fix: file hash & apk cert hash

This commit is contained in:
2025-02-15 22:33:05 +00:00
parent c0b7312aae
commit 0502845986
2 changed files with 108 additions and 73 deletions

View File

@ -35,20 +35,20 @@ impl ApkSigningBlock {
for (k, v) in &self.data { for (k, v) in &self.data {
match *k { match *k {
V2_SIG_BLOCK_ID => { V2_SIG_BLOCK_ID => {
let v2 = get_length_prefixed_u32_sequence(v)?; let v2_block = remove_prefix_layers(v)?;
let v2_block = get_lv_sequence(v2_block)?;
ensure!( ensure!(
v2.len() == 1, v2_block.len() == 3,
"Expected 1 element in signing block got {}", "Expected 3 elements in signing block got {}",
v2.len() v2_block.len()
); );
let signed_data = get_lv_sequence(v2_block[0])?;
let v2 = get_length_prefixed_u32_sequence(v2[0])?;
let signed_data = get_sequence(v2[0])?;
let digests = get_sequence_kv(signed_data[0])?; let digests = get_sequence_kv(signed_data[0])?;
let certificates = get_sequence(signed_data[1])?; let certificates = get_lv_sequence(signed_data[1])?;
let attributes = get_sequence_kv(signed_data[2])?; let attributes = get_sequence_kv(signed_data[2])?;
let signatures = get_sequence_kv(v2[1])?;
let public_key = v2[2]; let signatures = get_sequence_kv(v2_block[1])?;
let public_key = v2_block[2];
let digests: HashMap<u32, &[u8]> = HashMap::from_iter(digests); let digests: HashMap<u32, &[u8]> = HashMap::from_iter(digests);
sigs.push(ApkSignatureBlock::V2 { sigs.push(ApkSignatureBlock::V2 {
attributes: HashMap::from_iter( attributes: HashMap::from_iter(
@ -60,23 +60,20 @@ impl ApkSigningBlock {
}); });
} }
V3_SIG_BLOCK_ID => { V3_SIG_BLOCK_ID => {
let v3 = get_length_prefixed_u32_sequence(v)?; let mut v = &v[4..];
ensure!( let mut v3_block = take_lv_u32(&mut v)?;
v3.len() == 1,
"Expected 1 element in signing block got {}",
v3.len()
);
let v3 = get_length_prefixed_u32_sequence(v3[0])?; let mut signed_data = take_lv_u32(&mut v3_block)?;
let signed_data = get_sequence(v3[0])?; let digests = get_sequence_kv(take_lv_u32(&mut signed_data)?)?;
let digests = get_sequence_kv(signed_data[0])?; let certificates = get_lv_sequence(take_lv_u32(&mut signed_data)?)?;
let certificates = get_sequence(signed_data[1])?; let min_sdk_signed = u32::from_le_bytes(signed_data[..4].try_into()?);
let min_sdk_signed = u32::from_le_bytes(signed_data[2].try_into()?); let max_sdk_signed = u32::from_le_bytes(signed_data[4..8].try_into()?);
let max_sdk_signed = u32::from_le_bytes(signed_data[3].try_into()?); signed_data = &signed_data[8..];
let attributes = get_sequence_kv(signed_data[4])?; let attributes = get_sequence_kv(take_lv_u32(&mut signed_data)?)?;
let min_sdk = u32::from_le_bytes(v3[1].try_into()?); let min_sdk = u32::from_le_bytes(v3_block[..4].try_into()?);
let max_sdk = u32::from_le_bytes(v3[2].try_into()?); let max_sdk = u32::from_le_bytes(v3_block[4..8].try_into()?);
v3_block = &v3_block[8..];
ensure!( ensure!(
min_sdk_signed == min_sdk, min_sdk_signed == min_sdk,
@ -91,8 +88,8 @@ impl ApkSigningBlock {
max_sdk max_sdk
); );
let signatures = get_sequence_kv(v3[3])?; let signatures = get_sequence_kv(take_lv_u32(&mut v3_block)?)?;
let public_key = v3[4]; let public_key = take_lv_u32(&mut v3_block)?;
let digests: HashMap<u32, &[u8]> = HashMap::from_iter(digests); let digests: HashMap<u32, &[u8]> = HashMap::from_iter(digests);
sigs.push(ApkSignatureBlock::V3 { sigs.push(ApkSignatureBlock::V3 {
@ -257,7 +254,7 @@ where
let mut magic_buf = [0u8; 16]; let mut magic_buf = [0u8; 16];
loop { loop {
let magic_pos = zip.seek(SeekFrom::Current(-17))?; let magic_pos = zip.seek(SeekFrom::Current(-17))?;
if magic_pos <= 4 { if magic_pos <= 16 {
bail!("Failed to find signing block"); bail!("Failed to find signing block");
} }
@ -276,19 +273,19 @@ where
size2 size2
); );
let mut data_bytes = size1 - 8 - 16; let mut data_bytes = size2 - 16 - 8;
let mut sigs = Vec::new(); let mut blocks = Vec::new();
loop { loop {
let (k, v) = read_u64_length_prefixed_kv(zip)?; let (k, v) = read_u64_length_prefixed_kv(zip)?;
data_bytes -= (v.len() + 4 + 8) as u64; data_bytes -= (v.len() + 4 + 8) as u64;
sigs.push((k, v)); blocks.push((k, v));
if data_bytes == 0 { if data_bytes == 0 {
break; break;
} }
} }
zip.seek(SeekFrom::Start(0))?; zip.seek(SeekFrom::Start(0))?;
return Ok(ApkSigningBlock { data: sigs }); return Ok(ApkSigningBlock { data: blocks });
} }
} }
} }
@ -302,41 +299,70 @@ where
let k = file.read_u32::<LittleEndian>()?; let k = file.read_u32::<LittleEndian>()?;
let v_len = kv_len as usize - 4; let v_len = kv_len as usize - 4;
let mut v = vec![0; v_len]; let mut v = vec![0; v_len];
file.read_exact(v.as_mut_slice())?; file.read_exact(&mut v)?;
Ok((k, v)) Ok((k, v))
} }
#[inline] #[inline]
fn get_u64_length_prefixed_kv(slice: &[u8]) -> Result<(u32, &[u8])> { fn get_lv_u32_kv(slice: &[u8]) -> Result<(u32, &[u8])> {
let kv_len = u64::from_le_bytes(slice[..8].try_into()?); let data = get_lv_u32(slice)?;
let k = u32::from_le_bytes(slice[8..12].try_into()?); let k = u32::from_le_bytes(data[0..4].try_into()?);
Ok((k, &slice[12..(kv_len as usize - 12)])) Ok((k, &data[4..]))
} }
#[inline] #[inline]
fn get_u32_length_prefixed_kv(slice: &[u8]) -> Result<(u32, &[u8])> { fn get_lv_u32(slice: &[u8]) -> Result<&[u8]> {
let kv_len = u32::from_le_bytes(slice[..4].try_into()?); let len = u32::from_le_bytes(slice[0..4].try_into()?);
let k = u32::from_le_bytes(slice[4..8].try_into()?); ensure!(
Ok((k, &slice[8..(kv_len as usize - 8)])) len <= (slice.len() - 4) as u32,
} "Invalid LV sequence {} > {}",
len,
#[inline] slice.len(),
fn get_length_prefixed_u32(slice: &[u8]) -> Result<&[u8]> { );
let len = u32::from_le_bytes(slice[..4].try_into()?);
Ok(&slice[4..4 + len as usize]) Ok(&slice[4..4 + len as usize])
} }
#[inline] #[inline]
fn get_length_prefixed_u32_sequence(slice: &[u8]) -> Result<Vec<&[u8]>> { fn take_lv_u32<'a>(slice: &mut &'a[u8]) -> Result<&'a [u8]> {
let sequence_len = u32::from_le_bytes(slice[..4].try_into()?); let len = u32::from_le_bytes(slice[..4].try_into()?);
get_sequence(&slice[4..4 + sequence_len as usize]) ensure!(
len <= (slice.len() - 4) as u32,
"Invalid LV sequence {} > {}",
len,
slice.len(),
);
let (a, b) = slice[4..].split_at(len as usize);
*slice = b;
Ok(a)
} }
/// Remove 1 or more prefix layers
/// IDK why android needs 3 layers of prefixed lengths, maybe its just how it was written in Java,
/// but it makes no logical sense:
/// ```yaml
/// L: (1000)
/// L: (996)
/// L: V (740) - SEQ
/// L: V (252) - SEQ
/// ```
#[inline] #[inline]
fn get_sequence(mut slice: &[u8]) -> Result<Vec<&[u8]>> { fn remove_prefix_layers(mut slice: &[u8]) -> Result<&[u8]> {
let l1 = u32::from_le_bytes(slice[..4].try_into()?);
loop {
slice = &slice[4..];
let l2 = u32::from_le_bytes(slice[..4].try_into()?);
if l1 != l2 + 4 {
return Ok(slice);
}
}
}
/// Read 0 or more length prefixed values until the slice is empty
#[inline]
fn get_lv_sequence(mut slice: &[u8]) -> Result<Vec<&[u8]>> {
let mut ret = Vec::new(); let mut ret = Vec::new();
while slice.len() >= 4 { while slice.len() >= 4 {
let data = get_length_prefixed_u32(slice)?; let data = get_lv_u32(&slice[..])?;
let r_len = data.len() + 4; let r_len = data.len() + 4;
slice = &slice[r_len..]; slice = &slice[r_len..];
ret.push(data); ret.push(data);
@ -346,7 +372,7 @@ fn get_sequence(mut slice: &[u8]) -> Result<Vec<&[u8]>> {
#[inline] #[inline]
fn get_sequence_kv(slice: &[u8]) -> Result<Vec<(u32, &[u8])>> { fn get_sequence_kv(slice: &[u8]) -> Result<Vec<(u32, &[u8])>> {
let seq = get_sequence(slice)?; let seq = get_lv_sequence(slice)?;
Ok(seq Ok(seq
.into_iter() .into_iter()
.map(|s| { .map(|s| {

View File

@ -71,26 +71,26 @@ impl TryInto<EventBuilder> for RepoArtifact {
match self.metadata { match self.metadata {
ArtifactMetadata::APK { ArtifactMetadata::APK {
manifest, manifest,
signatures, signature_blocks: signatures,
} => { } => {
for signature in signatures { for signature in signatures {
match signature { match signature {
ApkSignatureBlock::Unknown { .. } => { ApkSignatureBlock::Unknown { .. } => {
warn!("No signature found in metadata"); warn!("No signature found in metadata");
} }
ApkSignatureBlock::V2 { signatures, .. } => { ApkSignatureBlock::V2 { certificates, .. } => {
for signature in signatures { for certificate in certificates {
b = b.tag(Tag::parse([ b = b.tag(Tag::parse([
"apk_signature_hash", "apk_signature_hash",
&hex::encode(signature.digest), &hex::encode(Sha256::digest(certificate)),
])?); ])?);
} }
} }
ApkSignatureBlock::V3 { signatures, .. } => { ApkSignatureBlock::V3 { certificates, .. } => {
for signature in signatures { for certificate in certificates {
b = b.tag(Tag::parse([ b = b.tag(Tag::parse([
"apk_signature_hash", "apk_signature_hash",
&hex::encode(signature.digest), &hex::encode(Sha256::digest(certificate)),
])?); ])?);
} }
} }
@ -124,7 +124,7 @@ impl TryInto<EventBuilder> for RepoArtifact {
pub enum ArtifactMetadata { pub enum ArtifactMetadata {
APK { APK {
manifest: AndroidManifest, manifest: AndroidManifest,
signatures: Vec<ApkSignatureBlock>, signature_blocks: Vec<ApkSignatureBlock>,
}, },
} }
@ -133,7 +133,7 @@ impl Display for ArtifactMetadata {
match self { match self {
ArtifactMetadata::APK { ArtifactMetadata::APK {
manifest, manifest,
signatures, signature_blocks: signatures,
} => { } => {
write!( write!(
f, f,
@ -173,6 +173,7 @@ impl Display for Platform {
Architecture::ARM64 => "arm64-v8a", Architecture::ARM64 => "arm64-v8a",
Architecture::X86 => "x86", Architecture::X86 => "x86",
Architecture::X86_64 => "x86_64", Architecture::X86_64 => "x86_64",
Architecture::Universal => "universal",
} }
), ),
Platform::IOS { arch } => write!( Platform::IOS { arch } => write!(
@ -220,6 +221,7 @@ impl Display for Platform {
#[derive(Debug, Clone)] #[derive(Debug, Clone)]
pub enum Architecture { pub enum Architecture {
Universal,
ARMv7, ARMv7,
ARM64, ARM64,
X86, X86,
@ -233,6 +235,7 @@ impl Display for Architecture {
Architecture::ARM64 => write!(f, "arm64-v8a"), Architecture::ARM64 => write!(f, "arm64-v8a"),
Architecture::X86 => write!(f, "x86"), Architecture::X86 => write!(f, "x86"),
Architecture::X86_64 => write!(f, "x86_64"), Architecture::X86_64 => write!(f, "x86_64"),
Architecture::Universal => write!(f, "universal"),
} }
} }
} }
@ -396,8 +399,6 @@ fn load_apk_artifact(path: &Path) -> Result<RepoArtifact> {
}) })
.collect(); .collect();
ensure!(lib_arch.len() == 1, "Unknown library architecture");
Ok(RepoArtifact { Ok(RepoArtifact {
name: path.file_name().unwrap().to_str().unwrap().to_string(), name: path.file_name().unwrap().to_str().unwrap().to_string(),
size: path.metadata()?.len(), size: path.metadata()?.len(),
@ -405,17 +406,21 @@ fn load_apk_artifact(path: &Path) -> Result<RepoArtifact> {
hash: hash_file(path)?, hash: hash_file(path)?,
content_type: "application/vnd.android.package-archive".to_string(), content_type: "application/vnd.android.package-archive".to_string(),
platform: Platform::Android { platform: Platform::Android {
arch: match lib_arch.iter().next().unwrap().as_str() { arch: if lib_arch.is_empty() {
"arm64-v8a" => Architecture::ARM64, Architecture::Universal
"armeabi-v7a" => Architecture::ARMv7, } else {
"x86_64" => Architecture::X86_64, match lib_arch.iter().next().unwrap().as_str() {
"x86" => Architecture::X86, "arm64-v8a" => Architecture::ARM64,
v => bail!("unknown architecture: {v}"), "armeabi-v7a" => Architecture::ARMv7,
"x86_64" => Architecture::X86_64,
"x86" => Architecture::X86,
v => bail!("unknown architecture: {v}"),
}
}, },
}, },
metadata: ArtifactMetadata::APK { metadata: ArtifactMetadata::APK {
manifest, manifest,
signatures: sig_block.get_signatures()?, signature_blocks: sig_block.get_signatures()?,
}, },
}) })
} }
@ -423,7 +428,7 @@ fn load_apk_artifact(path: &Path) -> Result<RepoArtifact> {
fn hash_file(path: &Path) -> Result<Vec<u8>> { fn hash_file(path: &Path) -> Result<Vec<u8>> {
let mut file = File::open(path)?; let mut file = File::open(path)?;
let mut hash = Sha256::default(); let mut hash = Sha256::default();
let mut buf = Vec::with_capacity(4096); let mut buf = vec![0; 4096];
while let Ok(r) = file.read(&mut buf) { while let Ok(r) = file.read(&mut buf) {
if r == 0 { if r == 0 {
break; break;
@ -471,7 +476,11 @@ mod tests {
let path = "/home/kieran/Downloads/snort-arm64-v8a-v0.3.0.apk"; let path = "/home/kieran/Downloads/snort-arm64-v8a-v0.3.0.apk";
let apk = load_apk_artifact(&PathBuf::from(path))?; let apk = load_apk_artifact(&PathBuf::from(path))?;
eprint!("{}", apk);
Ok(()) eprintln!("{:?}", apk);
if let ArtifactMetadata::APK { .. } = apk.metadata {
return Ok(());
}
bail!("missing apk metadata");
} }
} }