From f6274642f056810c5bf686da9adcea985d302c30 Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Sun, 3 Mar 2019 18:27:56 +0100 Subject: [PATCH] Windows: Update documentation for command line usage --- doc/html/Command Line Usage.html | 19 ++++++++++++++----- 1 file changed, 14 insertions(+), 5 deletions(-) diff --git a/doc/html/Command Line Usage.html b/doc/html/Command Line Usage.html index 61b786a7..29964e6a 100644 --- a/doc/html/Command Line Usage.html +++ b/doc/html/Command Line Usage.html @@ -209,7 +209,13 @@

VeraCrypt Format.exe (VeraCrypt Volume Creation Wizard):

(Only with /create)
It must be followed by a parameter indicating the encryption algorithm to use. The default is AES if this switch is not specified. The parameter can have the following values (case insensitive): +
  • AES
  • Serpent
  • Twofish
  • Camellia
  • Kuznyechik
  • AES(Twofish)
  • AES(Twofish(Serpent))
  • Serpent(AES)
  • Serpent(Twofish(AES))
  • Twofish(Serpent)
  • +
  • Camellia(Kuznyechik)
  • +
  • Kuznyechik(Twofish)
  • +
  • Camellia(Serpent)
  • +
  • Kuznyechik(AES)
  • +
  • Kuznyechik(Serpent(Camellia))
  • + @@ -218,7 +224,10 @@

    VeraCrypt Format.exe (VeraCrypt Volume Creation Wizard):

    It must be followed by a parameter indicating the file system to use for the volume. The parameter can have the following values: + +
  • ExFAT: format using ExFAT. This switch is available starting from Windows Vista SP1
  • +
  • ReFS: format using ReFS. This switch is available starting from Windows 10
  • + @@ -244,10 +253,10 @@

    VeraCrypt Format.exe (VeraCrypt Volume Creation Wizard):

    Syntax

    -

    VeraCrypt.exe [/tc] [/hash {sha256|sha-256|sha512|sha-512|whirlpool |ripemd160|ripemd-160}][/a [devices|favorites]] [/b] [/c [y|n|f]] [/d [drive letter]] [/e] [/f] [/h [y|n]] [/k keyfile or search path] [tryemptypass [y|n]] [/l drive letter] [/m {bk|rm|recovery|ro|sm|ts}] +

    VeraCrypt.exe [/tc] [/hash {sha256|sha-256|sha512|sha-512|whirlpool |ripemd160|ripemd-160}][/a [devices|favorites]] [/b] [/c [y|n|f]] [/d [drive letter]] [/e] [/f] [/h [y|n]] [/k keyfile or search path] [tryemptypass [y|n]] [/l drive letter] [/m {bk|rm|recovery|ro|sm|ts|noattach}] [/p password] [/pim pimvalue] [/q [background|preferences]] [/s] [/tokenlib path] [/v volume] [/w]

    -

    "VeraCrypt Format.exe" [/n] [/create] [/size number[{K|M|G|T}]] [/p password]  [/encryption {AES | Serpent | Twofish | AES(Twofish) | AES(Twofish(Serpent)) | Serpent(AES) | Serpent(Twofish(AES)) | Twofish(Serpent)}] [/hash {sha256|sha-256|sha512|sha-512|whirlpool|ripemd160|ripemd-160}] - [/filesystem {None|FAT|NTFS}] [/dynamic] [/force] [/silent]

    +

    "VeraCrypt Format.exe" [/n] [/create] [/size number[{K|M|G|T}]] [/p password]  [/encryption {AES | Serpent | Twofish | Camellia | Kuznyechik | AES(Twofish) | AES(Twofish(Serpent)) | Serpent(AES) | Serpent(Twofish(AES)) | Twofish(Serpent) | Camellia(Kuznyechik) | Kuznyechik(Twofish) | Camellia(Serpent) | Kuznyechik(AES) | Kuznyechik(Serpent(Camellia))}] [/hash {sha256|sha-256|sha512|sha-512|whirlpool|ripemd160|ripemd-160}] + [/filesystem {None|FAT|NTFS|ExFAT|ReFS}] [/dynamic] [/force] [/silent]

    Note that the order in which options are specified does not matter.

    Examples

    Mount the volume d:\myvolume as the first free drive letter, using the password prompt (the main program window will not be displayed):