def testAPKCertFingerprint(self): """ Test if certificates are correctly unpacked from the SignatureBlock files Check if fingerprints matches :return: """ from androguard.core.bytecodes.apk import APK import binascii from hashlib import md5, sha1, sha256 a = APK("examples/android/TestsAndroguard/bin/TestActivity.apk", skip_analysis=True) # this one is not signed v2, it is v1 only self.assertTrue(a.is_signed_v1()) self.assertFalse(a.is_signed_v2()) self.assertTrue(a.is_signed()) self.assertEqual(a.get_certificates_der_v2(), []) self.assertEqual(a.get_certificates_v2(), []) self.assertEqual(a.get_signature_name(), "META-INF/CERT.RSA") self.assertEqual(a.get_signature_names(), ["META-INF/CERT.RSA"]) cert = a.get_certificate(a.get_signature_name()) cert_der = a.get_certificate_der(a.get_signature_name()) # Keytool are the hashes collected by keytool -printcert -file CERT.RSA for h2, keytool in [(md5, "99:FF:FC:37:D3:64:87:DD:BA:AB:F1:7F:94:59:89:B5"), (sha1, "1E:0B:E4:01:F9:34:60:E0:8D:89:A3:EF:6E:27:25:55:6B:E1:D1:6B"), (sha256, "6F:5C:31:60:8F:1F:9E:28:5E:B6:34:3C:7C:8A:F0:7D:E8:1C:1F:B2:14:8B:53:49:BE:C9:06:44:41:44:57:6D")]: x = h2() x.update(cert_der) hash_hashlib = x.hexdigest() self.assertEqual(hash_hashlib.lower(), keytool.replace(":", "").lower())
def testAPKv2Signature(self): from androguard.core.bytecodes.apk import APK a = APK("examples/signing/TestActivity_signed_both.apk") self.assertTrue(a.is_signed_v1()) self.assertTrue(a.is_signed_v2()) self.assertTrue(a.is_signed()) # Signing name is maximal 8 chars... self.assertEqual(a.get_signature_name(), "META-INF/ANDROGUA.RSA") self.assertEqual(len(a.get_certificates_der_v2()), 1) # As we signed with the same certificate, both methods should return the # same content self.assertEqual(a.get_certificate_der(a.get_signature_name()), a.get_certificates_der_v2()[0]) from asn1crypto import x509 self.assertIsInstance(a.get_certificates_v2()[0], x509.Certificate) # Test if the certificate is also the same as on disk with open("examples/signing/certificate.der", "rb") as f: cert = f.read() cert_der_v1 = a.get_certificate_der(a.get_signature_name()) cert_der_v2 = a.get_certificates_der_v2()[0] for fun in [hashlib.md5, hashlib.sha1, hashlib.sha256, hashlib.sha512]: h1 = fun(cert).hexdigest() h2 = fun(cert_der_v1).hexdigest() h3 = fun(cert_der_v2).hexdigest() self.assertEqual(h1, h2) self.assertEqual(h1, h3) self.assertEqual(h2, h3)
def testAPKCertFingerprint(self): """ Test if certificates are correctly unpacked from the SignatureBlock files Check if fingerprints matches :return: """ from androguard.core.bytecodes.apk import APK import binascii from cryptography.hazmat.primitives import hashes from hashlib import md5, sha1, sha256 a = APK("examples/android/TestsAndroguard/bin/TestActivity.apk", skip_analysis=True) cert = a.get_certificate(a.get_signature_name()) cert_der = a.get_certificate_der(a.get_signature_name()) # Keytool are the hashes collected by keytool -printcert -file CERT.RSA for h, h2, keytool in [(hashes.MD5, md5, "99:FF:FC:37:D3:64:87:DD:BA:AB:F1:7F:94:59:89:B5"), (hashes.SHA1, sha1, "1E:0B:E4:01:F9:34:60:E0:8D:89:A3:EF:6E:27:25:55:6B:E1:D1:6B"), (hashes.SHA256, sha256, "6F:5C:31:60:8F:1F:9E:28:5E:B6:34:3C:7C:8A:F0:7D:E8:1C:1F:B2:14:8B:53:49:BE:C9:06:44:41:44:57:6D")]: hash_x509 = binascii.hexlify(cert.fingerprint(h())).decode("ascii") x = h2() x.update(cert_der) hash_hashlib = x.hexdigest() self.assertEqual(hash_x509.lower(), hash_hashlib.lower()) self.assertEqual(hash_x509.lower(), keytool.replace(":", "").lower())
def testAPKv2Signature(self): from androguard.core.bytecodes.apk import APK a = APK("examples/signing/TestActivity_signed_both.apk") self.assertTrue(a.is_signed_v1()) self.assertTrue(a.is_signed_v2()) self.assertTrue(a.is_signed()) # Signing name is maximal 8 chars... self.assertEqual(a.get_signature_name(), "META-INF/ANDROGUA.RSA") self.assertEqual(len(a.get_certificates_der_v2()), 1) # As we signed with the same certificate, both methods should return the # same content self.assertEqual(a.get_certificate_der(a.get_signature_name()), a.get_certificates_der_v2()[0]) from asn1crypto import x509 self.assertIsInstance(a.get_certificates_v2()[0], x509.Certificate) # Test if the certificate is also the same as on disk with open("examples/signing/certificate.der", "rb") as f: cert = f.read() cert_der_v1 = a.get_certificate_der(a.get_signature_name()) cert_der_v2 = a.get_certificates_der_v2()[0] for fun in [hashlib.md5, hashlib.sha1, hashlib.sha256, hashlib.sha512]: h1 = fun(cert).hexdigest() h2 = fun(cert_der_v1).hexdigest() h3 = fun(cert_der_v2).hexdigest() self.assertEqual(h1, h2) self.assertEqual(h1, h3) self.assertEqual(h2, h3)
def testAPKCertFingerprint(self): """ Test if certificates are correctly unpacked from the SignatureBlock files Check if fingerprints matches :return: """ from androguard.core.bytecodes.apk import APK import binascii from hashlib import md5, sha1, sha256 a = APK("examples/android/TestsAndroguard/bin/TestActivity.apk", skip_analysis=True) # this one is not signed v2, it is v1 only self.assertTrue(a.is_signed_v1()) self.assertFalse(a.is_signed_v2()) self.assertTrue(a.is_signed()) self.assertEqual(a.get_certificates_der_v2(), []) self.assertEqual(a.get_certificates_v2(), []) self.assertEqual(a.get_signature_name(), "META-INF/CERT.RSA") self.assertEqual(a.get_signature_names(), ["META-INF/CERT.RSA"]) cert = a.get_certificate(a.get_signature_name()) cert_der = a.get_certificate_der(a.get_signature_name()) # Keytool are the hashes collected by keytool -printcert -file CERT.RSA for h2, keytool in [(md5, "99:FF:FC:37:D3:64:87:DD:BA:AB:F1:7F:94:59:89:B5"), (sha1, "1E:0B:E4:01:F9:34:60:E0:8D:89:A3:EF:6E:27:25:55:6B:E1:D1:6B"), (sha256, "6F:5C:31:60:8F:1F:9E:28:5E:B6:34:3C:7C:8A:F0:7D:E8:1C:1F:B2:14:8B:53:49:BE:C9:06:44:41:44:57:6D")]: x = h2() x.update(cert_der) hash_hashlib = x.hexdigest() self.assertEqual(hash_hashlib.lower(), keytool.replace(":", "").lower())
def testAPKCertFingerprint(self): """ Test if certificates are correctly unpacked from the SignatureBlock files Check if fingerprints matches :return: """ from androguard.core.bytecodes.apk import APK import binascii from cryptography.hazmat.primitives import hashes from hashlib import md5, sha1, sha256 a = APK("examples/android/TestsAndroguard/bin/TestActivity.apk", skip_analysis=True) cert = a.get_certificate(a.get_signature_name()) cert_der = a.get_certificate_der(a.get_signature_name()) # Keytool are the hashes collected by keytool -printcert -file CERT.RSA for h, h2, keytool in [ (hashes.MD5, md5, "99:FF:FC:37:D3:64:87:DD:BA:AB:F1:7F:94:59:89:B5"), (hashes.SHA1, sha1, "1E:0B:E4:01:F9:34:60:E0:8D:89:A3:EF:6E:27:25:55:6B:E1:D1:6B"), (hashes.SHA256, sha256, "6F:5C:31:60:8F:1F:9E:28:5E:B6:34:3C:7C:8A:F0:7D:E8:1C:1F:B2:14:8B:53:49:BE:C9:06:44:41:44:57:6D" ) ]: hash_x509 = binascii.hexlify(cert.fingerprint(h())).decode("ascii") x = h2() x.update(cert_der) hash_hashlib = x.hexdigest() self.assertEqual(hash_x509.lower(), hash_hashlib.lower()) self.assertEqual(hash_x509.lower(), keytool.replace(":", "").lower())
def testAPKCert(self): """ Test if certificates are correctly unpacked from the SignatureBlock files :return: """ from androguard.core.bytecodes.apk import APK import binascii a = APK("examples/android/TestsAndroguard/bin/TestActivity.apk", skip_analysis=True) cert = a.get_certificate_der(a.get_signature_name()) expected = "308201E53082014EA00302010202045114FECF300D06092A864886F70D010105" \ "05003037310B30090603550406130255533110300E060355040A1307416E6472" \ "6F6964311630140603550403130D416E64726F6964204465627567301E170D31" \ "33303230383133333430375A170D3433303230313133333430375A3037310B30" \ "090603550406130255533110300E060355040A1307416E64726F696431163014" \ "0603550403130D416E64726F696420446562756730819F300D06092A864886F7" \ "0D010101050003818D00308189028181009903975EC93F0F3CCB54BD1A415ECF" \ "3505993715B8B9787F321104ACC7397D186F01201341BCC5771BB28695318E00" \ "6E47C888D3C7EE9D952FF04DF06EDAB1B511F51AACDCD02E0ECF5AA7EC6B51BA" \ "08C601074CF2DA579BD35054E4F77BAAAAF0AA67C33C1F1C3EEE05B5862952C0" \ "888D39179C0EDD785BA4F47FB7DF5D5F030203010001300D06092A864886F70D" \ "0101050500038181006B571D685D41E77744F5ED20822AE1A14199811CE649BB" \ "B29248EB2F3CC7FB70F184C2A3D17C4F86B884FCA57EEB289ECB5964A1DDBCBD" \ "FCFC60C6B7A33D189927845067C76ED29B42D7F2C7F6E2389A4BC009C01041A3" \ "6E666D76D1D66467416E68659D731DC7328CB4C2E989CF59BB6D2D2756FDE7F2" \ "B3FB733EBB4C00FD3B" self.assertEqual(binascii.hexlify(cert).decode("ascii").upper(), expected)
def testAPKCert(self): """ Test if certificates are correctly unpacked from the SignatureBlock files :return: """ from androguard.core.bytecodes.apk import APK import binascii a = APK("examples/android/TestsAndroguard/bin/TestActivity.apk", skip_analysis=True) cert = a.get_certificate_der(a.get_signature_name()) expected = "308201E53082014EA00302010202045114FECF300D06092A864886F70D010105" \ "05003037310B30090603550406130255533110300E060355040A1307416E6472" \ "6F6964311630140603550403130D416E64726F6964204465627567301E170D31" \ "33303230383133333430375A170D3433303230313133333430375A3037310B30" \ "090603550406130255533110300E060355040A1307416E64726F696431163014" \ "0603550403130D416E64726F696420446562756730819F300D06092A864886F7" \ "0D010101050003818D00308189028181009903975EC93F0F3CCB54BD1A415ECF" \ "3505993715B8B9787F321104ACC7397D186F01201341BCC5771BB28695318E00" \ "6E47C888D3C7EE9D952FF04DF06EDAB1B511F51AACDCD02E0ECF5AA7EC6B51BA" \ "08C601074CF2DA579BD35054E4F77BAAAAF0AA67C33C1F1C3EEE05B5862952C0" \ "888D39179C0EDD785BA4F47FB7DF5D5F030203010001300D06092A864886F70D" \ "0101050500038181006B571D685D41E77744F5ED20822AE1A14199811CE649BB" \ "B29248EB2F3CC7FB70F184C2A3D17C4F86B884FCA57EEB289ECB5964A1DDBCBD" \ "FCFC60C6B7A33D189927845067C76ED29B42D7F2C7F6E2389A4BC009C01041A3" \ "6E666D76D1D66467416E68659D731DC7328CB4C2E989CF59BB6D2D2756FDE7F2" \ "B3FB733EBB4C00FD3B" self.assertEqual(binascii.hexlify(cert).decode("ascii").upper(), expected)