Index: chrome/browser/safe_browsing/verifier_test/verifier_unittest.cc |
diff --git a/chrome/browser/safe_browsing/verifier_test/verifier_unittest.cc b/chrome/browser/safe_browsing/verifier_test/verifier_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..309754e0e1dca465557808803d8eb07f113054ce |
--- /dev/null |
+++ b/chrome/browser/safe_browsing/verifier_test/verifier_unittest.cc |
@@ -0,0 +1,140 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
csharp
2014/07/29 14:28:15
This file should probably live a level higher and
krstnmnlsn
2014/07/29 17:30:25
Done.
|
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chrome/browser/safe_browsing/module_integrity_verifier.h" |
+ |
+#include <windows.h> |
+#include <psapi.h> |
+ |
+#include "base/files/file_path.h" |
+#include "base/files/memory_mapped_file.h" |
+#include "base/native_library.h" |
+#include "base/path_service.h" |
+#include "base/scoped_native_library.h" |
+#include "base/win/pe_image.h" |
+#include "testing/gtest/include/gtest/gtest.h" |
+ |
+namespace safe_browsing { |
+ |
+const wchar_t kTestDllName[] = L"verifier_test_dll.dll"; |
+ |
+class SafeBrowsingModuleVerifierTest : public testing::Test { |
+ protected: |
+ SafeBrowsingModuleVerifierTest() {} |
+ virtual ~SafeBrowsingModuleVerifierTest() {} |
+ |
+ base::ScopedNativeLibrary mem_dll_handle; |
csharp
2014/07/29 14:28:15
All class data member names need to end with a tra
krstnmnlsn
2014/07/29 17:30:25
Right!
|
+ base::MemoryMappedFile disk_dll_handle; |
+ scoped_ptr<base::win::PEImageAsData> disk_peimage_ptr; |
+ scoped_ptr<base::win::PEImage> mem_peimage_ptr; |
+ |
+ void SetUpTestDllAndPEImages() { |
+ LoadModule(); |
+ HMODULE mem_handle; |
+ HMODULE disk_handle; |
+ GetMemModuleHandle(&mem_handle); |
+ GetDiskModuleHandle(&disk_handle); |
+ |
+ disk_peimage_ptr.reset(new base::win::PEImageAsData(disk_handle)); |
+ mem_peimage_ptr.reset(new base::win::PEImage(mem_handle)); |
+ ASSERT_TRUE(disk_peimage_ptr->VerifyMagic()); |
csharp
2014/07/29 14:28:15
Move up a line to check right after creation
krstnmnlsn
2014/07/29 17:30:25
Done.
|
+ ASSERT_TRUE(mem_peimage_ptr->VerifyMagic()); |
+ } |
+ |
+ void LoadModule() { |
+ base::FilePath current_dir; |
+ ASSERT_TRUE(PathService::Get(base::DIR_EXE, ¤t_dir)); |
+ mem_dll_handle.Reset( |
+ LoadNativeLibrary(current_dir.Append(kTestDllName), NULL)); |
+ ASSERT_TRUE(mem_dll_handle.is_valid()); |
+ } |
+ |
+ void GetMemModuleHandle(HMODULE* mem_handle) { |
+ *mem_handle = GetModuleHandle(kTestDllName); |
+ ASSERT_TRUE(NULL != *mem_handle); |
+ } |
+ |
+ void GetDiskModuleHandle(HMODULE* disk_handle) { |
+ // Use the module handle to find the it on disk, then load as a file. |
+ HMODULE module_handle = GetModuleHandle(kTestDllName); |
+ ASSERT_TRUE(NULL != module_handle); |
+ |
+ WCHAR module_path[MAX_PATH] = {}; |
+ DWORD length = |
+ GetModuleFileName(module_handle, module_path, arraysize(module_path)); |
+ ASSERT_NE(length, arraysize(module_path)); |
+ |
+ ASSERT_TRUE(disk_dll_handle.Initialize(base::FilePath(module_path))); |
+ *disk_handle = reinterpret_cast<HMODULE>( |
+ const_cast<uint8*>(disk_dll_handle.data())); |
+ } |
+ |
+ private: |
+ DISALLOW_COPY_AND_ASSIGN(SafeBrowsingModuleVerifierTest); |
+}; |
+ |
+TEST_F(SafeBrowsingModuleVerifierTest, CountBytesDiffInPtr) { |
+ // Construct test pointer and try with CountBytesDiffInPtr. |
csharp
2014/07/29 14:28:15
nit: pointer -> pointers
krstnmnlsn
2014/07/29 17:30:25
Done.
|
+ // The first Bytes differ. |
+ intptr_t num_a = 0xFF; |
+ intptr_t num_b = 0x00; |
+ |
+ // Any inbetween Bytes are identical. |
+ int num_bytes_to_add = sizeof(num_a) - 2; |
+ for (int i = 0; i < num_bytes_to_add; ++i) { |
+ num_a <<= 8; |
+ num_b <<= 8; |
+ num_a += 0xFF; |
+ num_b += 0xFF; |
+ } |
+ |
+ // The last Bytes differ. |
+ num_a <<= 8; |
+ num_b <<= 8; |
+ num_a += 0x0F; |
+ num_b += 0xFF; |
+ |
+ EXPECT_EQ(2, CountBytesDiffInPtr(num_a, num_b)); |
csharp
2014/07/29 14:28:15
also check "EXPECT_EQ(2, CountBytesDiffInPtr(num_b
krstnmnlsn
2014/07/29 17:30:25
Good idea.
|
+ EXPECT_EQ(0, CountBytesDiffInPtr(num_a, num_a)); |
+} |
+ |
+TEST_F(SafeBrowsingModuleVerifierTest, VerifyModuleUnmodified) { |
+ // Call VerifyModule before the module has been loaded, should fail. |
+ EXPECT_EQ(MODULE_STATE_UNKNOWN, VerifyModule(kTestDllName)); |
+ |
+ // On loading, the module should be identical (up to relocations) in memory as |
+ // on disk. |
+ SetUpTestDllAndPEImages(); |
+ EXPECT_EQ(MODULE_STATE_UNMODIFIED, VerifyModule(kTestDllName)); |
+} |
+ |
+TEST_F(SafeBrowsingModuleVerifierTest, VerifyModuleModified) { |
+ // Confirm the module is identical in memory as on disk before we begin. |
+ SetUpTestDllAndPEImages(); |
+ EXPECT_EQ(MODULE_STATE_UNMODIFIED, VerifyModule(kTestDllName)); |
+ |
+ BYTE* mem_code_addr = NULL; |
+ BYTE* disk_code_addr = NULL; |
+ SIZE_T code_size = 0; |
+ EXPECT_TRUE(GetCodeAddrsAndSize(*mem_peimage_ptr, |
+ *disk_peimage_ptr, |
+ &mem_code_addr, |
+ &disk_code_addr, |
+ &code_size)); |
+ |
+ // Edit the first byte of the code section of the module. |
+ BYTE new_val = (*mem_code_addr) + 1; |
+ SIZE_T bytes_written = 0; |
+ WriteProcessMemory(GetCurrentProcess(), |
+ mem_code_addr, |
+ reinterpret_cast<void*>(&new_val), |
+ 1, |
+ &bytes_written); |
+ EXPECT_EQ(1, bytes_written); |
+ |
+ // VerifyModule should detect the change. |
+ EXPECT_EQ(MODULE_STATE_MODIFIED, VerifyModule(kTestDllName)); |
+} |
+ |
+} // namespace safe_browsing |