From 4f0d1c02bdf4adf56caf48de967c41d2d4d9ff2d Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Mon, 23 Apr 2018 12:56:02 +0200 Subject: Windows: Don't start EFI system encryption process if SecureBoot is enabled and VeraCrypt-DCS custom keys were not loaded in the machine firmware. --- src/Mount/MainCom.cpp | 5 +++++ src/Mount/MainCom.idl | 1 + 2 files changed, 6 insertions(+) (limited to 'src/Mount') diff --git a/src/Mount/MainCom.cpp b/src/Mount/MainCom.cpp index f3ce90b2..a4096707 100644 --- a/src/Mount/MainCom.cpp +++ b/src/Mount/MainCom.cpp @@ -188,6 +188,11 @@ public: return BaseCom::GetEfiBootDeviceNumber (pSdn); } + virtual DWORD STDMETHODCALLTYPE GetSecureBootConfig (BOOL* pSecureBootEnabled, BOOL *pVeraCryptKeysLoaded) + { + return BaseCom::GetSecureBootConfig (pSecureBootEnabled, pVeraCryptKeysLoaded); + } + virtual DWORD STDMETHODCALLTYPE WriteEfiBootSectorUserConfig (DWORD userConfig, BSTR customUserMessage, int pim, int hashAlg) { return BaseCom::WriteEfiBootSectorUserConfig (userConfig, customUserMessage,pim, hashAlg); diff --git a/src/Mount/MainCom.idl b/src/Mount/MainCom.idl index 25bb80ce..bb949750 100644 --- a/src/Mount/MainCom.idl +++ b/src/Mount/MainCom.idl @@ -52,6 +52,7 @@ library TrueCryptMainCom DWORD GetEfiBootDeviceNumber (BSTR* pSdn); DWORD WriteEfiBootSectorUserConfig (DWORD userConfig, BSTR customUserMessage, int pim, int hashAlg); DWORD UpdateSetupConfigFile (BOOL bForInstall); + DWORD GetSecureBootConfig (BOOL* pSecureBootEnabled, BOOL *pVeraCryptKeysLoaded); }; [ -- cgit v1.2.3