From 6ca598f8418a1ab12ff7353c534d610b4dbac943 Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Wed, 29 Jul 2015 00:09:14 +0200 Subject: Windows: Implement Evil-Maid-Attack detection mechanism. Write the correct bootloader when changing the system encryption password: this enables to recover if an attack is detected. --- src/Common/Volumes.h | 3 +++ 1 file changed, 3 insertions(+) (limited to 'src/Common/Volumes.h') diff --git a/src/Common/Volumes.h b/src/Common/Volumes.h index 76a14966..016d989f 100644 --- a/src/Common/Volumes.h +++ b/src/Common/Volumes.h @@ -130,6 +130,9 @@ UINT64_STRUCT GetHeaderField64 (byte *header, int offset); int ReadVolumeHeader (BOOL bBoot, char *encryptedHeader, Password *password, int pim, PCRYPTO_INFO *retInfo, CRYPTO_INFO *retHeaderCryptoInfo); #else int ReadVolumeHeader (BOOL bBoot, char *encryptedHeader, Password *password, int pkcs5_prf, int pim, BOOL truecryptMode, PCRYPTO_INFO *retInfo, CRYPTO_INFO *retHeaderCryptoInfo); +#ifdef _WIN32 +void ComputeBootloaderFingerprint (byte *bootLoaderBuf, unsigned int bootLoaderSize, byte* fingerprint); +#endif #endif #if !defined (DEVICE_DRIVER) && !defined (TC_WINDOWS_BOOT) -- cgit v1.2.3