VeraCrypt
aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2014-12-30 22:29:42 +0100
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2014-12-30 22:31:37 +0100
commit41c12afefd1bd3917d76bf700befa7d54a1cd4c8 (patch)
tree7570e481dacdc9b601ca75e6062554647a55bba2
parent7c050d681d764f36b0dbb4b15586a97338f1e8a1 (diff)
downloadVeraCrypt-41c12afefd1bd3917d76bf700befa7d54a1cd4c8.tar.gz
VeraCrypt-41c12afefd1bd3917d76bf700befa7d54a1cd4c8.zip
Windows driver: don't fail if the PRF recovered from boot memory is not recognized in case we are dealing with a restored bootloader coming from a version prior to 1.0f.
-rw-r--r--src/Driver/DriveFilter.c7
1 files changed, 0 insertions, 7 deletions
diff --git a/src/Driver/DriveFilter.c b/src/Driver/DriveFilter.c
index e3cb4056..328f348e 100644
--- a/src/Driver/DriveFilter.c
+++ b/src/Driver/DriveFilter.c
@@ -284,13 +284,6 @@ static NTSTATUS MountDrive (DriveFilterExtension *Extension, Password *password,
Hash* pHash = HashGet(pBootCryptoInfo->pkcs5);
if (pHash && pHash->SystemEncryption)
pkcs5_prf = pBootCryptoInfo->pkcs5;
- else
- {
- status = STATUS_UNSUCCESSFUL;
- burn (mappedCryptoInfo, BootArgs.CryptoInfoLength);
- MmUnmapIoSpace (mappedCryptoInfo, BootArgs.CryptoInfoLength);
- goto ret;
- }
}
}