VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Mount
AgeCommit message (Collapse)AuthorFilesLines
2022-02-16Increment version to 1.25.8.2 and update signed Windows driversMounir IDRASSI1-2/+2
2022-02-11Windows: Increment version to 1.25.8.1 and update signed Windows driversMounir IDRASSI1-2/+2
2022-02-10Windows: Reduce the size of installers by almost 50% by using LZMA ↵Mounir IDRASSI2-25/+34
compression instead of DEFLATE
2022-02-10Windows: Make Travel Disk contains 32-bit and arm64 binaries when VeraCrypt ↵Mounir IDRASSI1-89/+91
installed using MSI
2022-02-05Increment version to 1.25.8Mounir IDRASSI1-2/+2
2022-02-02Windows: Fix failure to create Traveler Disk when VeraCrypt is installed ↵Mounir IDRASSI1-59/+129
using MSI
2022-02-01Windows: Make MSI installer compatible with System Encryption by leveraging ↵Mounir IDRASSI1-16/+40
VeraCrypt service capabilities
2022-01-07Increment version to 1.25.7 and update Release NotesMounir IDRASSI1-2/+2
2021-12-27Increment version to 1.25.6. Update Release Notes and add signed Windows driver.Mounir IDRASSI1-2/+2
2021-12-20Increment version to 1.25.5 and update release notesMounir IDRASSI1-2/+2
2021-12-04Windows: Implement TESTSIGNING build configuration that allows running under ↵Mounir IDRASSI1-0/+136
Windows Vista,7, 8 and 8.1.
2021-11-30Increment version to 1.25.4 and set release date to December 3rd 2021Mounir IDRASSI1-2/+2
2021-11-29Windows: Try to workaround Windows Updates issues by fixing of bootloader ↵Mounir IDRASSI1-27/+51
and SetupConfig.ini when session logged in/unlocked or system resumes
2021-11-28Increment version to 1.25 (1.25.3)Mounir IDRASSI1-2/+2
2021-11-21Increment version to 1.25-RC2 and update release notesMounir IDRASSI1-2/+2
2021-09-05Increment version to 1.25-RC1Mounir IDRASSI1-2/+2
2021-08-30Increment version to 1.25Mounir IDRASSI1-4/+4
2021-08-15Windows: Increment version to 1.24.25.3 and update signed Windows driverMounir IDRASSI1-2/+2
2021-08-02Windows: Increment version to 1.24.25.2 and update signed Windows driverMounir IDRASSI1-2/+2
2021-07-14Windows: Copy ARM64 binaries when creating Traveler Disk and when VeraCrypt ↵Mounir IDRASSI1-0/+16
is installed
2021-07-13Windows: replace insecure wcscpy/wcscat/strcpy runtime functions with secure ↵Mounir IDRASSI1-6/+6
equivalents This fixed failure to build driver for ARM64 with latest VS 2019
2021-02-21interface: add keyboard shortcut to "TrueCrypt mode" in the mount dialog (#729)alt3r 3go1-1/+1
I've also updated all the relevant language files. Closes #95. Signed-off-by: alt3r 3go <alt3r.3go@protonmail.com>
2021-01-02Increment version to 1.24-Update9Mounir IDRASSI1-4/+4
2021-01-02Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). ↵Mounir IDRASSI3-0/+847
System encryption still not implemented on ARM64
2020-12-13replicate change of "processors" with "logical processors"Mounir IDRASSI1-1/+1
2020-11-29Increment version to 1.24-Update8Mounir IDRASSI1-4/+4
2020-08-06Increment internal version to 1.24.23 and update release notesMounir IDRASSI1-2/+2
2020-08-06Windows: Fix crash when using portable 32-bit "VeraCrypt ↵Mounir IDRASSI2-18/+18
Format.exe"/"VeraCrypt.exe" on a 64-bit machine where VeraCrypt is already installed
2020-08-06Increment internal version to 1.24.22 and update release notesMounir IDRASSI1-2/+2
2020-08-03Increment internal version to 1.24.21 and update release notesMounir IDRASSI1-2/+2
2020-08-03Windows: Fix issue in UI for configuration autofix mechanism of bootloaderMounir IDRASSI1-29/+24
2020-08-02Windows: Fix UI for blocking TRIM in system encryption not working in MBR ↵Mounir IDRASSI1-5/+8
boot mode
2020-07-22Increment internal version to 1.24.20 and update release notesMounir IDRASSI1-2/+2
2020-07-21Windows: Implement detection of Hibernate and Fast Startup and disable them ↵Mounir IDRASSI1-0/+37
if RAM encryption is activated.
2020-07-08Windows: Add UI options to control the behavior of automatic bootloader ↵Mounir IDRASSI3-22/+119
fixing when System Encryption used.
2020-07-06Windows: Support direct password drag-n-drop from external applications ↵Mounir IDRASSI1-0/+70
(e.g. KeePass) which is more secure than using clipboard.
2020-07-04Increment internal version to 1.24.19Mounir IDRASSI1-2/+2
2020-07-02Windows: Replace GetSystemInfo calls by more reliable function to get number ↵Mounir IDRASSI1-7/+7
of CPUs active on the PC.
2020-06-29Increment internal version to 1.24.18 and update signed Windows drivers.Mounir IDRASSI1-2/+2
2020-06-28Windows: Fix failure to detect suspension of machine that caused mounted ↵Mounir IDRASSI1-12/+47
volume not be dismount even if "Entering power saving mode" is checked in Preferences. This fix implements compatibility with Windows 10 Modern Standby and Windows 8.1 Connected Standby power model.
2020-06-28Windows: remove unused code targeting Windows 2000.Mounir IDRASSI1-14/+6
2020-06-23Increment version to 1.24-Update7Mounir IDRASSI1-4/+4
2020-06-19Windows: remove duplicated function to detect AES-NI support in CPUMounir IDRASSI1-1/+1
2020-03-10Increment version to 1.24-Update6Mounir IDRASSI1-4/+4
2020-03-10Windows: Fix truncation of PIM label in password dialogMounir IDRASSI1-1/+1
2020-03-10Windows: Fix keyfiles path passed as CLI argument and set as default not ↵Mounir IDRASSI1-3/+6
always cleared from RAM when VeraCrypt exits
2020-03-10Windows: Fix text truncation in password dialog with some languagesMounir IDRASSI1-3/+3
2020-02-11Increment version to 1.24-Update5 and update signed Windows drivers.Mounir IDRASSI1-4/+4
2020-02-10Windows: Fix warnings reported by Coverity static code analyzerMounir IDRASSI1-0/+7
2020-01-22Windows: restore Visual Studio solution and project files to default ↵VeraCrypt_1.24-Update4Mounir IDRASSI1-1/+2
configuration
span class="o">*60*100), mm=rest/(60*100), rest%%=60*100, ss=rest/100, cc=rest%%100 if %hh% lss 10 set hh=0%hh% if %mm% lss 10 set mm=0%mm% if %ss% lss 10 set ss=0%ss% if %cc% lss 10 set cc=0%cc% echo SHA-512 (Hidden) = %hh%:%mm%:%ss%,%cc% echo. "c:\Program Files\VeraCrypt\veracrypt.exe" /dismount %mydriveletter% /silent /q :whirlpool IF NOT EXIST test.whirlpool.hc GOTO :sha256 rem Get start time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "start=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Mount Whirlpool container (Normal). "c:\Program Files\VeraCrypt\veracrypt.exe" /volume test.whirlpool.hc /hash whirlpool /l %mydriveletter% /password test /q /silent /m ro rem Get end time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "end=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Get elapsed time: set /A elapsed=end-start rem Show elapsed time: set /A hh=elapsed/(60*60*100), rest=elapsed%%(60*60*100), mm=rest/(60*100), rest%%=60*100, ss=rest/100, cc=rest%%100 if %hh% lss 10 set hh=0%hh% if %mm% lss 10 set mm=0%mm% if %ss% lss 10 set ss=0%ss% if %cc% lss 10 set cc=0%cc% echo Whirlpool (Normal) = %hh%:%mm%:%ss%,%cc% "c:\Program Files\VeraCrypt\veracrypt.exe" /dismount %mydriveletter% /silent /q rem Get start time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "start=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Mount Whirlpool container (Hidden). "c:\Program Files\VeraCrypt\veracrypt.exe" /volume test.whirlpool.hc /hash whirlpool /l %mydriveletter% /password testhidden /q /silent /m ro rem Get end time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "end=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Get elapsed time: set /A elapsed=end-start rem Show elapsed time: set /A hh=elapsed/(60*60*100), rest=elapsed%%(60*60*100), mm=rest/(60*100), rest%%=60*100, ss=rest/100, cc=rest%%100 if %hh% lss 10 set hh=0%hh% if %mm% lss 10 set mm=0%mm% if %ss% lss 10 set ss=0%ss% if %cc% lss 10 set cc=0%cc% echo Whirlpool (Hidden) = %hh%:%mm%:%ss%,%cc% echo. "c:\Program Files\VeraCrypt\veracrypt.exe" /dismount %mydriveletter% /silent /q :sha256 IF NOT EXIST test.sha256.hc GOTO :ripemd160 rem Get start time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "start=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Mount SHA-256 container (Normal) "c:\Program Files\VeraCrypt\veracrypt.exe" /volume test.sha256.hc /hash sha256 /l %mydriveletter% /password test /q /silent /m ro rem Get end time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "end=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Get elapsed time: set /A elapsed=end-start rem Show elapsed time: set /A hh=elapsed/(60*60*100), rest=elapsed%%(60*60*100), mm=rest/(60*100), rest%%=60*100, ss=rest/100, cc=rest%%100 if %hh% lss 10 set hh=0%hh% if %mm% lss 10 set mm=0%mm% if %ss% lss 10 set ss=0%ss% if %cc% lss 10 set cc=0%cc% echo SHA-256 (Normal) = %hh%:%mm%:%ss%,%cc% "c:\Program Files\VeraCrypt\veracrypt.exe" /dismount %mydriveletter% /silent /q rem Get start time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "start=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Mount SHA-256 container (Hidden) "c:\Program Files\VeraCrypt\veracrypt.exe" /volume test.sha256.hc /hash sha256 /l %mydriveletter% /password testhidden /q /silent /m ro rem Get end time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "end=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Get elapsed time: set /A elapsed=end-start rem Show elapsed time: set /A hh=elapsed/(60*60*100), rest=elapsed%%(60*60*100), mm=rest/(60*100), rest%%=60*100, ss=rest/100, cc=rest%%100 if %hh% lss 10 set hh=0%hh% if %mm% lss 10 set mm=0%mm% if %ss% lss 10 set ss=0%ss% if %cc% lss 10 set cc=0%cc% echo SHA-256 (Hidden) = %hh%:%mm%:%ss%,%cc% echo. "c:\Program Files\VeraCrypt\veracrypt.exe" /dismount %mydriveletter% /silent /q :ripemd160 IF NOT EXIST test.ripemd160.hc GOTO :streebog rem Get start time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "start=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Mount RIPEMD-160 container (Normal) "c:\Program Files\VeraCrypt\veracrypt.exe" /volume test.ripemd160.hc /hash ripemd160 /l %mydriveletter% /password test /q /silent /m ro rem Get end time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "end=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Get elapsed time: set /A elapsed=end-start rem Show elapsed time: set /A hh=elapsed/(60*60*100), rest=elapsed%%(60*60*100), mm=rest/(60*100), rest%%=60*100, ss=rest/100, cc=rest%%100 if %hh% lss 10 set hh=0%hh% if %mm% lss 10 set mm=0%mm% if %ss% lss 10 set ss=0%ss% if %cc% lss 10 set cc=0%cc% echo RIPEMD-160 (Normal) = %hh%:%mm%:%ss%,%cc% "c:\Program Files\VeraCrypt\veracrypt.exe" /dismount %mydriveletter% /silent /q rem Get start time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "start=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Mount RIPEMD-160 container (Hidden) "c:\Program Files\VeraCrypt\veracrypt.exe" /volume test.ripemd160.hc /hash ripemd160 /l %mydriveletter% /password testhidden /q /silent /m ro rem Get end time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "end=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Get elapsed time: set /A elapsed=end-start rem Show elapsed time: set /A hh=elapsed/(60*60*100), rest=elapsed%%(60*60*100), mm=rest/(60*100), rest%%=60*100, ss=rest/100, cc=rest%%100 if %hh% lss 10 set hh=0%hh% if %mm% lss 10 set mm=0%mm% if %ss% lss 10 set ss=0%ss% if %cc% lss 10 set cc=0%cc% echo RIPEMD-160 (Hidden) = %hh%:%mm%:%ss%,%cc% echo. "c:\Program Files\VeraCrypt\veracrypt.exe" /dismount %mydriveletter% /silent /q :streebog IF NOT EXIST test.streebog.hc GOTO :autodetect rem Get start time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "start=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Mount Streebog container (Normal) "c:\Program Files\VeraCrypt\veracrypt.exe" /volume test.streebog.hc /hash streebog /l %mydriveletter% /password test /q /silent /m ro rem Get end time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "end=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Get elapsed time: set /A elapsed=end-start rem Show elapsed time: set /A hh=elapsed/(60*60*100), rest=elapsed%%(60*60*100), mm=rest/(60*100), rest%%=60*100, ss=rest/100, cc=rest%%100 if %hh% lss 10 set hh=0%hh% if %mm% lss 10 set mm=0%mm% if %ss% lss 10 set ss=0%ss% if %cc% lss 10 set cc=0%cc% echo Streebog (Normal) = %hh%:%mm%:%ss%,%cc% "c:\Program Files\VeraCrypt\veracrypt.exe" /dismount %mydriveletter% /silent /q rem Get start time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "start=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Mount Streebog container (Hidden) "c:\Program Files\VeraCrypt\veracrypt.exe" /volume test.streebog.hc /hash streebog /l %mydriveletter% /password testhidden /q /silent /m ro rem Get end time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "end=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Get elapsed time: set /A elapsed=end-start rem Show elapsed time: set /A hh=elapsed/(60*60*100), rest=elapsed%%(60*60*100), mm=rest/(60*100), rest%%=60*100, ss=rest/100, cc=rest%%100 if %hh% lss 10 set hh=0%hh% if %mm% lss 10 set mm=0%mm% if %ss% lss 10 set ss=0%ss% if %cc% lss 10 set cc=0%cc% echo Streebog (Hidden) = %hh%:%mm%:%ss%,%cc% echo. "c:\Program Files\VeraCrypt\veracrypt.exe" /dismount %mydriveletter% /silent /q :autodetect call :availablevolume testvolume && goto :contautodetect goto :exit :contautodetect rem Get start time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "start=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Try to mount with a wrong password and PRF autodetection "c:\Program Files\VeraCrypt\veracrypt.exe" /volume %testvolume% /l %mydriveletter% /password wrongpassword /q /silent /m ro rem Get end time: for /F "tokens=1-4 delims=:.," %%a in ("%time%") do ( set /A "end=(((%%a*60)+1%%b %% 100)*60+1%%c %% 100)*100+1%%d %% 100" ) rem Get elapsed time: set /A elapsed=end-start rem Show elapsed time: set /A hh=elapsed/(60*60*100), rest=elapsed%%(60*60*100), mm=rest/(60*100), rest%%=60*100, ss=rest/100, cc=rest%%100 if %hh% lss 10 set hh=0%hh% if %mm% lss 10 set mm=0%mm% if %ss% lss 10 set ss=0%ss% if %cc% lss 10 set cc=0%cc% echo Wrong Password (PRF Auto-detection)= %hh%:%mm%:%ss%,%cc% echo. goto :exit rem Finds a free drive letter. rem rem Parameters: rem %1 = Output variable name. rem rem Example: rem call :freedrive mydriveletter && goto :cont rem echo ERROR: No free drive letter found. rem goto :EOF rem :cont rem echo Found drive letter: %mydriveletter% :freedrive setlocal EnableDelayedExpansion set exitcode=0 set "output_var=%~1" for %%i in (C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y,Z) do ( set "drive=%%i:" rem If 'subst' fails, the drive letter is already in use. rem This way we can even detect optical drives that have a drive rem letter but no media in them, a case that goes undetected when rem using 'if exist'. subst !drive! %SystemDrive%\ >nul if !errorlevel! == 0 ( subst !drive! /d >nul set "drive=%%i" goto :freedrive0 ) ) set exitcode=1 set drive= :freedrive0 endlocal & set "%output_var%=%drive%" & exit /b %exitcode% :availablevolume setlocal EnableDelayedExpansion set exitcode=0 set "output_var=%~1" for %%i in (test.sha512.hc,test.sha256.hc,test.whirlpool.hc,test.ripemd160.hc) do ( if exist %%i ( set "volume=%%i" goto :availablevolume0 ) ) set exitcode=1 set volume= :availablevolume0 endlocal & set "%output_var%=%volume%" & exit /b %exitcode% :exit pause