summaryrefslogtreecommitdiffstats
path: root/src/VBox/Runtime/testcase/tstRTLdrVerifyPeImage.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/VBox/Runtime/testcase/tstRTLdrVerifyPeImage.cpp')
-rw-r--r--src/VBox/Runtime/testcase/tstRTLdrVerifyPeImage.cpp132
1 files changed, 132 insertions, 0 deletions
diff --git a/src/VBox/Runtime/testcase/tstRTLdrVerifyPeImage.cpp b/src/VBox/Runtime/testcase/tstRTLdrVerifyPeImage.cpp
new file mode 100644
index 00000000..de78e9e9
--- /dev/null
+++ b/src/VBox/Runtime/testcase/tstRTLdrVerifyPeImage.cpp
@@ -0,0 +1,132 @@
+/* $Id: tstRTLdrVerifyPeImage.cpp $ */
+/** @file
+ * SUP Testcase - Testing the Authenticode signature verification code.
+ */
+
+/*
+ * Copyright (C) 2014-2023 Oracle and/or its affiliates.
+ *
+ * This file is part of VirtualBox base platform packages, as
+ * available from https://www.virtualbox.org.
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation, in version 3 of the
+ * License.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, see <https://www.gnu.org/licenses>.
+ *
+ * The contents of this file may alternatively be used under the terms
+ * of the Common Development and Distribution License Version 1.0
+ * (CDDL), a copy of it is provided in the "COPYING.CDDL" file included
+ * in the VirtualBox distribution, in which case the provisions of the
+ * CDDL are applicable instead of those of the GPL.
+ *
+ * You may elect to license modified versions of this file under the
+ * terms and conditions of either the GPL or the CDDL or both.
+ *
+ * SPDX-License-Identifier: GPL-3.0-only OR CDDL-1.0
+ */
+
+
+/*********************************************************************************************************************************
+* Header Files *
+*********************************************************************************************************************************/
+#include <iprt/ldr.h>
+
+#include <iprt/errcore.h>
+#include <iprt/mem.h>
+#include <iprt/path.h>
+#include <iprt/stream.h>
+#include <iprt/string.h>
+#include <iprt/test.h>
+
+#include <iprt/md5.h>
+#include <iprt/sha.h>
+
+
+/*********************************************************************************************************************************
+* Global Variables *
+*********************************************************************************************************************************/
+static int g_iDummy = 0;
+
+
+static DECLCALLBACK(int) TestCallback(RTLDRMOD hLdrMod, PCRTLDRSIGNATUREINFO pInfo, PRTERRINFO pErrInfo, void *pvUser)
+{
+ RT_NOREF(hLdrMod, pInfo, pErrInfo, pvUser);
+ return VINF_SUCCESS;
+}
+
+
+int main(int argc, char **argv)
+{
+ RTTEST hTest;
+ RTEXITCODE rcExit = RTTestInitAndCreate("tstAuthenticode", &hTest);
+ if (rcExit != RTEXITCODE_SUCCESS)
+ return rcExit;
+ RTTestBanner(hTest);
+
+ /*
+ * Process input.
+ */
+ for (int i = 1; i < argc; i++)
+ {
+ const char *pszFullName = argv[i];
+ const char *pszFilename = RTPathFilename(pszFullName);
+ RTTestSub(hTest, pszFilename);
+
+ RTLDRMOD hLdrMod;
+ int rc = RTLdrOpen(pszFullName, RTLDR_O_FOR_VALIDATION, RTLDRARCH_WHATEVER, &hLdrMod);
+ if (RT_SUCCESS(rc))
+ {
+ uint8_t abHash[128];
+ char szDigest[512];
+
+ RTTESTI_CHECK_RC(rc = RTLdrHashImage(hLdrMod, RTDIGESTTYPE_MD5, abHash, sizeof(abHash)), VINF_SUCCESS);
+ if (RT_SUCCESS(rc))
+ {
+ RTMd5ToString(abHash, szDigest, sizeof(szDigest));
+ RTTestPrintf(hTest, RTTESTLVL_ALWAYS, "md5=%s\n", szDigest);
+ }
+ RTTESTI_CHECK_RC(rc = RTLdrHashImage(hLdrMod, RTDIGESTTYPE_SHA1, abHash, sizeof(abHash)), VINF_SUCCESS);
+ if (RT_SUCCESS(rc))
+ {
+ RTSha1ToString(abHash, szDigest, sizeof(szDigest));
+ RTTestPrintf(hTest, RTTESTLVL_ALWAYS, "sha1=%s\n", szDigest);
+ }
+ RTTESTI_CHECK_RC(rc = RTLdrHashImage(hLdrMod, RTDIGESTTYPE_SHA256, abHash, sizeof(abHash)), VINF_SUCCESS);
+ if (RT_SUCCESS(rc))
+ {
+ RTSha256ToString(abHash, szDigest, sizeof(szDigest));
+ RTTestPrintf(hTest, RTTESTLVL_ALWAYS, "sha256=%s\n", szDigest);
+ }
+ RTTESTI_CHECK_RC(rc = RTLdrHashImage(hLdrMod, RTDIGESTTYPE_SHA512, abHash, sizeof(abHash)), VINF_SUCCESS);
+ if (RT_SUCCESS(rc))
+ {
+ RTSha512ToString(abHash, szDigest, sizeof(szDigest));
+ RTTestPrintf(hTest, RTTESTLVL_ALWAYS, "sha512=%s\n", szDigest);
+ }
+
+ if (rc != VERR_NOT_SUPPORTED)
+ {
+ RTERRINFOSTATIC ErrInfo;
+ RTErrInfoInitStatic(&ErrInfo);
+ rc = RTLdrVerifySignature(hLdrMod, TestCallback, &g_iDummy, &ErrInfo.Core);
+ if (RT_FAILURE(rc))
+ RTTestFailed(hTest, "%s: %s (rc=%Rrc)", pszFilename, ErrInfo.Core.pszMsg, rc);
+ }
+ RTLdrClose(hLdrMod);
+ }
+ else
+ RTTestFailed(hTest, "Error opening '%s': %Rrc\n", pszFullName, rc);
+ }
+
+ return RTTestSummaryAndDestroy(hTest);
+}
+