diff --git a/test/commonfuzztest/authacl_fuzzer/auth_acl_fuzzer.cpp b/test/commonfuzztest/authacl_fuzzer/auth_acl_fuzzer.cpp index 0b1103234ecf676347497848a63548f495a5cae1..f0420974898654c0eea5def335499b521e1bf8af 100644 --- a/test/commonfuzztest/authacl_fuzzer/auth_acl_fuzzer.cpp +++ b/test/commonfuzztest/authacl_fuzzer/auth_acl_fuzzer.cpp @@ -32,6 +32,7 @@ void AuthAclFuzzTest(const uint8_t* data, size_t size) FuzzedDataProvider fdp(data, size); int32_t sessionId = fdp.ConsumeIntegral(); std::string result = fdp.ConsumeRandomLengthString(); + std::string peerDeviceId = fdp.ConsumeRandomLengthString(); std::shared_ptr authSink = std::make_shared(); std::shared_ptr authSrc = std::make_shared(); @@ -45,6 +46,9 @@ void AuthAclFuzzTest(const uint8_t* data, size_t size) context->accesser.isCommonFlag = false; authSink->VerifyCertificate(context); authSink->VerifyCertificate(nullptr); + context->IsProxyBind = true; + authSink->DerivativeSessionKey(context); + authSrc->GetPeerDeviceId(context, peerDeviceId); } } } diff --git a/test/servicesfuzztest/authconfirm_fuzzer/auth_confirm_fuzzer.cpp b/test/servicesfuzztest/authconfirm_fuzzer/auth_confirm_fuzzer.cpp index a60faf0ed9999f644ab3acc1e801c26f6401c299..0571eab22bc6bee124427ffb26094c68ae37a4fb 100644 --- a/test/servicesfuzztest/authconfirm_fuzzer/auth_confirm_fuzzer.cpp +++ b/test/servicesfuzztest/authconfirm_fuzzer/auth_confirm_fuzzer.cpp @@ -165,6 +165,7 @@ void AuthConfirmFuzzTestNext(JsonObject &jsonObject, FuzzedDataProvider &fdp) authSrcConfirmState_->GetIdenticalCredentialInfo(context_, jsonObject); authSrcConfirmState_->GetShareCredentialInfo(context_, jsonObject); authSrcConfirmState_->GetP2PCredentialInfo(context_, jsonObject); + authSinkConfirmState_->CreateProxyData(context_, jsonObject); authSinkConfirmState_->NegotiateCredential(context_, jsonObject); authSinkConfirmState_->NegotiateAcl(context_, jsonObject); authSinkNegotiateStateMachine_->GetIdenticalCredentialInfo(context_, jsonObject); @@ -200,6 +201,9 @@ void AuthConfirmFuzzTestThird(FuzzedDataProvider &fdp) { std::string businessId = fdp.ConsumeRandomLengthString(); std::string businessValue = fdp.ConsumeRandomLengthString(); + std::string authorizeInfo = fdp.ConsumeRandomLengthString(); + std::vector deleteCredInfo; + DistributedDeviceProfile::AccessControlProfile acl; authSinkNegotiateStateMachine_->IsAntiDisturbanceMode(businessId); authSinkNegotiateStateMachine_->IsAntiDisturbanceMode(""); authSinkNegotiateStateMachine_->ParseAndCheckAntiDisturbanceMode(businessId, businessValue); @@ -216,6 +220,18 @@ void AuthConfirmFuzzTestThird(FuzzedDataProvider &fdp) authSrcPinNegotiateStartState_->ProcessCredAuth(context_); int32_t credType = fdp.ConsumeIntegral(); authSrcPinNegotiateStartState_->GetCredIdByCredType(context_, credType); + context_->IsProxyBind = true; + authSrcConfirmState_->NegotiateProxyCredential(context_); + authSrcConfirmState_->NegotiateProxyAcl(context_); + authSrcConfirmState_->ResetBindLevel(context_); + authSinkConfirmState_->GetBundleLabel(context_); + authSinkConfirmState_->NegotiateProxyAcl(context_); + authSinkConfirmState_->ProcessUserAuthorize(context_); + authSinkConfirmState_->ProcessServerAuthorize(context_); + authSinkConfirmState_->NegotiateProxyCredential(context_); + authSrcConfirmState_->GetSrcProxyCredTypeForP2P(context_, deleteCredInfo); + authSinkConfirmState_->ProcessUserOption(context_, authorizeInfo); + authSrcConfirmState_->GetSrcProxyAclInfoForP2P(context_, acl); } void AuthConfirmFuzzTest(const uint8_t* data, size_t size)