1 /*
2  * Copyright (c) 2024 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include <cstddef>
17 #include <cstdint>
18 #include <cstdio>
19 #include "params_run_tool.h"
20 #include "extension.h"
21 #include "merkle_tree_extension.h"
22 #include "segment_header.h"
23 #include "code_signing.h"
24 #include "file_utils.h"
25 #include "verify_hap.h"
26 
27 namespace OHOS {
28 namespace SignatureTools {
DoSomethingInterestingWithMyAPI(const uint8_t* data, size_t size)29 bool DoSomethingInterestingWithMyAPI(const uint8_t* data, size_t size)
30 {
31     if (!data || !size) {
32         return true;
33     }
34 
35     char arg0[] = "";
36     char arg1[] = "verify-app";
37     char arg2[] = "-inFile";
38     char arg3[] = "./generateKeyPair/entry-default-signed-so.hap";
39     char arg4[] = "-outCertChain";
40     char arg5[] = "./generateKeyPair/app-sign-srv-ca1.cer";
41     char arg6[] = "-outProfile";
42     char arg7[] = "./generateKeyPair/app-profile.p7b";
43     char* argv[] = { arg0, arg1, arg2, arg3, arg4, arg5, arg6, arg7 };
44     int argc = 8;
45 
46     bool ret = ParamsRunTool::ProcessCmd(argv, argc);
47     return ret;
48 }
49 
VerifyElf(const uint8_t* data, size_t size)50 bool VerifyElf(const uint8_t* data, size_t size)
51 {
52     if (!data || !size) {
53         return true;
54     }
55 
56     char arg0[] = "";
57     char arg1[] = "verify-app";
58     char arg2[] = "-inFile";
59     char arg3[] = "./generateKeyPair/entry-default-signed-so.elf";
60     char arg4[] = "-outCertChain";
61     char arg5[] = "./generateKeyPair/app-sign-srv-ca1.cer";
62     char arg6[] = "-outProfile";
63     char arg7[] = "./generateKeyPair/app-profile.p7b";
64     char arg8[] = "-inForm";
65     char arg9[] = "elf";
66     char* argv[] = { arg0, arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9 };
67     int argc = 10;
68 
69     bool ret = ParamsRunTool::ProcessCmd(argv, argc);
70     return ret;
71 }
72 
VerifyBin(const uint8_t* data, size_t size)73 bool VerifyBin(const uint8_t* data, size_t size)
74 {
75     if (!data || !size) {
76         return true;
77     }
78 
79     char arg0[] = "";
80     char arg1[] = "verify-app";
81     char arg2[] = "-inFile";
82     char arg3[] = "./generateKeyPair/entry-default-signed-so.bin";
83     char arg4[] = "-outCertChain";
84     char arg5[] = "./generateKeyPair/app-sign-srv-ca1.cer";
85     char arg6[] = "-outProfile";
86     char arg7[] = "./generateKeyPair/app-profile.p7b";
87     char arg8[] = "-inForm";
88     char arg9[] = "bin";
89     char* argv[] = { arg0, arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9 };
90     int argc = 10;
91 
92     bool ret = ParamsRunTool::ProcessCmd(argv, argc);
93     return ret;
94 }
95 
TestDatastructure(const uint8_t* data, size_t size)96 bool TestDatastructure(const uint8_t* data, size_t size)
97 {
98     Extension extension;
99     int32_t sizet = extension.GetSize();
100     MerkleTreeExtension merkleTreeExtension;
101     SegmentHeader segmentHeader;
102     CodeSigning codeSigning;
103     VerifyHap verifyHap;
104     verifyHap.setIsPrintCert(true);
105     return sizet != 0;
106 }
107 
TestFileUtils(const uint8_t* data, size_t size)108 bool TestFileUtils(const uint8_t* data, size_t size)
109 {
110     std::string bytes;
111     std::string file;
112     bool flag = FileUtils::WriteByteToOutFile(bytes, file);
113     FileUtils::DelDir(file);
114     return flag;
115 }
116 
TestNativeLibs(const uint8_t* data, size_t size)117 bool TestNativeLibs(const uint8_t* data, size_t size)
118 {
119     NativeLibInfoSegment nativeLibInfoSegment;
120     std::vector<std::pair<std::string, SignInfo>> soInfoList;
121     nativeLibInfoSegment.SetSoInfoList(soInfoList);
122     return true;
123 }
124 } // namespace SignatureTools
125 } // namespace OHOS
126 
127 /* Fuzzer entry point */
LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)128 extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
129 {
130     (void)rename("./generateKeyPair/entry-default-signed-so.txt", "./generateKeyPair/entry-default-signed-so.hap");
131     (void)rename("./generateKeyPair/signed-elf.txt", "./generateKeyPair/entry-default-signed-so.elf");
132     (void)rename("./generateKeyPair/signed-bin.txt", "./generateKeyPair/entry-default-signed-so.bin");
133     sync();
134     /* Run your code on data */
135     OHOS::SignatureTools::DoSomethingInterestingWithMyAPI(data, size);
136     OHOS::SignatureTools::VerifyElf(data, size);
137     OHOS::SignatureTools::VerifyBin(data, size);
138     OHOS::SignatureTools::TestDatastructure(data, size);
139     OHOS::SignatureTools::TestFileUtils(data, size);
140     sync();
141     return 0;
142 }