites mounting.
@@ -832,3 +1116,3 @@ incorrect Impersonation Token Handling. </li></ul>
<ul>
-<li>Solve issue volumes not auto-dismounting when quitting VeraCrypt<strong>.</strong>
+<li>Solve issue volumes not auto-unmounting when quitting VeraCrypt<strong>.</strong>
</li><li>Solve issue VeraCrypt window not reopening by clicking dock icon. </li></ul>
@@ -869,3 +1153,3 @@ incorrect Impersonation Token Handling. </li></ul>
</li><li>Correct a random crash when clicking the link for more information on keyfiles
-</li><li>Implement option to auto-dismount when user session is locked </li><li>Add self-test vectors for SHA-256 </li><li>Modern look-and-feel by enabling visual styles </li><li>few minor fixed. </li></ul>
+</li><li>Implement option to auto-unmount when user session is locked </li><li>Add self-test vectors for SHA-256 </li><li>Modern look-and-feel by enabling visual styles </li><li>few minor fixed. </li></ul>
</li></ul>
diff --git a/doc/html/Removable Medium Volume.html b/doc/html/Removable Medium Volume.html
index 63c59c55..2be8297c 100644
--- a/doc/html/Removable Medium Volume.html
+++ b/doc/html/Removable Medium Volume.html
@@ -49,4 +49,4 @@
NTFS health checks as <a href="https://blogs.msdn.microsoft.com/b8/2012/05/09/redesigning-chkdsk-and-the-new-ntfs-health-model/" target="_blank">
-explained here</a>. Big thanks to Liran Elharar for discovering this. </li><li>Windows may use caching methods and write delays that are normally used for removable media (for example, USB flash drives). This might slightly decrease the performance but at the same increase the likelihood that it will be possible to dismount the volume
- quickly without having to force the dismount. </li><li>The operating system may tend to keep the number of handles it opens to such a volume to a minimum. Hence, volumes mounted as removable media might require fewer forced dismounts than other volumes.
+explained here</a>. Big thanks to Liran Elharar for discovering this. </li><li>Windows may use caching methods and write delays that are normally used for removable media (for example, USB flash drives). This might slightly decrease the performance but at the same increase the likelihood that it will be possible to unmount the volume
+ quickly without having to force the unmount. </li><li>The operating system may tend to keep the number of handles it opens to such a volume to a minimum. Hence, volumes mounted as removable media might require fewer forced unmounts than other volumes.
</li><li>Under Windows Vista and earlier, the &lsquo;<em>Computer</em>&rsquo; (or &lsquo;<em>My Computer</em>&rsquo;) list does not show the amount of free space on volumes mounted as removable (note that this is a Windows limitation, not a bug in VeraCrypt).
diff --git a/doc/html/Removing Encryption.html b/doc/html/Removing Encryption.html
index c2baf5c6..3f3bf139 100644
--- a/doc/html/Removing Encryption.html
+++ b/doc/html/Removing Encryption.html
@@ -45,3 +45,3 @@ for non-system partition/drive). If you need to remove encryption (e.g., if you
<li>Mount the VeraCrypt volume. </li><li>Move all files from the VeraCrypt volume to any location outside the VeraCrypt volume (note that the files will be decrypted on the fly).
-</li><li>Dismount the VeraCrypt volume. </li><li>delete it (the container) just like you delete any other file. </li></ol>
+</li><li>Unmount the VeraCrypt volume. </li><li>delete it (the container) just like you delete any other file. </li></ol>
<p>If in-place decryption of non-system partitions/drives is not desired, it is also possible in this case to follow the steps 1-3 described above.<br>
diff --git a/doc/html/Security Model.html b/doc/html/Security Model.html
index 79e154d2..edac59d2 100644
--- a/doc/html/Security Model.html
+++ b/doc/html/Security Model.html
@@ -53,3 +53,3 @@
</li><li>Preserve/verify the integrity or authenticity of encrypted or decrypted data.
-</li><li>Prevent traffic analysis when encrypted data is transmitted over a network. </li><li>Prevent an attacker from determining in which sectors of the volume the content changed (and when and how many times) if he or she can observe the volume (dismounted or mounted) before and after data is written to it, or if the storage medium/device allows
+</li><li>Prevent traffic analysis when encrypted data is transmitted over a network. </li><li>Prevent an attacker from determining in which sectors of the volume the content changed (and when and how many times) if he or she can observe the volume (unmounted or mounted) before and after data is written to it, or if the storage medium/device allows
the attacker to determine such information (for example, the volume resides on a device that saves metadata that can be used to determine when data was written to a particular sector).
@@ -67,5 +67,5 @@ Known Issues &amp; Limitations</a>). </li></ul>
<em>Settings</em> &gt; &lsquo;<em>System Encryption</em>&rsquo; &gt; &lsquo;<em>Allow pre-boot authentication to be bypassed by pressing the Esc key</em>&rsquo;; note that this option can be enabled or disabled only by an administrator).
-</li><li>Dismount, using VeraCrypt, (and, in the VeraCrypt application window, see the path to and properties of) any VeraCrypt volume mounted by him or her. However, this does not apply to &lsquo;system favorite volumes&rsquo;, which he or she can dismount (etc.)
+</li><li>Unmount, using VeraCrypt, (and, in the VeraCrypt application window, see the path to and properties of) any VeraCrypt volume mounted by him or her. However, this does not apply to &lsquo;system favorite volumes&rsquo;, which he or she can unmount (etc.)
regardless of who mounted them (this can be prevented by enabling the option <em>
-Settings</em> &gt; &lsquo;<em>System Favorite Volumes</em>&rsquo; &gt; &lsquo;<em>Allow</em> only administrators to view and dismount system favorite volumes in VeraCrypt&rsquo;; note that this option can be enabled or disabled only by an administrator).
+Settings</em> &gt; &lsquo;<em>System Favorite Volumes</em>&rsquo; &gt; &lsquo;<em>Allow</em> only administrators to view and unmount system favorite volumes in VeraCrypt&rsquo;; note that this option can be enabled or disabled only by an administrator).
</li><li>Create a file-hosted VeraCrypt volume containing a FAT or no file system (provided that the relevant folder permissions allow it).
@@ -89,3 +89,3 @@ Settings</em> &gt; &lsquo;<em>System Favorite Volumes</em>&rsquo; &gt; &lsquo;<e
<li>Mount any file-hosted or partition/device-hosted VeraCrypt volume provided that the file/device permissions allow it.
-</li><li>Dismount, using VeraCrypt, (and, in the VeraCrypt application window, see the path to and properties of) any VeraCrypt volume mounted by him or her.
+</li><li>Unmount, using VeraCrypt, (and, in the VeraCrypt application window, see the path to and properties of) any VeraCrypt volume mounted by him or her.
</li><li>Create a file-hosted or partition/device-hosted VeraCrypt volume provided that the relevant folder/device permissions allow it.
diff --git a/doc/html/Security Requirements and Precautions.html b/doc/html/Security Requirements and Precautions.html
index da8519e1..1f2c0c47 100644
--- a/doc/html/Security Requirements and Precautions.html
+++ b/doc/html/Security Requirements and Precautions.html
@@ -61,2 +61,4 @@ The sections in this chapter specify security requirements for using VeraCrypt a
</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
+<a href="VeraCrypt%20Memory%20Protection.html" style="text-align:left; color:#0080c0; text-decoration:none.html">VeraCrypt Memory Protection</a>
+</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
<a href="Physical%20Security.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Physical Security</a>
diff --git a/doc/html/Security Requirements for Hidden Volumes.html b/doc/html/Security Requirements for Hidden Volumes.html
index 3b5dbdb3..7ac28c40 100644
--- a/doc/html/Security Requirements for Hidden Volumes.html
+++ b/doc/html/Security Requirements for Hidden Volumes.html
@@ -46,3 +46,3 @@ hidden VeraCrypt volume</a>, you must follow the security requirements and preca
<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-If an adversary has access to a (dismounted) VeraCrypt volume at several points over time, he may be able to determine which sectors of the volume are changing. If you change the contents of a
+If an adversary has access to a (unmounted) VeraCrypt volume at several points over time, he may be able to determine which sectors of the volume are changing. If you change the contents of a
<a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
diff --git a/doc/html/Sharing over Network.html b/doc/html/Sharing over Network.html
index 829838b9..f1969f0f 100644
--- a/doc/html/Sharing over Network.html
+++ b/doc/html/Sharing over Network.html
@@ -47,3 +47,3 @@
<em>System Favorite Volumes</em></a>).</p>
-</li><li>A dismounted VeraCrypt file container is stored on a single computer (for example, on a server). This encrypted file is shared over a network. Users on other computers or systems will locally mount the shared file. Thus, the volume will be mounted simultaneously
+</li><li>A unmounted VeraCrypt file container is stored on a single computer (for example, on a server). This encrypted file is shared over a network. Users on other computers or systems will locally mount the shared file. Thus, the volume will be mounted simultaneously
under multiple operating systems.
diff --git a/doc/html/Supported Operating Systems.html b/doc/html/Supported Operating Systems.html
index 9814913d..67612ab2 100644
--- a/doc/html/Supported Operating Systems.html
+++ b/doc/html/Supported Operating Systems.html
@@ -39,25 +39,14 @@ Windows 11 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; p
Windows 10 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows 8 and 8.1 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows 7 (KB3033929 or KB4474419 must be installed)</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows Vista (KB4039648 or KB4474419 must be installed)</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows XP </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
Windows Server 2016 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows Server 2012 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows Server 2008 R2 (64-bit) (KB3033929 or KB4474419 must be installed)</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows Server 2008 (KB4039648 or KB4474419 must be installed)</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows Server 2003 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
+Mac OS X 14 Sonoma </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
+Mac OS X 13 Ventura </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
Mac OS X 12 Monterey </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Mac OS X 11 Big Sur </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Mac OS X 10.15 Catalina </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Mac OS X 10.14 Mojave </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Mac OS X 10.13 High Sierra </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Mac OS X 10.12 Sierra </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Mac OS X 10.11 El Capitan </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Mac OS X 10.10 Yosemite </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Mac OS X 10.9 Mavericks </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Linux x86 (32-bit and 64-bit versions, kernel 2.6 or compatible) </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-FreeBSD x86 (32-bit and 64-bit versions, starting from version 11) </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
+Linux x86, x86-64, ARM64 (Starting from Debian 10, Ubuntu 20.04, CentOS 7, OpenSUSE 15.1) </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
+FreeBSD x86-64 (starting from version 12) </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
Raspberry Pi OS (32-bit and 64-bit) </li></ul>
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-<span style="text-align:left;">Note: VeraCrypt 1.24-Update8 is the last version that supports Mac OS X 10.7 Lion and Mac OS X 10.8 Mountain Lion.</span></div>
+<span style="text-align:left;">Note: <br/>
+VeraCrypt 1.25.9 is the last version that supports Windows XP, Windows Vista, Windows 7, Windows 8, and Windows 8.1.<br/>
+VeraCrypt 1.25.9 is the last version the supports Mac OS X versions from 10.9 Mavericks to 11 Big Sur<br/>
+VeraCrypt 1.24-Update8 is the last version that supports Mac OS X 10.7 Lion and Mac OS X 10.8 Mountain Lion.</span></div>
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
diff --git a/doc/html/Supported Systems for System Encryption.html b/doc/html/Supported Systems for System Encryption.html
index 67e5d2d4..afadc0ec 100644
--- a/doc/html/Supported Systems for System Encryption.html
+++ b/doc/html/Supported Systems for System Encryption.html
@@ -44,11 +44,3 @@ VeraCrypt can currently encrypt the following operating systems:</div>
Windows 11 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows 10 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows 8 and 8.1 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows 7 (KB3033929 or KB4474419 must be installed)</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows Vista SP2 (KB4039648 or KB4474419 must be installed) </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows XP </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows Server 2012 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows Server 2008 R2 (64-bit) (KB3033929 or KB4474419 must be installed)</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows Server 2008 (KB4039648 or KB4474419 must be installed)</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-Windows Server 2003 </li></ul>
+Windows 10 </li></ul>
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
diff --git a/doc/html/System Encryption.html b/doc/html/System Encryption.html
index 464ac8fc..c83d72fe 100644
--- a/doc/html/System Encryption.html
+++ b/doc/html/System Encryption.html
@@ -42,2 +42,8 @@ System encryption provides the highest level of security and privacy, because al
registry entries are always permanently encrypted as well.</div>
+
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+<strong>Note on SSDs and TRIM:</strong>
+When using system encryption on SSDs, it's important to consider the implications of the TRIM operation, which can potentially reveal information about which sectors on the drive are not in use. For detailed guidance on how TRIM operates with VeraCrypt and how to manage its settings for enhanced security, please refer to the <a href="Trim%20Operation.html">TRIM Operation</a> documentation.
+</div>
+
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
@@ -64,6 +70,7 @@ System</em> &gt; <em style="text-align:left">Encrypt System Partition/Drive</em>
Because of BIOS requirement, the pre-boot password is typed using <strong>US keyboard layout.
-</strong>During the system encryption process, VeraCrypt automatically and transparently switches the keyboard to US layout in order to ensure that the password value typed will match the one typed in pre-boot mode. Thus, in order to avoid wrong password errors,
- one must type the password using the same keys as when creating the system encryption.</div>
+</strong>During the system encryption process, VeraCrypt automatically and transparently switches the keyboard to US layout in order to ensure that the password value typed will match the one typed in pre-boot mode.
+However, pasting the password from the clipboard can override this protective measure. To prevent any issues arising from this discrepancy, VeraCrypt disables the option to paste passwords from the clipboard in the system encryption wizard.
+Thus, when setting or entering your password, it's crucial to type it manually using the same keys as when creating the system encryption, ensuring consistent access to your encrypted system.</div>
<p>Note: By default, Windows 7 and later boot from a special small partition. The partition contains files that are required to boot the system. Windows allows only applications that have administrator privileges to write to the partition (when the system is
- running). In EFI boot mode, which is the default on modern PCs, VeraCrypt can not encrypt this partition since it must remain unencrypted so that the BIOS can load the EFI bootloader from it. This in turn implies that in EFI boot mode, VeraCrypt offers only to encrypt the system partition where Windows is installed (the user can later manualy encrypt other data partitions using VeraCrypt).
+ running). In EFI boot mode, which is the default on modern PCs, VeraCrypt can not encrypt this partition since it must remain unencrypted so that the BIOS can load the EFI bootloader from it. This in turn implies that in EFI boot mode, VeraCrypt offers only to encrypt the system partition where Windows is installed (the user can later manually encrypt other data partitions using VeraCrypt).
In MBR legacy boot mode, VeraCrypt encrypts the partition only if you choose to encrypt the whole system drive (as opposed to choosing to encrypt only the partition where Windows is installed).</p>
diff --git a/doc/html/System Favorite Volumes.html b/doc/html/System Favorite Volumes.html
index 491a6698..3dd06b74 100644
--- a/doc/html/System Favorite Volumes.html
+++ b/doc/html/System Favorite Volumes.html
@@ -54,4 +54,4 @@ each time the operating system starts. </li></ul>
System favorite volumes <strong>can be configured to be available within VeraCrypt only to users with administrator privileges
-</strong>(select <em>Settings </em>&gt; &lsquo;<em>System Favorite Volumes</em>&rsquo; &gt; &lsquo;<em>Allow only administrators to view and dismount system favorite volumes in VeraCrypt</em>&rsquo;). This option should be enabled on servers to ensure that
- system favorite volumes cannot be dismounted by users without administrator privileges. On non-server systems, this option can be used to prevent normal VeraCrypt volume actions (such as &lsquo;<em>Dismount All</em>&rsquo;, auto-dismount, etc.) from affecting
+</strong>(select <em>Settings </em>&gt; &lsquo;<em>System Favorite Volumes</em>&rsquo; &gt; &lsquo;<em>Allow only administrators to view and unmount system favorite volumes in VeraCrypt</em>&rsquo;). This option should be enabled on servers to ensure that
+ system favorite volumes cannot be unmounted by users without administrator privileges. On non-server systems, this option can be used to prevent normal VeraCrypt volume actions (such as &lsquo;<em>Unmount All</em>&rsquo;, auto-unmount, etc.) from affecting
system favorite volumes. In addition, when VeraCrypt is run without administrator privileges (the default on Windows Vista and later), system favorite volumes will not be displayed in the drive letter list in the main VeraCrypt application window.</p>
diff --git a/doc/html/Technical Details.html b/doc/html/Technical Details.html
index 29f7aae1..63878e05 100644
--- a/doc/html/Technical Details.html
+++ b/doc/html/Technical Details.html
@@ -57,2 +57,11 @@
<a href="Source%20Code.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Source Code</a>
+</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
+<a href="CompilingGuidelines.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Building VeraCrypt From Source</a>
+<ul>
+<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
+<a href="CompilingGuidelineWin.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Windows Build Guide</a>
+</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
+<a href="CompilingGuidelineLinux.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Linux Build Guide</a>
+</li>
+</ul>
</li></ul>
diff --git a/doc/html/Trim Operation.html b/doc/html/Trim Operation.html
index be4cec73..a186f9da 100644
--- a/doc/html/Trim Operation.html
+++ b/doc/html/Trim Operation.html
@@ -40,10 +40,19 @@
Some storage devices (e.g., some solid-state drives, including USB flash drives) use so-called 'trim' operation to mark drive sectors as free e.g. when a file is deleted. Consequently, such sectors may contain unencrypted zeroes or other undefined data (unencrypted)
- even if they are located within a part of the drive that is encrypted by VeraCrypt. VeraCrypt does not block the trim operation on partitions that are within the key scope of
-<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
-system encryption</a> (unless a <a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
-hidden operating system</a> is running) and under Linux on all volumes that use the Linux native kernel cryptographic services. In those cases, the adversary will be able to tell which sectors contain free space (and may be able to use this information for
+ even if they are located within a part of the drive that is encrypted by VeraCrypt.<br>
+<br>
+On Windows, VeraCrypt allows users to control the trim operation for both non-system and system volumes:
+<ul>
+<li>For non-system volumes, trim is blocked by default. Users can enable trim through VeraCrypt's interface by navigating to "Settings -> Performance/Driver Configuration" and checking the option "Allow TRIM command for non-system SSD partition/drive."</li>
+<li>For <a href="System%20Encryption.html">system encryption</a>, trim is enabled by default (unless a <a href="Hidden%20Operating%20System.html">hidden operating system</a> is running). Users can disable trim by navigating to "System -> Settings" and checking the option "Block TRIM command on system partition/drive."</li>
+</ul>
+
+Under Linux, VeraCrypt does not block the trim operation on volumes using the native Linux kernel cryptographic services, which is the default setting. To block TRIM on Linux, users should either enable the "do not use kernel cryptographic services" option in VeraCrypt's Preferences (applicable only to volumes mounted afterward) or use the <code>--mount-options=nokernelcrypto</code> switch in the command line when mounting.
+<br>
+<br>
+Under macOS, VeraCrypt does not support the trim operation. Therefore, trim is always blocked on all volumes.
+<br>
+<br>
+In cases where trim operations occur, the adversary will be able to tell which sectors contain free space (and may be able to use this information for
further analysis and attacks) and <a href="Plausible%20Deniability.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
-plausible deniability</a> may be negatively affected. If you want to avoid those issues, do not use
-<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
-system encryption</a> on drives that use the trim operation and, under Linux, either configure VeraCrypt not to use the Linux native kernel cryptographic services or make sure VeraCrypt volumes are not located on drives that use the trim operation.</div>
+plausible deniability</a> may be negatively affected. In order to avoid these issues, users should either disable trim in VeraCrypt settings as previously described or make sure VeraCrypt volumes are not located on drives that use the trim operation.</div>
<p>To find out whether a device uses the trim operation, please refer to documentation supplied with the device or contact the vendor/manufacturer.</p>
diff --git a/doc/html/Troubleshooting.html b/doc/html/Troubleshooting.html
index 3eece663..e3cfb49f 100644
--- a/doc/html/Troubleshooting.html
+++ b/doc/html/Troubleshooting.html
@@ -316,3 +316,3 @@ Replace the motherboard with a different one (different type and/or brand). </li
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-<em style="text-align:left">When mounting or dismounting a VeraCrypt volume, the system crashes (a 'blue screen' error screen appears or the
+<em style="text-align:left">When mounting or unmounting a VeraCrypt volume, the system crashes (a 'blue screen' error screen appears or the
<span style="text-align:left">computer abruptly restarts)</span>.</em></div>
diff --git a/doc/html/TrueCrypt Support.html b/doc/html/TrueCrypt Support.html
index 4c61f738..af1383c7 100644
--- a/doc/html/TrueCrypt Support.html
+++ b/doc/html/TrueCrypt Support.html
@@ -36,2 +36,5 @@
<h1>TrueCrypt Support</h1>
+<p>
+<strong>Note: <span style="color:#ff0000;">TrueCrypt support was dropped starting from version 1.26</span></strong>
+</p>
<p>Starting from version 1.0f, VeraCrypt supports loading TrueCrypt volumes and partitions, both normal and hidden. In order to activate this, you have to check &ldquo;TrueCrypt Mode&rdquo; in the password prompt dialog as shown below.</p>
diff --git a/doc/html/Unencrypted Data in RAM.html b/doc/html/Unencrypted Data in RAM.html
index 9c4de777..96fe5813 100644
--- a/doc/html/Unencrypted Data in RAM.html
+++ b/doc/html/Unencrypted Data in RAM.html
@@ -42,7 +42,7 @@ It is important to note that VeraCrypt is <em style="text-align:left">disk</em>
Keep in mind that most programs do not clear the memory area (buffers) in which they store unencrypted (portions of) files they load from a VeraCrypt volume. This means that after you exit such a program, unencrypted data it worked with may remain in memory
- (RAM) until the computer is turned off (and, according to some researchers, even for some time after the power is turned off*). Also note that if you open a file stored on a VeraCrypt volume, for example, in a text editor and then force dismount on the VeraCrypt
- volume, then the file will remain unencrypted in the area of memory (RAM) used by (allocated to) the text editor. This also applies to forced auto-dismount.</div>
+ (RAM) until the computer is turned off (and, according to some researchers, even for some time after the power is turned off*). Also note that if you open a file stored on a VeraCrypt volume, for example, in a text editor and then force unmount on the VeraCrypt
+ volume, then the file will remain unencrypted in the area of memory (RAM) used by (allocated to) the text editor. This also applies to forced auto-unmount.</div>
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-Inherently, unencrypted master keys have to be stored in RAM too. When a non-system VeraCrypt volume is dismounted, VeraCrypt erases its master keys (stored in RAM). When the computer is cleanly restarted (or cleanly shut down), all non-system VeraCrypt volumes
- are automatically dismounted and, thus, all master keys stored in RAM are erased by the VeraCrypt driver (except master keys for system partitions/drives &mdash; see below). However, when power supply is abruptly interrupted, when the computer is reset (not
+Inherently, unencrypted master keys have to be stored in RAM too. When a non-system VeraCrypt volume is unmounted, VeraCrypt erases its master keys (stored in RAM). When the computer is cleanly restarted (or cleanly shut down), all non-system VeraCrypt volumes
+ are automatically unmounted and, thus, all master keys stored in RAM are erased by the VeraCrypt driver (except master keys for system partitions/drives &mdash; see below). However, when power supply is abruptly interrupted, when the computer is reset (not
cleanly restarted), or when the system crashes, <strong style="text-align:left">
@@ -72,5 +72,5 @@ Hibernation File</a>).</td>
(e.g. -50&nbsp;&deg;C). New types of memory modules allegedly exhibit a much shorter decay time (e.g. 1.5-2.5 seconds) than older types (as of 2008).</span><br style="text-align:left">
-<span style="text-align:left; font-size:10px; line-height:12px">** Before a key can be erased from RAM, the corresponding VeraCrypt volume must be dismounted. For non-system volumes, this does not cause any problems. However, as Microsoft currently does not
- provide any appropriate API for handling the final phase of the system shutdown process, paging files located on encrypted system volumes that are dismounted during the system shutdown process may still contain valid swapped-out memory pages (including portions
- of Windows system files). This could cause 'blue screen' errors. Therefore, to prevent 'blue screen' errors, VeraCrypt does not dismount encrypted system volumes and consequently cannot clear the master keys of the system volumes when the system is shut down
+<span style="text-align:left; font-size:10px; line-height:12px">** Before a key can be erased from RAM, the corresponding VeraCrypt volume must be unmounted. For non-system volumes, this does not cause any problems. However, as Microsoft currently does not
+ provide any appropriate API for handling the final phase of the system shutdown process, paging files located on encrypted system volumes that are unmounted during the system shutdown process may still contain valid swapped-out memory pages (including portions
+ of Windows system files). This could cause 'blue screen' errors. Therefore, to prevent 'blue screen' errors, VeraCrypt does not unmount encrypted system volumes and consequently cannot clear the master keys of the system volumes when the system is shut down
or restarted.</span></p>
diff --git a/doc/html/Using VeraCrypt Without Administrator Privileges.html b/doc/html/Using VeraCrypt Without Administrator Privileges.html
index 742ae0e9..1bb1bbb9 100644
--- a/doc/html/Using VeraCrypt Without Administrator Privileges.html
+++ b/doc/html/Using VeraCrypt Without Administrator Privileges.html
@@ -42,3 +42,3 @@
<br>
-After a system administrator installs VeraCrypt on the system, users without administrator privileges will be able to run VeraCrypt, mount/dismount any type of VeraCrypt volume, load/save data from/to it, and create file-hosted VeraCrypt volumes on the system.
+After a system administrator installs VeraCrypt on the system, users without administrator privileges will be able to run VeraCrypt, mount/unmount any type of VeraCrypt volume, load/save data from/to it, and create file-hosted VeraCrypt volumes on the system.
However, users without administrator privileges cannot encrypt/format partitions, cannot create NTFS volumes, cannot install/uninstall VeraCrypt, cannot change passwords/keyfiles for VeraCrypt partitions/devices, cannot backup/restore headers of VeraCrypt
diff --git a/doc/html/VeraCrypt Background Task.html b/doc/html/VeraCrypt Background Task.html
index 2ded6d50..bc56155b 100644
--- a/doc/html/VeraCrypt Background Task.html
+++ b/doc/html/VeraCrypt Background Task.html
@@ -41,3 +41,3 @@
<ol>
-<li>Hot keys </li><li>Auto-dismount (e.g., upon logoff, inadvertent host device removal, time-out, etc.)
+<li>Hot keys </li><li>Auto-unmount (e.g., upon logoff, inadvertent host device removal, time-out, etc.)
</li><li>Auto-mount of favorite volumes </li><li>Notifications (e.g., when damage to hidden volume is prevented) </li><li>Tray icon </li></ol>
diff --git a/doc/html/VeraCrypt Hidden Operating System.html b/doc/html/VeraCrypt Hidden Operating System.html
index 8881b925..fcaeef57 100644
--- a/doc/html/VeraCrypt Hidden Operating System.html
+++ b/doc/html/VeraCrypt Hidden Operating System.html
@@ -221,3 +221,3 @@ When an attacker gets hold of your computer when a VeraCrypt volume is mounted (
limit the time the volume is mounted to a minimum. Obviously, this may be impossible or difficult if the sensitive data is stored on an encrypted system partition or on an entirely encrypted system drive (because you would also have to limit the time you work
- with the computer to a minimum). Hence, you can answer that you created a separate partition (encrypted with a different key than your system partition) for your most sensitive data and that you mount it only when necessary and dismount it as soon as possible
+ with the computer to a minimum). Hence, you can answer that you created a separate partition (encrypted with a different key than your system partition) for your most sensitive data and that you mount it only when necessary and unmount it as soon as possible
(so as to limit the time the volume is mounted to a minimum). On the system partition, you store data that is less sensitive (but which you need to access often) than data you store on the non-system partition (i.e. on the outer volume).
diff --git a/doc/html/VeraCrypt License.html b/doc/html/VeraCrypt License.html
index 057e43f4..20e024aa 100644
--- a/doc/html/VeraCrypt License.html
+++ b/doc/html/VeraCrypt License.html
@@ -353,3 +353,3 @@ This software is provided 'as is' with no explicit or implied warranties in resp
<br>
- Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler.<br>
+ Copyright (C) 1995-2023 Jean-loup Gailly and Mark Adler.<br>
<br>
@@ -367,3 +367,3 @@ ____________________________________________________________<br>
<br>
- Copyright (C) 1999-2016 Dieter Baron and Thomas Klausner<br>
+ Copyright (C) 1999-2023 Dieter Baron and Thomas Klausner<br>
<br>
@@ -407,3 +407,3 @@ ____________________________________________________________<br>
<br>
-Copyright (c) 2013-2018 Stephan Mueller &lt;smueller@chronox.de&gt;<br>
+Copyright (c) 2013-2019 Stephan Mueller &lt;smueller@chronox.de&gt;<br>
<br>
@@ -422,2 +422,18 @@ THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLU
____________________________________________________________<br>
+<br>
+Copyright (c) 1999-2023 Igor Pavlov<br>
+<br>
+LZMA SDK is written and placed in the public domain by Igor Pavlov.<br>
+<br>
+Some code in LZMA SDK is based on public domain code from another developers:<br>
+<ol>
+ <li> PPMd var.H (2001): Dmitry Shkarin</li>
+ <li> SHA-256: Wei Dai (Crypto++ library)</li>
+</ol>
+<p>
+ Anyone is free to copy, modify, publish, use, compile, sell, or distribute the <br>
+ original LZMA SDK code, either in source code form or as a compiled binary, for <br>
+ any purpose, commercial or non-commercial, and by any means.
+</p>
+____________________________________________________________<br>
</div>
diff --git a/doc/html/VeraCrypt Memory Protection.html b/doc/html/VeraCrypt Memory Protection.html
new file mode 100644
index 00000000..115d5f47
--- /dev/null
+++ b/doc/html/VeraCrypt Memory Protection.html
@@ -0,0 +1,106 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title>
+<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>
+<meta name="keywords" content="encryption, security"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Home</a></li>
+ <li><a href="/code/">Source Code</a></li>
+ <li><a href="Downloads.html">Downloads</a></li>
+ <li><a class="active" href="Documentation.html">Documentation</a></li>
+ <li><a href="Donation.html">Donate</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Documentation</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="VeraCrypt%20Memory%20Protection.html">VeraCrypt Memory Protection</a>
+</p></div>
+
+<div class="wikidoc">
+<h1>VeraCrypt Memory Protection Mechanism</h1>
+<h2>Introduction</h2>
+<p>VeraCrypt always strives to enhance user experience while maintaining the highest level of security. The memory protection mechanism is one such security feature. However, understanding the need for accessibility, we have also provided an option to disable this mechanism for certain users. This page provides in-depth information on both.</p>
+<h2>Memory Protection Mechanism: An Overview</h2>
+<p>
+The memory protection mechanism ensures that non-administrator processes are prohibited from accessing the VeraCrypt process memory. This serves two primary purposes:
+<ul>
+ <li>Security Against Malicious Activities: The mechanism prevents non-admin processes from injecting harmful data or code inside the VeraCrypt process.</li>
+ <li>Protection of Sensitive Data: Although VeraCrypt is designed to not leave sensitive data in memory, this feature offers an extra layer of assurance by ensuring other non-admin processes cannot access or extract potentially sensitive information.</li>
+</ul>
+</p>
+<h2>Why Introduce An Option To Disable Memory Protection?</h2>
+<p>
+ Some accessibility tools, like screen readers, require access to a software's process memory to effectively interpret and interact with its user interface (UI). VeraCrypt's memory protection unintentionally hindered the functioning of such tools. To ensure that users relying on accessibility tools can still use VeraCrypt without impediments, we introduced this option.
+</p>
+<h2>How to Enable/Disable the Memory Protection Mechanism?</h2>
+<p>
+ By default, the memory protection mechanism is enabled. However, you can disable through VeraCrypt main UI or during installation.
+ <ol>
+ <li>During installation:
+ <ul>
+ <li>In the setup wizard, you'll encounter the <b>"Disable memory protection for Accessibility tools compatibility"</b> checkbox.</li>
+ <li>Check the box if you want to disable the memory protection. Leave it unchecked to keep using memory protection.</li>
+ <li>Proceed with the rest of the installation.</li>
+ </ul>
+ </li>
+ <li>Post-Installation:
+ <ul>
+ <li>Open VeraCrypt main UI and navigate to the menu Settings -> "Performance/Driver Configuration".</li>
+ <li>Locate and check/uncheck the <b>"Disable memory protection for Accessibility tools compatibility"</b> option as per your needs. You will be notified that an OS reboot is required for the change to take effect.</li>
+ <li>Click <b>OK</b>.</li>
+ </ul>
+ </li>
+ <li>During Upgrade or Repair/Reinstall
+ <ul>
+ <li>In the setup wizard, you'll encounter the <b>"Disable memory protection for Accessibility tools compatibility"</b> checkbox.</li>
+ <li>Check/uncheck the <b>"Disable memory protection for Accessibility tools compatibility"</b> option as per your needs.</li>
+ <li>Proceed with the rest of the upgrade or repair/reinstall.</li>
+ <li>You will be notified that an OS reboot is required if you have changed the memory protection setting.</li>
+ </ul>
+
+ </li>
+ </ol>
+<h2>Risks and Considerations</h2>
+<p>
+While disabling the memory protection mechanism can be essential for some users, it's crucial to understand the risks:
+<ul>
+ <li><b>Potential Exposure:</b> Disabling the mechanism could expose the VeraCrypt process memory to malicious processes.</li>
+ <li><b>Best Practice:</b> If you don't require accessibility tools to use VeraCrypt, it's recommended to leave the memory protection enabled.</li>
+</ul>
+</p>
+<h2>FAQ</h2>
+<p>
+ <b>Q: What is the default setting for the memory protection mechanism?</b><br>
+ <b>A:</b> The memory protection mechanism is enabled by default.
+</p>
+<p>
+ <b>Q: How do I know if the memory protection mechanism is enabled or disabled?</b><br>
+ <b>A:</b> You can check the status of the memory protection mechanism in the VeraCrypt main UI. Navigate to the menu Settings -> "Performance/Driver Configuration". If the <b>"Disable memory protection for Accessibility tools compatibility"</b> option is checked, the memory protection mechanism is disabled. If the option is unchecked, the memory protection mechanism is enabled.
+</p>
+<p>
+ <b>Q: Will disabling memory protection reduce the encryption strength of VeraCrypt?</b><br>
+ <b>A:</b> No, the encryption algorithms and their strength remain the same. Only the protection against potential memory snooping and injection by non-admin processes is affected.
+</p>
+<p>
+ <b>Q: I don't use accessibility tools. Should I disable this feature?</b><br>
+ <b>A:</b> No, it's best to keep the memory protection mechanism enabled for added security.
+</p>
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/VeraCrypt RAM Encryption.html b/doc/html/VeraCrypt RAM Encryption.html
new file mode 100644
index 00000000..033a4522
--- /dev/null
+++ b/doc/html/VeraCrypt RAM Encryption.html
@@ -0,0 +1,158 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title>
+<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>
+<meta name="keywords" content="encryption, security"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Home</a></li>
+ <li><a href="/code/">Source Code</a></li>
+ <li><a href="Downloads.html">Downloads</a></li>
+ <li><a class="active" href="Documentation.html">Documentation</a></li>
+ <li><a href="Donation.html">Donate</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Documentation</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="VeraCrypt%20RAM%20Encryption.html">VeraCrypt RAM Encryption</a>
+</p></div>
+
+<div class="wikidoc">
+<h1>VeraCrypt RAM Encryption Mechanism</h1>
+
+<h2>Introduction</h2>
+
+<p>
+ VeraCrypt RAM Encryption aims to protect disk encryption keys stored in volatile memory against certain types of attacks. The primary objectives of this mechanism are:
+ </p><ul>
+ <li>To protect against cold boot attacks.</li>
+ <li>To add an obfuscation layer to significantly complicate the recovery of encryption master keys from memory dumps, be it live or offline.</li>
+ </ul>
+<p></p>
+
+<h3>Implementation Overview</h3>
+
+<p>Here's a summary of how RAM encryption is achieved:</p>
+<ol>
+ <li>At Windows startup, the VeraCrypt driver allocates a 1MiB memory region. If this fails, we device the size by two until allocation succeeds (minimal size being 8KiB). All these variables are allocated in non-paged Kernel memory space.</li>
+ <li>This memory region is then populated with random bytes generated by a CSPRNG based on ChaCha20.</li>
+ <li>Two random 64-bit integers, <code>HashSeedMask</code> and <code>CipherIVMask</code>, are generated.</li>
+ <li>For every master key of a volume, the RAM encryption algorithm derives a unique key from a combination of the memory region and unique values extracted from the memory to be encrypted. This ensures a distinct key for each encrypted memory region. The use of location-dependent keys and IVs prevents master keys from being easily extracted from memory dumps.</li>
+ <li>The master keys are decrypted for every request, requiring a fast decryption algorithm. For this, ChaCha12 is utilized.</li>
+ <li>Once a volume is mounted, its master keys are immediately encrypted using the described algorithm.</li>
+ <li>For each I/O request for a volume, the master keys are decrypted only for the duration of that request and then securely wiped.</li>
+ <li>Upon volume unmounting, the encrypted master keys are securely removed from memory.</li>
+ <li>At Windows shutdown or reboot, the memory region allocated during startup is securely wiped.</li>
+</ol>
+
+<h3>Protection against Cold Boot Attacks</h3>
+
+<p>
+ The mitigation of cold boot attacks is achieved by utilizing a large memory page for key derivation. This ensures that attackers cannot recover the master key since parts of this large memory area would likely be corrupted and irrecoverable after shutdown. Further details on cold boot attacks and mitigation techniques can be found in the referenced papers:
+</p>
+<ul>
+ <li><a href="https://www.blackhat.com/presentations/bh-usa-08/McGregor/BH_US_08_McGregor_Cold_Boot_Attacks.pdf" target="_blank">Cold Boot Attacks (BlackHat)</a></li>
+ <li><a href="https://www.grc.com/sn/files/RAM_Hijacks.pdf" target="_blank">RAM Hijacks</a></li>
+</ul>
+
+<h3>Incompatibility with Windows Hibernate and Fast Startup</h3>
+<p>
+ RAM Encryption in VeraCrypt is not compatible with the Windows Hibernate and Fast Startup features. Before activating RAM Encryption, these features will be disabled by VeraCrypt to ensure the security and functionality of the encryption mechanism.
+
+</p>
+
+<h3>Algorithm Choices</h3>
+
+<p>
+ The choice of algorithms was based on a balance between security and performance:
+</p>
+<ul>
+ <li><strong>t1ha2:</strong> A non-cryptographic hash function chosen for its impressive speed and ability to achieve GiB/s hashing rates. This is vital since keys are derived from a 1MB memory region for every encryption/decryption request. It also respects the strict avalanche criteria which is crucial for this use case.</li>
+ <li><strong>ChaCha12:</strong> Chosen over ChaCha20 for performance reasons, it offers sufficient encryption strength while maintaining fast encryption/decryption speeds.</li>
+</ul>
+
+<h3>Key Algorithms</h3>
+
+<p>
+ Two core algorithms are fundamental to the RAM encryption process:
+</p>
+
+<h4>1. VcGetEncryptionID</h4>
+
+<p>
+ Computes a unique ID for the RAM buffer set to be encrypted.
+</p>
+<pre> <code>
+ - Input: pCryptoInfo, a CRYPTO_INFO variable to encrypt/decrypt
+ - Output: A 64-bit integer identifying the pCryptoInfo variable
+ - Steps:
+ - Compute the sum of the virtual memory addresses of the fields ks and ks2 of pCryptoInfo: encID = ((uint64) pCryptoInfo-&gt;ks) + ((uint64) pCryptoInfo-&gt;ks2)
+ - Return the result
+ </code>
+</pre>
+
+<h4>2. VcProtectMemory</h4>
+
+<p>
+ Encrypts the RAM buffer using the unique ID generated by VcGetEncryptionID.
+</p>
+<pre> <code>
+ - Input:
+ - encID, unique ID for memory to be encrypted
+ - pbData, pointer to the memory to be encrypted
+ - pbKeyDerivationArea, memory area allocated by the driver at startup
+ - HashSeedMask and CipherIVMask, two 64-bit random integers from startup
+ - Output:
+ - None; memory at pbData is encrypted in place
+ - Steps:
+ - Derive hashSeed: hashSeed = (((uint64) pbKeyDerivationArea) + encID) ^ HashSeedMask
+ - Compute 128-bit hash: hash128 = t1h2 (pbKeyDerivationArea,hashSeed).
+ - Decompose hash128 into two 64-bit integers: hash128 = hash128_1 || hash128_2
+ - Create a 256-bit key for ChaCha12: chachaKey = hash128_1 || hash128_2 || (hash128_1 OR hash128_2) || (hash128_1 + hash128_2)
+ - Encrypt chachaKey by itself using ChaCha12 using hashSeed as an IV: ChaCha256Encrypt (chachaKey, hashSeed, chachaKey)
+ - Derive the 64-bit IV for ChaCha12: chachaIV = (((uint64) pbKeyDerivationArea) + encID) ^ CipherIVMask
+ - Encrypt memory at pbData using ChaCha12: ChaCha256Encrypt (chachaKey, chachaIV, pbData)
+ - Securely erase temporary values
+ </code>
+</pre>
+
+<p>
+ It's important to note that, due to ChaCha12 being a stream cipher, encryption and decryption processes are identical, and the <code>VcProtectMemory</code> function can be used for both.
+</p>
+
+<p>
+ For a deeper understanding and a look into the codebase, one can visit the VeraCrypt repository and explore the mentioned functions in the <code>src/Common/Crypto.c</code> file.
+</p>
+
+<h3>Additional Security Measures</h3>
+
+<p>
+ Starting from version 1.24, VeraCrypt has integrated a mechanism that detects the insertion of new devices into the system when System Encryption is active. If a new device is inserted, master keys are immediately purged from memory, resulting in a Windows BSOD. This protects against attacks using specialized devices to extract memory from running systems. However, for maximum efficiency, this feature should be paired with RAM encryption.<br>
+ To enable this feature, navigate to the menu System -> Settings and check the <b>"Clear encryption keys from memory if a new device is inserted"</b> option.
+</p>
+
+<h3>Technical Limitations with Hibernation and Fast Startup</h3>
+<p>
+The Windows Hibernate and Fast Startup features save the content of RAM to the hard drive. In the context of VeraCrypt's RAM Encryption, supporting these features presents a significant challenge, namely a chicken-egg problem.<br>
+To maintain security, the large memory region used for key derivation in RAM Encryption would have to be stored in an encrypted format, separate from the usual VeraCrypt encryption applied to the current drive. This separate encrypted storage must also be unlockable using the same password as the one used for Pre-Boot Authentication. Moreover, this process must happen early in the boot sequence before filesystem access is available, necessitating the raw storage of encrypted data in specific sectors of a different disk.<br>
+While this is technically feasible, the complexity and user-unfriendliness of such a solution make it impractical for standard deployments. Therefore, enabling RAM Encryption necessitates the disabling of the Windows Hibernate and Fast Startup features.<br>
+</p>
+
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/donation.js b/doc/html/donation.js
new file mode 100644
index 00000000..2718bbc9
--- /dev/null
+++ b/doc/html/donation.js
@@ -0,0 +1,9 @@
+document.addEventListener('DOMContentLoaded', function() {
+ document.getElementById('currency-form').addEventListener('submit', function(e) {
+ e.preventDefault();
+ const select = this.querySelector('select');
+ if (select.value) {
+ window.open(select.value, '_blank');
+ }
+ });
+});
diff --git a/doc/html/ru/AES.html b/doc/html/ru/AES.html
new file mode 100644
index 00000000..4d78e88e
--- /dev/null
+++ b/doc/html/ru/AES.html
@@ -0,0 +1,58 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Encryption%20Algorithms.html">Алгоритмы шифрования</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="AES.html">AES</a>
+</p></div>
+
+<div class="wikidoc">
+<h1>Алгоритм шифрования AES</h1>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+Advanced Encryption Standard (AES) – это одобренный FIPS (Федеральные стандарты обработки информации) криптографический
+алгоритм (также известен как Rijndael, авторы: Joan Daemen и Vincent Rijmen, опубликован в 1998 году), разрешённый
+к применению федеральными ведомствами и учреждениями США для криптостойкой защиты секретной информации [3].
+VeraCrypt использует AES с 14 раундами и 256-битовым ключом (то есть стандарт AES-256, опубликованный в 2001 году), работающий
+<a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
+в режиме XTS</a> (см. раздел <a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
+Режимы работы</a>).</div>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+В июне 2003 года, после того как Агентство национальной безопасности США (NSA, US National Security Agency)
+провело исследование и анализ AES, американский комитет CNSS (Committee on National Security Systems) объявил
+в [1], что реализация и надёжность AES-256 (и AES-192) достаточны для защиты секретной информации вплоть до
+уровня Top Secret («Совершенно секретно»). Это относится ко всем правительственным ведомствам и
+учреждениям США, намеревающимся приобрести или использовать продукты, включающие Advanced Encryption Standard (AES),
+для обеспечения требований информационной безопасности, относящейся к защите национальных систем безопасности
+и/или информации, связанной с госбезопасностью [1].
+</div>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+<a href="Camellia.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Следующий раздел &gt;&gt;</a></div>
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/ru/Acknowledgements.html b/doc/html/ru/Acknowledgements.html
new file mode 100644
index 00000000..14e6ce3f
--- /dev/null
+++ b/doc/html/ru/Acknowledgements.html
@@ -0,0 +1,60 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Acknowledgements.html">Благодарности</a>
+</p></div>
+<div class="wikidoc">
+<div>
+<h1>Благодарности</h1>
+<p>Выражаем благодарность следующим людям:</p>
+<p>Разработчикам программы TrueCrypt, проделавшим потрясающую работу в течение 10 лет. Без их напряжённого труда VeraCrypt сегодня не существовало бы.</p>
+<p><i>Paul Le Roux</i> за предоставление его исходного кода E4M; TrueCrypt 1.0 ведёт своё происхождение от E4M, а некоторые части исходного кода E4M и поныне входят в исходный код текущей версии TrueCrypt.</p>
+<p><i>Brian Gladman</i>, автору превосходных подпрограмм AES, Twofish и SHA-512.</p>
+<p><i>Peter Gutmann</i> за его документ о случайных числах и за создание библиотеки cryptlib, послужившей источником части исходного кода генератора случайных чисел.</p>
+<p><i>Wei Dai</i>, автору подпрограмм Serpent и RIPEMD-160.</p>
+<p><i>Tom St Denis</i>, автору LibTomCrypt, включающей компактные подпрограммы SHA-256.</p>
+<p><i>Mark Adler</i> и <i>Jean-loup Gailly</i>, написавшим библиотеку zlib.</p>
+<p>Разработчикам алгоритмов шифрования, хеширования и режима работы:</p>
+<p><i>Horst Feistel, Don Coppersmith, Walt Tuchmann, Lars Knudsen, Ross Anderson, Eli Biham, Bruce Schneier, David Wagner, John Kelsey, Niels Ferguson, Doug Whiting, Chris Hall, Joan Daemen, Vincent Rijmen, Carlisle Adams, Stafford Tavares, Phillip Rogaway, Hans
+ Dobbertin, Antoon Bosselaers, Bart Preneel, Paulo S. L. M. Barreto.</i></p>
+<p><i>Andreas Becker</i> за создание логотипа и значков VeraCrypt.</p>
+<p><i>Xavier de Carn&eacute; de Carnavalet</i>, предложившему оптимизацию скорости для PBKDF2, которая вдвое сократила время монтирования/загрузки.</p>
+<p><i>kerukuro</i> за библиотеку cppcrypto (http://cppcrypto.sourceforge.net/), откуда взята реализация шифра «Кузнечик».</p>
+<p><br>
+<i>Dieter Baron</i> и <i>Thomas Klausner</i>, написавшим библиотеку libzip.</p>
+<p><br>
+<i>Jack Lloyd</i>, написавшему оптимизированную для SIMD реализацию Serpent.</p>
+<p>Всем остальным, благодаря кому стал возможен этот проект, кто нас морально поддерживал, а также тем, кто присылал нам сообщения об ошибках и предложения по улучшению программы.</p>
+<p>Большое вам спасибо!</p>
+<br><br>
+<p>Перевод программы и документации на русский язык выполнил <em>Дмитрий Ерохин</em>.</p>
+</div>
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/ru/Additional Security Requirements and Precautions.html b/doc/html/ru/Additional Security Requirements and Precautions.html
new file mode 100644
index 00000000..b64a31f4
--- /dev/null
+++ b/doc/html/ru/Additional Security Requirements and Precautions.html
@@ -0,0 +1,52 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Security%20Requirements%20and%20Precautions.html">Требования безопасности и меры предосторожности</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Additional%20Security%20Requirements%20and%20Precautions.html">Дополнительные требования безопасности и меры предосторожности</a>
+</p></div>
+
+<div class="wikidoc">
+<div>
+<h1>Дополнительные требования безопасности и меры предосторожности</h1>
+<p>Помимо всего, что описано в главе <a href="Security%20Requirements%20and%20Precautions.html"><em>Требования безопасности и меры предосторожности</em></a>,
+вы обязаны помнить и соблюдать требования безопасности, меры предосторожности и ограничения, изложенные в следующих главах и разделах:</p>
+<ul>
+<li><a href="How%20to%20Back%20Up%20Securely.html"><em><strong>О безопасном резервном копировании</strong></em></a>
+</li><li><a href="Issues%20and%20Ограничения.html"><em><strong>Ограничения</strong></em></a>
+</li><li><a href="Security%20Model.html"><em><strong>Модель безопасности</strong></em></a>
+</li><li><a href="Security%20Requirements%20for%20Hidden%20Volumes.html"><em><strong>Требования безопасности и меры предосторожности, касающиеся скрытых томов</strong></em></a>
+</li><li><a href="Plausible%20Deniability.html"><em><strong>Правдоподобное отрицание наличия шифрования</strong></em></a>
+</li></ul>
+<p>См. также: <a href="Digital%20Signatures.html">
+<em>Цифровые подписи</em></a></p>
+</div>
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/ru/Authenticity and Integrity.html b/doc/html/ru/Authenticity and Integrity.html
new file mode 100644
index 00000000..9e3f699c
--- /dev/null
+++ b/doc/html/ru/Authenticity and Integrity.html
@@ -0,0 +1,54 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Security%20Requirements%20and%20Precautions.html">Требования безопасности и меры предосторожности</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Authenticity%20and%20Integrity.html">Подлинность и целостность данных</a>
+</p></div>
+
+<div class="wikidoc">
+<div>
+<h1>Подлинность и целостность данных</h1>
+<p>VeraCrypt применяет шифрование для сохранения <em>конфиденциальности</em> шифруемых данных. VeraCrypt
+не сохраняет и не проверяет целостность или подлинность данных, подвергающихся шифрованию и дешифрованию.
+Следовательно, если вы позволите неприятелю изменить зашифрованные с помощью VeraCrypt данные, он сможет
+установить у любого 16-байтового блока данных случайное или предыдущее значение, которое ему удалось
+получить в прошлом. Обратите внимание, что неприятель не может выбрать значение, которое вы получите,
+когда VeraCrypt расшифровывает изменённый блок – значение будет случайным, если только противник не восстановит
+старую версию зашифрованного блока, которую ему удалось получить в прошлом. Ответственность за проверку
+целостности и подлинности данных, зашифрованных или расшифрованных VeraCrypt, лежит только на вас (например,
+это можно сделать с помощью соответствующего стороннего ПО).<br>
+<br>
+См. также: <a href="Physical%20Security.html">
+<em>Физическая безопасность</em></a>, <a href="Security%20Model.html">
+<em>Модель безопасности</em></a></p>
+</div>
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/ru/Authors.html b/doc/html/ru/Authors.html
new file mode 100644
index 00000000..765a20a4
--- /dev/null
+++ b/doc/html/ru/Authors.html
@@ -0,0 +1,44 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="VeraCrypt%20Volume.html">Том VeraCrypt</a>
+</p></div>
+
+<div class="wikidoc">
+<h2>Авторы</h2>
+<p>Mounir IDRASSI (<a href="https://www.idrix.fr" target="_blank">IDRIX</a>, <a href="https://fr.linkedin.com/in/idrassi" target="_blank">
+https://fr.linkedin.com/in/idrassi</a>) – создатель и главный разработчик VeraCrypt. Руководит всеми аспектами
+разработки и развёртывания на всех поддерживаемых платформах (Windows, Linux и macOS).</p>
+<p>Алекс Колотников (<a href="https://ru.linkedin.com/in/alex-kolotnikov-6625568b" target="_blank">https://ru.linkedin.com/in/alex-kolotnikov-6625568b</a>) – автор
+EFI-загрузчика VeraCrypt. Отвечает за все аспекты поддержки EFI, а его обширный опыт помогает внедрять новые
+интересные функции в системное Windows-шифрование VeraCrypt.</p>
+<p>&nbsp;</p>
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/ru/Avoid Third-Party File Extensions.html b/doc/html/ru/Avoid Third-Party File Extensions.html
new file mode 100644
index 00000000..81f88334
--- /dev/null
+++ b/doc/html/ru/Avoid Third-Party File Extensions.html
@@ -0,0 +1,85 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Avoid%20Third-Party%20File%20Extensions.html">О рисках, связанных со сторонними расширениями файлов</a>
+</p></div>
+
+<div class="wikidoc">
+ <h1>Понимание рисков использования сторонних расширений файлов с VeraCrypt</h1>
+ <div>
+ <p>Хотя VeraCrypt обеспечивает надёжные возможности шифрования для защиты ваших данных, использование сторонних расширений файлов для файловых контейнеров или ключевых файлов может привести к риску сделать зашифрованные данные недоступными.<br />
+ В этом руководстве содержится подробное объяснение связанных с этим рисков и излагаются рекомендации, как их снизить.</p>
+ </div>
+
+ <h2>Риски, связанные с файловыми контейнерами</h2>
+ <div>
+ <p>Использование стороннего расширения файла для файловых контейнеров подвергает вас нескольким рискам:</p>
+ <ul>
+ <li>ПЕРЕЗАПИСЬ МЕТАДАННЫХ: Обновление метаданных сторонними приложениями может привести к перезаписи важных частей файлового контейнера.</li>
+ <li>НЕПРЕДНАМЕРЕННЫЕ ИЗМЕНЕНИЯ: Случайный запуск файлового контейнера с помощью стороннего приложения может привести к изменению его метаданных без вашего согласия.</li>
+ <li>ПОВРЕЖДЕНИЕ КОНТЕЙНЕРА: Эти действия могут сделать контейнер нечитаемым или непригодным для использования.</li>
+ <li>ПОТЕРЯ ДАННЫХ: Данные внутри контейнера могут быть безвозвратно потеряны, если контейнер будет повреждён.</li>
+ </ul>
+ </div>
+
+ <h2>Риски, связанные с ключевыми файлами</h2>
+ <div>
+ <p>Аналогичные риски связаны с ключевыми файлами:</p>
+ <ul>
+ <li>ПОВРЕЖДЕНИЕ КЛЮЧЕВОГО ФАЙЛА: Непреднамеренное изменение ключевого файла с помощью стороннего приложения может сделать его непригодным для расшифровки.</li>
+ <li>ПЕРЕЗАПИСЬ ДАННЫХ: Сторонние приложения могут перезаписать ту часть ключевого файла, которую VeraCrypt использует для расшифровки.</li>
+ <li>НЕПРЕДНАМЕРЕННЫЕ ИЗМЕНЕНИЯ: Случайные изменения могут сделать невозможным монтирование тома, если у вас нет неизменённой резервной копии ключевого файла.</li>
+ </ul>
+ </div>
+
+ <h2>Примеры расширений, которых следует избегать</h2>
+ <div>
+ <p>Избегайте использования следующих типов сторонних расширений файлов:</p>
+ <ul>
+ <li>МЕДИАФАЙЛЫ: Изображения, аудио- и видеофайлы подвержены изменениям метаданных соответствующим программным обеспечением.</li>
+ <li>АРХИВЫ: Файлы ZIP, RAR, 7z могут быть легко изменены, из-за чего нарушится работа зашифрованного тома.</li>
+ <li>ИСПОЛНЯЕМЫЕ ФАЙЛЫ: Эти файлы могут изменяться в результате обновления программного обеспечения, что делает их ненадёжными в качестве файловых контейнеров или ключевых файлов.</li>
+ <li>ФАЙЛЫ ДОКУМЕНТОВ: Файлы Office и PDF могут автоматически обновляться программным обеспечением, что делает их использование рискованным.</li>
+ </ul>
+ </div>
+
+ <h2>Рекомендации</h2>
+ <div>
+ <p>Для безопасного использования примите к сведению следующие рекомендации:</p>
+ <ul>
+ <li>Используйте нейтральные расширения файлов для файловых контейнеров и ключевых файлов, чтобы свести к минимуму риск автоматической ассоциации файлов.</li>
+ <li>Храните резервные копии файловых контейнеров и ключевых файлов в защищённых местах, изолированных от доступа по сети.</li>
+ <li>Отключите автоматическое открытие для определённых расширений файлов, которые вы используете для файловых контейнеров VeraCrypt и ключевых файлов.</li>
+ <li>Всегда перепроверяйте ассоциации файлов и будьте осторожны при использовании нового устройства или стороннего приложения.</li>
+ </ul>
+ </div>
+
+<div class="ClearBoth"></div></body></html>
diff --git a/doc/html/ru/BCH_Logo_30x30.png b/doc/html/ru/BCH_Logo_30x30.png
new file mode 100644
index 00000000..00c71cb9
--- /dev/null
+++ b/doc/html/ru/BCH_Logo_30x30.png
Binary files differ
diff --git a/doc/html/ru/BC_Logo_30x30.png b/doc/html/ru/BC_Logo_30x30.png
new file mode 100644
index 00000000..a53a6d93
--- /dev/null
+++ b/doc/html/ru/BC_Logo_30x30.png
Binary files differ
diff --git a/doc/html/ru/BLAKE2s-256.html b/doc/html/ru/BLAKE2s-256.html
new file mode 100644
index 00000000..583433a0
--- /dev/null
+++ b/doc/html/ru/BLAKE2s-256.html
@@ -0,0 +1,59 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Hash%20Algorithms.html">Алгоритмы хеширования</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="BLAKE2s-256.html">BLAKE2s-256</a>
+</p></div>
+
+<div class="wikidoc">
+<h1>BLAKE2s-256</h1>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+<p>
+BLAKE2 – это основанная на BLAKE криптографическая хеш-функция (авторы: Jean-Philippe Aumasson,
+Samuel Neves, Zooko Wilcox-O'Hearn и Christian Winnerlein, опубликована 21 декабря 2012 года).
+Цель разработки состояла в том, чтобы заменить широко используемые, но взломанные алгоритмы
+MD5 и SHA-1 в приложениях, требующих высокой производительности программного обеспечения.
+BLAKE2 обеспечивает лучшую безопасность, чем SHA-2, и похож на SHA-3 (например, невосприимчив
+к увеличению длины, имеет недифференцируемость от случайного оракула и т. д.).<br/>
+BLAKE2 убирает добавление констант к словам сообщения из функции раунда BLAKE, изменяет две
+константы вращения, упрощает заполнение, добавляет блок параметров, который подвергается
+операции XOR с векторами инициализации, и уменьшает количество раундов с 16 до 12 для BLAKE2b
+(преемника BLAKE- 512) и с 14 до 10 для BLAKE2s (преемник BLAKE-256).<br/>
+BLAKE2b и BLAKE2s указаны в документе RFC 7693.
+</p>
+<p>
+VeraCrypt использует только BLAKE2s с максимальным выходным размером 32 байта (256 бит).
+</p>
+</div>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+<a href="SHA-256.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Следующий раздел &gt;&gt;</a></div>
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/ru/Beginner's Tutorial.html b/doc/html/ru/Beginner's Tutorial.html
new file mode 100644
index 00000000..7c78e766
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial.html
@@ -0,0 +1,244 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Beginner's%20Tutorial.html">Руководство для начинающих пользователей</a>
+</p></div>
+
+<div class="wikidoc">
+<h1>Руководство для начинающих пользователей</h1>
+<h2>Как создать и использовать контейнер VeraCrypt</h2>
+<p>В этой главе содержатся пошаговые инструкции о том, как создавать, монтировать и использовать том VeraCrypt.
+Настоятельно рекомендуем вам ознакомиться и с другими разделами данного руководства, так как они содержат важную информацию.</p>
+<h4>ШАГ 1:</h4>
+<p>Если вы этого ещё не сделали, загрузите и установите программу VeraCrypt. Затем запустите её, дважды щёлкнув
+по файлу VeraCrypt.exe или по ярлыку VeraCrypt в меню <i>Пуск</i> в Windows.</p>
+<h4>ШАГ 2:</h4>
+<p><img src="Beginner's Tutorial_Image_001.png" alt=""><br>
+<br>
+Должно появиться главное окно VeraCrypt. Нажмите кнопку <strong>Создать том</strong> (на иллюстрации она выделена красным).</p>
+<h4>ШАГ 3:</h4>
+<p><img src="Beginner's Tutorial_Image_002.png" alt=""><br>
+<br>
+Должно появиться окно мастера создания томов VeraCrypt.<br>
+<br>
+На этом этапе нам нужно выбрать место, где будет создан том VeraCrypt. Том может находиться в файле
+(также именуемом контейнером), в разделе или на диске. В этом примере мы выберем первый вариант и
+создадим том VeraCrypt внутри файла.
+<br>
+<br>
+Поскольку эта опция выбрана по умолчанию, просто нажимаем кнопку <strong>Далее</strong>.</p>
+<h4>ШАГ 4:</h4>
+<p><img src="Beginner's Tutorial_Image_003.png" alt=""><br>
+<br>
+Сейчас нам нужно выбрать, какой том VeraCrypt мы хотим создать – обычный или скрытый. В этом примере мы
+выберем первый вариант и создадим обычный том.<br>
+<br>
+Поскольку эта опция выбрана по умолчанию, просто нажимаем кнопку <strong>Далее</strong>.</p>
+<h4>ШАГ 5:</h4>
+<p><img src="Beginner's Tutorial_Image_004.png" alt=""><br>
+<br>
+На этом этапе требуется указать место создания тома (файла-контейнера) VeraCrypt. Обратите внимание: контейнер
+VeraCrypt ничем не отличается от любого другого обычного файла. Например, его можно перемещать или удалять
+как любой другой файл. Также ему потребуется имя файла, которое мы выберем на следующем этапе.<br>
+<br>
+Нажмите кнопку <strong>Выбрать файл</strong>.<br>
+<br>
+Появится стандартное диалоговое окно выбора файлов Windows (при этом окно мастера создания томов останется открытым в фоне).</p>
+<h4>ШАГ 6:</h4>
+<p><img src="Beginner's Tutorial_Image_005.png" alt=""><br>
+<br>
+В этом руководстве мы создадим наш том VeraCrypt в папке F<em>:\Data\ </em>
+и присвоим тому (файлу-контейнеру) имя <em>MyVolume.hc</em> (как показано на иллюстрации выше). Разумеется,
+вы можете выбрать любое другое имя и расположение файла (например, поместив его на USB-флешку). Обратите внимание,
+что файла <em>MyVolume.hc</em> пока не существует &ndash; VeraCrypt его создаст.</p>
+<p>ВАЖНО: Имейте в виду, что VeraCrypt <em>не будет</em> шифровать никакие имеющиеся файлы (при создании
+файла-контейнера VeraCrypt). Если на данном этапе выбрать какой-либо уже существующий файл, он будет
+перезаписан и заменён новым созданным томом (то есть перезаписанный файл будет <em>уничтожен</em>, а <em>не</em>
+зашифрован). Зашифровать имеющиеся файлы вы сможете позднее, переместив их в том VeraCrypt, который мы сейчас создаём.*</p>
+<p>Выберите в файловом окне желаемый путь (место, где вы хотите создать контейнер). В поле
+<strong>Имя файла</strong> введите имя, которое вы хотите дать файлу-контейнеру.<br>
+<br>
+Нажмите кнопку <strong>Сохранить</strong>.<br>
+<br>
+Окно выбора файлов должно исчезнуть.<br>
+<br>
+На следующих этапах мы вернёмся в окно мастера создания томов VeraCrypt.</p>
+<p>* Обратите внимание, что после того, как вы скопируете существующие незашифрованные файлы на том VeraCrypt,
+вы должны надёжно удалить (затереть) исходные незашифрованные файлы. Для надёжного стирания существуют
+специальные программы (многие из которых бесплатны).</p>
+<h4>ШАГ 7:</h4>
+<p><img src="Beginner's Tutorial_Image_007.png" alt=""><br>
+<br>
+В окне мастера создания томов нажмите <strong>Далее</strong>.</p>
+<h4>ШАГ 8:</h4>
+<p><img src="Beginner's Tutorial_Image_008.png" alt=""><br>
+<br>
+Здесь можно выбрать для тома алгоритмы шифрования и хеширования. Если вы не знаете, что лучше выбрать,
+просто оставьте предложенные значения и нажмите
+<strong>Далее</strong> (см. подробности в главах <a href="Алгоритмы шифрования.html">
+<em>Алгоритмы шифрования</em></a> и <a href="Hash%20Algorithms.html">
+<em>Алгоритмы хеширования</em></a>).</p>
+<h4>ШАГ 9:</h4>
+<p><img src="Beginner's Tutorial_Image_009.png" alt=""><br>
+<br>
+Здесь мы укажем, что хотим создать контейнер VeraCrypt размером 250 мегабайт. Разумеется, вы можете
+указать любой другой размер. После того, как вы введёте размер в поле ввода (оно выделено красным),
+нажмите кнопку <strong>Далее</strong>.</p>
+<h4>ШАГ 10:</h4>
+<p><img src="Beginner's Tutorial_Image_010.png" alt=""><br>
+<br>
+Мы подошли к одному из самых важных этапов: нам нужно выбрать для тома хороший пароль. Какой пароль
+следует считать хорошим, написано в этом окне мастера. Внимательно прочитайте данную информацию.<br>
+<br>
+После того, как вы определитесь с хорошим паролем, введите его в первое поле ввода. Затем введите тот же
+самый пароль в расположенное ниже второе поле ввода и нажмите кнопку <strong>Далее</strong>.</p>
+<p>Примечание: кнопка <strong>Далее</strong> будет недоступна до тех пор, пока в полях ввода не будут
+введены одинаковые пароли.</p>
+<h4>ШАГ 11:</h4>
+<p><img src="Beginner's Tutorial_Image_011.png" alt=""><br>
+<br>
+Произвольно перемещайте мышь в окне мастера создания томов в течение хотя бы 30 секунд. Чем дольше вы
+будете перемещать мышь, тем лучше – этим вы значительно повысите криптостойкость ключей шифрования
+(что увеличит их надёжность).<br>
+<br>
+Нажмите кнопку <strong>Разметить</strong>.<br>
+<br>
+Сейчас должно начаться создание тома. VeraCrypt создаст файл с именем <em>MyVolume.hc</em>
+ в папке <em>F:\Data\</em> (как мы указали в шаге 6). Этот файл станет контейнером VeraCrypt (то есть он
+ будет содержать зашифрованный том VeraCrypt). В зависимости от размера тома, создание тома может
+ длиться довольно долго. По окончании появится следующее окно:<br>
+<br>
+<img src="Beginner's Tutorial_Image_012.png" alt=""><br>
+<br>
+Нажмите <strong>OK</strong>, чтобы закрыть это окно.</p>
+<h4>ШАГ 12:</h4>
+<p><img src="Beginner's Tutorial_Image_013.png" alt=""><br>
+<br>
+Итак, только что мы успешно создали том VeraCrypt (файловый контейнер). Нажмите кнопку
+<strong>Выход</strong> в окне мастера создания томов VeraCrypt.<br>
+<br>
+Окно мастера должно исчезнуть.<br>
+<br>
+На следующих этапах мы смонтируем том, который только что создали. Сейчас мы должны были вернуться
+в главное окно VeraCrypt (которое должно быть всё ещё открыто, в противном случае выполните заново шаг 1,
+чтобы запустить VeraCrypt, а затем перейдите к шагу 13).</p>
+<h4>ШАГ 13:</h4>
+<p><img src="Beginner's Tutorial_Image_014.png" alt=""><br>
+<br>
+Выберите в списке букву диска (на иллюстрации она помечена красным). Она станет буквой диска
+со смонтированным контейнером VeraCrypt.<br>
+<br>
+Примечание: в нашем примере мы выбрали букву диска M, но вы, разумеется, можете выбрать любую другую доступную букву.</p>
+<h4>ШАГ 14:</h4>
+<p><img src="Beginner's Tutorial_Image_015.png" alt=""><br>
+<br>
+Нажмите кнопку <strong>Выбрать файл</strong>.<br>
+<br>
+Появится обычное окно выбора файлов.</p>
+<h4>ШАГ 15:</h4>
+<p><img src="Beginner's Tutorial_Image_016.png" alt=""><br>
+<br>
+В окне выбора файлов найдите и укажите файловый контейнер (который мы создали на шагах 6-12). Нажмите кнопку
+<strong>Открыть</strong> (в окне выбора файлов).<br>
+<br>
+Окно выбора файлов должно исчезнуть.<br>
+<br>
+На следующих этапах мы вернёмся в главное окно VeraCrypt.</p>
+<h4>ШАГ 16:</h4>
+<p><img src="Beginner's Tutorial_Image_017.png" alt=""><br>
+<br>
+В главном окне VeraCrypt нажмите кнопку <strong>Смонтировать</strong>. Появится окно ввода пароля.</p>
+<h4>ШАГ 17:</h4>
+<p><img src="Beginner's Tutorial_Image_018.png" alt=""><br>
+<br>
+Укажите пароль (который мы задали на шаге 10) в поле ввода (на иллюстрации оно отмечено красным).</p>
+<h4>ШАГ 18:</h4>
+<p><img src="Beginner's Tutorial_Image_019.png" alt=""><br>
+<br>
+Выберите алгоритм PRF, который был использован при создании тома (по умолчанию VeraCrypt использует
+PRF-алгоритм SHA-512). Если вы не помните, какой PRF использовался, просто оставьте здесь автоопределение,
+но монтирование в этом случае займёт большее время. После ввода пароля нажмите <strong>OK</strong>.<br>
+<br>
+Сейчас VeraCrypt попытается смонтировать наш том. Если пароль указан неправильно (например, вы ошиблись
+при вводе), VeraCrypt известит вас об этом, и потребуется повторить предыдущий этап (снова ввести пароль и
+нажать <strong>OK</strong>). Если пароль правильный, том будет смонтирован.</p>
+<h4>ШАГ 19 (ЗАКЛЮЧИТЕЛЬНЫЙ):</h4>
+<p><img src="Beginner's Tutorial_Image_020.png" alt=""><br>
+<br>
+Итак, мы только что успешно смонтировали контейнер как виртуальный диск M:.<br>
+<br>
+Этот виртуальный диск полностью зашифрован (в том числе зашифрованы имена файлов, таблицы распределения,
+свободное место и т. д.) и ведёт себя как настоящий диск. Вы можете сохранять (или копировать, перемещать
+и т. д.) файлы на этом виртуальном диске – они будут шифроваться на лету в момент записи.<br>
+<br>
+Если вы откроете файл, хранящийся в томе VeraCrypt, например, в медиапроигрывателе, этот файл будет
+автоматически расшифровываться в памяти (в ОЗУ) непосредственно в момент считывания, то есть на лету.</p>
+<p><i>ВАЖНО: Обратите внимание, что когда вы открываете файл, хранящийся в томе VeraCrypt (или когда
+сохраняете/копируете файл в томе VeraCrypt), повторно пароль не запрашивается. Правильный пароль нужно
+указать только один раз – при монтировании тома.</i></p>
+<p>Открыть смонтированный том можно, например, двойным щелчком по элементу, выделенному на иллюстрации синим цветом.</p>
+<p>Просматривать содержимое смонтированного тома можно точно так же, как содержимое любого другого диска.
+Например, открыть <em>Компьютер</em> (или <em>Мой компьютер</em>) и дважды щёлкнуть по соответствующей
+букве диска (в нашем случае это буква M).<br>
+<br>
+<img src="Beginner's Tutorial_Image_021.png" alt=""><br>
+<br>
+Вы можете копировать файлы (или папки) в/из том(а) VeraCrypt, как если бы вы копировали их в любой другой
+обычный диск (например, с помощью перетаскивания). Файлы, считываемые или копируемые из зашифрованного
+тома VeraCrypt, автоматически на лету расшифровываются в ОЗУ (в памяти). Аналогично, файлы, записываемые
+или копируемые в том VeraCrypt, автоматически зашифровываются на лету в ОЗУ (непосредственно перед их записью на диск).<br>
+<br>
+Обратите внимание, что VeraCrypt никогда не сохраняет на диске данные в незашифрованном виде – незашифрованные
+данные хранятся лишь временно в ОЗУ (памяти). Даже при смонтированном томе данные в этом томе остаются
+зашифрованными. При перезагрузке Windows или выключении компьютера том будет размонтирован, а все находящиеся
+в нём файлы станут недоступными (и зашифрованными). Даже в случае случайного перебоя электропитания (то есть
+при некорректном завершении работы системы) все хранящиеся в томе файлы будут недоступными (и зашифрованными).
+Чтобы снова получить к ним доступ, потребуется смонтировать том. Как это сделать, описано в шагах 13-18.</p>
+<p>Если вам нужно закрыть том, сделав его содержимое недоступным, можно либо перезагрузить операционную систему,
+либо размонтировать том. Для этого сделайте следующее:<br>
+<br>
+<img src="Beginner's Tutorial_Image_022.png" alt=""><br>
+<br>
+Выберите нужный том из списка смонтированных томов в главном окне VeraCrypt (на иллюстрации он отмечен красным)
+и нажмите кнопку <strong>Размонтировать</strong> (на иллюстрации она также отмечена красным). Чтобы снова
+получить доступ к хранящимся в томе файлам, потребуется смонтировать том. Как это сделать, описано в шагах 13-18.</p>
+<h2>Как создать и использовать раздел/устройство, зашифрованное VeraCrypt</h2>
+<p>Вместо создания файлов-контейнеров вы можете воспользоваться шифрованием физических разделов или дисков
+(то есть создавать тома VeraCrypt на основе устройств). Чтобы это сделать, повторите шаги 1-3, но на шаге 3
+выберите второй или третий параметр и следуйте инструкциям мастера.
+При создании тома VeraCrypt на основе устройства внутри <em>несистемного</em> раздела/диска, монтирование
+этого тома выполняется кнопкой <em>Автомонтирование</em> в главном окне VeraCrypt. Информацию о зашифрованных
+<em>системных</em> разделах/дисках см. в главе <a href="System%20Encryption.html">
+<em>Шифрование системы</em></a>.</p>
+<p>ВАЖНО: <em>Настоятельно рекомендуем ознакомиться с другими главами этого руководства – они содержат важную
+информацию, которая здесь опущена, чтобы проще было объяснить азы.</em></p>
+</div>
+</body></html>
diff --git a/doc/html/ru/Beginner's Tutorial_Image_001.png b/doc/html/ru/Beginner's Tutorial_Image_001.png
new file mode 100644
index 00000000..f0232d7c
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_001.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_002.png b/doc/html/ru/Beginner's Tutorial_Image_002.png
new file mode 100644
index 00000000..bfabc461
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_002.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_003.png b/doc/html/ru/Beginner's Tutorial_Image_003.png
new file mode 100644
index 00000000..d82f4346
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_003.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_004.png b/doc/html/ru/Beginner's Tutorial_Image_004.png
new file mode 100644
index 00000000..cd6b4688
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_004.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_005.png b/doc/html/ru/Beginner's Tutorial_Image_005.png
new file mode 100644
index 00000000..c003f4df
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_005.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_007.png b/doc/html/ru/Beginner's Tutorial_Image_007.png
new file mode 100644
index 00000000..8d6fa1b4
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_007.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_008.png b/doc/html/ru/Beginner's Tutorial_Image_008.png
new file mode 100644
index 00000000..5637f034
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_008.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_009.png b/doc/html/ru/Beginner's Tutorial_Image_009.png
new file mode 100644
index 00000000..c9ec72e2
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_009.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_010.png b/doc/html/ru/Beginner's Tutorial_Image_010.png
new file mode 100644
index 00000000..4c0d0df0
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_010.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_011.png b/doc/html/ru/Beginner's Tutorial_Image_011.png
new file mode 100644
index 00000000..3e5c1f08
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_011.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_012.png b/doc/html/ru/Beginner's Tutorial_Image_012.png
new file mode 100644
index 00000000..af05afe8
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_012.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_013.png b/doc/html/ru/Beginner's Tutorial_Image_013.png
new file mode 100644
index 00000000..0ddb537f
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_013.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_014.png b/doc/html/ru/Beginner's Tutorial_Image_014.png
new file mode 100644
index 00000000..4492b513
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_014.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_015.png b/doc/html/ru/Beginner's Tutorial_Image_015.png
new file mode 100644
index 00000000..f9297a36
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_015.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_016.png b/doc/html/ru/Beginner's Tutorial_Image_016.png
new file mode 100644
index 00000000..3648ac45
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_016.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_017.png b/doc/html/ru/Beginner's Tutorial_Image_017.png
new file mode 100644
index 00000000..017dc9ed
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_017.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_018.png b/doc/html/ru/Beginner's Tutorial_Image_018.png
new file mode 100644
index 00000000..8061c181
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_018.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_019.png b/doc/html/ru/Beginner's Tutorial_Image_019.png
new file mode 100644
index 00000000..018858d3
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_019.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_020.png b/doc/html/ru/Beginner's Tutorial_Image_020.png
new file mode 100644
index 00000000..99c94c6c
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_020.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_021.png b/doc/html/ru/Beginner's Tutorial_Image_021.png
new file mode 100644
index 00000000..6aff7099
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_021.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_022.png b/doc/html/ru/Beginner's Tutorial_Image_022.png
new file mode 100644
index 00000000..aa651266
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_022.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_023.png b/doc/html/ru/Beginner's Tutorial_Image_023.png
new file mode 100644
index 00000000..3f2e37c2
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_023.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_024.png b/doc/html/ru/Beginner's Tutorial_Image_024.png
new file mode 100644
index 00000000..121a7581
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_024.png
Binary files differ
diff --git a/doc/html/ru/Beginner's Tutorial_Image_034.png b/doc/html/ru/Beginner's Tutorial_Image_034.png
new file mode 100644
index 00000000..49c524d2
--- /dev/null
+++ b/doc/html/ru/Beginner's Tutorial_Image_034.png
Binary files differ
diff --git a/doc/html/ru/Camellia.html b/doc/html/ru/Camellia.html
new file mode 100644
index 00000000..7bc84b6e
--- /dev/null
+++ b/doc/html/ru/Camellia.html
@@ -0,0 +1,48 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Encryption%20Algorithms.html">Алгоритмы шифрования</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Camellia.html">Camellia</a>
+</p></div>
+
+<div class="wikidoc">
+<h1>Алгоритм шифрования Camellia</h1>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+Совместная разработка Mitsubishi Electric и NTT of Japan. Camellia это шифр с блоками размером 128 бит, впервые
+опубликованный в 2000 году. Одобрен к использованию ISO/IEC, проектом NESSIE Евросоюза и японским проектом CRYPTREC.</div>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+В VeraCrypt используется шифр Camellia с 24 раундами и 256-битовым ключом, работающий в <a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
+режиме XTS</a> (см. раздел <a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
+Режимы работы</a>).</div>
+<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
+<a href="Kuznyechik.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Следующий раздел &gt;&gt;</a></div>
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/ru/Cascades.html b/doc/html/ru/Cascades.html
new file mode 100644
index 00000000..d46a7723
--- /dev/null
+++ b/doc/html/ru/Cascades.html
@@ -0,0 +1,91 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Encryption%20Algorithms.html">Алгоритмы шифрования</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Cascades.html">Каскады шифров</a>
+</p></div>
+
+<div class="wikidoc">
+<h1>Каскады шифров</h1>
+<p>&nbsp;</p>
+<h2>AES-Twofish</h2>
+<p>Последовательно выполняемые (каскадом) [15, 16] два шифра, работающие в режиме XTS (см. раздел <a href="Modes%20of%20Operation.html">
+<em>Режимы работы</em></a>). Каждый блок размером 128 бит сначала шифруется алгоритмом Twofish (с ключом размером 256 бит) в режиме XTS, а затем алгоритмом AES (с ключом размером 256 бит) также в режиме XTS. Каждый из этих каскадных шифров использует свой собственный ключ. Все ключи шифрования не зависят друг от друга
+ (обратите внимание, что ключи заголовка тоже независимы, хотя и получены в результате формирования одного пароля &ndash; см. раздел
+<a href="Header Key Derivation.html"><em>Формирование ключа заголовка, соль и количество итераций</em></a>). Информация о каждом отдельном шифре приведена выше.</p>
+<h2>AES-Twofish-Serpent</h2>
+<p>Последовательно выполняемые (каскадом) [15, 16] три шифра, работающие в режиме XTS (см. раздел <a href="Modes%20of%20Operation.html">
+<em>Режимы работы</em></a>). Каждый блок размером 128 бит сначала шифруется алгоритмом Serpent (с ключом размером 256 бит) в режиме XTS, затем алгоритмом Twofish (с ключом размером 256 бит) в режиме XTS, и, наконец, алгоритмом AES (с ключом размером 256 бит) в режиме XTS. Каждый из этих каскадных шифров использует свой собственный ключ.
+ Все ключи шифрования не зависят друг от друга (обратите внимание, что ключи заголовка тоже независимы, хотя и получены в результате формирования одного пароля &ndash; см. раздел
+<a href="Header Key Derivation.html"><em>Формирование ключа заголовка, соль и количество итераций</em></a>). Информация о каждом отдельном шифре приведена выше.</p>
+<h2>Camellia-Kuznyechik</h2>
+<p>Последовательно выполняемые (каскадом) [15, 16] два шифра, работающие в режиме XTS (см. раздел <a href="Modes%20of%20Operation.html">
+<em>Режимы работы</em></a>). Каждый блок размером 128 бит сначала шифруется алгоритмом Kuznyechik (с ключом размером 256 бит) в режиме XTS, а затем алгоритмом Camellia (с ключом размером 256 бит) в режиме XTS. Каждый из этих каскадных шифров использует свой собственный ключ. Все ключи шифрования не зависят друг от друга
+ (обратите внимание, что ключи заголовка тоже независимы, хотя и получены в результате формирования одного пароля &ndash; см. раздел
+<a href="Header Key Derivation.html"><em>Формирование ключа заголовка, соль и количество итераций</em></a>). Информация о каждом отдельном шифре приведена выше.</p>
+<h2>Camellia-Serpent</h2>
+<p>Последовательно выполняемые (каскадом) [15, 16] два шифра, работающие в режиме XTS (см. раздел <a href="Modes%20of%20Operation.html">
+<em>Режимы работы</em></a>). Каждый блок размером 128 бит сначала шифруется алгоритмом Serpent (с ключом размером 256 бит) в режиме XTS, а затем алгоритмом Camellia (с ключом размером 256 бит) в режиме XTS. Каждый из этих каскадных шифров использует свой собственный ключ. Все ключи шифрования не зависят друг от друга
+ (обратите внимание, что ключи заголовка тоже независимы, хотя и получены в результате формирования одного пароля &ndash; см. раздел
+<a href="Header Key Derivation.html"><em>Формирование ключа заголовка, соль и количество итераций</em></a>). Информация о каждом отдельном шифре приведена выше.</p>
+<h2>Kuznyechik-AES</h2>
+<p>Последовательно выполняемые (каскадом) [15, 16] два шифра, работающие в режиме XTS (см. раздел <a href="Modes%20of%20Operation.html">
+<em>Режимы работы</em></a>). Каждый блок размером 128 бит сначала шифруется алгоритмом AES (с ключом размером 256 бит) в режиме XTS, а затем алгоритмом Kuznyechik (с ключом размером 256 бит) в режиме XTS. Каждый из этих каскадных шифров использует свой собственный ключ. Все ключи шифрования не зависят друг от друга
+ (обратите внимание, что ключи заголовка тоже независимы, хотя и получены в результате формирования одного пароля &ndash; см. раздел
+<a href="Header Key Derivation.html"><em>Формирование ключа заголовка, соль и количество итераций</em></a>). Информация о каждом отдельном шифре приведена выше.</p>
+<h2>Kuznyechik-Serpent-Camellia</h2>
+<p>Последовательно выполняемые (каскадом) [15, 16] три шифра, работающие в режиме XTS (см. раздел <a href="Modes%20of%20Operation.html">
+<em>Режимы работы</em></a>). Каждый блок размером 128 бит сначала шифруется алгоритмом Camellia (с ключом размером 256 бит) в режиме XTS, затем алгоритмом Serpent (с ключом размером 256 бит) в режиме XTS, и, наконец, алгоритмом Kuznyechik (с ключом размером 256 бит) в режиме XTS. Каждый из этих каскадных шифров использует свой собственный ключ.
+ Все ключи шифрования не зависят друг от друга (обратите внимание, что ключи заголовка тоже независимы, хотя и получены в результате формирования одного пароля &ndash; см. раздел
+<a href="Header Key Derivation.html"><em>Формирование ключа заголовка, соль и количество итераций</em></a>). Информация о каждом отдельном шифре приведена выше.</p>
+<h2>Kuznyechik-Twofish</h2>
+<p>Последовательно выполняемые (каскадом) [15, 16] два шифра, работающие в режиме XTS (см. раздел <a href="Modes%20of%20Operation.html">
+<em>Режимы работы</em></a>). Каждый блок размером 128 бит сначала шифруется алгоритмом Twofish (с ключом размером 256 бит) в режиме XTS, а затем алгоритмом Kuznyechik (с ключом размером 256 бит) в режиме XTS. Каждый из этих каскадных шифров использует свой собственный ключ. Все ключи шифрования не зависят друг от друга
+ (обратите внимание, что ключи заголовка тоже независимы, хотя и получены в результате формирования одного пароля &ndash; см. раздел
+<a href="Header Key Derivation.html"><em>Формирование ключа заголовка, соль и количество итераций</em></a>). Информация о каждом отдельном шифре приведена выше.</p>
+<h2>Serpent-AES</h2>
+<p>Последовательно выполняемые (каскадом) [15, 16] два шифра, работающие в режиме XTS (см. раздел <a href="Modes%20of%20Operation.html">
+<em>Режимы работы</em></a>). Каждый блок размером 128 бит сначала шифруется алгоритмом AES (с ключом размером 256 бит) в режиме XTS, а затем алгоритмом Serpent (с ключом размером 256 бит) в режиме XTS. Каждый из этих каскадных шифров использует свой собственный ключ. Все ключи шифрования не зависят друг от друга
+ (обратите внимание, что ключи заголовка тоже независимы, хотя и получены в результате формирования одного пароля &ndash; см. раздел
+<a href="Header Key Derivation.html"><em>Формирование ключа заголовка, соль и количество итераций</em></a>). Информация о каждом отдельном шифре приведена выше.</p>
+<h2>Serpent-Twofish-AES</h2>
+<p>Последовательно выполняемые (каскадом) [15, 16] три шифра, работающие в режиме XTS (см. раздел <a href="Modes%20of%20Operation.html">
+<em>Режимы работы</em></a>). Каждый блок размером 128 бит сначала шифруется алгоритмом AES (с ключом размером 256 бит) в режиме XTS, затем алгоритмом Twofish (с ключом размером 256 бит) в режиме XTS, и, наконец, алгоритмом Serpent (с ключом размером 256 бит) в режиме XTS. Каждый из этих каскадных шифров использует свой собственный ключ.
+ Все ключи шифрования не зависят друг от друга (обратите внимание, что ключи заголовка тоже независимы, хотя и получены в результате формирования одного пароля &ndash; см. раздел
+<a href="Header Key Derivation.html"><em>Формирование ключа заголовка, соль и количество итераций</em></a>). Информация о каждом отдельном шифре приведена выше.</p>
+<h2>Twofish-Serpent</h2>
+<p>Последовательно выполняемые (каскадом) [15, 16] два шифра, работающие в режиме XTS (см. раздел <a href="Modes%20of%20Operation.html">
+<em>Режимы работы</em></a>). Каждый блок размером 128 бит сначала шифруется алгоритмом Serpent (с ключом размером 256 бит) в режиме XTS, а затем алгоритмом Twofish (с ключом размером 256 бит) в режиме XTS. Каждый из этих каскадных шифров использует свой собственный ключ. Все ключи шифрования не зависят друг от друга
+ (обратите внимание, что ключи заголовка тоже независимы, хотя и получены в результате формирования одного пароля &ndash; см. раздел
+<a href="Header Key Derivation.html"><em>Формирование ключа заголовка, соль и количество итераций</em></a>). Информация о каждом отдельном шифре приведена выше.</p>
+</div>
+</body></html>
diff --git a/doc/html/ru/Changing Passwords and Keyfiles.html b/doc/html/ru/Changing Passwords and Keyfiles.html
new file mode 100644
index 00000000..fcbd62bc
--- /dev/null
+++ b/doc/html/ru/Changing Passwords and Keyfiles.html
@@ -0,0 +1,56 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Security%20Requirements%20and%20Precautions.html">Требования безопасности и меры предосторожности</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Changing%20Passwords%20and%20Keyfiles.html">Изменение паролей и ключевых файлов</a>
+</p></div>
+
+<div class="wikidoc">
+<h1>Изменение паролей и ключевых файлов</h1>
+<p>Обратите внимание, что в заголовке тома (который зашифрован с помощью ключа заголовка, сформированного из пароля/ключевого файла) содержится мастер-ключ (не путайте с паролем), посредством которого зашифрован том.
+ Если у злоумышленника есть возможность сделать копию вашего тома до того, как изменили пароль и/или ключевые файлы, он может использовать свою копию или фрагмент (старый заголовок) тома VeraCrypt, чтобы смонтировать ваш том, используя скомпрометированный пароль и/или скомпрометированные ключевые файлы, которые требовались для монтирования тома
+ до изменения пароля и/или ключевых файлов.<br>
+<br>
+Если вы не уверены, знает ли злоумышленник ваш пароль (или обладает вашими ключевыми файлами), и что у него нет копии вашего тома, когда вам потребовалось изменить его пароль и/или ключевые файлы, то настоятельно рекомендуется создать новый том VeraCrypt и переместить в него файлы
+ из старого тома (у нового тома будет другой мастер-ключ).<br>
+<br>
+Также учтите, что если злоумышленник знает ваш пароль (или обладает вашими ключевыми файлами) и у него есть доступ к вашему тому, он может получить и сохранить его мастер-ключ. Сделав это, он сможет расшифровать ваш том, даже если вы затем изменили пароль и/или ключевые файлы
+ (потому что мастер-ключ не меняется при смене пароля тома и/или ключевых файлов). В этом случае создайте новый том VeraCrypt и переместите в него все файлы из старого тома.<br>
+<br>
+Следующие разделы этой главы содержат дополнительную информацию о возможных проблемах безопасности, связанных со сменой паролей и/или ключевых файлов:</p>
+<ul>
+<li><a href="Security%20Requirements%20and%20Precautions.html"><em>Требования безопасности и меры предосторожности</em></a>
+</li><li><a href="Journaling%20File%20Systems.html"><em>Журналируемые файловые системы</em></a>
+</li><li><a href="Дефрагментация.html"><em>Дефрагментация</em></a>
+</li><li><a href="Reallocated%20Sectors.html"><em>Перераспределённые сектора</em></a>
+</li></ul>
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/ru/Choosing Passwords and Keyfiles.html b/doc/html/ru/Choosing Passwords and Keyfiles.html
new file mode 100644
index 00000000..ae9080d7
--- /dev/null
+++ b/doc/html/ru/Choosing Passwords and Keyfiles.html
@@ -0,0 +1,60 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Security%20Requirements%20and%20Precautions.html">Требования безопасности и меры предосторожности</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Choosing%20Passwords%20and%20Keyfiles.html">Выбор паролей и ключевых файлов</a>
+</p></div>
+
+<div class="wikidoc">
+<div>
+<h1>Выбор паролей и ключевых файлов</h1>
+<p>Выбрать хороший пароль – это очень важно! Ни в коем случае не используйте пароль из одного слова, которое
+можно найти в каком-нибудь словаре (или сочетание из таких слов). В пароле не должно быть никаких имён, дней рождения,
+номеров телефонов и учётных записей (аккаунтов) и любых других элементов, которые можно угадать. Хороший пароль
+это случайная комбинация из букв в верхнем и нижнем регистрах, цифр и специальных символов, таких как @ ^ = $ * &#43;
+и др. Настоятельно рекомендуется выбирать пароль, состоящий не менее чем из 20 символов (чем длиннее, тем лучше),
+так как короткие пароли несложно взломать методом перебора (brute-force).<br>
+<br>
+Чтобы сделать атаки перебором невозможными, размер ключевого файла должен быть не менее 30 байт. Если для тома
+используется несколько ключевых файлов, хотя бы один из них должен иметь размер 30 байт или больше. Обратите
+внимание, что 30-байтовое ограничение предполагает большой объём энтропии в ключевом файле. Если первые 1024 килобайта
+файла содержат лишь небольшой объём энтропии, такой файл нельзя использовать как ключевой (вне зависимости от
+размера файла). Если вы не понимаете, что такое энтропия, рекомендуем доверить VeraCrypt создание файла со
+случайным содержимым и использовать этот файл как ключевой (выберите <em>Сервис &gt; Генератор ключевых файлов</em>).</p>
+<p>При создании тома, шифровании системного раздела/диска или изменении паролей/ключевых файлов нельзя позволять
+никому другому выбирать или изменять пароли/ключевые файлы до тех пор, пока не будет создан том или изменены
+пароль/ключевые файлы. Например, нельзя использовать никакие генераторы паролей (будь то приложения в Интернете
+или программы у вас в компьютере), если вы не уверены в их высоком качестве и в том, что они не подконтрольны
+неприятелю, а в качестве ключевых файлов нельзя использовать файлы, загруженные из Интернета, или которые
+доступны другим пользователям данного компьютера (неважно, администраторы они или нет).</p>
+</div>
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/ru/Command Line Usage.html b/doc/html/ru/Command Line Usage.html
new file mode 100644
index 00000000..e0d41dfa
--- /dev/null
+++ b/doc/html/ru/Command Line Usage.html
@@ -0,0 +1,325 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Command%20Line%20Usage.html">Использование в режиме командной строки</a>
+</p></div>
+
+<div class="wikidoc">
+<div>
+<h1>Использование в режиме командной строки</h1>
+<p>Информация в этом разделе относится к версии VeraCrypt для Windows. Чтобы получить сведения об использовании в режиме командной строки
+<strong>версий для Linux и Mac OS X</strong>, выполните следующую команду: <code>veracrypt -h</code></p>
+<table border="1" cellspacing="0" cellpadding="1">
+<tbody>
+<tr>
+<td>&nbsp;<em>/help</em> или <em>/?</em></td>
+<td>Показать справку по использованию в командной строке.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/truecrypt</em> или <em>/tc</em></td>
+<td>Активировать режим совместимости с TrueCrypt, который позволяет монтировать тома, созданные в TrueCrypt версий 6.x и 7.x.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/hash</em></td>
+<td>После этого ключа указывается хеш-алгоритм PRF, используемый при монтировании тома. Возможные значения ключа /hash: <code>sha256, sha-256, sha512, sha-512, whirlpool, blake2s</code> и <code>blake2s-256</code>. Если ключ <code>/hash</code> не указан, VeraCrypt будет пробовать
+ все доступные PRF-алгоритмы, тем самым увеличивая время монтирования.</td>
+</tr>
+<tr>
+<td id="volume">&nbsp;<em>/volume</em> или <em>/v</em></td>
+<td>
+<p>После этого ключа указывается полное имя (с путём) файла с томом VeraCrypt для монтирования (не используйте при размонтировании) или идентификатор тома (Volume ID) диска/раздела для монтирования.<br>
+Синтаксис идентификатора тома следующий: <code>ID:XXXXXX...XX</code>, где часть с XX это строка из 64 шестнадцатеричных символов, которая представляет собой 32-байтовый идентификатор тома для монтирования.<br>
+<br>
+Чтобы смонтировать том на основе раздела/устройства, используйте, например, параметры <code>/v \Device\Harddisk1\Partition3</code> (узнать путь к разделу/устройству можно, запустив VeraCrypt и нажав кнопку
+<em>Выбрать устройство</em>). Монтировать раздел или динамический том также можно используя его имя тома (например, <code>/v \\?\Volume{5cceb196-48bf-46ab-ad00-70965512253a}\</code>). Узнать имя тома можно, например, с помощью mountvol.exe. Также помните, что в путях устройств учитывается регистр букв.<br>
+<br>
+Для монтирования также можно указывать идентификатор монтируемого тома (Volume ID) на основе раздела/устройства, например: <code>/v ID:53B9A8D59CC84264004DA8728FC8F3E2EE6C130145ABD3835695C29FD601EDCA</code>. Значение идентификатора тома можно получить с помощью диалогового окна свойств тома.</p>
+</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/letter</em> или <em>/l</em></td>
+<td>После этого ключа указывается буква диска, присваиваемая монтируемому тому. Если ключ <code>/l</code> не указан и используется ключ <code>/a</code>, тогда тому присваивается первая незанятая буква диска.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/explore</em> или <em>/e</em></td>
+<td>Открыть окно Проводника после монтирования тома.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/beep</em> или <em>/b</em></td>
+<td>Звуковой сигнал после успешного монтирования или размонтирования.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/auto</em> или <em>/a</em></td>
+<td>Если этот ключ указан без параметров, то выполняется автоматическое монтирование тома. Если указан параметр <code>devices</code> (например, <code>/a devices</code>), то выполняется автомонтирование всех доступных в данный момент томов VeraCrypt на основе устройств/разделов. Если указан параметр <code>favorites</code>, то выполняется автомонтирование
+ избранных томов. Обратите внимание, что ключ <code>/auto</code> подразумевается, если указаны ключи <code>/quit</code> и <code>/volume</code>. Если требуется подавить вывод на экран окна программы, используйте ключ <code>/quit</code>.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/unmount</em> или <em>/d</em></td>
+<td>Размонтировать том с указанной буквой диска (пример: <code>/d x</code>). Если буква диска не указана, то будут размонтированы все смонтированные на данный момент тома VeraCrypt.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/force</em> или <em>/f</em></td>
+<td>Принудительно размонтировать (если размонтируемый том содержит файлы, используемые системой или какой-либо программой) и принудительно смонтировать в совместно используемом (shared) режиме (то есть без эксклюзивного доступа).</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/keyfile</em> или <em>/k</em></td>
+<td>После этого ключа указывается ключевой файл или путь поиска ключевых файлов. Если ключевых файлов несколько, то они указываются, например, так: <code>/k c:\keyfile1.dat /k d:\KeyfileFolder /k c:\kf2</code>. Чтобы указать ключевой файл, находящийся на токене безопасности или смарт-карте, используйте следующий синтаксис:
+<code>token://slot/SLOT_NUMBER/file/FILE_NAME</code></td>
+</tr>
+<tr id="tryemptypass">
+<td>&nbsp;<em>/tryemptypass&nbsp;&nbsp; </em></td>
+<td>Этот ключ применяется, <em>только</em> если сконфигурирован ключевой файл по умолчанию или ключевой файл указан в командной строке.<br>
+Если после этого ключа указан параметр <strong>y</strong> или <strong>yes</strong>, либо параметр не указан: попытаться смонтировать, используя пустой пароль и ключевой файл, прежде чем показать запрос пароля.<br>
+Если после этого ключа указан параметр <strong>n</strong> или <strong>no</strong>: не пытаться смонтировать, используя пустой пароль и ключевой файл, и сразу показать запрос пароля.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/nowaitdlg</em></td>
+<td>Если после этого ключа указан параметр <strong>y</strong> или <strong>yes</strong>, либо параметр не указан: не показывать окно ожидания при выполнении таких операций, как, например, монтирование томов.<br>
+Если после этого ключа указан параметр <strong>n</strong> или <strong>no</strong>: принудительно показывать окно ожидания при выполнении операций.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/secureDesktop</em></td>
+<td>Если после этого ключа указан параметр <strong>y</strong> или <strong>yes</strong>, либо параметр не указан: показывать окно пароля и окно пин-кода токена на выделенном безопасном рабочем столе для защиты от определённых типов атак.<br>
+Если после этого ключа указан параметр <strong>n</strong> или <strong>no</strong>: окно пароля и окно PIN-кода токена отображаются на обычном рабочем столе.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/tokenlib</em></td>
+<td>После этого ключа указывается библиотека PKCS #11 для токенов безопасности и смарт-карт (пример: <code>/tokenlib c:\pkcs11lib.dll</code>).</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/tokenpin</em></td>
+<td>После этого ключа указывается пин-код для аутентификации с помощью токена безопасности или смарт-карты (пример: <code>/tokenpin 0000</code>).
+ ВНИМАНИЕ: Этот метод ввода пин-кода смарт-карты может быть небезопасным, например, когда незашифрованный журнал истории командной строки сохраняется на незашифрованном диске.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/cache</em> или <em>/c</em></td>
+<td>Если после этого ключа указан параметр <strong>y</strong> или <strong>yes</strong>, либо параметр не указан: включить кэш паролей.
+<br>
+Если после этого ключа указан параметр <strong>p</strong> или <strong>pim</strong>: включить кэш паролей и PIM (пример: <code>/c p</code>).<br>
+Если после этого ключа указан параметр <strong>n</strong> или <strong>no</strong>: отключить кэш паролей (пример: <code>/c n</code>).<br>
+Если после этого ключа указан параметр <strong>f</strong> или <strong>favorites</strong>: временно кэшировать пароль при монтировании нескольких избранных томов (пример: <code>/c f</code>).<br>
+Обратите внимание, что отключение кэша паролей не очищает его (чтобы очистить кэш паролей, используйте ключ <code>/w</code>).</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/history</em> или <em>/h</em></td>
+<td>Если после этого ключа указан параметр <strong>y</strong> или параметр не указан: включить сохранение истории смонтированных томов.<br>
+Если после этого ключа указан параметр <strong>n</strong>: отключить сохранение истории смонтированных томов (пример: <code>/h n</code>).</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/wipecache</em> или <em>/w</em></td>
+<td>Удалить все пароли, кэшированные (сохранённые) в памяти драйвера.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/password</em> или <em>/p</em></td>
+<td>После этого ключа указывается пароль тома. Если в пароле есть пробелы, его необходимо заключить в двойные кавычки (пример: <code>/p &rdquo;My Password&rdquo;</code>). Чтобы указать пустой пароль, используйте ключ <code>/p &rdquo;&rdquo;</code>.
+<em>ВНИМАНИЕ: Такой метод ввода пароля может быть небезопасен, например, если на незашифрованном диске записывается незашифрованная история операций в командной строке.</em></td>
+</tr>
+<tr>
+<td>&nbsp;<em>/pim</em></td>
+<td>После этого ключа указывается положительное целое число, определяющее PIM (Персональный множитель итераций) для использования с этим томом.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/quit</em> или <em>/q</em></td>
+<td>Автоматически выполнить запрошенные действия и выйти (без отображения главного окна VeraCrypt). Если в качестве параметра указано <code>preferences</code> (пример: <code>/q preferences</code>), то будут загружены/сохранены настройки программы, и они переопределят параметры, указанные в командной строке.
+Ключ <code>/q background</code> запускает VeraCrypt в фоновом режиме (значок в области уведомлений), если только это не запрещено в настройках.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/silent</em> или <em>/s</em></td>
+<td>При указании вместе с ключом <code>/q</code> подавляет взаимодействие с пользователем (запросы, сообщения об ошибках, предупреждения и т. д.). Если ключ <code>/q</code> не указан, этот параметр никакого действия не оказывает.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/mountoption</em> или <em>/m</em></td>
+<td>
+<p>После этого ключа указывается один из перечисленных ниже параметров.</p>
+<p><strong>ro</strong> или <strong>readonly</strong>: смонтировать том как доступный только для чтения.</p>
+<p><strong>rm</strong> или <strong>removable</strong>: смонтировать том как сменный носитель (см. раздел
+<a href="Removable%20Medium%20Volume.html">
+<em>Том, смонтированный как сменный носитель</em></a>).</p>
+<p><strong>ts</strong> или <strong>timestamp</strong>: не сохранять дату и время изменения контейнера.</p>
+<p><strong>sm</strong> или <strong>system</strong>: смонтировать без предзагрузочной аутентификации раздел, входящий в область действия шифрования системы (например, раздел на зашифрованном системном диске с другой операционной системой, которая в данный момент не выполняется).
+ Полезно, например, для операций резервного копирования или починки. Примечание: если вы указываете пароль как параметр ключа /p, убедитесь, что пароль набран с использованием стандартной американской раскладки клавиатуры (при использовании графического интерфейса программы это делается автоматически). Это необходимо потому,
+ что пароль требуется вводить на этапе до загрузки операционной системы (до запуска Windows), когда раскладки клавиатуры, отличные от американской, ещё недоступны.</p>
+<p><strong>bk</strong> или <strong>headerbak</strong>: смонтировать том, используя встроенную резервную копию заголовка. Примечание: встроенная резервная копия заголовка содержится во всех томах, созданных VeraCrypt (эта копия располагается в конце тома).</p>
+<p><strong>recovery</strong>: не проверять контрольные суммы, хранящиеся в заголовке тома. Этот параметр следует использовать только при повреждении заголовка тома и когда такой том невозможно смонтировать даже с параметром headerbak. Пример: /m ro</p>
+<p><strong>label=LabelValue</strong>: использовать указанную строку <strong>LabelValue</strong> как метку смонтированного тома в Проводнике Windows. Максимальная длина
+<strong>LabelValue&nbsp;</strong> – 32 символа для томов NTFS и 11 символов для томов FAT. Например,
+<code>/m label=MyDrive</code> установит для диска в Проводнике метку тома <em>MyDrive</em>.</p>
+<p><strong>noattach</strong>: создать только виртуальное устройство без фактического присоединения смонтированного тома к выбранной букве диска.</p>
+<p>Обратите внимание, что этот ключ может присутствовать в командной строке несколько раз, чтобы указать несколько вариантов монтирования (пример: /m rm /m ts)</p>
+</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/DisableDeviceUpdate</em>&nbsp;</td>
+<td>Отключить периодическую внутреннюю проверку устройств, подключённых к системе, которая используется для обработки избранного, идентифицированного с помощью идентификаторов томов (Volume ID), и заменить её проверками по требованию.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/protectMemory</em>&nbsp;</td>
+<td>Активировать механизм защиты памяти процесса VeraCrypt от доступа со стороны других процессов без прав администратора.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/signalExit</em>&nbsp;</td>
+<td>После этого ключа должен следовать параметр, определяющий имя отправляемого сигнала для разблокирования ожидания команды <a href="https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/waitfor" target="_blank">WAITFOR.EXE</a> при завершении работы VeraCrypt.<br>
+Имя сигнала должно совпадать с указанным в команде WAITFOR.EXE (пример: <code>veracrypt.exe /q /v test.hc /l Z /signal SigName</code> с последующим <code>waitfor.exe SigName</code><br>
+Если <code>/q</code> не указан, этот ключ игнорируется.</td>
+</tr>
+</tbody>
+</table>
+<h4>VeraCrypt Format.exe (Мастер создания томов VeraCrypt):</h4>
+<table border="1" cellspacing="0" cellpadding="0">
+<tbody>
+<tr>
+<td>&nbsp;<em>/create</em></td>
+<td>Создать том на основе файла-контейнера в режиме командной строки. За этим ключом должно следовать имя файла создаваемого контейнера.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/size</em></td>
+<td>
+<p>(Только с ключом /create)<br>
+После этого ключа указывается размер создаваемого файла-контейнера. Если указано просто число без суффикса, то оно обозначает размер в байтах. Если после числа добавить суффикс "K", "M", "G" или "T", то это будет означать размер, соответственно, в килобайтах, мегабайтах, гигабайтах или терабайтах.
+Примеры:</p>
+<ul>
+<li><code>/size 5000000</code>: размер контейнера – 5 000 000 байт</li><li><code>/size 25K</code>: размер контейнера – 25 килобайт</li><li><code>/size 100M</code>: размер контейнера – 100 мегабайт </li><li><code>/size 2G</code>: размер контейнера – 2 гигабайта</li><li><code>/size 1T</code>: размер контейнера – 1 терабайт</li></ul>
+</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/password</em></td>
+<td>(Только с ключом <code>/create</code>)<br>
+После этого ключа указывается пароль к создаваемому тому.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/keyfile</em> или <em>/k</em></td>
+<td>(Только с ключом <code>/create</code>)<br>
+После этого ключа указывается ключевой файл или путь поиска ключевых файлов к создаваемому тому. Чтобы использовать несколько ключевых файлов, укажите, например, такие параметры: <code>/k c:\keyfile1.dat /k d:\KeyfileFolder /k c:\kf2</code>. Чтобы указать ключевой файл, расположенный на токене безопасности или смарт-карте, используйте следующий синтаксис:
+<code>token://slot/SLOT_NUMBER/file/FILE_NAME</code></td>
+</tr>
+<tr>
+<td>&nbsp;<em>/tokenlib</em></td>
+<td>(Только с ключом <code>/create</code>)<br>
+После этого ключа указывается библиотека PKCS #11 для использования с токенами безопасности и смарт-картами (пример: <code>/tokenlib c:\pkcs11lib.dll</code>).</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/tokenpin</em></td>
+<td>(Только с ключом <code>/create</code>)<br>
+После этого ключа указывается пин-код для аутентификации с помощью токена безопасности или смарт-карты (пример: <code>/tokenpin 0000</code>). ВНИМАНИЕ: Этот метод
+ввода пин-кода смарт-карты может быть небезопасным, например, когда незашифрованный журнал истории командной строки сохраняется на незашифрованном диске.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/hash</em></td>
+<td>(Только с ключом <code>/create</code>)<br>
+После этого ключа указывается хеш-алгоритм PRF, используемый при создании тома. Синтаксис такой же, как у VeraCrypt.exe.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/encryption</em></td>
+<td>(Только с ключом <code>/create</code>)<br>
+После этого ключа указывается используемый алгоритм шифрования. По умолчанию это AES, если данный ключ не указан. Возможны следующие значения (регистр букв не учитывается):
+<ul>
+<li><code>AES </li><li>Serpent </li><li>Twofish </li><li>Camellia </li><li>Kuznyechik </li><li>AES(Twofish) </li><li>AES(Twofish(Serpent)) </li><li>Serpent(AES) </li><li>Serpent(Twofish(AES)) </li><li>Twofish(Serpent) </li>
+<li>Camellia(Kuznyechik) </li>
+<li>Kuznyechik(Twofish) </li>
+<li>Camellia(Serpent) </li>
+<li>Kuznyechik(AES) </li>
+<li>Kuznyechik(Serpent(Camellia))</code></li>
+</ul>
+</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/filesystem</em></td>
+<td>(Только с ключом <code>/create</code>)<br>
+После этого ключа указывается файловая система для использования в томе. Возможны следующие значения:
+<ul>
+<li>Значение не указано: не использовать никакую файловую систему</li><li>FAT: форматировать в FAT/FAT32 </li><li>NTFS: форматировать в NTFS (в этом случае появится окно с запросом UAC, если только процесс не выполняется с полными правами администратора)
+</li>
+<li>ExFAT: форматировать в ExFAT (этот ключ доступен начиная с Windows Vista SP1)</li>
+<li>ReFS: форматировать в ReFS (этот ключ доступен начиная с Windows 10)</li>
+</ul>
+</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/dynamic</em></td>
+<td>(Только с ключом <code>/create</code>)<br>
+Создать динамический том.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/force</em></td>
+<td>(Только с ключом <code>/create</code>)<br>
+Принудительная перезапись без запроса.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/silent</em></td>
+<td>(Только с ключом <code>/create</code>)<br>
+Не показывать окна с сообщениями. Если произойдёт какая-либо ошибка, операция завершится без сообщений.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/noisocheck</em> или <em>/n</em></td>
+<td>Не проверять правильность записи на носители дисков восстановления VeraCrypt (Rescue Disk). <strong>ВНИМАНИЕ</strong>: Никогда не пытайтесь применять этот ключ, чтобы облегчить повторное использование ранее созданного Диска восстановления VeraCrypt. Помните, что при каждом шифровании системного раздела/диска
+ нужно создавать новый Диск восстановления VeraCrypt, даже если используете тот же пароль. Ранее созданный Диск восстановления нельзя использовать повторно, так как он был создан для другого мастер-ключа.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/nosizecheck</em></td>
+<td>Не проверять Не проверять, что заданный размер файлового контейнера меньше, чем доступно на места на диске. Это относится как к пользовательскому интерфейсу, так и к командной строке.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/quick</em></td>
+<td>Выполнять быстрое форматирование томов вместо полного форматирования. Это относится как к пользовательскому интерфейсу, так и к командной строке.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/FastCreateFile</em></td>
+<td>Использовать более быстрый, хотя и потенциально небезопасный метод создания файловых контейнеров. Эта опция сопряжена с риском для безопасности, поскольку способна встроить существующее содержимое диска в файловый контейнер, что может привести к раскрытию конфиденциальных данных, если злоумышленник получит к нему доступ. Обратите внимание, что этот ключ влияет на все методы создания файловых контейнеров, независимо от того, запущены ли они из командной строки с параметром <em>/create</em> или с помощью мастера из интерфейса пользователя.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/protectMemory</em>&nbsp;</td>
+<td>Активировать механизм защиты памяти процесса VeraCrypt Format от доступа со стороны других процессов без прав администратора.</td>
+</tr>
+<tr>
+<td>&nbsp;<em>/secureDesktop</em></td>
+<td>Если после этого ключа указан параметр <strong>y</strong> или <strong>yes</strong>, либо параметр не указан: показывать окно пароля и окно PIN-кода токена на выделенном безопасном рабочем столе для защиты от определённых типов атак.<br>
+Если после этого ключа указан параметр <strong>n</strong> или <strong>no</strong>: окно пароля и окно PIN-кода токена отображаются на обычном рабочем столе.</td>
+</tr>
+</tbody>
+</table>
+<h4>Синтаксис</h4>
+<p><code>VeraCrypt.exe [/tc] [/hash {sha256|sha-256|sha512|sha-512|whirlpool |blake2s|blake2s-256}][/a [devices|favorites]] [/b] [/c [y|n|f]] [/d [буква диска]] [/e] [/f] [/h [y|n]] [/k ключевой файл или путь поиска] [tryemptypass [y|n]] [/l буква диска] [/m {bk|rm|recovery|ro|sm|ts|noattach}]
+ [/p пароль] [/pim значение pim] [/q [background|preferences]] [/s] [/tokenlib путь] [/v том] [/w]</code></p>
+<p><code>&quot;VeraCrypt Format.exe&quot; [/n] [/create] [/size число[{K|M|G|T}]] [/p пароль]&nbsp; [/encryption {AES | Serpent | Twofish | Camellia | Kuznyechik | AES(Twofish) | AES(Twofish(Serpent)) | Serpent(AES) | Serpent(Twofish(AES)) | Twofish(Serpent) | Camellia(Kuznyechik) | Kuznyechik(Twofish) | Camellia(Serpent) | Kuznyechik(AES) | Kuznyechik(Serpent(Camellia))}] [/hash {sha256|sha-256|sha512|sha-512|whirlpool|blake2s|blake2s-256}]
+ [/filesystem {пусто|FAT|NTFS|ExFAT|ReFS}] [/dynamic] [/force] [/silent] [/noisocheck] [FastCreateFile] [/quick]</code></p>
+<p>Порядок, в котором указаны параметры, не имеет значения.</p>
+<h4>Примеры</h4>
+<p>Смонтировать том <em>d:\myvolume</em> на первую свободную букву диска, используя запрос пароля (основное окно программы не отображается):</p>
+<p><code>veracrypt /q /v d:\myvolume</code></p>
+<p>Размонтировать том, смонтированный как диск <em>X</em> (основное окно программы не отображается):</p>
+<p><code>veracrypt /q /d x</code></p>
+<p>Смонтировать том с именем <em>myvolume.tc</em>, используя пароль <em>MyPassword</em>, как диск
+<em>X</em>. VeraCrypt откроет окно Проводника и подаст звуковой сигнал; монтирование будет автоматическим:</p>
+<p><code>veracrypt /v myvolume.tc /l x /a /p MyPassword /e /b</code></p>
+<p>Создать файловый контейнер размером 10 МБ, используя пароль <em>test</em>, шифрование Serpent, хеш SHA-512, и отформатировав том в FAT:</p>
+<p><code>&quot;C:\Program Files\VeraCrypt\VeraCrypt Format.exe&quot; /create c:\Data\test.hc /password test /hash sha512 /encryption serpent /filesystem FAT /size 10M /force</code></p>
+</div>
+</div><div class="ClearBoth"></div></body></html>
diff --git a/doc/html/ru/CompilingGuidelineLinux.html b/doc/html/ru/CompilingGuidelineLinux.html
new file mode 100644
index 00000000..20d9579c
--- /dev/null
+++ b/doc/html/ru/CompilingGuidelineLinux.html
@@ -0,0 +1,314 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+
+<style>
+.textbox {
+ vertical-align: top;
+ height: auto !important;
+ font-family: Helvetica,sans-serif;
+ font-size: 20px;
+ font-weight: bold;
+ margin: 10px;
+ padding: 10px;
+ background-color: white;
+ width: auto;
+ border-radius: 10px;
+}
+
+.texttohide {
+ font-family: Helvetica,sans-serif;
+ font-size: 14px;
+ font-weight: normal;
+}
+
+
+</style>
+
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Technical%20Details.html">Технические подробности</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="CompilingGuidelines.html">Сборка VeraCrypt из исходного кода</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="CompilingGuidelineLinux.html">Руководство по сборке в Linux</a>
+</p></div>
+
+<div class="wikidoc">
+В этом руководстве описано, как настроить систему Linux для сборки программы VeraCrypt из исходных кодов и как выполнить компиляцию. <br>
+Здесь как пример приведена процедура для Ubuntu 22.04 LTS, процедуры для других версий Linux аналогичны.
+</div>
+
+<div class="wikidoc">
+<br>
+<br>
+Для компиляции VeraCrypt необходимы следующие компоненты:
+<ol>
+ <li>GNU Make</li>
+ <li>GNU C/C++ Compiler</li>
+ <li>YASM 1.3.0</li>
+ <li>pkg-config</li>
+ <li>Общая библиотека wxWidgets 3.x и заголовочные файлы, установленные системой, либо исходный код библиотеки wxWidgets 3.x</li>
+ <li>Библиотека FUSE и заголовочные файлы</li>
+ <li>Библиотека PCSC-lite и заголовочные файлы</li>
+</ol>
+</div>
+
+<div class="wikidoc">
+<p>Ниже приведены шаги процедуры. Нажав на любую ссылку, вы сразу перейдёте к соответствующему шагу:
+<ul>
+<li><strong><a href="#InstallationOfGNUMake">Установка GNU Make</a></li></strong>
+<li><strong><a href="#InstallationOfGNUCompiler">Установка GNU C/C++ Compiler</a></li></strong>
+<li><strong><a href="#InstallationOfYASM">Установка YASM</a></li></strong>
+<li><strong><a href="#InstallationOfPKGConfig">Установка pkg-config</a></li></strong>
+<li><strong><a href="#InstallationOfwxWidgets">Установка wxWidgets 3.2</a></li></strong>
+<li><strong><a href="#InstallationOfFuse">Установка libfuse</a></li></strong>
+<li><strong><a href="#InstallationOfPCSCLite">Установка libpcsclite</a></li></strong>
+<li><strong><a href="#DownloadVeraCrypt">Загрузка VeraCrypt</a></li></strong>
+<li><strong><a href="#CompileVeraCrypt">Компиляция VeraCrypt</a></li></strong>
+</ul>
+</p>
+<p>Их также можно выполнить, запустив приведённый ниже список команд в терминале или скопировав их в скрипт:<br>
+<code>
+sudo apt update <br>
+sudo apt install -y build-essential yasm pkg-config libwxgtk3.0-gtk3-dev <br>
+sudo apt install -y libfuse-dev git libpcsclite-dev <br>
+git clone https://github.com/veracrypt/VeraCrypt.git <br>
+cd ~/VeraCrypt/src <br>
+make
+</code>
+</p>
+</div>
+
+<div class="wikidoc">
+ <div class="textbox" id="InstallationOfGNUMake">
+ <a href="#InstallationOfGNUMake">Установка GNU Make</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Откройте терминал.
+ </li>
+ <li>
+ Выполните следующие команды: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install build-essential
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfGNUCompiler">
+ <a href="#InstallationOfGNUCompiler">Установка GNU C/C++ Compiler</a>
+ <div class="texttohide">
+ <p> Если build-essential уже был установлен на предыдущем шаге, этот шаг можно пропустить.
+ <ol>
+ <li>
+ Откройте терминал.
+ </li>
+ <li>
+ Выполните следующие команды: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install build-essential
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfYASM">
+ <a href="#InstallationOfYASM">Установка YASM</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Откройте терминал.
+ </li>
+ <li>
+ Выполните следующие команды: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install yasm
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfPKGConfig">
+ <a href="#InstallationOfPKGConfig">Установка pkg-config</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Откройте терминал.
+ </li>
+ <li>
+ Выполните следующие команды: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install pkg-config
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfwxWidgets">
+ <a href="#InstallationOfwxWidgets">Установка wxWidgets 3.2</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Откройте терминал.
+ </li>
+ <li>
+ Выполните следующие команды: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install libwxgtk3.0-gtk3-dev <br>
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="InstallationOfFuse">
+ <a href="#InstallationOfFuse">Установка libfuse</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Откройте терминал.
+ </li>
+ <li>
+ Выполните следующие команды: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install libfuse-dev
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+<div class="textbox" id="InstallationOfPCSCLite">
+ <a href="#InstallationOfPCSCLite">Установка libpcsclite</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Откройте терминал.
+ </li>
+ <li>
+ Выполните следующие команды: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install libpcsclite-dev
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+</div>
+
+ <div class="textbox" id="DownloadVeraCrypt">
+ <a href="#DownloadVeraCrypt">Загрузка VeraCrypt</a>
+ <div class="texttohide">
+ <p>
+ <ol>
+ <li>
+ Откройте терминал.
+ </li>
+ <li>
+ Выполните следующие команды: <br>
+ <code>
+ sudo apt update <br>
+ sudo apt install git <br>
+ git clone https://github.com/veracrypt/VeraCrypt.git
+ </code>
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+ <div class="textbox" id="CompileVeraCrypt">
+ <a href="#CompileVeraCrypt">Компиляция VeraCrypt</a>
+ <div class="texttohide">
+ <p> Примечания: <br>
+ <ul>
+ <li>
+ По умолчанию создаётся универсальный исполняемый файл, поддерживающий как графический, так и текстовый пользовательский интерфейс (через ключ --text). <br>
+ В Linux исполняемый файл только для консоли, для которого не требуется библиотека графического интерфейса, может быть создан с использованием параметра "NOGUI". <br>
+ Для этого нужно загрузить исходники wxWidgets, извлечь их в любое место по вашему выбору, а затем выполнить следующие команды: <br>
+ <code>
+ make NOGUI=1 WXSTATIC=1 WX_ROOT=/path/to/wxWidgetsSources wxbuild <br>
+ make NOGUI=1 WXSTATIC=1 WX_ROOT=/path/to/wxWidgetsSources
+ </code>
+ </li>
+ <li>
+ Если вы не используете системную библиотеку wxWidgets, то придётся загрузить и использовать исходники wxWidgets, как указано выше, но на этот раз необходимо выполнить следующие команды для сборки версии VeraCrypt с графическим интерфейсом (NOGUI не указан): <br>
+ <code>
+ make WXSTATIC=1 WX_ROOT=/path/to/wxWidgetsSources wxbuild <br>
+ make WXSTATIC=1 WX_ROOT=/path/to/wxWidgetsSources
+ </code>
+ </li>
+ </ul>
+ Шаги:
+ <ol>
+ <li>
+ Откройте терминал.
+ </li>
+ <li>
+ Выполните следующие команды: <br>
+ <code>
+ cd ~/VeraCrypt/src <br>
+ make
+ </code>
+ </li>
+ <li>
+ Если всё прошло нормально, исполняемый файл VeraCrypt должен находиться в каталоге "Main".
+ </li>
+ </ol>
+ </p>
+ </div>
+ </div>
+
+</div>
+</body></html>
diff --git a/doc/html/ru/CompilingGuidelineWin.html b/doc/html/ru/CompilingGuidelineWin.html
new file mode 100644
index 00000000..ef17b265
--- /dev/null
+++ b/doc/html/ru/CompilingGuidelineWin.html
@@ -0,0 +1,1224 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+
+<style>
+.textbox {
+ vertical-align: top;
+ height: auto !important;
+ font-family: Helvetica,sans-serif;
+ font-size: 20px;
+ font-weight: bold;
+ margin: 10px;
+ padding: 10px;
+ background-color: white;
+ width: auto;
+ border-radius: 10px;
+}
+
+.texttohide {
+ font-family: Helvetica,sans-serif;
+ font-size: 14px;
+ font-weight: normal;
+}
+
+
+</style>
+
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
+<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
+<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
+<link href="styles.css" rel="stylesheet" type="text/css" />
+</head>
+<body>
+
+<div>
+<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
+</div>
+
+<div id="menu">
+ <ul>
+ <li><a href="Home.html">Начало</a></li>
+ <li><a href="/code/">Исходный код</a></li>
+ <li><a href="Downloads.html">Загрузить</a></li>
+ <li><a class="active" href="Documentation.html">Документация</a></li>
+ <li><a href="Donation.html">Поддержать разработку</a></li>
+ <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
+ </ul>
+</div>
+
+<div>
+<p>
+<a href="Documentation.html">Документация</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="Technical%20Details.html">Технические подробности</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="CompilingGuidelines.html">Сборка VeraCrypt из исходного кода</a>
+<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
+<a href="CompilingGuidelineWin.html">Руководство по сборке в Windows</a>
+</p></div>
+
+<div class="wikidoc">
+В этом руководстве описано, как настроить систему Windows для компилирования VeraCrypt и как cкомпилировать программу.<br>
+Здесь как пример приведена процедура для Windows 10, процедуры для других версий Windows аналогичны.
+</div>
+
+<div class="wikidoc">
+Для компиляции VeraCrypt необходимы следующие компоненты:
+
+<ol>
+ <li>Microsoft Visual Studio 2010</li>
+ <li>Microsoft Visual Studio 2010 Service Pack 1</li>
+ <li>NASM</li>
+ <li>YASM</li>
+ <li>Visual C++ 1.52</li>
+ <li>Windows SDK 7.1</li>
+ <li>Windows Driver Kit 7.1</li>
+ <li>Windows 8.1 SDK</li>
+ <li>gzip</li>
+ <li>UPX</li>
+ <li>7-Zip</li>
+ <li>WiX3</li>
+ <li>Microsoft Visual Studio 2019</li>
+ <li>Windows 10 SDK</li>
+ <li>Windows Driver Kit 1903</li>
+ <li>Средства сборки Visual Studio</li>
+
+</ol>
+
+</div>
+
+<div class="wikidoc">
+Ниже приведены шаги процедуры. Нажав на любую ссылку, вы сразу перейдёте к соответствующему шагу:
+<ul>
+<li><strong><a href="#InstallationOfMicrosoftVisualStudio2010">Установка Microsoft Visual Studio 2010</a></li></strong>
+<li><strong><a href="#InstallationOfMicrosoftVisualStudio2010ServicePack1">Установка Microsoft Visual Studio 2010 Service Pack 1</a></li></strong>
+<li><strong><a href="#InstallationOfNASM">Установка NASM</a></li></strong>
+<li><strong><a href="#InstallationOfYASM">Установка YASM</a></li></strong>
+<li><strong><a href="#InstallationOfVisualCPP">Установка Microsoft Visual C++ 1.52</a></li></strong>
+<li><strong><a href="#InstallationOfWindowsSDK71PP">Установка Windows SDK 7.1</a></li></strong>
+<li><strong><a href="#InstallationOfWDK71PP">Установка Windows Driver Kit 7.1</a></li></strong>
+<li><strong><a href="#InstallationOfSDK81PP">Установка Windows 8.1 SDK</a></li></strong>
+<li><strong><a href="#InstallationOfGzip">Установка gzip</a></li></strong>
+<li><strong><a href="#InstallationOfUpx">Установка UPX</a></li></strong>
+<li><strong><a href="#InstallationOf7zip">Установка 7-Zip</a></li></strong>
+<li><strong><a href="#InstallationOfWix3">Установка WiX3</a></li></strong>
+<li><strong><a href="#InstallationOfVS2019">Установка Microsoft Visual Studio 2019</a></li></strong>
+<li><strong><a href="#InstallationOfWDK10">Установка Windows Driver Kit 2004</a></li></strong>
+<li><strong><a href="#InstallationOfVisualBuildTools">Установка средств сборки Visual Studio</a></li></strong>
+<li><strong>