diff options
author | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2014-12-30 22:29:42 +0100 |
---|---|---|
committer | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2014-12-30 22:31:37 +0100 |
commit | 41c12afefd1bd3917d76bf700befa7d54a1cd4c8 (patch) | |
tree | 7570e481dacdc9b601ca75e6062554647a55bba2 | |
parent | 7c050d681d764f36b0dbb4b15586a97338f1e8a1 (diff) | |
download | VeraCrypt-41c12afefd1bd3917d76bf700befa7d54a1cd4c8.tar.gz VeraCrypt-41c12afefd1bd3917d76bf700befa7d54a1cd4c8.zip |
Windows driver: don't fail if the PRF recovered from boot memory is not recognized in case we are dealing with a restored bootloader coming from a version prior to 1.0f.
-rw-r--r-- | src/Driver/DriveFilter.c | 7 |
1 files changed, 0 insertions, 7 deletions
diff --git a/src/Driver/DriveFilter.c b/src/Driver/DriveFilter.c index e3cb4056..328f348e 100644 --- a/src/Driver/DriveFilter.c +++ b/src/Driver/DriveFilter.c @@ -284,13 +284,6 @@ static NTSTATUS MountDrive (DriveFilterExtension *Extension, Password *password, Hash* pHash = HashGet(pBootCryptoInfo->pkcs5);
if (pHash && pHash->SystemEncryption)
pkcs5_prf = pBootCryptoInfo->pkcs5;
- else
- {
- status = STATUS_UNSUCCESSFUL;
- burn (mappedCryptoInfo, BootArgs.CryptoInfoLength);
- MmUnmapIoSpace (mappedCryptoInfo, BootArgs.CryptoInfoLength);
- goto ret;
- }
}
}
|