From 6ca598f8418a1ab12ff7353c534d610b4dbac943 Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Wed, 29 Jul 2015 00:09:14 +0200 Subject: Windows: Implement Evil-Maid-Attack detection mechanism. Write the correct bootloader when changing the system encryption password: this enables to recover if an attack is detected. --- src/Common/Apidrvr.h | 6 ++++++ 1 file changed, 6 insertions(+) (limited to 'src/Common/Apidrvr.h') diff --git a/src/Common/Apidrvr.h b/src/Common/Apidrvr.h index ee40aa8a..16b1641f 100644 --- a/src/Common/Apidrvr.h +++ b/src/Common/Apidrvr.h @@ -62,6 +62,7 @@ #define TC_IOCTL_SET_SYSTEM_FAVORITE_VOLUME_DIRTY TC_IOCTL (36) #define TC_IOCTL_REREAD_DRIVER_CONFIG TC_IOCTL (37) #define TC_IOCTL_GET_SYSTEM_DRIVE_DUMP_CONFIG TC_IOCTL (38) +#define VC_IOCTL_GET_BOOT_LOADER_FINGERPRINT TC_IOCTL (39) // Legacy IOCTLs used before version 5.0 #define TC_IOCTL_LEGACY_GET_DRIVER_VERSION 466968 @@ -254,6 +255,11 @@ typedef struct char BootPrfAlgorithmName[256]; } GetBootEncryptionAlgorithmNameRequest; +typedef struct +{ + byte Fingerprint[WHIRLPOOL_DIGESTSIZE + SHA512_DIGESTSIZE]; +} BootLoaderFingerprintRequest; + typedef struct { wchar_t DevicePath[TC_MAX_PATH]; -- cgit v1.2.3