1 /*
2 * Copyright (c) 2024 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include <cstddef>
17 #include <cstdint>
18 #include <cstdio>
19 #include "params_run_tool.h"
20 #include "extension.h"
21 #include "merkle_tree_extension.h"
22 #include "segment_header.h"
23 #include "code_signing.h"
24 #include "file_utils.h"
25 #include "verify_hap.h"
26
27 namespace OHOS {
28 namespace SignatureTools {
DoSomethingInterestingWithMyAPI(const uint8_t* data, size_t size)29 bool DoSomethingInterestingWithMyAPI(const uint8_t* data, size_t size)
30 {
31 if (!data || !size) {
32 return true;
33 }
34
35 char arg0[] = "";
36 char arg1[] = "verify-app";
37 char arg2[] = "-inFile";
38 char arg3[] = "./generateKeyPair/entry-default-signed-so.hap";
39 char arg4[] = "-outCertChain";
40 char arg5[] = "./generateKeyPair/app-sign-srv-ca1.cer";
41 char arg6[] = "-outProfile";
42 char arg7[] = "./generateKeyPair/app-profile.p7b";
43 char* argv[] = { arg0, arg1, arg2, arg3, arg4, arg5, arg6, arg7 };
44 int argc = 8;
45
46 bool ret = ParamsRunTool::ProcessCmd(argv, argc);
47 return ret;
48 }
49
VerifyElf(const uint8_t* data, size_t size)50 bool VerifyElf(const uint8_t* data, size_t size)
51 {
52 if (!data || !size) {
53 return true;
54 }
55
56 char arg0[] = "";
57 char arg1[] = "verify-app";
58 char arg2[] = "-inFile";
59 char arg3[] = "./generateKeyPair/entry-default-signed-so.elf";
60 char arg4[] = "-outCertChain";
61 char arg5[] = "./generateKeyPair/app-sign-srv-ca1.cer";
62 char arg6[] = "-outProfile";
63 char arg7[] = "./generateKeyPair/app-profile.p7b";
64 char arg8[] = "-inForm";
65 char arg9[] = "elf";
66 char* argv[] = { arg0, arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9 };
67 int argc = 10;
68
69 bool ret = ParamsRunTool::ProcessCmd(argv, argc);
70 return ret;
71 }
72
VerifyBin(const uint8_t* data, size_t size)73 bool VerifyBin(const uint8_t* data, size_t size)
74 {
75 if (!data || !size) {
76 return true;
77 }
78
79 char arg0[] = "";
80 char arg1[] = "verify-app";
81 char arg2[] = "-inFile";
82 char arg3[] = "./generateKeyPair/entry-default-signed-so.bin";
83 char arg4[] = "-outCertChain";
84 char arg5[] = "./generateKeyPair/app-sign-srv-ca1.cer";
85 char arg6[] = "-outProfile";
86 char arg7[] = "./generateKeyPair/app-profile.p7b";
87 char arg8[] = "-inForm";
88 char arg9[] = "bin";
89 char* argv[] = { arg0, arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9 };
90 int argc = 10;
91
92 bool ret = ParamsRunTool::ProcessCmd(argv, argc);
93 return ret;
94 }
95
TestDatastructure(const uint8_t* data, size_t size)96 bool TestDatastructure(const uint8_t* data, size_t size)
97 {
98 Extension extension;
99 int32_t sizet = extension.GetSize();
100 MerkleTreeExtension merkleTreeExtension;
101 SegmentHeader segmentHeader;
102 CodeSigning codeSigning;
103 VerifyHap verifyHap;
104 verifyHap.setIsPrintCert(true);
105 return sizet != 0;
106 }
107
TestFileUtils(const uint8_t* data, size_t size)108 bool TestFileUtils(const uint8_t* data, size_t size)
109 {
110 std::string bytes;
111 std::string file;
112 bool flag = FileUtils::WriteByteToOutFile(bytes, file);
113 FileUtils::DelDir(file);
114 return flag;
115 }
116
TestNativeLibs(const uint8_t* data, size_t size)117 bool TestNativeLibs(const uint8_t* data, size_t size)
118 {
119 NativeLibInfoSegment nativeLibInfoSegment;
120 std::vector<std::pair<std::string, SignInfo>> soInfoList;
121 nativeLibInfoSegment.SetSoInfoList(soInfoList);
122 return true;
123 }
124 } // namespace SignatureTools
125 } // namespace OHOS
126
127 /* Fuzzer entry point */
LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)128 extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
129 {
130 (void)rename("./generateKeyPair/entry-default-signed-so.txt", "./generateKeyPair/entry-default-signed-so.hap");
131 (void)rename("./generateKeyPair/signed-elf.txt", "./generateKeyPair/entry-default-signed-so.elf");
132 (void)rename("./generateKeyPair/signed-bin.txt", "./generateKeyPair/entry-default-signed-so.bin");
133 sync();
134 /* Run your code on data */
135 OHOS::SignatureTools::DoSomethingInterestingWithMyAPI(data, size);
136 OHOS::SignatureTools::VerifyElf(data, size);
137 OHOS::SignatureTools::VerifyBin(data, size);
138 OHOS::SignatureTools::TestDatastructure(data, size);
139 OHOS::SignatureTools::TestFileUtils(data, size);
140 sync();
141 return 0;
142 }