VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Boot/Windows/BootMain.cpp
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2016-01-29 00:35:26 +0100
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2016-01-29 00:50:27 +0100
commit926721d54ebc69963b8036cfcdcb1a7e8d319503 (patch)
tree5e363dabfa27c6f3d6b7d3230a0d53ee0ca99945 /src/Boot/Windows/BootMain.cpp
parent24b2dfc0d54befee3744cfe2a4b6246de8563584 (diff)
downloadVeraCrypt-926721d54ebc69963b8036cfcdcb1a7e8d319503.tar.gz
VeraCrypt-926721d54ebc69963b8036cfcdcb1a7e8d319503.zip
Windows Bootloader: Always hide password/PIM values with '*' after ENTER is hit, even if F5 was pressed to display password/PIM.
Diffstat (limited to 'src/Boot/Windows/BootMain.cpp')
-rw-r--r--src/Boot/Windows/BootMain.cpp30
1 files changed, 15 insertions, 15 deletions
diff --git a/src/Boot/Windows/BootMain.cpp b/src/Boot/Windows/BootMain.cpp
index 7922c454..abab2038 100644
--- a/src/Boot/Windows/BootMain.cpp
+++ b/src/Boot/Windows/BootMain.cpp
@@ -169,16 +169,17 @@ static byte AskPassword (Password &password, int& pim)
{
case TC_BIOS_KEY_ENTER:
password.Length = pos;
- if (hidePassword)
+ Print ("\r");
+ if (!PreventNormalSystemBoot)
+ Print ("Enter password: ");
+ pos = 0;
+ while (pos < MAX_PASSWORD)
{
- while (pos < MAX_PASSWORD)
- {
- pos++;
- if (pos < MAX_PASSWORD)
- PrintChar ('*');
- else
- PrintCharAtCursor ('*');
- }
+ pos++;
+ if (pos < MAX_PASSWORD)
+ PrintChar ('*');
+ else
+ PrintCharAtCursor ('*');
}
ClearBiosKeystrokeBuffer();
@@ -240,13 +241,12 @@ static byte AskPassword (Password &password, int& pim)
switch (scanCode)
{
case TC_BIOS_KEY_ENTER:
- if (hidePassword)
+ Print ("\rPIM: ");
+ pos =0;
+ while (pos < MAX_PIM)
{
- while (pos < MAX_PIM)
- {
- PrintChar ('*');
- pos++;
- }
+ PrintChar ('*');
+ pos++;
}
ClearBiosKeystrokeBuffer();