Test Automation overview

The use of special software to control the execution of tests and compare the expected results with the outcome provided by the tests, is called test automation.
With automated tests we can automate repeated actions which are time-consuming when performed manually, and ensure the functionality of our code. Test automation is critical for software development teams which produce software in short cycles in order to ensure that the software can be reliably released.

In a previous blogpost saw how we can digitally sign a Windows driver in order to help the user determine whether the software can or cannot be trusted. In today’s blogpost we’ll see how we can create a simple .exe program that will install the signed driver to the user’s computer through a simple wizard. The user just runs the installer, makes the appropriate choices and waits until the installation finishes.


In our blogpost today we will show you an example of using node.js to provide a simple echo server which will interact asynchronously with a client html page on Windows OS. This way, we avoid polling for updates in specific time intervals and it is possible to initiate communication from either the client or the server at any time.

Windows Driver Signing – Introduction

Code signing is the process of digitally signing your code to confirm the software publisher and guarantee that the code has not been changed since it was signed by the publisher. To be more specific, a signed driver is a driver sealed with a digital signature, which assures that the original contents of the driver package have not been altered since the driver was signed by a publisher that has verified its identity with a certification authority. This helps users determine whether the software can or cannot be trusted. If a driver is unsigned, or signed by an unknown publisher, Windows will alert the user with a pop-up message like the one below.


Windows Driver Signing – Synopsis

  • Obtain a code signing certificate.
  • Download and install the necessary tools.
  • Generate the .cat file.
  • Download the Cross-Signing certificate.
  • Sign and timestamp the driver.
  • Verify the driver’s signature.

Windows Driver Signing – Analysis

Obtain a code signing certificate.

The first thing you need to do before starting the driver’s signing process is choose a certificate issuer and purchase a code signing certificate. Digital certificates allow developers to digitally sign code in order to prove that it has not been altered by a third party, as well as prevent the annoying warning messages that appear during a program’s installation. For drivers signing, codebender uses an Extended Validation (EV) Code Signing Certificate provided by Digicert.

Download and install the necessary tools.

After you’ve obtained the certificate, you will need two tools that will help you during the driver signing process: SignTool and Inf2Cat. Inf2Cat will be used to generate the security catalog file (.cat file), while SignTool will be used to sign it. Inf2Cat tool is provided by Microsoft via the Windows Driver Kit (WDK), and SignTool can be obtained through the Windows Software Development Kit. Some versions of the Windows SDK are included in Visual Studio installation.

Generate the .cat file.

Once you have obtained the certificate and installed the tools, you are ready to create the .cat file for your driver using the Inf2Cat tool. Navigate to C:\ , create a folder (e.g MyDriver) and copy your .inf file inside.
Open x86 Free Build Environment by navigating to Windows Driver Kits, WDK YourBuildNumber,Build Environments, Windows 7, and clicking on x86 Free Build Environment.

Run the command:

inf2cat /v /driver:C:\MyDriver\ /os:XP_X86,XP_X64,Vista_X86,Vista_X64,7_X86,7_X64


inf2cat /v /driver:path /os:os1,os2,...

/v: Configures inf2cat to display verbose information in a command window.
/driver:path: Path to the directory that contains the .inf file.
/os:os1os2,…: Configures inf2cat to verify that a driver’s .inf file complies with the signing requirements for the Windows versions that are specified by WindowsVersionList.

If the catalog generation was successful you will be able to see the message: Catalog generation complete. and mydriver.cat file will appear inside C:\MyDriver\ directory.


Download the Cross-Signing certificate.

In order to be able to use SignΤool and sign your driver, you will need to download and copy your CA’s Code Signing Cross-Certificate on the folder where your .cat file is located. You will need to specify this certificate in SignΤool. Microsoft provides a list of cross-signing certificates they currently support, which the developer can download and use during the signing process.

Sign and timestamp the driver.

Once the catalog file generation is completed, you will finally be able to sign and timestamp your driver. It is important to timestamp your signatures so that they will continue to work after your certificate’s expiration. To timestamp your signature, you will have to include an argument of the form /t http://timestampserver.com when you invoke SignTool.

To sign your .inf file run the command:

signtool sign /V /ac "C:\MyDriver\DigiCert High Assurance EV Root CA.crt" /t http://timestamp.digicert.com /n "CODEBENDER OOD" C:MyDriver\mydriver.cat

Syntax: signtool sign /V /ac "cross-signing-certificate" /t URL /n "subject-certificate-name" catFile`

sign: Command used to sign files.
/ac “cross-signing-certificate”: The cross-signing certificate downloaded previously.
/V: Configures signtool to display verbose information in a command window.
/t URL: Specifies the URL of the timestamp server.
/n “subject-certificate-name”: Specifies the name of the subject of the signing certificate.
catFile: The catalog file that you want to sign.


Verify the driver’s signature.

To verify that your cat file was successfully signed you can use the following command:
signtool verify /v /kp /c C:\MyDriver\mydriver.cat

The verify command configures SignTool to verify the signature that is embedded in the catalog file.

Syntax: signtool verify /v /kp /c catFile

verify: Command used to verify signature. /v: Configures signtool to display verbose information in a command window.
/kp: Configures SignTool to perform the verification by using the x64 kernel-mode driver signing policy.
/c catFile: Specifies the catalog file by name.


I hope that you have enjoyed reading my post!