Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(329)

Unified Diff: chrome/android/webapk/libs/client/junit/src/org/chromium/webapk/lib/client/WebApkVerifySignatureTest.java

Issue 2772483002: Commment signed webapks working and verified. (Closed)
Patch Set: Resond to Peter's comments. Created 3 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/android/webapk/libs/client/junit/src/org/chromium/webapk/lib/client/WebApkVerifySignatureTest.java
diff --git a/chrome/android/webapk/libs/client/junit/src/org/chromium/webapk/lib/client/WebApkVerifySignatureTest.java b/chrome/android/webapk/libs/client/junit/src/org/chromium/webapk/lib/client/WebApkVerifySignatureTest.java
new file mode 100644
index 0000000000000000000000000000000000000000..242ca95e99570f1d26b1eac5d424a65c0a0784f7
--- /dev/null
+++ b/chrome/android/webapk/libs/client/junit/src/org/chromium/webapk/lib/client/WebApkVerifySignatureTest.java
@@ -0,0 +1,139 @@
+// Copyright 2017 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+package org.chromium.webapk.lib.client;
+
+import static org.junit.Assert.assertArrayEquals;
+import static org.junit.Assert.assertEquals;
+import static org.junit.Assert.assertTrue;
+
+import org.junit.Test;
+import org.junit.runner.RunWith;
+import org.robolectric.annotation.Config;
+
+import org.chromium.testing.local.LocalRobolectricTestRunner;
+import org.chromium.testing.local.TestDir;
+
+import java.io.RandomAccessFile;
+import java.nio.MappedByteBuffer;
+import java.nio.channels.FileChannel;
+import java.nio.file.Files;
+import java.nio.file.Paths;
+import java.security.KeyFactory;
+import java.security.PublicKey;
+import java.security.SignatureException;
+import java.security.spec.X509EncodedKeySpec;
+
+/** Unit tests for WebApkVerifySignature for Android. */
+@RunWith(LocalRobolectricTestRunner.class)
+@Config(manifest = Config.NONE)
+public class WebApkVerifySignatureTest {
+ /** Elliptical Curves, Digital Signature Algorithm */
+ private static final String KEY_FACTORY = "EC";
+
+ private static final String TEST_DATA_DIR = "/webapks/";
+
+ static PublicKey readPublicKey(String publicDER) throws Exception {
+ return createPublicKey(Files.readAllBytes(Paths.get(publicDER)));
+ }
+
+ private static PublicKey createPublicKey(byte[] bytes) throws Exception {
+ return KeyFactory.getInstance(KEY_FACTORY).generatePublic(new X509EncodedKeySpec(bytes));
+ }
+
+ @Test
+ public void testHexToBytes() throws Exception {
+ assertEquals(null, WebApkVerifySignature.hexToBytes(""));
+ byte[] test = {(byte) 0xFF, (byte) 0xFE, 0x00, 0x01};
+ assertArrayEquals(test, WebApkVerifySignature.hexToBytes("fffe0001"));
+ assertArrayEquals(test, WebApkVerifySignature.hexToBytes("FFFE0001"));
+ assertEquals(null, WebApkVerifySignature.hexToBytes("f")); // Odd number of nibbles.
+ }
+
+ @Test
+ public void testCommentHash() throws Exception {
+ byte[] bytes = hexStringToByteArray("decafbad");
pkotwicz 2017/03/31 03:59:24 Can you initialize bytes with the result of hexStr
ScottK 2017/04/03 17:44:18 Done.
+ assertEquals(null, WebApkVerifySignature.parseCommentSignature("weapk:decafbad"));
+ assertEquals(null, WebApkVerifySignature.parseCommentSignature("webapk:"));
+ assertEquals(null, WebApkVerifySignature.parseCommentSignature("webapk:decafbad"));
+ assertArrayEquals(
+ bytes, WebApkVerifySignature.parseCommentSignature("webapk:12345:decafbad"));
+ assertArrayEquals(
+ bytes, WebApkVerifySignature.parseCommentSignature("XXXwebapk:0000:decafbadXXX"));
+ assertArrayEquals(
+ bytes, WebApkVerifySignature.parseCommentSignature("\n\nwebapk:0000:decafbad\n\n"));
+ assertArrayEquals(bytes,
+ WebApkVerifySignature.parseCommentSignature("chrome-webapk:000:decafbad\n\n"));
+ assertArrayEquals(bytes,
+ WebApkVerifySignature.parseCommentSignature(
+ "prefixed: chrome-webapk:000:decafbad :suffixed"));
+ }
+
+ public static String testFilename(String fname) {
pkotwicz 2017/03/31 03:59:24 testFilename() -> testFilePath()
ScottK 2017/04/03 17:44:18 Done.
+ return TestDir.getTestFilePath(TEST_DATA_DIR + fname);
+ }
+
+ @Test
+ public void testVerifyFiles() throws Exception {
pkotwicz 2017/03/31 03:59:24 Are the testVerifyFiles() and the testBadVerifyFil
ScottK 2017/04/03 17:44:18 They increase our code coverage by testing things
pkotwicz 2017/04/04 18:19:36 I don't think that it increases code coverage. Wha
ScottK 2017/04/04 21:03:02 Sorry, my mistake, it's the other way around - Web
pkotwicz 2017/04/05 02:54:28 The main concern is preserving the hackability of
ScottK 2017/04/05 20:14:27 Ok, removing this.
+ PublicKey pub = readPublicKey(testFilename("public.der"));
+ String[] filenames = {"example.apk", "java-example.apk"};
+ for (String filename : filenames) {
+ RandomAccessFile file = new RandomAccessFile(testFilename(filename), "r");
+ FileChannel inChannel = file.getChannel();
+ MappedByteBuffer buf =
+ inChannel.map(FileChannel.MapMode.READ_ONLY, 0, inChannel.size());
+ buf.load();
+ WebApkVerifySignature v = new WebApkVerifySignature(buf);
+ assertEquals("for file " + filename, WebApkVerifySignature.ERROR_OK, v.read());
+ assertEquals(
+ "for file " + filename, WebApkVerifySignature.ERROR_OK, v.verifySignature(pub));
+ buf.clear();
+ inChannel.close();
+ file.close();
+ }
+ }
+
+ @Test
+ public void testBadVerifyFiles() throws Exception {
+ PublicKey pub = readPublicKey(testFilename("public.der"));
+ String[] filenames = {
+ "bad-sig.apk", "bad-utf8-fname.apk", "empty.apk", "extra-len-too-large.apk",
+ "fcomment-too-large.apk", "no-cd.apk", "no-comment.apk", "no-eocd.apk",
+ "no-lfh.apk", "not-an.apk", "too-many-metainf.apk", "truncated.apk", "zeros.apk",
+ "zeros-at-end.apk",
+ };
+ for (String filename : filenames) {
+ RandomAccessFile file = new RandomAccessFile(testFilename(filename), "r");
+ FileChannel inChannel = file.getChannel();
+ MappedByteBuffer buf =
+ inChannel.map(FileChannel.MapMode.READ_ONLY, 0, inChannel.size());
+ buf.load();
+ WebApkVerifySignature v = new WebApkVerifySignature(buf);
+ try {
+ if (v.read() == WebApkVerifySignature.ERROR_OK) {
+ assertTrue(v.verifySignature(pub) != WebApkVerifySignature.ERROR_OK);
+ }
+ } catch (SignatureException | IllegalArgumentException e) {
+ // expected
+ }
+ buf.clear();
+ inChannel.close();
+ file.close();
+ }
+ }
+
+ private static byte[] hexStringToByteArray(String s) {
+ int len = s.length();
+ if (len % 2 == 1) {
+ // Expect an even number of nibbles.
+ return null;
+ }
+ byte[] data = new byte[len / 2];
+ for (int i = 0; i < len; i += 2) {
+ data[i / 2] = (byte) ((Character.digit(s.charAt(i), 16) << 4)
+ | Character.digit(s.charAt(i + 1), 16));
+ }
+ return data;
+ }
+}

Powered by Google App Engine
This is Rietveld 408576698