• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2024 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include <cstddef>
17 #include <cstdint>
18 #include <cstdio>
19 #include "params_run_tool.h"
20 #include "extension.h"
21 #include "merkle_tree_extension.h"
22 #include "segment_header.h"
23 #include "code_signing.h"
24 #include "file_utils.h"
25 #include "verify_hap.h"
26 
27 namespace OHOS {
28 namespace SignatureTools {
DoSomethingInterestingWithMyAPI(const uint8_t * data,size_t size)29 bool DoSomethingInterestingWithMyAPI(const uint8_t* data, size_t size)
30 {
31     if (!data || size <= 0) {
32         return true;
33     }
34 
35     char arg0[] = "";
36     char arg1[] = "verify-app";
37     char arg2[] = "-inFile";
38     char arg3[] = "./generateKeyPair/entry-default-signed-so.hap";
39     char arg4[] = "-outCertChain";
40     char arg5[] = "./generateKeyPair/app-sign-srv-ca1.cer";
41     char arg6[] = "-outProfile";
42     char* arg7 = new char[size];
43     memcpy_s(arg7, size, data, size);
44     char* argv[] = { arg0, arg1, arg2, arg3, arg4, arg5, arg6, arg7 };
45     int argc = 8;
46 
47     bool ret = ParamsRunTool::ProcessCmd(argv, argc);
48     return ret;
49 }
50 
VerifyElf(const uint8_t * data,size_t size)51 bool VerifyElf(const uint8_t* data, size_t size)
52 {
53     if (!data || size <= 0) {
54         return true;
55     }
56 
57     char arg0[] = "";
58     char arg1[] = "verify-app";
59     char arg2[] = "-inFile";
60     char arg3[] = "./generateKeyPair/entry-default-signed-so.elf";
61     char arg4[] = "-outCertChain";
62     char arg5[] = "./generateKeyPair/app-sign-srv-ca1.cer";
63     char arg6[] = "-outProfile";
64     char* arg7 = new char[size];
65     memcpy_s(arg7, size, data, size);
66     char arg8[] = "-inForm";
67     char arg9[] = "elf";
68     char* argv[] = { arg0, arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9 };
69     int argc = 10;
70 
71     bool ret = ParamsRunTool::ProcessCmd(argv, argc);
72     return ret;
73 }
74 
VerifyBin(const uint8_t * data,size_t size)75 bool VerifyBin(const uint8_t* data, size_t size)
76 {
77     if (!data || size <= 0) {
78         return true;
79     }
80 
81     char arg0[] = "";
82     char arg1[] = "verify-app";
83     char arg2[] = "-inFile";
84     char arg3[] = "./generateKeyPair/entry-default-signed-so.bin";
85     char arg4[] = "-outCertChain";
86     char arg5[] = "./generateKeyPair/app-sign-srv-ca1.cer";
87     char arg6[] = "-outProfile";
88     char* arg7 = new char[size];
89     memcpy_s(arg7, size, data, size);
90     char arg8[] = "-inForm";
91     char arg9[] = "bin";
92     char* argv[] = { arg0, arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9 };
93     int argc = 10;
94 
95     bool ret = ParamsRunTool::ProcessCmd(argv, argc);
96     delete[] arg7;
97     return ret;
98 }
99 
TestDatastructure(const uint8_t * data,size_t size)100 bool TestDatastructure(const uint8_t* data, size_t size)
101 {
102     Extension extension;
103     int32_t sizet = extension.GetSize();
104     MerkleTreeExtension merkleTreeExtension;
105     SegmentHeader segmentHeader;
106     CodeSigning codeSigning;
107     VerifyHap verifyHap;
108     verifyHap.setIsPrintCert(true);
109     return sizet != 0;
110 }
111 
TestFileUtils(const uint8_t * data,size_t size)112 bool TestFileUtils(const uint8_t* data, size_t size)
113 {
114     std::string bytes(reinterpret_cast<const char*>(data), size);
115     std::string file;
116     bool flag = FileUtils::WriteByteToOutFile(bytes, file);
117     FileUtils::DelDir(file);
118     return flag;
119 }
120 
TestNativeLibs(const uint8_t * data,size_t size)121 bool TestNativeLibs(const uint8_t* data, size_t size)
122 {
123     NativeLibInfoSegment nativeLibInfoSegment;
124     std::vector<std::pair<std::string, SignInfo>> soInfoList;
125     nativeLibInfoSegment.SetSoInfoList(soInfoList);
126     return true;
127 }
128 } // namespace SignatureTools
129 } // namespace OHOS
130 
131 /* Fuzzer entry point */
LLVMFuzzerTestOneInput(const uint8_t * data,size_t size)132 extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
133 {
134     (void)rename("./generateKeyPair/entry-default-signed-so.txt", "./generateKeyPair/entry-default-signed-so.hap");
135     (void)rename("./generateKeyPair/signed-elf.txt", "./generateKeyPair/entry-default-signed-so.elf");
136     (void)rename("./generateKeyPair/signed-bin.txt", "./generateKeyPair/entry-default-signed-so.bin");
137     sync();
138     /* Run your code on data */
139     OHOS::SignatureTools::DoSomethingInterestingWithMyAPI(data, size);
140     OHOS::SignatureTools::VerifyElf(data, size);
141     OHOS::SignatureTools::VerifyBin(data, size);
142     OHOS::SignatureTools::TestDatastructure(data, size);
143     OHOS::SignatureTools::TestFileUtils(data, size);
144     sync();
145     return 0;
146 }