1 /*
2 * Copyright (c) 2024 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include <cstddef>
17 #include <cstdint>
18 #include <cstdio>
19 #include "params_run_tool.h"
20 #include "extension.h"
21 #include "merkle_tree_extension.h"
22 #include "segment_header.h"
23 #include "code_signing.h"
24 #include "file_utils.h"
25 #include "verify_hap.h"
26
27 namespace OHOS {
28 namespace SignatureTools {
DoSomethingInterestingWithMyAPI(const uint8_t * data,size_t size)29 bool DoSomethingInterestingWithMyAPI(const uint8_t* data, size_t size)
30 {
31 if (!data || size <= 0) {
32 return true;
33 }
34
35 char arg0[] = "";
36 char arg1[] = "verify-app";
37 char arg2[] = "-inFile";
38 char arg3[] = "./generateKeyPair/entry-default-signed-so.hap";
39 char arg4[] = "-outCertChain";
40 char arg5[] = "./generateKeyPair/app-sign-srv-ca1.cer";
41 char arg6[] = "-outProfile";
42 char* arg7 = new char[size];
43 memcpy_s(arg7, size, data, size);
44 char* argv[] = { arg0, arg1, arg2, arg3, arg4, arg5, arg6, arg7 };
45 int argc = 8;
46
47 bool ret = ParamsRunTool::ProcessCmd(argv, argc);
48 return ret;
49 }
50
VerifyElf(const uint8_t * data,size_t size)51 bool VerifyElf(const uint8_t* data, size_t size)
52 {
53 if (!data || size <= 0) {
54 return true;
55 }
56
57 char arg0[] = "";
58 char arg1[] = "verify-app";
59 char arg2[] = "-inFile";
60 char arg3[] = "./generateKeyPair/entry-default-signed-so.elf";
61 char arg4[] = "-outCertChain";
62 char arg5[] = "./generateKeyPair/app-sign-srv-ca1.cer";
63 char arg6[] = "-outProfile";
64 char* arg7 = new char[size];
65 memcpy_s(arg7, size, data, size);
66 char arg8[] = "-inForm";
67 char arg9[] = "elf";
68 char* argv[] = { arg0, arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9 };
69 int argc = 10;
70
71 bool ret = ParamsRunTool::ProcessCmd(argv, argc);
72 return ret;
73 }
74
VerifyBin(const uint8_t * data,size_t size)75 bool VerifyBin(const uint8_t* data, size_t size)
76 {
77 if (!data || size <= 0) {
78 return true;
79 }
80
81 char arg0[] = "";
82 char arg1[] = "verify-app";
83 char arg2[] = "-inFile";
84 char arg3[] = "./generateKeyPair/entry-default-signed-so.bin";
85 char arg4[] = "-outCertChain";
86 char arg5[] = "./generateKeyPair/app-sign-srv-ca1.cer";
87 char arg6[] = "-outProfile";
88 char* arg7 = new char[size];
89 memcpy_s(arg7, size, data, size);
90 char arg8[] = "-inForm";
91 char arg9[] = "bin";
92 char* argv[] = { arg0, arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9 };
93 int argc = 10;
94
95 bool ret = ParamsRunTool::ProcessCmd(argv, argc);
96 delete[] arg7;
97 return ret;
98 }
99
TestDatastructure(const uint8_t * data,size_t size)100 bool TestDatastructure(const uint8_t* data, size_t size)
101 {
102 Extension extension;
103 int32_t sizet = extension.GetSize();
104 MerkleTreeExtension merkleTreeExtension;
105 SegmentHeader segmentHeader;
106 CodeSigning codeSigning;
107 VerifyHap verifyHap;
108 verifyHap.setIsPrintCert(true);
109 return sizet != 0;
110 }
111
TestFileUtils(const uint8_t * data,size_t size)112 bool TestFileUtils(const uint8_t* data, size_t size)
113 {
114 std::string bytes(reinterpret_cast<const char*>(data), size);
115 std::string file;
116 bool flag = FileUtils::WriteByteToOutFile(bytes, file);
117 FileUtils::DelDir(file);
118 return flag;
119 }
120
TestNativeLibs(const uint8_t * data,size_t size)121 bool TestNativeLibs(const uint8_t* data, size_t size)
122 {
123 NativeLibInfoSegment nativeLibInfoSegment;
124 std::vector<std::pair<std::string, SignInfo>> soInfoList;
125 nativeLibInfoSegment.SetSoInfoList(soInfoList);
126 return true;
127 }
128 } // namespace SignatureTools
129 } // namespace OHOS
130
131 /* Fuzzer entry point */
LLVMFuzzerTestOneInput(const uint8_t * data,size_t size)132 extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
133 {
134 (void)rename("./generateKeyPair/entry-default-signed-so.txt", "./generateKeyPair/entry-default-signed-so.hap");
135 (void)rename("./generateKeyPair/signed-elf.txt", "./generateKeyPair/entry-default-signed-so.elf");
136 (void)rename("./generateKeyPair/signed-bin.txt", "./generateKeyPair/entry-default-signed-so.bin");
137 sync();
138 /* Run your code on data */
139 OHOS::SignatureTools::DoSomethingInterestingWithMyAPI(data, size);
140 OHOS::SignatureTools::VerifyElf(data, size);
141 OHOS::SignatureTools::VerifyBin(data, size);
142 OHOS::SignatureTools::TestDatastructure(data, size);
143 OHOS::SignatureTools::TestFileUtils(data, size);
144 sync();
145 return 0;
146 }