2 * Test suite for imagehlp integrity functions
4 * Copyright 2009 Owen Rudge for CodeWeavers
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
22 #include "wine/test.h"
29 #define PSAPI_VERSION 1
32 static char test_dll_path
[MAX_PATH
];
34 static const char test_cert_data
[] =
35 {0x30,0x82,0x02,0xE1,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D,0x01,0x07,0x02
36 ,0xA0,0x82,0x02,0xD2,0x30,0x82,0x02,0xCE,0x02,0x01,0x01,0x31,0x00,0x30,0x0B
37 ,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D,0x01,0x07,0x01,0xA0,0x82,0x02,0xB4
38 ,0x30,0x82,0x02,0xB0,0x30,0x82,0x02,0x19,0xA0,0x03,0x02,0x01,0x02,0x02,0x09
39 ,0x00,0xE2,0x59,0x17,0xA5,0x87,0x0F,0x88,0x89,0x30,0x0D,0x06,0x09,0x2A,0x86
40 ,0x48,0x86,0xF7,0x0D,0x01,0x01,0x05,0x05,0x00,0x30,0x45,0x31,0x0B,0x30,0x09
41 ,0x06,0x03,0x55,0x04,0x06,0x13,0x02,0x41,0x55,0x31,0x13,0x30,0x11,0x06,0x03
42 ,0x55,0x04,0x08,0x13,0x0A,0x53,0x6F,0x6D,0x65,0x2D,0x53,0x74,0x61,0x74,0x65
43 ,0x31,0x21,0x30,0x1F,0x06,0x03,0x55,0x04,0x0A,0x13,0x18,0x49,0x6E,0x74,0x65
44 ,0x72,0x6E,0x65,0x74,0x20,0x57,0x69,0x64,0x67,0x69,0x74,0x73,0x20,0x50,0x74
45 ,0x79,0x20,0x4C,0x74,0x64,0x30,0x1E,0x17,0x0D,0x30,0x39,0x31,0x31,0x32,0x30
46 ,0x31,0x37,0x33,0x38,0x31,0x32,0x5A,0x17,0x0D,0x31,0x30,0x31,0x31,0x32,0x30
47 ,0x31,0x37,0x33,0x38,0x31,0x32,0x5A,0x30,0x45,0x31,0x0B,0x30,0x09,0x06,0x03
48 ,0x55,0x04,0x06,0x13,0x02,0x41,0x55,0x31,0x13,0x30,0x11,0x06,0x03,0x55,0x04
49 ,0x08,0x13,0x0A,0x53,0x6F,0x6D,0x65,0x2D,0x53,0x74,0x61,0x74,0x65,0x31,0x21
50 ,0x30,0x1F,0x06,0x03,0x55,0x04,0x0A,0x13,0x18,0x49,0x6E,0x74,0x65,0x72,0x6E
51 ,0x65,0x74,0x20,0x57,0x69,0x64,0x67,0x69,0x74,0x73,0x20,0x50,0x74,0x79,0x20
52 ,0x4C,0x74,0x64,0x30,0x81,0x9F,0x30,0x0D,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7
53 ,0x0D,0x01,0x01,0x01,0x05,0x00,0x03,0x81,0x8D,0x00,0x30,0x81,0x89,0x02,0x81
54 ,0x81,0x00,0x9B,0xC1,0x5E,0x28,0x70,0x32,0x81,0xEF,0x41,0x5C,0xCA,0x29,0x4A
55 ,0xB0,0x12,0xF7,0xAE,0x1E,0x30,0x93,0x14,0x3E,0x54,0x7C,0xC3,0x60,0x8C,0xB2
56 ,0x2F,0xC4,0x1F,0x20,0xEE,0x76,0xAC,0x83,0xD9,0xD4,0xC0,0x3C,0x78,0x6B,0xAA
57 ,0xA2,0x35,0x08,0x72,0x4A,0x5F,0xAE,0xD6,0x7D,0x5A,0xD8,0x27,0xEC,0xE0,0x24
58 ,0xBE,0xBE,0x62,0x86,0xF9,0x83,0x66,0x20,0xBC,0xF6,0x4B,0xC8,0x2D,0x1B,0x4C
59 ,0x5C,0xFA,0x0C,0x42,0x9F,0x57,0x49,0xDC,0xB9,0xC7,0x88,0x53,0xFA,0x26,0x21
60 ,0xC3,0xAB,0x4D,0x93,0x83,0x48,0x88,0xF1,0x14,0xB8,0x64,0x03,0x46,0x58,0x35
61 ,0xAC,0xD2,0xD2,0x9C,0xD4,0x6F,0xA4,0xE4,0x88,0x83,0x1C,0xD8,0x98,0xEE,0x2C
62 ,0xA3,0xEC,0x0C,0x4B,0xFB,0x1D,0x6E,0xBE,0xD9,0x77,0x02,0x03,0x01,0x00,0x01
63 ,0xA3,0x81,0xA7,0x30,0x81,0xA4,0x30,0x1D,0x06,0x03,0x55,0x1D,0x0E,0x04,0x16
64 ,0x04,0x14,0x3F,0xB3,0xC8,0x15,0x12,0xC7,0xD8,0xC0,0x13,0x3D,0xBE,0xF1,0x2F
65 ,0x5A,0xB3,0x51,0x59,0x79,0x89,0xF8,0x30,0x75,0x06,0x03,0x55,0x1D,0x23,0x04
66 ,0x6E,0x30,0x6C,0x80,0x14,0x3F,0xB3,0xC8,0x15,0x12,0xC7,0xD8,0xC0,0x13,0x3D
67 ,0xBE,0xF1,0x2F,0x5A,0xB3,0x51,0x59,0x79,0x89,0xF8,0xA1,0x49,0xA4,0x47,0x30
68 ,0x45,0x31,0x0B,0x30,0x09,0x06,0x03,0x55,0x04,0x06,0x13,0x02,0x41,0x55,0x31
69 ,0x13,0x30,0x11,0x06,0x03,0x55,0x04,0x08,0x13,0x0A,0x53,0x6F,0x6D,0x65,0x2D
70 ,0x53,0x74,0x61,0x74,0x65,0x31,0x21,0x30,0x1F,0x06,0x03,0x55,0x04,0x0A,0x13
71 ,0x18,0x49,0x6E,0x74,0x65,0x72,0x6E,0x65,0x74,0x20,0x57,0x69,0x64,0x67,0x69
72 ,0x74,0x73,0x20,0x50,0x74,0x79,0x20,0x4C,0x74,0x64,0x82,0x09,0x00,0xE2,0x59
73 ,0x17,0xA5,0x87,0x0F,0x88,0x89,0x30,0x0C,0x06,0x03,0x55,0x1D,0x13,0x04,0x05
74 ,0x30,0x03,0x01,0x01,0xFF,0x30,0x0D,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D
75 ,0x01,0x01,0x05,0x05,0x00,0x03,0x81,0x81,0x00,0x52,0x09,0xA5,0x81,0x63,0xEF
76 ,0xF7,0x76,0x65,0x2B,0xA5,0x48,0xC1,0xC5,0xE0,0x73,0x60,0x9B,0x66,0x2E,0x21
77 ,0xCF,0xF2,0xBD,0xFF,0x81,0xC4,0x99,0x39,0xD0,0x5D,0x1B,0x12,0xFD,0xAE,0x30
78 ,0x5D,0x9C,0x1A,0xD4,0x76,0x8A,0x25,0x10,0x0A,0x7E,0x5D,0x78,0xB5,0x94,0xD8
79 ,0x97,0xBD,0x9A,0x5A,0xD6,0x23,0xCA,0x5C,0x46,0x8C,0xC7,0x30,0x45,0xB4,0x77
80 ,0x44,0x6F,0x16,0xDD,0xC6,0x58,0xFE,0x16,0x15,0xAD,0xB8,0x58,0x49,0x9A,0xFE
81 ,0x6B,0x87,0x78,0xEE,0x13,0xFF,0x29,0x26,0x8E,0x13,0x83,0x0D,0x18,0xCA,0x9F
82 ,0xA9,0x3E,0x6E,0x3C,0xA6,0x50,0x4A,0x04,0x71,0x9F,0x2E,0xCF,0x25,0xA6,0x03
83 ,0x46,0xCA,0xEB,0xEA,0x67,0x89,0x49,0x7C,0x43,0xA2,0x52,0xD9,0x41,0xCC,0x65
84 ,0xED,0x2D,0xA1,0x00,0x31,0x00};
86 static const char test_cert_data_2
[] = {0xDE,0xAD,0xBE,0xEF,0x01,0x02,0x03};
88 static char test_pe_executable
[] =
90 0x4d,0x5a,0x90,0x00,0x03,0x00,0x00,0x00,0x04,0x00,0x00,0x00,0xff,0xff,0x00,
91 0x00,0xb8,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x00,0x00,
92 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
93 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
94 0x80,0x00,0x00,0x00,0x0e,0x1f,0xba,0x0e,0x00,0xb4,0x09,0xcd,0x21,0xb8,0x01,
95 0x4c,0xcd,0x21,0x54,0x68,0x69,0x73,0x20,0x70,0x72,0x6f,0x67,0x72,0x61,0x6d,
96 0x20,0x63,0x61,0x6e,0x6e,0x6f,0x74,0x20,0x62,0x65,0x20,0x72,0x75,0x6e,0x20,
97 0x69,0x6e,0x20,0x44,0x4f,0x53,0x20,0x6d,0x6f,0x64,0x65,0x2e,0x0d,0x0d,0x0a,
98 0x24,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x50,0x45,0x00,0x00,0x4c,0x01,0x0f,
99 0x00,0xfd,0x38,0xc9,0x55,0x00,0x24,0x01,0x00,0xea,0x04,0x00,0x00,0xe0,0x00,
100 0x07,0x01,0x0b,0x01,0x02,0x18,0x00,0x1a,0x00,0x00,0x00,0x2c,0x00,0x00,0x00,
101 0x06,0x00,0x00,0xe0,0x14,0x00,0x00,0x00,0x10,0x00,0x00,0x00,0x30,0x00,0x00,
102 0x00,0x00,0x40,0x00,0x00,0x10,0x00,0x00,0x00,0x02,0x00,0x00,0x04,0x00,0x00,
103 0x00,0x01,0x00,0x00,0x00,0x04,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xc0,
104 0x01,0x00,0x00,0x04,0x00,0x00,/* checksum */ 0x11,0xEF,0xCD,0xAB,0x03,0x00,
105 0x00,0x00,0x00,0x00,0x20,0x00,0x00,0x10,0x00,0x00,0x00,0x00,0x10,0x00,0x00,
106 0x10,0x00,0x00,0x00,0x00,0x00,0x00,0x10,0x00,0x00,0x00
109 static BOOL
copy_dll_file(void)
111 char sys_dir
[MAX_PATH
+15];
112 char temp_path
[MAX_PATH
];
114 if (GetSystemDirectoryA(sys_dir
, MAX_PATH
) == 0)
116 skip("Failed to get system directory. Skipping certificate/PE image tests.\n");
120 if (sys_dir
[lstrlenA(sys_dir
) - 1] != '\\')
121 lstrcatA(sys_dir
, "\\");
123 lstrcatA(sys_dir
, "imagehlp.dll");
125 /* Copy DLL to a temp file */
126 GetTempPathA(MAX_PATH
, temp_path
);
127 GetTempFileNameA(temp_path
, "img", 0, test_dll_path
);
129 if (CopyFileA(sys_dir
, test_dll_path
, FALSE
) == 0)
131 skip("Unable to create copy of imagehlp.dll for tests.\n");
138 static DWORD
get_file_size(void)
143 file
= CreateFileA(test_dll_path
, GENERIC_READ
, FILE_SHARE_READ
, NULL
,
144 OPEN_EXISTING
, FILE_ATTRIBUTE_NORMAL
, NULL
);
145 if (file
== INVALID_HANDLE_VALUE
)
148 filesize
= GetFileSize(file
, NULL
);
154 static DWORD
test_add_certificate(const char *cert_data
, int len
)
157 LPWIN_CERTIFICATE cert
;
162 hFile
= CreateFileA(test_dll_path
, GENERIC_READ
| GENERIC_WRITE
, FILE_SHARE_READ
, NULL
, OPEN_EXISTING
, FILE_ATTRIBUTE_NORMAL
, NULL
);
164 if (hFile
== INVALID_HANDLE_VALUE
)
166 skip("Unable to open %s, skipping test\n", test_dll_path
);
170 cert_len
= sizeof(WIN_CERTIFICATE
) + len
;
171 cert
= HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
, cert_len
);
175 skip("Unable to allocate memory, skipping test\n");
180 cert
->dwLength
= cert_len
;
181 cert
->wRevision
= WIN_CERT_REVISION_1_0
;
182 cert
->wCertificateType
= WIN_CERT_TYPE_PKCS_SIGNED_DATA
;
183 CopyMemory(cert
->bCertificate
, cert_data
, len
);
185 ret
= ImageAddCertificate(hFile
, cert
, &index
);
186 ok(ret
, "Unable to add certificate to image, error %x\n", GetLastError());
187 trace("added cert index %d\n", index
);
189 HeapFree(GetProcessHeap(), 0, cert
);
194 static void test_get_certificate(const char *cert_data
, int index
)
197 LPWIN_CERTIFICATE cert
;
202 hFile
= CreateFileA(test_dll_path
, GENERIC_READ
, FILE_SHARE_READ
, NULL
, OPEN_EXISTING
, FILE_ATTRIBUTE_NORMAL
, NULL
);
204 if (hFile
== INVALID_HANDLE_VALUE
)
206 skip("Unable to open %s, skipping test\n", test_dll_path
);
210 ret
= ImageGetCertificateData(hFile
, index
, NULL
, &cert_len
);
211 err
= GetLastError();
213 ok ((ret
== FALSE
) && (err
== ERROR_INSUFFICIENT_BUFFER
), "ImageGetCertificateData gave unexpected result; ret=%d / err=%x\n", ret
, err
);
215 cert
= HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
, cert_len
);
219 skip("Unable to allocate memory, skipping test\n");
224 ret
= ImageGetCertificateData(hFile
, index
, cert
, &cert_len
);
225 ok(ret
, "Unable to retrieve certificate; err=%x\n", GetLastError());
226 ok(memcmp(cert
->bCertificate
, cert_data
, cert_len
- sizeof(WIN_CERTIFICATE
)) == 0, "Certificate retrieved did not match original\n");
228 HeapFree(GetProcessHeap(), 0, cert
);
232 static void test_remove_certificate(int index
)
234 DWORD orig_count
= 0, count
= 0;
238 hFile
= CreateFileA(test_dll_path
, GENERIC_READ
| GENERIC_WRITE
, FILE_SHARE_READ
, NULL
, OPEN_EXISTING
, FILE_ATTRIBUTE_NORMAL
, NULL
);
240 if (hFile
== INVALID_HANDLE_VALUE
)
242 skip("Unable to open %s, skipping test\n", test_dll_path
);
246 ret
= ImageEnumerateCertificates(hFile
, CERT_SECTION_TYPE_ANY
, &orig_count
, NULL
, 0);
247 ok (ret
, "Unable to enumerate certificates in file; err=%x\n", GetLastError());
248 ret
= ImageRemoveCertificate(hFile
, index
);
249 ok (ret
, "Unable to remove certificate from file; err=%x\n", GetLastError());
251 /* Test to see if the certificate has actually been removed */
252 ImageEnumerateCertificates(hFile
, CERT_SECTION_TYPE_ANY
, &count
, NULL
, 0);
253 ok (count
== orig_count
- 1, "Certificate count mismatch; orig=%d new=%d\n", orig_count
, count
);
258 static void test_pe_checksum(void)
260 DWORD checksum_orig
, checksum_new
, checksum_correct
;
261 PIMAGE_NT_HEADERS nt_header
;
262 PIMAGE_NT_HEADERS ret
;
267 SetLastError(0xdeadbeef);
268 ret
= CheckSumMappedFile(NULL
, 0, &checksum_orig
, &checksum_new
);
269 ok(!ret
, "Expected CheckSumMappedFile to fail, got %p\n", ret
);
270 ok(((GetLastError() == ERROR_INVALID_PARAMETER
)||(GetLastError() == 0xdeadbeef)),
271 "Expected 0xdeadbeef (XP) or ERROR_INVALID_PARAMETER (Vista+), got %x\n", GetLastError());
273 SetLastError(0xdeadbeef);
274 ret
= CheckSumMappedFile((void *)0xdeadbeef, 0, &checksum_orig
, &checksum_new
);
275 ok(!ret
, "Expected CheckSumMappedFile to fail, got %p\n", ret
);
276 ok(((GetLastError() == ERROR_INVALID_PARAMETER
)||(GetLastError() == 0xdeadbeef)),
277 "Expected 0xdeadbeef (XP) or ERROR_INVALID_PARAMETER (Vista+), got %x\n", GetLastError());
279 /* basic checksum tests */
280 memset(buffer
, 0x11, sizeof(buffer
));
281 checksum_orig
= checksum_new
= 0xdeadbeef;
282 ret
= CheckSumMappedFile(buffer
, sizeof(buffer
), &checksum_orig
, &checksum_new
);
283 ok(ret
== NULL
, "Expected NULL, got %p\n", ret
);
284 todo_wine
ok(checksum_orig
== 0, "Expected 0, got %x\n", checksum_orig
);
285 todo_wine
ok(checksum_new
== 0xaabe, "Expected 0xaabe, got %x\n", checksum_new
);
287 memset(buffer
, 0x22, sizeof(buffer
));
288 checksum_orig
= checksum_new
= 0xdeadbeef;
289 ret
= CheckSumMappedFile(buffer
, sizeof(buffer
), &checksum_orig
, &checksum_new
);
290 ok(ret
== NULL
, "Expected NULL, got %p\n", ret
);
291 todo_wine
ok(checksum_orig
== 0, "Expected 0, got %x\n", checksum_orig
);
292 todo_wine
ok(checksum_new
== 0x5569, "Expected 0x5569, got %x\n", checksum_new
);
294 memset(buffer
, 0x22, sizeof(buffer
));
295 checksum_orig
= checksum_new
= 0xdeadbeef;
296 ret
= CheckSumMappedFile(buffer
, 10, &checksum_orig
, &checksum_new
);
297 ok(ret
== NULL
, "Expected NULL, got %p\n", ret
);
298 todo_wine
ok(checksum_orig
== 0, "Expected 0, got %x\n", checksum_orig
);
299 todo_wine
ok(checksum_new
== 0xaab4, "Expected 0xaab4, got %x\n", checksum_new
);
301 memset(buffer
, 0x22, sizeof(buffer
));
302 checksum_orig
= checksum_new
= 0xdeadbeef;
303 ret
= CheckSumMappedFile(buffer
, 11, &checksum_orig
, &checksum_new
);
304 ok(ret
== NULL
, "Expected NULL, got %p\n", ret
);
305 todo_wine
ok(checksum_orig
== 0, "Expected 0, got %x\n", checksum_orig
);
306 todo_wine
ok(checksum_new
== 0xaad7, "Expected 0xaad7, got %x\n", checksum_new
);
308 /* test checksum of PE module */
309 checksum_orig
= checksum_new
= 0xdeadbeef;
310 ret
= CheckSumMappedFile(test_pe_executable
, sizeof(test_pe_executable
),
311 &checksum_orig
, &checksum_new
);
312 ok((char *)ret
== test_pe_executable
+ 0x80, "Expected %p, got %p\n", test_pe_executable
+ 0x80, ret
);
313 ok(checksum_orig
== 0xabcdef11, "Expected 0xabcdef11, got %x\n", checksum_orig
);
314 ok(checksum_new
== 0xaa4, "Expected 0xaa4, got %x\n", checksum_new
);
316 ret_bool
= GetModuleInformation(GetCurrentProcess(), GetModuleHandleA(NULL
),
317 &modinfo
, sizeof(modinfo
));
318 ok(ret_bool
, "GetModuleInformation failed, error: %x\n", GetLastError());
320 SetLastError(0xdeadbeef);
321 checksum_orig
= checksum_new
= 0xdeadbeef;
322 ret
= CheckSumMappedFile(modinfo
.lpBaseOfDll
, modinfo
.SizeOfImage
, &checksum_orig
, &checksum_new
);
323 ok(ret
!= NULL
, "Expected CheckSumMappedFile to succeed\n");
324 ok(GetLastError() == 0xdeadbeef, "Expected err=0xdeadbeef, got %x\n", GetLastError());
325 ok(checksum_orig
!= 0xdeadbeef, "Expected orig checksum != 0xdeadbeef\n");
326 ok(checksum_new
!= 0xdeadbeef, "Expected new checksum != 0xdeadbeef\n");
328 SetLastError(0xdeadbeef);
329 checksum_orig
= checksum_new
= 0xdeadbeef;
330 ret
= CheckSumMappedFile((char *)modinfo
.lpBaseOfDll
+ 100, modinfo
.SizeOfImage
- 100,
331 &checksum_orig
, &checksum_new
);
332 ok(!ret
, "Expected CheckSumMappedFile to fail, got %p\n", ret
);
333 ok(GetLastError() == 0xdeadbeef, "Expected err=0xdeadbeef, got %x\n", GetLastError());
334 todo_wine
ok(checksum_orig
== 0, "Expected 0, got %x\n", checksum_orig
);
335 todo_wine
ok(checksum_new
!= 0 && checksum_new
!= 0xdeadbeef, "Got unexpected value %x\n", checksum_new
);
337 nt_header
= ImageNtHeader( modinfo
.lpBaseOfDll
);
338 checksum_correct
= nt_header
->OptionalHeader
.CheckSum
;
340 checksum_orig
= checksum_new
= 0xdeadbeef;
341 ret
= CheckSumMappedFile(modinfo
.lpBaseOfDll
, (char *)nt_header
- (char *)modinfo
.lpBaseOfDll
,
342 &checksum_orig
, &checksum_new
);
343 ok(!ret
|| (ret
== nt_header
), "Expected CheckSumMappedFile to fail, got %p\n", ret
);
344 ok((checksum_orig
== 0) || (checksum_orig
== checksum_correct
), "Expected %x, got %x\n", checksum_correct
, checksum_orig
);
345 ok(checksum_new
!= 0 && checksum_new
!= 0xdeadbeef, "Got unexpected value %x\n", checksum_new
);
347 checksum_orig
= checksum_new
= 0xdeadbeef;
348 ret
= CheckSumMappedFile(modinfo
.lpBaseOfDll
, sizeof(IMAGE_DOS_HEADER
),
349 &checksum_orig
, &checksum_new
);
350 ok(!ret
|| (ret
== nt_header
), "Expected CheckSumMappedFile to fail, got %p\n", ret
);
351 ok((checksum_orig
== 0) || (checksum_orig
== checksum_correct
), "Expected %x, got %x\n", checksum_correct
, checksum_orig
);
352 ok(checksum_new
!= 0 && checksum_new
!= 0xdeadbeef, "Got unexpected value %x\n", checksum_new
);
354 checksum_orig
= checksum_new
= 0xdeadbeef;
355 ret
= CheckSumMappedFile(modinfo
.lpBaseOfDll
, 0, &checksum_orig
, &checksum_new
);
356 ok(!ret
|| (ret
== nt_header
), "Expected CheckSumMappedFile to fail, got %p\n", ret
);
357 ok((checksum_orig
== 0xdeadbeef) || (checksum_orig
== checksum_correct
), "Expected %x, got %x\n", checksum_correct
, checksum_orig
);
358 ok((checksum_new
== 0xdeadbeef) || (checksum_new
!= 0 && checksum_new
!= 0xdeadbeef), "Got unexpected value %x\n", checksum_new
);
360 checksum_orig
= checksum_new
= 0xdeadbeef;
361 ret
= CheckSumMappedFile((char *)modinfo
.lpBaseOfDll
+ 1, 0,
362 &checksum_orig
, &checksum_new
);
363 ok(ret
== NULL
, "Expected NULL, got %p\n", ret
);
364 ok((checksum_orig
== 0) || (checksum_orig
== 0xdeadbeef), "Expected 0, got %x\n", checksum_orig
);
365 ok((checksum_new
== 0) || (checksum_new
== 0xdeadbeef), "Expected 0, got %x\n", checksum_new
);
368 START_TEST(integrity
)
370 DWORD file_size
, file_size_orig
, first
, second
;
372 if (!copy_dll_file())
375 file_size_orig
= get_file_size();
377 first
= test_add_certificate(test_cert_data
, sizeof(test_cert_data
));
378 test_get_certificate(test_cert_data
, first
);
379 test_remove_certificate(first
);
381 file_size
= get_file_size();
382 ok(file_size
== file_size_orig
, "File size different after add and remove (old: %d; new: %d)\n", file_size_orig
, file_size
);
384 /* Try adding multiple certificates */
385 first
= test_add_certificate(test_cert_data
, sizeof(test_cert_data
));
386 second
= test_add_certificate(test_cert_data_2
, sizeof(test_cert_data_2
));
387 ok(second
== first
+ 1, "got %d %d\n", first
, second
);
389 test_get_certificate(test_cert_data
, first
);
390 test_get_certificate(test_cert_data_2
, second
);
392 /* Remove the first one and verify the second certificate is intact */
393 test_remove_certificate(first
);
395 test_get_certificate(test_cert_data_2
, second
);
397 test_remove_certificate(second
);
399 file_size
= get_file_size();
400 ok(file_size
== file_size_orig
, "File size different after add and remove (old: %d; new: %d)\n", file_size_orig
, file_size
);
404 DeleteFileA(test_dll_path
);