EncryptionTestIT.java 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378
  1. /*
  2. * Nextcloud Android client application
  3. *
  4. * @author Tobias Kaminsky
  5. * Copyright (C) 2017 Tobias Kaminsky
  6. * Copyright (C) 2017 Nextcloud GmbH.
  7. *
  8. * This program is free software: you can redistribute it and/or modify
  9. * it under the terms of the GNU Affero General Public License as published by
  10. * the Free Software Foundation, either version 3 of the License, or
  11. * at your option) any later version.
  12. *
  13. * This program is distributed in the hope that it will be useful,
  14. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. * GNU Affero General Public License for more details.
  17. *
  18. * You should have received a copy of the GNU Affero General Public License
  19. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  20. */
  21. package com.owncloud.android.util;
  22. import android.os.Build;
  23. import android.support.annotation.RequiresApi;
  24. import android.support.test.runner.AndroidJUnit4;
  25. import com.google.gson.JsonElement;
  26. import com.google.gson.JsonParser;
  27. import com.google.gson.reflect.TypeToken;
  28. import com.owncloud.android.datamodel.DecryptedFolderMetadata;
  29. import com.owncloud.android.datamodel.EncryptedFolderMetadata;
  30. import com.owncloud.android.utils.CsrHelper;
  31. import com.owncloud.android.utils.EncryptionUtils;
  32. import org.apache.commons.io.FileUtils;
  33. import org.junit.Test;
  34. import org.junit.runner.RunWith;
  35. import java.io.File;
  36. import java.io.FileOutputStream;
  37. import java.io.IOException;
  38. import java.io.InputStream;
  39. import java.security.KeyPair;
  40. import java.security.KeyPairGenerator;
  41. import java.security.PrivateKey;
  42. import java.security.SecureRandom;
  43. import java.util.Arrays;
  44. import java.util.HashMap;
  45. import java.util.HashSet;
  46. import java.util.Set;
  47. import static android.support.test.InstrumentationRegistry.getInstrumentation;
  48. import static junit.framework.Assert.assertFalse;
  49. import static junit.framework.Assert.assertTrue;
  50. import static org.junit.Assert.assertEquals;
  51. @RequiresApi(api = Build.VERSION_CODES.KITKAT)
  52. @RunWith(AndroidJUnit4.class)
  53. public class EncryptionTestIT {
  54. private String privateKey = "MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAo" +
  55. "IBAQDsn0JKS/THu328z1IgN0VzYU53HjSX03WJIgWkmyTaxbiKpoJaKbksXmfSpgzV" +
  56. "GzKFvGfZ03fwFrN7Q8P8R2e8SNiell7mh1TDw9/0P7Bt/ER8PJrXORo+GviKHxaLr7" +
  57. "Y0BJX9i/nW/L0L/VaE8CZTAqYBdcSJGgHJjY4UMf892ZPTa9T2Dl3ggdMZ7BQ2kiCi" +
  58. "CC3qV99b0igRJGmmLQaGiAflhFzuDQPMifUMq75wI8RSRPdxUAtjTfkl68QHu7Umye" +
  59. "yy33OQgdUKaTl5zcS3VSQbNjveVCNM4RDH1RlEc+7Wf1BY8APqT6jbiBcROJD2CeoL" +
  60. "H2eiIJCi+61ZkSGfAgMBAAECggEBALFStCHrhBf+GL9a+qer4/8QZ/X6i91PmaBX/7" +
  61. "SYk2jjjWVSXRNmex+V6+Y/jBRT2mvAgm8J+7LPwFdatE+lz0aZrMRD2gCWYF6Itpda" +
  62. "90OlLkmQPVWWtGTgX2ta2tF5r2iSGzk0IdoL8zw98Q2UzpOcw30KnWtFMxuxWk0mHq" +
  63. "pgp00g80cDWg3+RPbWOhdLp5bflQ36fKDfmjq05cGlIk6unnVyC5HXpvh4d4k2EWlX" +
  64. "rjGsndVBPCjGkZePlLRgDHxT06r+5XdJ+1CBDZgCsmjGz3M8uOHyCfVW0WhB7ynzDT" +
  65. "agVgz0iqpuhAi9sPt6iWWwpAnRw8cQgqEKw9bvKKECgYEA/WPi2PJtL6u/xlysh/H7" +
  66. "A717CId6fPHCMDace39ZNtzUzc0nT5BemlcF0wZ74NeJSur3Q395YzB+eBMLs5p8mA" +
  67. "95wgGvJhM65/J+HX+k9kt6Z556zLMvtG+j1yo4D0VEwm3xahB4SUUP+1kD7dNvo4+8" +
  68. "xeSCyjzNllvYZZC0DrECgYEA7w8pEqhHHn0a+twkPCZJS+gQTB9Rm+FBNGJqB3XpWs" +
  69. "TeLUxYRbVGk0iDve+eeeZ41drxcdyWP+WcL34hnrjgI1Fo4mK88saajpwUIYMy6+qM" +
  70. "LY+jC2NRSBox56eH7nsVYvQQK9eKqv9wbB+PF9SwOIvuETN7fd8mAY02UnoaaU8CgY" +
  71. "BoHRKocXPLkpZJuuppMVQiRUi4SHJbxDo19Tp2w+y0TihiJ1lvp7I3WGpcOt3LlMQk" +
  72. "tEbExSvrRZGxZKH6Og/XqwQsYuTEkEIz679F/5yYVosE6GkskrOXQAfh8Mb3/04xVV" +
  73. "tMaVgDQw0+CWVD4wyL+BNofGwBDNqsXTCdCsfxAQKBgQCDv2EtbRw0y1HRKv21QIxo" +
  74. "ju5cZW4+cDfVPN+eWPdQFOs1H7wOPsc0aGRiiupV2BSEF3O1ApKziEE5U1QH+29bR4" +
  75. "R8L1pemeGX8qCNj5bCubKjcWOz5PpouDcEqimZ3q98p3E6GEHN15UHoaTkx0yO/V8o" +
  76. "j6zhQ9fYRxDHB5ACtQKBgQCOO7TJUO1IaLTjcrwS4oCfJyRnAdz49L1AbVJkIBK0fh" +
  77. "JLecOFu3ZlQl/RStQb69QKb5MNOIMmQhg8WOxZxHcpmIDbkDAm/J/ovJXFSoBdOr5o" +
  78. "uQsYsDZhsWW97zvLMzg5pH9/3/1BNz5q3Vu4HgfBSwWGt4E2NENj+XA+QAVmGA==";
  79. private String cert = "-----BEGIN CERTIFICATE-----\n" +
  80. "MIIDpzCCAo+gAwIBAgIBADANBgkqhkiG9w0BAQUFADBuMRowGAYDVQQDDBF3d3cu\n" +
  81. "bmV4dGNsb3VkLmNvbTESMBAGA1UECgwJTmV4dGNsb3VkMRIwEAYDVQQHDAlTdHV0\n" +
  82. "dGdhcnQxGzAZBgNVBAgMEkJhZGVuLVd1ZXJ0dGVtYmVyZzELMAkGA1UEBhMCREUw\n" +
  83. "HhcNMTcwOTI2MTAwNDMwWhcNMzcwOTIxMTAwNDMwWjBuMRowGAYDVQQDDBF3d3cu\n" +
  84. "bmV4dGNsb3VkLmNvbTESMBAGA1UECgwJTmV4dGNsb3VkMRIwEAYDVQQHDAlTdHV0\n" +
  85. "dGdhcnQxGzAZBgNVBAgMEkJhZGVuLVd1ZXJ0dGVtYmVyZzELMAkGA1UEBhMCREUw\n" +
  86. "ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDsn0JKS/THu328z1IgN0Vz\n" +
  87. "YU53HjSX03WJIgWkmyTaxbiKpoJaKbksXmfSpgzVGzKFvGfZ03fwFrN7Q8P8R2e8\n" +
  88. "SNiell7mh1TDw9/0P7Bt/ER8PJrXORo+GviKHxaLr7Y0BJX9i/nW/L0L/VaE8CZT\n" +
  89. "AqYBdcSJGgHJjY4UMf892ZPTa9T2Dl3ggdMZ7BQ2kiCiCC3qV99b0igRJGmmLQaG\n" +
  90. "iAflhFzuDQPMifUMq75wI8RSRPdxUAtjTfkl68QHu7Umyeyy33OQgdUKaTl5zcS3\n" +
  91. "VSQbNjveVCNM4RDH1RlEc+7Wf1BY8APqT6jbiBcROJD2CeoLH2eiIJCi+61ZkSGf\n" +
  92. "AgMBAAGjUDBOMB0GA1UdDgQWBBTFrXz2tk1HivD9rQ75qeoyHrAgIjAfBgNVHSME\n" +
  93. "GDAWgBTFrXz2tk1HivD9rQ75qeoyHrAgIjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3\n" +
  94. "DQEBBQUAA4IBAQARQTX21QKO77gAzBszFJ6xVnjfa23YZF26Z4X1KaM8uV8TGzuN\n" +
  95. "JA95XmReeP2iO3r8EWXS9djVCD64m2xx6FOsrUI8HZaw1JErU8mmOaLAe8q9RsOm\n" +
  96. "9Eq37e4vFp2YUEInYUqs87ByUcA4/8g3lEYeIUnRsRsWsA45S3wD7wy07t+KAn7j\n" +
  97. "yMmfxdma6hFfG9iN/egN6QXUAyIPXvUvlUuZ7/BhWBj/3sHMrF9quy9Q2DOI8F3t\n" +
  98. "1wdQrkq4BtStKhciY5AIXz9SqsctFHTv4Lwgtkapoel4izJnO0ZqYTXVe7THwri9\n" +
  99. "H/gua6uJDWH9jk2/CiZDWfsyFuNUuXvDSp05\n" +
  100. "-----END CERTIFICATE-----";
  101. @Test
  102. public void encryptStringAsymmetric() throws Exception {
  103. byte[] key1 = EncryptionUtils.generateKey();
  104. String base64encodedKey = EncryptionUtils.encodeBytesToBase64String(key1);
  105. String encryptedString = EncryptionUtils.encryptStringAsymmetric(base64encodedKey, cert);
  106. String decryptedString = EncryptionUtils.decryptStringAsymmetric(encryptedString, privateKey);
  107. byte[] key2 = EncryptionUtils.decodeStringToBase64Bytes(decryptedString);
  108. assertTrue(Arrays.equals(key1, key2));
  109. }
  110. @Test
  111. public void encryptStringSymmetric() throws Exception {
  112. byte[] key = EncryptionUtils.generateKey();
  113. String encryptedString = EncryptionUtils.encryptStringSymmetric(privateKey, key);
  114. String decryptedString = EncryptionUtils.decryptStringSymmetric(encryptedString, key);
  115. assertEquals(privateKey, decryptedString);
  116. }
  117. @Test
  118. public void encryptPrivateKey() throws Exception {
  119. String keyPhrase = "moreovertelevisionfactorytendencyindependenceinternationalintellectualimpress" +
  120. "interestvolunteer";
  121. KeyPairGenerator keyGen = KeyPairGenerator.getInstance("RSA");
  122. keyGen.initialize(4096, new SecureRandom());
  123. KeyPair keyPair = keyGen.generateKeyPair();
  124. PrivateKey privateKey = keyPair.getPrivate();
  125. byte[] privateKeyBytes = privateKey.getEncoded();
  126. String privateKeyString = EncryptionUtils.encodeBytesToBase64String(privateKeyBytes);
  127. String encryptedString = EncryptionUtils.encryptPrivateKey(privateKeyString, keyPhrase);
  128. String decryptedString = EncryptionUtils.decryptPrivateKey(encryptedString, keyPhrase);
  129. assertEquals(privateKeyString, decryptedString);
  130. }
  131. @Test
  132. public void generateCSR() throws Exception {
  133. KeyPairGenerator keyGen = KeyPairGenerator.getInstance("RSA");
  134. keyGen.initialize(2048, new SecureRandom());
  135. KeyPair keyPair = keyGen.generateKeyPair();
  136. assertFalse(CsrHelper.generateCsrPemEncodedString(keyPair, "").isEmpty());
  137. assertFalse(EncryptionUtils.encodeBytesToBase64String(keyPair.getPublic().getEncoded()).isEmpty());
  138. }
  139. /**
  140. * DecryptedFolderMetadata -> EncryptedFolderMetadata -> JSON -> encrypt
  141. * -> decrypt -> JSON -> EncryptedFolderMetadata -> DecryptedFolderMetadata
  142. */
  143. @Test
  144. public void encryptionMetadata() throws Exception {
  145. DecryptedFolderMetadata decryptedFolderMetadata1 = generateFolderMetadata();
  146. // encrypt
  147. EncryptedFolderMetadata encryptedFolderMetadata1 = EncryptionUtils.encryptFolderMetadata(
  148. decryptedFolderMetadata1, privateKey);
  149. // serialize
  150. String encryptedJson = EncryptionUtils.serializeJSON(encryptedFolderMetadata1);
  151. // de-serialize
  152. EncryptedFolderMetadata encryptedFolderMetadata2 = EncryptionUtils.deserializeJSON(encryptedJson,
  153. new TypeToken<EncryptedFolderMetadata>() {
  154. });
  155. // decrypt
  156. DecryptedFolderMetadata decryptedFolderMetadata2 = EncryptionUtils.decryptFolderMetaData(
  157. encryptedFolderMetadata2, privateKey);
  158. // compare
  159. assertTrue(compareJsonStrings(EncryptionUtils.serializeJSON(decryptedFolderMetadata1),
  160. EncryptionUtils.serializeJSON(decryptedFolderMetadata2)));
  161. }
  162. @Test
  163. public void testCryptFileWithoutMetadata() throws Exception {
  164. byte[] key = EncryptionUtils.decodeStringToBase64Bytes("WANM0gRv+DhaexIsI0T3Lg==");
  165. byte[] iv = EncryptionUtils.decodeStringToBase64Bytes("gKm3n+mJzeY26q4OfuZEqg==");
  166. byte[] authTag = EncryptionUtils.decodeStringToBase64Bytes("PboI9tqHHX3QeAA22PIu4w==");
  167. assertTrue(cryptFile("ia7OEEEyXMoRa1QWQk8r", "78f42172166f9dc8fd1a7156b1753353", key, iv, authTag));
  168. }
  169. @Test
  170. public void cryptFileWithMetadata() throws Exception {
  171. DecryptedFolderMetadata metadata = generateFolderMetadata();
  172. // n9WXAIXO2wRY4R8nXwmo
  173. assertTrue(cryptFile("ia7OEEEyXMoRa1QWQk8r",
  174. "78f42172166f9dc8fd1a7156b1753353",
  175. EncryptionUtils.decodeStringToBase64Bytes(metadata.getFiles().get("ia7OEEEyXMoRa1QWQk8r")
  176. .getEncrypted().getKey()),
  177. EncryptionUtils.decodeStringToBase64Bytes(metadata.getFiles().get("ia7OEEEyXMoRa1QWQk8r")
  178. .getInitializationVector()),
  179. EncryptionUtils.decodeStringToBase64Bytes(metadata.getFiles().get("ia7OEEEyXMoRa1QWQk8r")
  180. .getAuthenticationTag())));
  181. // n9WXAIXO2wRY4R8nXwmo
  182. assertTrue(cryptFile("n9WXAIXO2wRY4R8nXwmo",
  183. "825143ed1f21ebb0c3b3c3f005b2f5db",
  184. EncryptionUtils.decodeStringToBase64Bytes(metadata.getFiles().get("n9WXAIXO2wRY4R8nXwmo")
  185. .getEncrypted().getKey()),
  186. EncryptionUtils.decodeStringToBase64Bytes(metadata.getFiles().get("n9WXAIXO2wRY4R8nXwmo")
  187. .getInitializationVector()),
  188. EncryptionUtils.decodeStringToBase64Bytes(metadata.getFiles().get("n9WXAIXO2wRY4R8nXwmo")
  189. .getAuthenticationTag())));
  190. }
  191. /**
  192. * generates new keys and tests if they are unique
  193. */
  194. @Test
  195. public void testKey() {
  196. Set<String> keys = new HashSet<>();
  197. for (int i = 0; i < 50; i++) {
  198. assertTrue(keys.add(EncryptionUtils.encodeBytesToBase64String(EncryptionUtils.generateKey())));
  199. }
  200. }
  201. /**
  202. * generates new ivs and tests if they are unique
  203. */
  204. @Test
  205. public void testIV() {
  206. Set<String> ivs = new HashSet<>();
  207. for (int i = 0; i < 50; i++) {
  208. assertTrue(ivs.add(EncryptionUtils.encodeBytesToBase64String(
  209. EncryptionUtils.randomBytes(EncryptionUtils.ivLength))));
  210. }
  211. }
  212. /**
  213. * generates new salt and tests if they are unique
  214. */
  215. @Test
  216. public void testSalt() {
  217. Set<String> ivs = new HashSet<>();
  218. for (int i = 0; i < 50; i++) {
  219. assertTrue(ivs.add(EncryptionUtils.encodeBytesToBase64String(
  220. EncryptionUtils.randomBytes(EncryptionUtils.saltLength))));
  221. }
  222. }
  223. @Test
  224. public void testSHA512() {
  225. // sent to 3rd party app in cleartext
  226. String token = "4ae5978bf5354cd284b539015d442141";
  227. String salt = EncryptionUtils.encodeBytesToBase64String(EncryptionUtils.randomBytes(EncryptionUtils.saltLength));
  228. // stored in database
  229. String hashedToken = EncryptionUtils.generateSHA512(token, salt);
  230. // check: use passed cleartext and salt to verify hashed token
  231. assertTrue(EncryptionUtils.verifySHA512(hashedToken, token));
  232. }
  233. // Helper
  234. private boolean compareJsonStrings(String expected, String actual) {
  235. JsonParser parser = new JsonParser();
  236. JsonElement o1 = parser.parse(expected);
  237. JsonElement o2 = parser.parse(actual);
  238. if (o1.equals(o2)) {
  239. return true;
  240. } else {
  241. System.out.println("expected: " + o1);
  242. System.out.println("actual: " + o2);
  243. return false;
  244. }
  245. }
  246. private DecryptedFolderMetadata generateFolderMetadata() throws Exception {
  247. String metadataKey0 = EncryptionUtils.encodeBytesToBase64String(EncryptionUtils.generateKey());
  248. String metadataKey1 = EncryptionUtils.encodeBytesToBase64String(EncryptionUtils.generateKey());
  249. String metadataKey2 = EncryptionUtils.encodeBytesToBase64String(EncryptionUtils.generateKey());
  250. HashMap<Integer, String> metadataKeys = new HashMap<>();
  251. metadataKeys.put(0, EncryptionUtils.encryptStringAsymmetric(metadataKey0, cert));
  252. metadataKeys.put(1, EncryptionUtils.encryptStringAsymmetric(metadataKey1, cert));
  253. metadataKeys.put(2, EncryptionUtils.encryptStringAsymmetric(metadataKey2, cert));
  254. DecryptedFolderMetadata.Encrypted encrypted = new DecryptedFolderMetadata.Encrypted();
  255. encrypted.setMetadataKeys(metadataKeys);
  256. DecryptedFolderMetadata.Metadata metadata1 = new DecryptedFolderMetadata.Metadata();
  257. metadata1.setMetadataKeys(metadataKeys);
  258. metadata1.setVersion(1);
  259. DecryptedFolderMetadata.Sharing sharing = new DecryptedFolderMetadata.Sharing();
  260. sharing.setSignature("HMACOFRECIPIENTANDNEWESTMETADATAKEY");
  261. HashMap<String, String> recipient = new HashMap<>();
  262. recipient.put("blah@schiessle.org", "PUBLIC KEY");
  263. recipient.put("bjoern@schiessle.org", "PUBLIC KEY");
  264. sharing.setRecipient(recipient);
  265. metadata1.setSharing(sharing);
  266. HashMap<String, DecryptedFolderMetadata.DecryptedFile> files = new HashMap<>();
  267. DecryptedFolderMetadata.Data data1 = new DecryptedFolderMetadata.Data();
  268. data1.setKey("WANM0gRv+DhaexIsI0T3Lg==");
  269. data1.setFilename("test.txt");
  270. data1.setVersion(1);
  271. DecryptedFolderMetadata.DecryptedFile file1 = new DecryptedFolderMetadata.DecryptedFile();
  272. file1.setInitializationVector("gKm3n+mJzeY26q4OfuZEqg==");
  273. file1.setEncrypted(data1);
  274. file1.setMetadataKey(0);
  275. file1.setAuthenticationTag("PboI9tqHHX3QeAA22PIu4w==");
  276. files.put("ia7OEEEyXMoRa1QWQk8r", file1);
  277. DecryptedFolderMetadata.Data data2 = new DecryptedFolderMetadata.Data();
  278. data2.setKey("9dfzbIYDt28zTyZfbcll+g==");
  279. data2.setFilename("test2.txt");
  280. data2.setVersion(1);
  281. DecryptedFolderMetadata.DecryptedFile file2 = new DecryptedFolderMetadata.DecryptedFile();
  282. file2.setInitializationVector("hnJLF8uhDvDoFK4ajuvwrg==");
  283. file2.setEncrypted(data2);
  284. file2.setMetadataKey(0);
  285. file2.setAuthenticationTag("qOQZdu5soFO77Y7y4rAOVA==");
  286. files.put("n9WXAIXO2wRY4R8nXwmo", file2);
  287. return new DecryptedFolderMetadata(metadata1, files);
  288. }
  289. private boolean cryptFile(String fileName, String md5, byte[] key, byte[] iv, byte[] expectedAuthTag)
  290. throws Exception {
  291. File file = getFile(fileName);
  292. assertEquals(md5, EncryptionUtils.getMD5Sum(file));
  293. EncryptionUtils.EncryptedFile encryptedFile = EncryptionUtils.encryptFile(file, key, iv);
  294. File encryptedTempFile = File.createTempFile("file", "tmp");
  295. FileOutputStream fileOutputStream = new FileOutputStream(encryptedTempFile);
  296. fileOutputStream.write(encryptedFile.encryptedBytes);
  297. fileOutputStream.close();
  298. byte[] authenticationTag = EncryptionUtils.decodeStringToBase64Bytes(encryptedFile.authenticationTag);
  299. // verify authentication tag
  300. assertTrue(Arrays.equals(expectedAuthTag, authenticationTag));
  301. byte[] decryptedBytes = EncryptionUtils.decryptFile(encryptedTempFile, key, iv, authenticationTag);
  302. File decryptedFile = File.createTempFile("file", "dec");
  303. FileOutputStream fileOutputStream1 = new FileOutputStream(decryptedFile);
  304. fileOutputStream1.write(decryptedBytes);
  305. fileOutputStream1.close();
  306. return md5.compareTo(EncryptionUtils.getMD5Sum(decryptedFile)) == 0;
  307. }
  308. private File getFile(String filename) throws IOException {
  309. InputStream inputStream = getInstrumentation().getContext().getAssets().open(filename);
  310. File temp = File.createTempFile("file", "file");
  311. FileUtils.copyInputStreamToFile(inputStream, temp);
  312. return temp;
  313. }
  314. }