mirror of
https://github.com/veracrypt/VeraCrypt.git
synced 2025-11-11 19:08:26 -06:00
Windows: Implement Evil-Maid-Attack detection mechanism. Write the correct bootloader when changing the system encryption password: this enables to recover if an attack is detected.
This commit is contained in:
@@ -5769,6 +5769,7 @@ BOOL CALLBACK MainDialogProc (HWND hwndDlg, UINT uMsg, WPARAM wParam, LPARAM lPa
|
||||
|
||||
try
|
||||
{
|
||||
BootEncObj->SetParentWindow (hwndDlg);
|
||||
BootEncStatus = BootEncObj->GetStatus();
|
||||
RecentBootEncStatus = BootEncStatus;
|
||||
}
|
||||
@@ -5808,13 +5809,19 @@ BOOL CALLBACK MainDialogProc (HWND hwndDlg, UINT uMsg, WPARAM wParam, LPARAM lPa
|
||||
{
|
||||
if (IsHiddenOSRunning())
|
||||
{
|
||||
if (BootEncObj->GetInstalledBootLoaderVersion() > VERSION_NUM)
|
||||
if (BootEncObj->GetInstalledBootLoaderVersion() != VERSION_NUM)
|
||||
Warning ("UPDATE_TC_IN_HIDDEN_OS_TOO", hwndDlg);
|
||||
if (!BootEncObj->CheckBootloaderFingerprint ())
|
||||
Warning ("BOOT_LOADER_FINGERPRINT_CHECK_FAILED", hwndDlg);
|
||||
}
|
||||
else if (SysDriveOrPartitionFullyEncrypted (TRUE)
|
||||
&& BootEncObj->GetInstalledBootLoaderVersion() != VERSION_NUM)
|
||||
else if (SysDriveOrPartitionFullyEncrypted (TRUE))
|
||||
{
|
||||
Warning ("BOOT_LOADER_VERSION_DIFFERENT_FROM_DRIVER_VERSION", hwndDlg);
|
||||
if (BootEncObj->GetInstalledBootLoaderVersion() != VERSION_NUM)
|
||||
{
|
||||
Warning ("BOOT_LOADER_VERSION_DIFFERENT_FROM_DRIVER_VERSION", hwndDlg);
|
||||
}
|
||||
if (!BootEncObj->CheckBootloaderFingerprint ())
|
||||
Warning ("BOOT_LOADER_FINGERPRINT_CHECK_FAILED", hwndDlg);
|
||||
}
|
||||
}
|
||||
catch (...) { }
|
||||
|
||||
Reference in New Issue
Block a user