diff options
author | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2018-04-23 12:56:02 +0200 |
---|---|---|
committer | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2018-04-23 16:59:40 +0200 |
commit | 4f0d1c02bdf4adf56caf48de967c41d2d4d9ff2d (patch) | |
tree | 360d2be90e73133d06037922c6267617ab77d9ff /src/Mount/MainCom.cpp | |
parent | 42e7da2e8aa86eff54667fa1e76a64b1787d68e5 (diff) | |
download | VeraCrypt-4f0d1c02bdf4adf56caf48de967c41d2d4d9ff2d.tar.gz VeraCrypt-4f0d1c02bdf4adf56caf48de967c41d2d4d9ff2d.zip |
Windows: Don't start EFI system encryption process if SecureBoot is enabled and VeraCrypt-DCS custom keys were not loaded in the machine firmware.
Diffstat (limited to 'src/Mount/MainCom.cpp')
-rw-r--r-- | src/Mount/MainCom.cpp | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/src/Mount/MainCom.cpp b/src/Mount/MainCom.cpp index f3ce90b2..a4096707 100644 --- a/src/Mount/MainCom.cpp +++ b/src/Mount/MainCom.cpp @@ -188,6 +188,11 @@ public: return BaseCom::GetEfiBootDeviceNumber (pSdn); } + virtual DWORD STDMETHODCALLTYPE GetSecureBootConfig (BOOL* pSecureBootEnabled, BOOL *pVeraCryptKeysLoaded) + { + return BaseCom::GetSecureBootConfig (pSecureBootEnabled, pVeraCryptKeysLoaded); + } + virtual DWORD STDMETHODCALLTYPE WriteEfiBootSectorUserConfig (DWORD userConfig, BSTR customUserMessage, int pim, int hashAlg) { return BaseCom::WriteEfiBootSectorUserConfig (userConfig, customUserMessage,pim, hashAlg); |