1/*
2 * Copyright (c) 2024 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 *     http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16#include "abilitymgrinsightintentexecutemanager_fuzzer.h"
17
18#include <cstddef>
19#include <cstdint>
20
21#define private public
22#include "insight_intent_execute_manager.h"
23#include "insight_intent_execute_param.h"
24#undef private
25
26#include "securec.h"
27#include "ability_record.h"
28
29using namespace OHOS::AAFwk;
30using namespace OHOS::AppExecFwk;
31
32namespace OHOS {
33namespace {
34constexpr int INPUT_ZERO = 0;
35constexpr int INPUT_ONE = 1;
36constexpr int INPUT_TWO = 2;
37constexpr int INPUT_THREE = 3;
38constexpr size_t FOO_MAX_LEN = 1024;
39constexpr size_t U32_AT_SIZE = 4;
40constexpr size_t OFFSET_ZERO = 24;
41constexpr size_t OFFSET_ONE = 16;
42constexpr size_t OFFSET_TWO = 8;
43constexpr uint8_t ENABLE = 2;
44}
45uint32_t GetU32Data(const char* ptr)
46{
47    // convert fuzz input data to an integer
48    return (ptr[INPUT_ZERO] << OFFSET_ZERO) | (ptr[INPUT_ONE] << OFFSET_ONE) | (ptr[INPUT_TWO] << OFFSET_TWO) |
49        ptr[INPUT_THREE];
50}
51
52sptr<Token> GetFuzzAbilityToken()
53{
54    sptr<Token> token = nullptr;
55    AbilityRequest abilityRequest;
56    abilityRequest.appInfo.bundleName = "com.example.fuzzTest";
57    abilityRequest.abilityInfo.name = "MainAbility";
58    abilityRequest.abilityInfo.type = AbilityType::DATA;
59    std::shared_ptr<AbilityRecord> abilityRecord = AbilityRecord::CreateAbilityRecord(abilityRequest);
60    if (abilityRecord) {
61        token = abilityRecord->GetToken();
62    }
63    return token;
64}
65
66bool DoSomethingInterestingWithMyAPI(const char* data, size_t size)
67{
68    std::shared_ptr<InsightIntentExecuteConnection> infos = std::make_shared<InsightIntentExecuteConnection>();
69    AppExecFwk::ElementName element;
70    sptr<IRemoteObject> remoteObject;
71    int resultCod = static_cast<int>(GetU32Data(data));
72    infos->OnAbilityConnectDone(element, remoteObject, resultCod);
73    infos->OnAbilityDisconnectDone(element, resultCod);
74    uint64_t intentId = static_cast<uint64_t>(GetU32Data(data));
75
76    InsightIntentExecuteRecipient Rinfos(intentId);
77    wptr<IRemoteObject> remote;
78    Rinfos.OnRemoteDied(remote);
79    sptr<IRemoteObject> callerToken = GetFuzzAbilityToken();
80
81    std::shared_ptr<InsightIntentExecuteManager> Minfos = std::make_shared<InsightIntentExecuteManager>();
82    std::shared_ptr<AppExecFwk::InsightIntentExecuteParam> paramPtr;
83    uint64_t key = static_cast<uint64_t>(GetU32Data(data));
84    Minfos->CheckAndUpdateParam(key, callerToken, paramPtr);
85    Want want;
86    ExecuteMode executeMode = UI_ABILITY_FOREGROUND;
87    Minfos->CheckAndUpdateWant(want, executeMode);
88    executeMode = UI_ABILITY_BACKGROUND;
89    Minfos->CheckAndUpdateWant(want, executeMode);
90    executeMode = UI_EXTENSION_ABILITY;
91    Minfos->CheckAndUpdateWant(want, executeMode);
92    executeMode = SERVICE_EXTENSION_ABILITY;
93    Minfos->CheckAndUpdateWant(want, executeMode);
94
95    Minfos->RemoveExecuteIntent(intentId);
96    int32_t resultCode = static_cast<int32_t>(GetU32Data(data));
97    InsightIntentExecuteResult result;
98    Minfos->ExecuteIntentDone(intentId, resultCode, result);
99    Minfos->RemoteDied(intentId);
100    std::string jsonStr(data, size);
101    Minfos->GetBundleName(intentId, jsonStr);
102    Minfos->AddRecord(key, callerToken, jsonStr, intentId);
103    Minfos->GenerateWant(paramPtr, want);
104    Minfos->IsValidCall(want);
105    Minfos->CheckCallerPermission();
106    return true;
107}
108}
109
110/* Fuzzer entry point */
111extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
112{
113    /* Run your code on data */
114    if (data == nullptr) {
115        std::cout << "invalid data" << std::endl;
116        return 0;
117    }
118
119    /* Validate the length of size */
120    if (size > OHOS::FOO_MAX_LEN || size < OHOS::U32_AT_SIZE) {
121        return 0;
122    }
123
124    char* ch = (char*)malloc(size + 1);
125    if (ch == nullptr) {
126        std::cout << "malloc failed." << std::endl;
127        return 0;
128    }
129
130    (void)memset_s(ch, size + 1, 0x00, size + 1);
131    if (memcpy_s(ch, size + 1, data, size) != EOK) {
132        std::cout << "copy failed." << std::endl;
133        free(ch);
134        ch = nullptr;
135        return 0;
136    }
137
138    OHOS::DoSomethingInterestingWithMyAPI(ch, size);
139    free(ch);
140    ch = nullptr;
141    return 0;
142}
143
144