Index: chrome/browser/safe_browsing/module_integrity_verifier_win_unittest.cc |
diff --git a/chrome/browser/safe_browsing/module_integrity_verifier_win_unittest.cc b/chrome/browser/safe_browsing/module_integrity_verifier_win_unittest.cc |
deleted file mode 100644 |
index 36c721e530294ed2143174485055509cc5337b32..0000000000000000000000000000000000000000 |
--- a/chrome/browser/safe_browsing/module_integrity_verifier_win_unittest.cc |
+++ /dev/null |
@@ -1,154 +0,0 @@ |
-// Copyright 2014 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/browser/safe_browsing/module_integrity_verifier_win.h" |
- |
-#include "base/files/file_path.h" |
-#include "base/files/memory_mapped_file.h" |
-#include "base/native_library.h" |
-#include "base/path_service.h" |
-#include "base/scoped_native_library.h" |
-#include "base/win/pe_image.h" |
-#include "chrome/browser/safe_browsing/module_integrity_unittest_util_win.h" |
-#include "testing/gtest/include/gtest/gtest.h" |
- |
-namespace safe_browsing { |
- |
-class SafeBrowsingModuleVerifierWinTest : public testing::Test { |
- protected: |
- void SetUpTestDllAndPEImages() { |
- LoadModule(); |
- HMODULE mem_handle; |
- GetMemModuleHandle(&mem_handle); |
- mem_peimage_ptr_.reset(new base::win::PEImage(mem_handle)); |
- ASSERT_TRUE(mem_peimage_ptr_->VerifyMagic()); |
- |
- LoadDLLAsFile(); |
- HMODULE disk_handle; |
- GetDiskModuleHandle(&disk_handle); |
- disk_peimage_ptr_.reset(new base::win::PEImageAsData(disk_handle)); |
- ASSERT_TRUE(disk_peimage_ptr_->VerifyMagic()); |
- } |
- |
- void LoadModule() { |
- HMODULE mem_dll_handle = |
- LoadNativeLibrary(base::FilePath(kTestDllNames[0]), NULL); |
- ASSERT_NE(static_cast<HMODULE>(NULL), mem_dll_handle) |
- << "GLE=" << GetLastError(); |
- mem_dll_handle_.Reset(mem_dll_handle); |
- ASSERT_TRUE(mem_dll_handle_.is_valid()); |
- } |
- |
- void GetMemModuleHandle(HMODULE* mem_handle) { |
- *mem_handle = GetModuleHandle(kTestDllNames[0]); |
- ASSERT_NE(static_cast<HMODULE>(NULL), *mem_handle); |
- } |
- |
- void LoadDLLAsFile() { |
- // Use the module handle to find the it on disk, then load as a file. |
- HMODULE module_handle; |
- GetMemModuleHandle(&module_handle); |
- |
- WCHAR module_path[MAX_PATH] = {}; |
- DWORD length = |
- GetModuleFileName(module_handle, module_path, arraysize(module_path)); |
- ASSERT_NE(arraysize(module_path), length); |
- ASSERT_TRUE(disk_dll_handle_.Initialize(base::FilePath(module_path))); |
- } |
- |
- void GetDiskModuleHandle(HMODULE* disk_handle) { |
- *disk_handle = |
- reinterpret_cast<HMODULE>(const_cast<uint8*>(disk_dll_handle_.data())); |
- } |
- |
- // Edits the first byte of the single function exported by the test dll. |
- void EditExport() { |
- HMODULE mem_handle; |
- GetMemModuleHandle(&mem_handle); |
- uint8_t* export_addr = |
- reinterpret_cast<uint8_t*>(GetProcAddress(mem_handle, kTestExportName)); |
- EXPECT_NE(reinterpret_cast<uint8_t*>(NULL), export_addr); |
- |
- // Edit the first byte of the function. |
- uint8_t new_val = (*export_addr) + 1; |
- SIZE_T bytes_written = 0; |
- WriteProcessMemory(GetCurrentProcess(), |
- export_addr, |
- reinterpret_cast<void*>(&new_val), |
- 1, |
- &bytes_written); |
- EXPECT_EQ(1, bytes_written); |
- } |
- |
- base::ScopedNativeLibrary mem_dll_handle_; |
- base::MemoryMappedFile disk_dll_handle_; |
- scoped_ptr<base::win::PEImageAsData> disk_peimage_ptr_; |
- scoped_ptr<base::win::PEImage> mem_peimage_ptr_; |
-}; |
- |
-TEST_F(SafeBrowsingModuleVerifierWinTest, VerifyModuleUnmodified) { |
- std::set<std::string> modified_exports; |
- // Call VerifyModule before the module has been loaded, should fail. |
- EXPECT_EQ(MODULE_STATE_UNKNOWN, |
- VerifyModule(kTestDllNames[0], &modified_exports)); |
- EXPECT_EQ(0, modified_exports.size()); |
- |
- // On loading, the module should be identical (up to relocations) in memory as |
- // on disk. |
- SetUpTestDllAndPEImages(); |
- EXPECT_EQ(MODULE_STATE_UNMODIFIED, |
- VerifyModule(kTestDllNames[0], &modified_exports)); |
- EXPECT_EQ(0, modified_exports.size()); |
-} |
- |
-TEST_F(SafeBrowsingModuleVerifierWinTest, VerifyModuleModified) { |
- std::set<std::string> modified_exports; |
- // Confirm the module is identical in memory as on disk before we begin. |
- SetUpTestDllAndPEImages(); |
- EXPECT_EQ(MODULE_STATE_UNMODIFIED, |
- VerifyModule(kTestDllNames[0], &modified_exports)); |
- |
- uint8_t* mem_code_addr = NULL; |
- uint8_t* disk_code_addr = NULL; |
- uint32_t code_size = 0; |
- EXPECT_TRUE(GetCodeAddrsAndSize(*mem_peimage_ptr_, |
- *disk_peimage_ptr_, |
- &mem_code_addr, |
- &disk_code_addr, |
- &code_size)); |
- |
- // Edit the first byte of the code section of the module (this may be before |
- // the address of any export). |
- uint8_t new_val = (*mem_code_addr) + 1; |
- SIZE_T bytes_written = 0; |
- WriteProcessMemory(GetCurrentProcess(), |
- mem_code_addr, |
- reinterpret_cast<void*>(&new_val), |
- 1, |
- &bytes_written); |
- EXPECT_EQ(1, bytes_written); |
- |
- // VerifyModule should detect the change. |
- EXPECT_EQ(MODULE_STATE_MODIFIED, |
- VerifyModule(kTestDllNames[0], &modified_exports)); |
-} |
- |
-TEST_F(SafeBrowsingModuleVerifierWinTest, VerifyModuleExportModified) { |
- std::set<std::string> modified_exports; |
- // Confirm the module is identical in memory as on disk before we begin. |
- SetUpTestDllAndPEImages(); |
- EXPECT_EQ(MODULE_STATE_UNMODIFIED, |
- VerifyModule(kTestDllNames[0], &modified_exports)); |
- modified_exports.clear(); |
- |
- // Edit the exported function, VerifyModule should now return the function |
- // name in modified_exports. |
- EditExport(); |
- EXPECT_EQ(MODULE_STATE_MODIFIED, |
- VerifyModule(kTestDllNames[0], &modified_exports)); |
- EXPECT_EQ(1, modified_exports.size()); |
- EXPECT_EQ(0, std::string(kTestExportName).compare(*modified_exports.begin())); |
-} |
- |
-} // namespace safe_browsing |