From bcef2ea328b25a7f3b3eff3c4b383294d3646c6d Mon Sep 17 00:00:00 2001 From: xia-bubai Date: Fri, 5 Sep 2025 17:47:52 +0800 Subject: [PATCH] modify corpus Signed-off-by: xia-bubai Change-Id: Iedace45893ae22b78e6bdef88fe658e9fe7bcb33 Signed-off-by: xia-bubai --- OAT.xml | 1 + test/fuzztest/common/accesstoken_fuzzdata.h | 73 ++++++++++++++++++ .../accesstokenkitcoverage_fuzzer/BUILD.gn | 1 + .../allochaptoken_fuzzer/corpus/init | 14 ---- .../allochaptoken_fuzzer/corpus/init0 | Bin 0 -> 1000 bytes .../alloclocaltokenid_fuzzer/corpus/init | 14 ---- .../alloclocaltokenid_fuzzer/corpus/init0 | Bin 0 -> 20 bytes .../BUILD.gn | 1 + ...clearusergrantedpermissionstate_fuzzer.cpp | 5 +- .../deleteremotetoken_fuzzer/BUILD.gn | 1 + .../deleteremotetoken_fuzzer/corpus/init | 14 ---- .../deleteremotetoken_fuzzer/corpus/init0 | Bin 0 -> 40 bytes .../deleteremotetoken_fuzzer.cpp | 5 +- .../getdefpermission_fuzzer/BUILD.gn | 1 + .../getdefpermission_fuzzer/corpus/init | 14 ---- .../getdefpermission_fuzzer/corpus/init0 | 1 + .../getdefpermission_fuzzer.cpp | 4 +- .../gethaptokenid_fuzzer/corpus/init | 14 ---- .../gethaptokenid_fuzzer/corpus/init0 | Bin 0 -> 30 bytes .../getnativetokenid_fuzzer/corpus/init | 14 ---- .../getnativetokenid_fuzzer/corpus/init0 | Bin 0 -> 30 bytes .../getpermissionflags_fuzzer/corpus/init | 14 ---- .../getpermissionflags_fuzzer/corpus/init0 | Bin 0 -> 40 bytes .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 40 bytes .../getpermissionsstatus_fuzzer/corpus/init | 13 ---- .../getpermissionsstatus_fuzzer/corpus/init0 | Bin 0 -> 40 bytes .../getpermissionusedtype_fuzzer/corpus/init | 14 ---- .../getpermissionusedtype_fuzzer/corpus/init0 | Bin 0 -> 40 bytes .../getremotenativetokenid_fuzzer/corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 40 bytes .../corpus/init | 13 ---- .../corpus/init0 | Bin 0 -> 40 bytes .../getselfpermissionstatus_fuzzer/BUILD.gn | 2 + .../corpus/init | 13 ---- .../corpus/init0 | Bin 0 -> 20 bytes .../getselfpermissionstatus_fuzzer.cpp | 4 +- .../grantpermission_fuzzer/corpus/init | 14 ---- .../grantpermission_fuzzer/corpus/init0 | Bin 0 -> 30 bytes .../grantpermission_fuzzer.cpp | 5 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 30 bytes .../inithaptoken_fuzzer/corpus/init | 14 ---- .../inithaptoken_fuzzer/corpus/init0 | Bin 0 -> 30 bytes .../corpus/init | 13 ---- .../corpus/init0 | Bin 0 -> 30 bytes .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 30 bytes .../revokeusergrantedpermission_fuzzer.cpp | 4 +- .../setpermdialogcap_fuzzer/corpus/init | 14 ---- .../setpermdialogcap_fuzzer/corpus/init0 | Bin 0 -> 30 bytes .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 30 bytes ...etpermissionrequesttogglestatus_fuzzer.cpp | 3 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 30 bytes .../setpermissionstatuswithpolicy_fuzzer.cpp | 8 +- .../updatehaptoken_fuzzer/corpus/init | 14 ---- .../updatehaptoken_fuzzer/corpus/init0 | Bin 0 -> 1000 bytes .../verifyaccesstoken001_fuzzer/BUILD.gn | 2 + .../verifyaccesstoken001_fuzzer.cpp | 7 +- .../verifyaccesstoken_fuzzer/BUILD.gn | 2 + .../verifyaccesstoken_fuzzer/corpus/init | 14 ---- .../verifyaccesstoken_fuzzer/corpus/init0 | Bin 0 -> 50 bytes .../verifyaccesstoken_fuzzer.cpp | 6 +- .../verifyaccesstokenwithlist_fuzzer/BUILD.gn | 2 + .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 30 bytes .../verifyaccesstokenwithlist_fuzzer.cpp | 10 ++- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 40 bytes .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 40 bytes .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 80 bytes .../BUILD.gn | 7 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../getpermissionusedtypeinfos_fuzzer.cpp | 6 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 80 bytes .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 80 bytes .../setmutepolicy_fuzzer.cpp | 5 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 80 bytes .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 80 bytes .../startusingpermission_fuzzer/corpus/init | 14 ---- .../startusingpermission_fuzzer/corpus/init0 | Bin 0 -> 80 bytes .../stopusingpermission_fuzzer/corpus/init | 14 ---- .../stopusingpermission_fuzzer/corpus/init0 | Bin 0 -> 80 bytes .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 80 bytes .../allochaptokenservice_fuzzer.cpp | 12 +-- .../allochaptokenservice_fuzzer/corpus/init | 14 ---- .../allochaptokenservice_fuzzer/corpus/init0 | Bin 0 -> 1000 bytes .../gethaptokenidservice_fuzzer/corpus/init | 14 ---- .../gethaptokenidservice_fuzzer/corpus/init0 | Bin 0 -> 50 bytes .../gethaptokeninfoservice_fuzzer/corpus/init | 14 ---- .../corpus/init0 | 1 + .../gethaptokeninfoservice_fuzzer.cpp | 3 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../getpermissionflagservice_fuzzer.cpp | 5 +- .../grantpermissionservice_fuzzer/corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../grantpermissionservice_fuzzer.cpp | 6 +- .../inithaptokenservice_fuzzer/corpus/init | 14 ---- .../inithaptokenservice_fuzzer/corpus/init0 | Bin 0 -> 1000 bytes .../inithaptokenservice_fuzzer.cpp | 5 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../revokepermissionservice_fuzzer.cpp | 5 +- .../allochaptokenstub_fuzzer.cpp | 11 +-- .../allochaptokenstub_fuzzer/corpus/init | 14 ---- .../allochaptokenstub_fuzzer/corpus/init0 | Bin 0 -> 1000 bytes .../alloclocaltokenidstub_fuzzer.cpp | 3 +- .../alloclocaltokenidstub_fuzzer/corpus/init | 14 ---- .../alloclocaltokenidstub_fuzzer/corpus/init0 | Bin 0 -> 20 bytes ...rusergrantedpermissionstatestub_fuzzer.cpp | 3 +- .../corpus/init | 14 ---- .../corpus/init0 | 2 + .../deleteremotehaptokeninfostub_fuzzer.cpp | 3 +- .../deleteremotetokenstub_fuzzer/corpus/init | 14 ---- .../deleteremotetokenstub_fuzzer/corpus/init0 | Bin 0 -> 20 bytes .../deleteremotetokenstub_fuzzer.cpp | 5 +- .../dumptokeninfostub_fuzzer.cpp | 3 +- .../getaccesstokenid_fuzzer/corpus/init | 14 ---- .../getaccesstokenid_fuzzer/corpus/init0 | Bin 0 -> 30 bytes .../getdefpermissionstub_fuzzer.cpp | 3 +- .../gethaptokenidstub_fuzzer/corpus/init | 14 ---- .../gethaptokenidstub_fuzzer/corpus/init0 | Bin 0 -> 50 bytes .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 20 bytes .../gethaptokeninfofromremotestub_fuzzer.cpp | 4 +- .../gethaptokeninfostub_fuzzer.cpp | 3 +- .../getkernelpermissionsstub_fuzzer.cpp | 3 +- .../getnativetokenidstub_fuzzer/corpus/init | 14 ---- .../getnativetokenidstub_fuzzer/corpus/init0 | Bin 0 -> 30 bytes .../getnativetokeninfostub_fuzzer.cpp | 3 +- .../getpermissionflagstub_fuzzer/corpus/init | 14 ---- .../getpermissionflagstub_fuzzer/corpus/init0 | Bin 0 -> 50 bytes .../getpermissionflagstub_fuzzer.cpp | 5 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 30 bytes ...rmissionrequesttogglestatusstub_fuzzer.cpp | 3 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../getpermissionsstatusstub_fuzzer.cpp | 5 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../getpermissionusedtypestub_fuzzer.cpp | 5 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 30 bytes .../getremotehaptokeninfostub_fuzzer.cpp | 3 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 30 bytes .../getremotenativetokenidstub_fuzzer.cpp | 3 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../getreqpermissionbynamestub_fuzzer.cpp | 6 +- .../getreqpermissionsstub_fuzzer/corpus/init | 14 ---- .../getreqpermissionsstub_fuzzer/corpus/init0 | Bin 0 -> 50 bytes .../getreqpermissionsstub_fuzzer.cpp | 3 +- .../getseccompenhancestub_fuzzer/corpus/init | 14 ---- .../getseccompenhancestub_fuzzer/corpus/init0 | Bin 0 -> 50 bytes .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../getselfpermissionsstatestub_fuzzer.cpp | 3 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../getselfpermissionstatusstub_fuzzer.cpp | 3 +- .../gettokenidbyuseridstub_fuzzer/corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 30 bytes .../gettokentypestub_fuzzer.cpp | 3 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes ...tpermissionforspecifiedtimestub_fuzzer.cpp | 5 +- .../grantpermissionstub_fuzzer/corpus/init | 14 ---- .../grantpermissionstub_fuzzer/corpus/init0 | Bin 0 -> 50 bytes .../grantpermissionstub_fuzzer.cpp | 20 ++++- .../inithaptokenstub_fuzzer/corpus/init | 14 ---- .../inithaptokenstub_fuzzer/corpus/init0 | Bin 0 -> 1000 bytes .../inithaptokenstub_fuzzer.cpp | 5 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes ...sterpermstatechangecallbackstub_fuzzer.cpp | 5 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes ...selfpermstatechangecallbackstub_fuzzer.cpp | 5 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../requestapppermonsettingstub_fuzzer.cpp | 3 +- .../revokepermissionstub_fuzzer/corpus/init | 14 ---- .../revokepermissionstub_fuzzer/corpus/init0 | Bin 0 -> 50 bytes .../revokepermissionstub_fuzzer.cpp | 25 ++++-- .../setpermdialogcapstub_fuzzer/corpus/init | 14 ---- .../setpermdialogcapstub_fuzzer/corpus/init0 | Bin 0 -> 50 bytes .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 30 bytes ...rmissionrequesttogglestatusstub_fuzzer.cpp | 6 +- .../verifyaccesstokenstub_fuzzer/corpus/init | 14 ---- .../verifyaccesstokenstub_fuzzer/corpus/init0 | Bin 0 -> 50 bytes .../verifyaccesstokenstub_fuzzer.cpp | 6 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 40 bytes .../verifyaccesstokenwithliststub_fuzzer.cpp | 5 +- ...ddpermissionusedrecordasyncstub_fuzzer.cpp | 5 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../addpermissionusedrecordstub_fuzzer.cpp | 5 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 200 bytes ...tpermissionusedrecordsasyncstub_fuzzer.cpp | 5 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 200 bytes .../getpermissionusedrecordsstub_fuzzer.cpp | 5 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../getpermissionusedtypeinfosstub_fuzzer.cpp | 7 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes .../isallowedusingpermissionstub_fuzzer.cpp | 7 +- ...terpermactivestatuscallbackstub_fuzzer.cpp | 3 +- .../corpus/init | 14 ---- .../corpus/init0 | Bin 0 -> 50 bytes ...removepermissionusedrecordsstub_fuzzer.cpp | 7 +- .../sethapwithfgreminderstub_fuzzer.cpp | 3 +- .../setmutepolicystub_fuzzer.cpp | 6 +- ...tartusingpermissioncallbackstub_fuzzer.cpp | 3 +- .../startusingpermissionstub_fuzzer.cpp | 3 +- .../stopusingpermissionstub_fuzzer.cpp | 7 +- ...terpermactivestatuscallbackstub_fuzzer.cpp | 3 +- 236 files changed, 324 insertions(+), 1237 deletions(-) delete mode 100644 test/fuzztest/innerkits/accesstoken/allochaptoken_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/allochaptoken_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/alloclocaltokenid_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/alloclocaltokenid_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/deleteremotetoken_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/deleteremotetoken_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/gethaptokenid_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/gethaptokenid_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/getnativetokenid_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/getnativetokenid_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/getpermissionflags_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/getpermissionflags_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/getpermissionrequesttogglestatus_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/getpermissionrequesttogglestatus_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/getpermissionsstatus_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/getpermissionsstatus_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/getpermissionusedtype_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/getpermissionusedtype_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/getremotenativetokenid_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/getremotenativetokenid_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/getselfpermissionsstate_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/getselfpermissionsstate_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/getselfpermissionstatus_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/getselfpermissionstatus_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/grantpermission_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/grantpermission_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/grantpermissionforspecifiedtime_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/grantpermissionforspecifiedtime_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/inithaptoken_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/inithaptoken_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/registerpermstatechangecallback_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/registerpermstatechangecallback_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/revokeusergrantedpermission_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/revokeusergrantedpermission_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/setpermdialogcap_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/setpermdialogcap_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/setpermissionrequesttogglestatus_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/setpermissionrequesttogglestatus_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/setpermissionstatuswithpolicy_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/setpermissionstatuswithpolicy_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/updatehaptoken_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/updatehaptoken_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/privacy/addpermissionusedrecord_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/privacy/addpermissionusedrecord_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/privacy/addpermissionusedrecordasync_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/privacy/addpermissionusedrecordasync_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/privacy/getpermissionusedrecords_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/privacy/getpermissionusedrecords_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/privacy/isallowedusingpermission_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/privacy/isallowedusingpermission_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/privacy/registerpermactivestatuscallback_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/privacy/registerpermactivestatuscallback_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/privacy/setpermissionusedrecordtogglestatus_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/privacy/setpermissionusedrecordtogglestatus_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/privacy/startusingpermission001_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/privacy/startusingpermission001_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/privacy/startusingpermission_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/privacy/startusingpermission_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/privacy/stopusingpermission_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/privacy/stopusingpermission_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/innerkits/privacy/unregisterpermactivestatuscallback_fuzzer/corpus/init create mode 100644 test/fuzztest/innerkits/privacy/unregisterpermactivestatuscallback_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/normalize_service/accesstoken/allochaptokenservice_fuzzer/corpus/init create mode 100644 test/fuzztest/normalize_service/accesstoken/allochaptokenservice_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/normalize_service/accesstoken/gethaptokenidservice_fuzzer/corpus/init create mode 100644 test/fuzztest/normalize_service/accesstoken/gethaptokenidservice_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/normalize_service/accesstoken/gethaptokeninfoservice_fuzzer/corpus/init create mode 100644 test/fuzztest/normalize_service/accesstoken/gethaptokeninfoservice_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/normalize_service/accesstoken/getpermissionflagservice_fuzzer/corpus/init create mode 100644 test/fuzztest/normalize_service/accesstoken/getpermissionflagservice_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/normalize_service/accesstoken/grantpermissionservice_fuzzer/corpus/init create mode 100644 test/fuzztest/normalize_service/accesstoken/grantpermissionservice_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/normalize_service/accesstoken/inithaptokenservice_fuzzer/corpus/init create mode 100644 test/fuzztest/normalize_service/accesstoken/inithaptokenservice_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/normalize_service/accesstoken/revokepermissionservice_fuzzer/corpus/init create mode 100644 test/fuzztest/normalize_service/accesstoken/revokepermissionservice_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/allochaptokenstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/allochaptokenstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/alloclocaltokenidstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/alloclocaltokenidstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/clearusergrantedpermissionstatestub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/clearusergrantedpermissionstatestub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/deleteremotetokenstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/deleteremotetokenstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/getaccesstokenid_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/getaccesstokenid_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/gethaptokenidstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/gethaptokenidstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/gethaptokeninfofromremotestub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/gethaptokeninfofromremotestub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/getnativetokenidstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/getnativetokenidstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/getpermissionflagstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/getpermissionflagstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/getpermissionrequesttogglestatusstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/getpermissionrequesttogglestatusstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/getpermissionsstatusstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/getpermissionsstatusstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/getpermissionusedtypestub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/getpermissionusedtypestub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/getremotehaptokeninfostub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/getremotehaptokeninfostub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/getremotenativetokenidstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/getremotenativetokenidstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/getreqpermissionbynamestub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/getreqpermissionbynamestub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/getreqpermissionsstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/getreqpermissionsstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/getseccompenhancestub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/getseccompenhancestub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/getselfpermissionsstatestub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/getselfpermissionsstatestub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/getselfpermissionstatusstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/getselfpermissionstatusstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/gettokenidbyuseridstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/gettokenidbyuseridstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/grantpermissionforspecifiedtimestub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/grantpermissionforspecifiedtimestub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/grantpermissionstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/grantpermissionstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/inithaptokenstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/inithaptokenstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/registerpermstatechangecallbackstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/registerpermstatechangecallbackstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/registerselfpermstatechangecallbackstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/registerselfpermstatechangecallbackstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/requestapppermonsettingstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/requestapppermonsettingstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/revokepermissionstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/revokepermissionstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/setpermdialogcapstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/setpermdialogcapstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/setpermissionrequesttogglestatusstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/setpermissionrequesttogglestatusstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/verifyaccesstokenstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/verifyaccesstokenstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/accesstoken/verifyaccesstokenwithliststub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/accesstoken/verifyaccesstokenwithliststub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/privacy/addpermissionusedrecordasyncstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/privacy/addpermissionusedrecordasyncstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/privacy/addpermissionusedrecordstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/privacy/addpermissionusedrecordstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/privacy/getpermissionusedrecordsasyncstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/privacy/getpermissionusedrecordsasyncstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/privacy/getpermissionusedrecordsstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/privacy/getpermissionusedrecordsstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/privacy/getpermissionusedtypeinfosstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/privacy/getpermissionusedtypeinfosstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/privacy/isallowedusingpermissionstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/privacy/isallowedusingpermissionstub_fuzzer/corpus/init0 delete mode 100644 test/fuzztest/services/privacy/removepermissionusedrecordsstub_fuzzer/corpus/init create mode 100644 test/fuzztest/services/privacy/removepermissionusedrecordsstub_fuzzer/corpus/init0 diff --git a/OAT.xml b/OAT.xml index c30889645..b6be19ee8 100644 --- a/OAT.xml +++ b/OAT.xml @@ -79,6 +79,7 @@ + diff --git a/test/fuzztest/common/accesstoken_fuzzdata.h b/test/fuzztest/common/accesstoken_fuzzdata.h index 8502c1358..9d3b6a620 100644 --- a/test/fuzztest/common/accesstoken_fuzzdata.h +++ b/test/fuzztest/common/accesstoken_fuzzdata.h @@ -17,10 +17,83 @@ #define ACCESSTOKEN_FUZZDATA_TEMPLATE_H #include +#include +#include #include +#include "fuzzer/FuzzedDataProvider.h" +#include "accesstoken_kit.h" +#include "permission_map.h" #include "securec.h" +static OHOS::Security::AccessToken::AccessTokenID TransfterStrToAccesstokenID(const std::string& numStr) +{ + size_t index = 0; + while (index < numStr.length()) { + if (!std::isdigit(numStr[index])) { + break; + } + ++index; + } + if (index != numStr.length()) { + return 0; + } + OHOS::Security::AccessToken::AccessTokenID id = + static_cast(std::stoi(numStr)); + return id; +} + +void GetTokenIdList(std::vector &tokenIdList) +{ + std::string dumpInfo; + OHOS::Security::AccessToken::AtmToolsParamInfo info; + OHOS::Security::AccessToken::AccessTokenKit::DumpTokenInfo(info, dumpInfo); + std::istringstream iss(dumpInfo); + std::string line; + while (std::getline(iss, line)) { + size_t pos = line.find(':'); + if (pos != std::string::npos) { + std::string numStr = line.substr(0, pos); + OHOS::Security::AccessToken::AccessTokenID id = TransfterStrToAccesstokenID(numStr); + if (id != OHOS::Security::AccessToken::INVALID_TOKENID) { + tokenIdList.push_back(id); + } + } + } +} + +OHOS::Security::AccessToken::AccessTokenID ConsumeTokenId(FuzzedDataProvider &provider) +{ + static std::vector tokenIdList; + static bool isIntialize = false; + if (!isIntialize) { + GetTokenIdList(tokenIdList); + isIntialize = true; + } + OHOS::Security::AccessToken::AccessTokenID tokenId = 0; + if (provider.ConsumeBool() || tokenIdList.empty()) { + tokenId = provider.ConsumeIntegral(); + } else { + tokenId = tokenIdList[ + provider.ConsumeIntegralInRange(0, static_cast(tokenIdList.size() - 1))]; + } + + return tokenId; +} + +std::string ConsumePermissionName(FuzzedDataProvider &provider) +{ + std::string permissionName; + if (provider.ConsumeBool()) { + permissionName = provider.ConsumeRandomLengthString(); + } else { + permissionName = OHOS::Security::AccessToken::TransferOpcodeToPermission( + provider.ConsumeIntegralInRange( + 0, static_cast(OHOS::Security::AccessToken::GetDefPermissionsSize()) - 1), permissionName); + } + return permissionName; +} + namespace OHOS { namespace Security { namespace AccessToken { diff --git a/test/fuzztest/innerkits/accesstoken/accesstokenkitcoverage_fuzzer/BUILD.gn b/test/fuzztest/innerkits/accesstoken/accesstokenkitcoverage_fuzzer/BUILD.gn index ad40c6192..1dbc99062 100644 --- a/test/fuzztest/innerkits/accesstoken/accesstokenkitcoverage_fuzzer/BUILD.gn +++ b/test/fuzztest/innerkits/accesstoken/accesstokenkitcoverage_fuzzer/BUILD.gn @@ -20,6 +20,7 @@ ohos_fuzztest("AccessTokenKitCoverageFuzzTest") { fuzz_config_file = "." include_dirs = [ + "${access_token_path}/frameworks/common/include", "${access_token_path}/interfaces/innerkits/accesstoken/include", "${access_token_path}/test/fuzztest/common", ] diff --git a/test/fuzztest/innerkits/accesstoken/allochaptoken_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/allochaptoken_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/accesstoken/allochaptoken_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/allochaptoken_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/allochaptoken_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..07e8732f9bdcab54fc163cc20eacad1019ddda02 GIT binary patch literal 1000 zcmVkN=zTyRPNTu*KQ zTs3q6TxL!HTx)LtTs3b1TzFVywRN(z<0ox^U{j*SIEo?L8bQ^UhZBmZ7o%mFnI;#8 zyw6F{nKs?vp)l09Nias_Gc)k80e$SY^X6Q{2a>GYU4E0;?RZW8W`CfTYUTyst|3#w zHKqouIOiqruf1TR2l9TPp~rmsvJLm98+Z-avM8ytJQg$NU>j@93C$_8RfMXBOwhK? zg}bfJ&y=aFqcb#@FHz@@4)LwRm-0TKph6gzg8@v0ZymYmg9;|ZTG`<7Z+W$k(Yvsz zLb^QTuvnO?yy~Qq!MvQ59)xiGVIOe2qQ#l+xK~uG#)xUD3#k3@&b|udaWs<6sEw$T zBn-UW`#c={M|YjBNI?#T1psWX#68#IktXAl zJVp4}a(x1=oFN9^g|wRL4zc{ZMzK@Rqt#%IVMg4-Wk$&KI+Ys`x>dvYIxSTxU~E3rv$q7S%~+ZdS20{ zen|qCS|SG4hR@6XO?L^?dicqmP<6YowDqRP(g%zCZ<$-Qv!rpjC-OwMdR67WMVpMN za(|M_FpGhsOM(N&zo%&ZZHgeCMLQ#-#(1yRK*(jeFPSH?@EFU))=KV;8%Y4LiztZw z%et$$dK?DGpJ(*98s*ZVMBssfcLMIXmAdWm))|ZDgr$$6>!~F1a)&yLp4b6~#Jk6% zMFp7i{t;Qpa}`Lx_n*)A2dR~xj|8-o_2?(h(%n_>*Vc2R5kCMYZNSg)POw&Kpv%oSq8!6GtF!7d`ro}2GulCTgN|aEBK9${4ljwo^awKv4*;Hp$<=kud~jW<^T09Zx}i~s-t literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/clearusergrantedpermissionstate_fuzzer/BUILD.gn b/test/fuzztest/innerkits/accesstoken/clearusergrantedpermissionstate_fuzzer/BUILD.gn index 460d5c90e..4f8e58dd5 100644 --- a/test/fuzztest/innerkits/accesstoken/clearusergrantedpermissionstate_fuzzer/BUILD.gn +++ b/test/fuzztest/innerkits/accesstoken/clearusergrantedpermissionstate_fuzzer/BUILD.gn @@ -19,6 +19,7 @@ ohos_fuzztest("ClearUserGrantedPermissionStateFuzzTest") { module_out_path = module_output_path_interface_access_token fuzz_config_file = "." include_dirs = [ + "${access_token_path}/frameworks/common/include", "${access_token_path}/interfaces/innerkits/accesstoken/include", "${access_token_path}/test/fuzztest/common", ] diff --git a/test/fuzztest/innerkits/accesstoken/clearusergrantedpermissionstate_fuzzer/clearusergrantedpermissionstate_fuzzer.cpp b/test/fuzztest/innerkits/accesstoken/clearusergrantedpermissionstate_fuzzer/clearusergrantedpermissionstate_fuzzer.cpp index 2d73c4635..e9e09fdcf 100644 --- a/test/fuzztest/innerkits/accesstoken/clearusergrantedpermissionstate_fuzzer/clearusergrantedpermissionstate_fuzzer.cpp +++ b/test/fuzztest/innerkits/accesstoken/clearusergrantedpermissionstate_fuzzer/clearusergrantedpermissionstate_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_kit.h" #include "fuzzer/FuzzedDataProvider.h" @@ -34,8 +35,8 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - return AccessTokenKit::ClearUserGrantedPermissionState( - provider.ConsumeIntegral()) == RET_SUCCESS; + AccessTokenID tokenId = ConsumeTokenId(provider); + return AccessTokenKit::ClearUserGrantedPermissionState(tokenId) == RET_SUCCESS; } } diff --git a/test/fuzztest/innerkits/accesstoken/deleteremotetoken_fuzzer/BUILD.gn b/test/fuzztest/innerkits/accesstoken/deleteremotetoken_fuzzer/BUILD.gn index 2937d5c6d..14ff8cbb4 100644 --- a/test/fuzztest/innerkits/accesstoken/deleteremotetoken_fuzzer/BUILD.gn +++ b/test/fuzztest/innerkits/accesstoken/deleteremotetoken_fuzzer/BUILD.gn @@ -19,6 +19,7 @@ ohos_fuzztest("DeleteRemoteTokenFuzzTest") { module_out_path = module_output_path_interface_access_token fuzz_config_file = "." include_dirs = [ + "${access_token_path}/frameworks/common/include", "${access_token_path}/interfaces/innerkits/accesstoken/include", "${access_token_path}/test/fuzztest/common", ] diff --git a/test/fuzztest/innerkits/accesstoken/deleteremotetoken_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/deleteremotetoken_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/accesstoken/deleteremotetoken_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/deleteremotetoken_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/deleteremotetoken_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..86d830374f3be9b1916e3cf36733799eced92be2 GIT binary patch literal 40 ycmV+@0N4LUV@Gm!WJ+uRT$4`1#=Y20+p8}0an0?=eE)R7AhO16s0@6aXH #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_kit.h" #include "fuzzer/FuzzedDataProvider.h" @@ -35,8 +36,8 @@ namespace OHOS { #ifdef TOKEN_SYNC_ENABLE FuzzedDataProvider provider(data, size); - return AccessTokenKit::DeleteRemoteToken(provider.ConsumeRandomLengthString(), - provider.ConsumeIntegral()) == RET_SUCCESS; + AccessTokenID tokenId = ConsumeTokenId(provider); + return AccessTokenKit::DeleteRemoteToken(provider.ConsumeRandomLengthString(), tokenId) == RET_SUCCESS; #else return true; #endif diff --git a/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/BUILD.gn b/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/BUILD.gn index 838fa2cd7..360738f32 100644 --- a/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/BUILD.gn +++ b/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/BUILD.gn @@ -31,6 +31,7 @@ ohos_fuzztest("GetDefPermissionFuzzTest") { sources = [ "getdefpermission_fuzzer.cpp" ] deps = [ + "${access_token_path}/frameworks/common:accesstoken_common_cxx", "${access_token_path}/interfaces/innerkits/accesstoken:libaccesstoken_sdk", ] diff --git a/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/corpus/init0 new file mode 100644 index 000000000..a7de26a73 --- /dev/null +++ b/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/corpus/init0 @@ -0,0 +1 @@ +҉(_ĝ)Ymjz]>[\K UȹB \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/getdefpermission_fuzzer.cpp b/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/getdefpermission_fuzzer.cpp index 2143937de..cb79fbcee 100644 --- a/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/getdefpermission_fuzzer.cpp +++ b/test/fuzztest/innerkits/accesstoken/getdefpermission_fuzzer/getdefpermission_fuzzer.cpp @@ -21,6 +21,7 @@ #include "fuzzer/FuzzedDataProvider.h" #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_kit.h" #include "permission_def.h" @@ -37,7 +38,8 @@ namespace OHOS { FuzzedDataProvider provider(data, size); PermissionDef def; - return AccessTokenKit::GetDefPermission(provider.ConsumeRandomLengthString(), def) == RET_SUCCESS; + std::string permissionName = ConsumePermissionName(provider); + return AccessTokenKit::GetDefPermission(permissionName, def) == RET_SUCCESS; } } diff --git a/test/fuzztest/innerkits/accesstoken/gethaptokenid_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/gethaptokenid_fuzzer/corpus/init deleted file mode 100644 index c49c21aa8..000000000 --- a/test/fuzztest/innerkits/accesstoken/gethaptokenid_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/gethaptokenid_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/gethaptokenid_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d77f9491c933682a5a9a05101dccb26c0c3714ca GIT binary patch literal 30 jcma!WE2(m=V2GLCd3|2y`9jV!y#aqSo}@4^G=MMw%@GWz literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/getnativetokenid_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/getnativetokenid_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/accesstoken/getnativetokenid_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/getnativetokenid_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/getnativetokenid_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..78779e2e2ce8bb524950ccae5de5895ce8d7e711 GIT binary patch literal 30 lcmYdHPEIW@F3HbM&5JKiEh@`QPK{wu_EQOBdUwB84gj}g3y}Z- literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/getpermissionflags_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/getpermissionflags_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/accesstoken/getpermissionflags_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/getpermissionflags_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/getpermissionflags_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..291d17696893b6eed3ac9c20c4e54b2b9cf0fb5e GIT binary patch literal 40 ycmV+@0N4LDI8jPWc{F$cT*AQ21RUQ1C0_pE)&aGU{*csWH|d6n$kJKmcnuC?D-#0% literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/getpermissionrequesttogglestatus_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/getpermissionrequesttogglestatus_fuzzer/corpus/init deleted file mode 100644 index 61a7da989..000000000 --- a/test/fuzztest/innerkits/accesstoken/getpermissionrequesttogglestatus_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ diff --git a/test/fuzztest/innerkits/accesstoken/getpermissionrequesttogglestatus_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/getpermissionrequesttogglestatus_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..291d17696893b6eed3ac9c20c4e54b2b9cf0fb5e GIT binary patch literal 40 ycmV+@0N4LDI8jPWc{F$cT*AQ21RUQ1C0_pE)&aGU{*csWH|d6n$kJKmcnuC?D-#0% literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/getpermissionsstatus_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/getpermissionsstatus_fuzzer/corpus/init deleted file mode 100644 index f7880ef1a..000000000 --- a/test/fuzztest/innerkits/accesstoken/getpermissionsstatus_fuzzer/corpus/init +++ /dev/null @@ -1,13 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/getpermissionsstatus_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/getpermissionsstatus_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..291d17696893b6eed3ac9c20c4e54b2b9cf0fb5e GIT binary patch literal 40 ycmV+@0N4LDI8jPWc{F$cT*AQ21RUQ1C0_pE)&aGU{*csWH|d6n$kJKmcnuC?D-#0% literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/getpermissionusedtype_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/getpermissionusedtype_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/innerkits/accesstoken/getpermissionusedtype_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/getpermissionusedtype_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/getpermissionusedtype_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..291d17696893b6eed3ac9c20c4e54b2b9cf0fb5e GIT binary patch literal 40 ycmV+@0N4LDI8jPWc{F$cT*AQ21RUQ1C0_pE)&aGU{*csWH|d6n$kJKmcnuC?D-#0% literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/getremotenativetokenid_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/getremotenativetokenid_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/accesstoken/getremotenativetokenid_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/getremotenativetokenid_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/getremotenativetokenid_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..291d17696893b6eed3ac9c20c4e54b2b9cf0fb5e GIT binary patch literal 40 ycmV+@0N4LDI8jPWc{F$cT*AQ21RUQ1C0_pE)&aGU{*csWH|d6n$kJKmcnuC?D-#0% literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/getselfpermissionsstate_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/getselfpermissionsstate_fuzzer/corpus/init deleted file mode 100644 index 1b910144f..000000000 --- a/test/fuzztest/innerkits/accesstoken/getselfpermissionsstate_fuzzer/corpus/init +++ /dev/null @@ -1,13 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/getselfpermissionsstate_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/getselfpermissionsstate_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..291d17696893b6eed3ac9c20c4e54b2b9cf0fb5e GIT binary patch literal 40 ycmV+@0N4LDI8jPWc{F$cT*AQ21RUQ1C0_pE)&aGU{*csWH|d6n$kJKmcnuC?D-#0% literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/getselfpermissionstatus_fuzzer/BUILD.gn b/test/fuzztest/innerkits/accesstoken/getselfpermissionstatus_fuzzer/BUILD.gn index 2968c428b..f7927965f 100644 --- a/test/fuzztest/innerkits/accesstoken/getselfpermissionstatus_fuzzer/BUILD.gn +++ b/test/fuzztest/innerkits/accesstoken/getselfpermissionstatus_fuzzer/BUILD.gn @@ -19,6 +19,7 @@ ohos_fuzztest("GetSelfPermissionStatusFuzzTest") { module_out_path = module_output_path_interface_access_token fuzz_config_file = "." include_dirs = [ + "${access_token_path}/frameworks/common/include", "${access_token_path}/interfaces/innerkits/accesstoken/include", "${access_token_path}/test/fuzztest/common", ] @@ -30,6 +31,7 @@ ohos_fuzztest("GetSelfPermissionStatusFuzzTest") { ] sources = [ "getselfpermissionstatus_fuzzer.cpp" ] deps = [ + "${access_token_path}/frameworks/common:accesstoken_common_cxx", "${access_token_path}/interfaces/innerkits/accesstoken:libaccesstoken_sdk", ] diff --git a/test/fuzztest/innerkits/accesstoken/getselfpermissionstatus_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/getselfpermissionstatus_fuzzer/corpus/init deleted file mode 100644 index 8f37f0925..000000000 --- a/test/fuzztest/innerkits/accesstoken/getselfpermissionstatus_fuzzer/corpus/init +++ /dev/null @@ -1,13 +0,0 @@ -# Copyright (c) 2025 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/getselfpermissionstatus_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/getselfpermissionstatus_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..a168e9ed5b82e46f596235154fc4958ce4051df2 GIT binary patch literal 20 bcmXqb(7 #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_kit.h" #include "fuzzer/FuzzedDataProvider.h" @@ -35,7 +36,8 @@ namespace OHOS { FuzzedDataProvider provider(data, size); PermissionOper status; - return AccessTokenKit::GetSelfPermissionStatus(provider.ConsumeRandomLengthString(), status) == RET_SUCCESS; + std::string permissionName = ConsumePermissionName(provider); + return AccessTokenKit::GetSelfPermissionStatus(permissionName, status) == RET_SUCCESS; } } diff --git a/test/fuzztest/innerkits/accesstoken/grantpermission_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/grantpermission_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/accesstoken/grantpermission_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/grantpermission_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/grantpermission_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d77f9491c933682a5a9a05101dccb26c0c3714ca GIT binary patch literal 30 jcma!WE2(m=V2GLCd3|2y`9jV!y#aqSo}@4^G=MMw%@GWz literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/grantpermission_fuzzer/grantpermission_fuzzer.cpp b/test/fuzztest/innerkits/accesstoken/grantpermission_fuzzer/grantpermission_fuzzer.cpp index 6c0671867..5482a2ceb 100644 --- a/test/fuzztest/innerkits/accesstoken/grantpermission_fuzzer/grantpermission_fuzzer.cpp +++ b/test/fuzztest/innerkits/accesstoken/grantpermission_fuzzer/grantpermission_fuzzer.cpp @@ -23,6 +23,8 @@ #include "accesstoken_kit.h" #include "fuzzer/FuzzedDataProvider.h" +const static int32_t FLAG_SIZE = 16; + using namespace std; using namespace OHOS::Security::AccessToken; @@ -35,7 +37,8 @@ namespace OHOS { FuzzedDataProvider provider(data, size); return AccessTokenKit::GrantPermission(provider.ConsumeIntegral(), - provider.ConsumeRandomLengthString(), provider.ConsumeIntegral()) == RET_SUCCESS; + provider.ConsumeRandomLengthString(), + 1 << (provider.ConsumeIntegral() % FLAG_SIZE)) == RET_SUCCESS; } } diff --git a/test/fuzztest/innerkits/accesstoken/grantpermissionforspecifiedtime_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/grantpermissionforspecifiedtime_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/innerkits/accesstoken/grantpermissionforspecifiedtime_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/grantpermissionforspecifiedtime_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/grantpermissionforspecifiedtime_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d77f9491c933682a5a9a05101dccb26c0c3714ca GIT binary patch literal 30 jcma!WE2(m=V2GLCd3|2y`9jV!y#aqSo}@4^G=MMw%@GWz literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/inithaptoken_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/inithaptoken_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/innerkits/accesstoken/inithaptoken_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/inithaptoken_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/inithaptoken_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d77f9491c933682a5a9a05101dccb26c0c3714ca GIT binary patch literal 30 jcma!WE2(m=V2GLCd3|2y`9jV!y#aqSo}@4^G=MMw%@GWz literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/registerpermstatechangecallback_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/registerpermstatechangecallback_fuzzer/corpus/init deleted file mode 100644 index 1b910144f..000000000 --- a/test/fuzztest/innerkits/accesstoken/registerpermstatechangecallback_fuzzer/corpus/init +++ /dev/null @@ -1,13 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/registerpermstatechangecallback_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/registerpermstatechangecallback_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d77f9491c933682a5a9a05101dccb26c0c3714ca GIT binary patch literal 30 jcma!WE2(m=V2GLCd3|2y`9jV!y#aqSo}@4^G=MMw%@GWz literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/revokeusergrantedpermission_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/revokeusergrantedpermission_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/accesstoken/revokeusergrantedpermission_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/revokeusergrantedpermission_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/revokeusergrantedpermission_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d77f9491c933682a5a9a05101dccb26c0c3714ca GIT binary patch literal 30 jcma!WE2(m=V2GLCd3|2y`9jV!y#aqSo}@4^G=MMw%@GWz literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/revokeusergrantedpermission_fuzzer/revokeusergrantedpermission_fuzzer.cpp b/test/fuzztest/innerkits/accesstoken/revokeusergrantedpermission_fuzzer/revokeusergrantedpermission_fuzzer.cpp index 45ad4e878..4ed3a8723 100644 --- a/test/fuzztest/innerkits/accesstoken/revokeusergrantedpermission_fuzzer/revokeusergrantedpermission_fuzzer.cpp +++ b/test/fuzztest/innerkits/accesstoken/revokeusergrantedpermission_fuzzer/revokeusergrantedpermission_fuzzer.cpp @@ -25,6 +25,7 @@ using namespace std; using namespace OHOS::Security::AccessToken; +const static int32_t FLAG_SIZE = 16; namespace OHOS { bool RevokeUserGrantedPermissionFuzzTest(const uint8_t* data, size_t size) @@ -34,8 +35,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - uint32_t flag = provider.ConsumeIntegralInRange( - 0, static_cast(PermissionFlag::PERMISSION_ALLOW_THIS_TIME)); + uint32_t flag = 1 << (provider.ConsumeIntegral() % FLAG_SIZE); return AccessTokenKit::RevokePermission(provider.ConsumeIntegral(), provider.ConsumeRandomLengthString(), flag) == RET_SUCCESS; } diff --git a/test/fuzztest/innerkits/accesstoken/setpermdialogcap_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/setpermdialogcap_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/innerkits/accesstoken/setpermdialogcap_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/setpermdialogcap_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/setpermdialogcap_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d77f9491c933682a5a9a05101dccb26c0c3714ca GIT binary patch literal 30 jcma!WE2(m=V2GLCd3|2y`9jV!y#aqSo}@4^G=MMw%@GWz literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/setpermissionrequesttogglestatus_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/setpermissionrequesttogglestatus_fuzzer/corpus/init deleted file mode 100644 index 61a7da989..000000000 --- a/test/fuzztest/innerkits/accesstoken/setpermissionrequesttogglestatus_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ diff --git a/test/fuzztest/innerkits/accesstoken/setpermissionrequesttogglestatus_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/setpermissionrequesttogglestatus_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d77f9491c933682a5a9a05101dccb26c0c3714ca GIT binary patch literal 30 jcma!WE2(m=V2GLCd3|2y`9jV!y#aqSo}@4^G=MMw%@GWz literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/setpermissionrequesttogglestatus_fuzzer/setpermissionrequesttogglestatus_fuzzer.cpp b/test/fuzztest/innerkits/accesstoken/setpermissionrequesttogglestatus_fuzzer/setpermissionrequesttogglestatus_fuzzer.cpp index 3ddfd3c77..0e98219a7 100644 --- a/test/fuzztest/innerkits/accesstoken/setpermissionrequesttogglestatus_fuzzer/setpermissionrequesttogglestatus_fuzzer.cpp +++ b/test/fuzztest/innerkits/accesstoken/setpermissionrequesttogglestatus_fuzzer/setpermissionrequesttogglestatus_fuzzer.cpp @@ -22,6 +22,7 @@ #undef private #include "accesstoken_kit.h" #include "fuzzer/FuzzedDataProvider.h" +const static int32_t STATUS_SIZE = 3; using namespace std; using namespace OHOS::Security::AccessToken; @@ -35,7 +36,7 @@ namespace OHOS { FuzzedDataProvider provider(data, size); return AccessTokenKit::SetPermissionRequestToggleStatus(provider.ConsumeRandomLengthString(), - provider.ConsumeIntegral(), provider.ConsumeIntegral()) == RET_SUCCESS; + provider.ConsumeIntegral() % STATUS_SIZE, provider.ConsumeIntegral()) == RET_SUCCESS; } } diff --git a/test/fuzztest/innerkits/accesstoken/setpermissionstatuswithpolicy_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/setpermissionstatuswithpolicy_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/accesstoken/setpermissionstatuswithpolicy_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/setpermissionstatuswithpolicy_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/setpermissionstatuswithpolicy_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d77f9491c933682a5a9a05101dccb26c0c3714ca GIT binary patch literal 30 jcma!WE2(m=V2GLCd3|2y`9jV!y#aqSo}@4^G=MMw%@GWz literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/setpermissionstatuswithpolicy_fuzzer/setpermissionstatuswithpolicy_fuzzer.cpp b/test/fuzztest/innerkits/accesstoken/setpermissionstatuswithpolicy_fuzzer/setpermissionstatuswithpolicy_fuzzer.cpp index 2c8131413..0153b9fcb 100644 --- a/test/fuzztest/innerkits/accesstoken/setpermissionstatuswithpolicy_fuzzer/setpermissionstatuswithpolicy_fuzzer.cpp +++ b/test/fuzztest/innerkits/accesstoken/setpermissionstatuswithpolicy_fuzzer/setpermissionstatuswithpolicy_fuzzer.cpp @@ -18,7 +18,7 @@ #include #include #include -#include "accesstoken_fuzzdata.h" +#include "fuzzer/FuzzedDataProvider.h" #undef private #include "accesstoken_kit.h" @@ -32,10 +32,10 @@ namespace OHOS { return false; } - AccessTokenFuzzData fuzzData(data, size); - std::vector permList = {fuzzData.GenerateStochasticString()}; + FuzzedDataProvider provider(data, size); + std::vector permList = {provider.ConsumeRandomLengthString()}; int32_t result = AccessTokenKit::SetPermissionStatusWithPolicy( - fuzzData.GetData(), permList, 0, 128); + provider.ConsumeIntegral(), permList, 0, 128); return result == RET_SUCCESS; } } diff --git a/test/fuzztest/innerkits/accesstoken/updatehaptoken_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/updatehaptoken_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/accesstoken/updatehaptoken_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/updatehaptoken_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/updatehaptoken_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..600c49776b326136c67fec13237a9dad9f3be463 GIT binary patch literal 1000 zcmVlLTheINkmToTy$#yTtqcTMR06sPyk$QOKxFrGDJ%NTtQd>Tw-hhTufmA zTw_xJTzO6aTr@-gTrqS2TxL%IT=<#!6B4>??#ifPO?vG-LL&La1_1~SI#ACu$ z8Uw5H@t?iyUsje*WZ}8Y0rce$SdqetoVJVEKzo~}!R)EM_tD?>nEblrA)&d5X2VijSKU-jw!bnM2&N$!Lb49#)ry{7>?1cZ{3+>7BYb zGm`4oJ8t^0+iwOx=A{4m0~Zsq3C%4(d^z^S$C0-&`3&(?}0 z5LfELYh;Ymv`v?S#B!9p9Xo|%;DVxjCkftG#$wrl6iUjE*aWKwvmWRbj0DyaxD~eq zb>fvTC8nAT%80MD%t(&IQ~J9_*BP&2M-Q~Br*Wy30T9?cg3QuBZ8zJnePfL5y)({> z1-<_c!dITXFXz>BxEZABeVU3>70dXHBGm0@GfL&*Wi0ZI2-4x^j}DHd#*~HKCHR2~ zfNq-(J^S(8F=)>YS9Y(eF~X*@dEeU8;$7nqu;fFBPl2DXGhcg(cj-0_2|o^N)+Z zMFa28DD==7WI6hZ7fy~l-rD%*<)Ya|95mND=MU;5in+Db!~5IxJ0X;kDvRdagNpMt zD*3T>#?rd!TllHkI6CMdka+nps+o#Cu88rJLNB1FsD0LWia*JOFVTpe98}DADq_=~ zjI-#1_Fj$7^}mt}Rp0x4O#!4=_5{+LQuy@PXIYjQw(`yS`_Gzb8zi;HnELT(b!Ljv zRXDSTO5&dqD22NYsJpPK&W)94wJqn*2=0r|S{jB0T(*l)rVW)tx^~g`;o+)a{o>mn zfH4cuWC*bZn;~ep%5y7j=dCi^zKPgTZ>B=pziPAGmCW~>cbt2Qm W%--AP=ca #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_kit.h" #include "fuzzer/FuzzedDataProvider.h" @@ -34,8 +35,10 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - return AccessTokenKit::VerifyAccessToken(provider.ConsumeIntegral(), - provider.ConsumeIntegral(), provider.ConsumeRandomLengthString(), + AccessTokenID callerTokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); + AccessTokenID firstTokenId = ConsumeTokenId(provider); + return AccessTokenKit::VerifyAccessToken(callerTokenId, firstTokenId, permissionName, provider.ConsumeBool()) == RET_SUCCESS; } } diff --git a/test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/BUILD.gn b/test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/BUILD.gn index 35127ce11..9c29a7002 100644 --- a/test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/BUILD.gn +++ b/test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/BUILD.gn @@ -19,6 +19,7 @@ ohos_fuzztest("VerifyAccessTokenFuzzTest") { module_out_path = module_output_path_interface_access_token fuzz_config_file = "." include_dirs = [ + "${access_token_path}/frameworks/common/include", "${access_token_path}/interfaces/innerkits/accesstoken/include", "${access_token_path}/test/fuzztest/common", ] @@ -31,6 +32,7 @@ ohos_fuzztest("VerifyAccessTokenFuzzTest") { sources = [ "verifyaccesstoken_fuzzer.cpp" ] deps = [ + "${access_token_path}/frameworks/common:accesstoken_common_cxx", "${access_token_path}/interfaces/innerkits/accesstoken:libaccesstoken_sdk", ] diff --git a/test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/verifyaccesstoken_fuzzer.cpp b/test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/verifyaccesstoken_fuzzer.cpp index 0c2a0464d..51a96b9df 100644 --- a/test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/verifyaccesstoken_fuzzer.cpp +++ b/test/fuzztest/innerkits/accesstoken/verifyaccesstoken_fuzzer/verifyaccesstoken_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_kit.h" #include "fuzzer/FuzzedDataProvider.h" @@ -34,8 +35,9 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - return AccessTokenKit::VerifyAccessToken(provider.ConsumeIntegral(), - provider.ConsumeRandomLengthString(), provider.ConsumeBool()) == RET_SUCCESS; + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); + return AccessTokenKit::VerifyAccessToken(tokenId, permissionName, provider.ConsumeBool()) == RET_SUCCESS; } } diff --git a/test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/BUILD.gn b/test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/BUILD.gn index 200fd1490..6ff5e7ab4 100644 --- a/test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/BUILD.gn +++ b/test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/BUILD.gn @@ -19,6 +19,7 @@ ohos_fuzztest("VerifyAccessTokenWithListFuzzTest") { module_out_path = module_output_path_interface_access_token fuzz_config_file = "." include_dirs = [ + "${access_token_path}/frameworks/common/include", "${access_token_path}/interfaces/innerkits/accesstoken/include", "${access_token_path}/test/fuzztest/common", ] @@ -31,6 +32,7 @@ ohos_fuzztest("VerifyAccessTokenWithListFuzzTest") { sources = [ "verifyaccesstokenwithlist_fuzzer.cpp" ] deps = [ + "${access_token_path}/frameworks/common:accesstoken_common_cxx", "${access_token_path}/interfaces/innerkits/accesstoken:libaccesstoken_sdk", ] diff --git a/test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/corpus/init b/test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/corpus/init0 b/test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..a8f0906299856ee9e912d4a6aad0cf27a2f9ebef GIT binary patch literal 30 mcmXR52`Em_VTeha{K)v`2~XC^uk*S5Hl{EzG;ICBumAwWA`IaG literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/verifyaccesstokenwithlist_fuzzer.cpp b/test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/verifyaccesstokenwithlist_fuzzer.cpp index a621f7f00..543a994aa 100644 --- a/test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/verifyaccesstokenwithlist_fuzzer.cpp +++ b/test/fuzztest/innerkits/accesstoken/verifyaccesstokenwithlist_fuzzer/verifyaccesstokenwithlist_fuzzer.cpp @@ -20,12 +20,12 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_kit.h" #include "fuzzer/FuzzedDataProvider.h" using namespace std; using namespace OHOS::Security::AccessToken; -const int32_t MAX_PERMISSION_SIZE = 1100; namespace OHOS { bool VerifyAccessTokenWithListFuzzTest(const uint8_t* data, size_t size) @@ -35,14 +35,16 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - int32_t permSize = provider.ConsumeIntegral() % MAX_PERMISSION_SIZE; + AccessTokenID tokenId = ConsumeTokenId(provider); + int32_t permSize = provider.ConsumeIntegral() % + (static_cast(OHOS::Security::AccessToken::GetDefPermissionsSize()) - 1); std::vector permissionList; for (int32_t i = 0; i < permSize; ++i) { - permissionList.emplace_back(provider.ConsumeRandomLengthString()); + permissionList.emplace_back(ConsumePermissionName(provider)); } std::vector permStateList; - return AccessTokenKit::VerifyAccessToken(provider.ConsumeIntegral(), permissionList, + return AccessTokenKit::VerifyAccessToken(tokenId, permissionList, permStateList, provider.ConsumeBool()) == RET_SUCCESS; } } diff --git a/test/fuzztest/innerkits/privacy/addpermissionusedrecord_fuzzer/corpus/init b/test/fuzztest/innerkits/privacy/addpermissionusedrecord_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/privacy/addpermissionusedrecord_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/privacy/addpermissionusedrecord_fuzzer/corpus/init0 b/test/fuzztest/innerkits/privacy/addpermissionusedrecord_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..cb0a738b2f82974dc220178eac7d9ec4ce0c6d79 GIT binary patch literal 40 scmd1L$S>9_NG;0EEH2K>&(m{u^mPq#WQggqNvcU9_NG;0EEH2K>&(m{u^mPq#WQggqNvcUm40NGi=s$w~D~%uS79$j`_x)+00s?=P?}-u4+aGQuM``{ literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/BUILD.gn b/test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/BUILD.gn index ac6c1d4f4..207addef7 100644 --- a/test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/BUILD.gn +++ b/test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/BUILD.gn @@ -19,6 +19,7 @@ ohos_fuzztest("GetPermissionUsedTypeInfosFuzzTest") { module_out_path = module_output_path_interface_privacy fuzz_config_file = "." include_dirs = [ + "${access_token_path}/frameworks/common/include", "${access_token_path}/interfaces/innerkits/accesstoken/include", "${access_token_path}/test/fuzztest/common", ] @@ -30,7 +31,11 @@ ohos_fuzztest("GetPermissionUsedTypeInfosFuzzTest") { ] sources = [ "getpermissionusedtypeinfos_fuzzer.cpp" ] - deps = [ "${access_token_path}/interfaces/innerkits/privacy:libprivacy_sdk" ] + deps = [ + "${access_token_path}/frameworks/common:accesstoken_common_cxx", + "${access_token_path}/interfaces/innerkits/accesstoken:libaccesstoken_sdk", + "${access_token_path}/interfaces/innerkits/privacy:libprivacy_sdk", + ] configs = [ "${access_token_path}/config:coverage_flags" ] diff --git a/test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/corpus/init b/test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/corpus/init0 b/test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/getpermissionusedtypeinfos_fuzzer.cpp b/test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/getpermissionusedtypeinfos_fuzzer.cpp index 5bfb04192..fabd6b34f 100644 --- a/test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/getpermissionusedtypeinfos_fuzzer.cpp +++ b/test/fuzztest/innerkits/privacy/getpermissionusedtypeinfos_fuzzer/getpermissionusedtypeinfos_fuzzer.cpp @@ -20,6 +20,7 @@ #include #include +#include "accesstoken_fuzzdata.h" #include "fuzzer/FuzzedDataProvider.h" #undef private #include "privacy_kit.h" @@ -36,8 +37,9 @@ namespace OHOS { FuzzedDataProvider provider(data, size); std::vector results; - return PrivacyKit::GetPermissionUsedTypeInfos(provider.ConsumeIntegral(), - provider.ConsumeRandomLengthString(), results) == 0; + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); + return PrivacyKit::GetPermissionUsedTypeInfos(tokenId, permissionName, results) == 0; } } diff --git a/test/fuzztest/innerkits/privacy/isallowedusingpermission_fuzzer/corpus/init b/test/fuzztest/innerkits/privacy/isallowedusingpermission_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/privacy/isallowedusingpermission_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/privacy/isallowedusingpermission_fuzzer/corpus/init0 b/test/fuzztest/innerkits/privacy/isallowedusingpermission_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..795d1be7830d42a6c398573865ca7ca87e7474ac GIT binary patch literal 80 zcmV-W0I&aVXm4{aaAk6BX>)UFZ*DF_K}|(cL0kYZgVJe}Hh=qRe(NE9TF!f{G*7JC m%Rm>zhbGjuuUcmD5kxuv$84lgkTR8x%u&^3004ls_y8b!RwNbx literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/privacy/registerpermactivestatuscallback_fuzzer/corpus/init b/test/fuzztest/innerkits/privacy/registerpermactivestatuscallback_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/privacy/registerpermactivestatuscallback_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/privacy/registerpermactivestatuscallback_fuzzer/corpus/init0 b/test/fuzztest/innerkits/privacy/registerpermactivestatuscallback_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..8308e087de3c590f2eef9a708f047cf2e6c6effb GIT binary patch literal 80 zcmV-W0I&aVXm4{aaAk6BX>)UFZ*DF_K}|(cL0kaO8(), provider.ConsumeIntegral(), + return PrivacyKit::SetMutePolicy(provider.ConsumeIntegralInRange(0, ACTIVE_CHANGE_CHANGE_TYPE_MAX), + provider.ConsumeIntegralInRange(0, CALLER_TYPE_MAX), provider.ConsumeBool(), provider.ConsumeIntegral()) == 0; } } diff --git a/test/fuzztest/innerkits/privacy/setpermissionusedrecordtogglestatus_fuzzer/corpus/init b/test/fuzztest/innerkits/privacy/setpermissionusedrecordtogglestatus_fuzzer/corpus/init deleted file mode 100644 index 65af8ee8d..000000000 --- a/test/fuzztest/innerkits/privacy/setpermissionusedrecordtogglestatus_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2025 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/privacy/setpermissionusedrecordtogglestatus_fuzzer/corpus/init0 b/test/fuzztest/innerkits/privacy/setpermissionusedrecordtogglestatus_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..229e16eeeccbef9365e77c270ff8c73e98e145fa GIT binary patch literal 80 zcmV-W0I&Z672VH0^Cmxk6^-m_3U*wX6+VPX-|qBIx|48c6=+dlGm6><^-HyfC8Ah0 m65V-_gC!3u0QdhX5|1F0DRc3GBQ`xqlQv5!4b?$p004l1z#y*x literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/privacy/startusingpermission001_fuzzer/corpus/init b/test/fuzztest/innerkits/privacy/startusingpermission001_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/privacy/startusingpermission001_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/privacy/startusingpermission001_fuzzer/corpus/init0 b/test/fuzztest/innerkits/privacy/startusingpermission001_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..80bc12d5f063d0522db0d7b08883841c5722a754 GIT binary patch literal 80 zcmd1L$S>9_NG;0EEH2K>&(m{u^mPq#jA6K!(66=6`+RX#iQxWY!ka{#r5Y7iaxtAd jqQ?6CpBMKY=G)QMEB4zKG#TtRPhnta0Ahx%KNu7M`)?kr literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/privacy/startusingpermission_fuzzer/corpus/init b/test/fuzztest/innerkits/privacy/startusingpermission_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/privacy/startusingpermission_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/privacy/startusingpermission_fuzzer/corpus/init0 b/test/fuzztest/innerkits/privacy/startusingpermission_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d99dde3bff7aa3e49926726739d837dc93b8af7e GIT binary patch literal 80 zcmV-W0I&aVXm4{aaAk6BX>)UFZ*DF_K}|(cL0kar7XTszKKs%C!$O|X2@0Jh-G}34 m1^g?@j7D8~(FS5&;|U35qA3BK9JvTW+}Y5bLRG-E_y8aw;34Gz literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/privacy/stopusingpermission_fuzzer/corpus/init b/test/fuzztest/innerkits/privacy/stopusingpermission_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/privacy/stopusingpermission_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/privacy/stopusingpermission_fuzzer/corpus/init0 b/test/fuzztest/innerkits/privacy/stopusingpermission_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..80bc12d5f063d0522db0d7b08883841c5722a754 GIT binary patch literal 80 zcmd1L$S>9_NG;0EEH2K>&(m{u^mPq#jA6K!(66=6`+RX#iQxWY!ka{#r5Y7iaxtAd jqQ?6CpBMKY=G)QMEB4zKG#TtRPhnta0Ahx%KNu7M`)?kr literal 0 HcmV?d00001 diff --git a/test/fuzztest/innerkits/privacy/unregisterpermactivestatuscallback_fuzzer/corpus/init b/test/fuzztest/innerkits/privacy/unregisterpermactivestatuscallback_fuzzer/corpus/init deleted file mode 100644 index bc977bd97..000000000 --- a/test/fuzztest/innerkits/privacy/unregisterpermactivestatuscallback_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2022 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/innerkits/privacy/unregisterpermactivestatuscallback_fuzzer/corpus/init0 b/test/fuzztest/innerkits/privacy/unregisterpermactivestatuscallback_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..8308e087de3c590f2eef9a708f047cf2e6c6effb GIT binary patch literal 80 zcmV-W0I&aVXm4{aaAk6BX>)UFZ*DF_K}|(cL0kaO8 #include "accesstoken_manager_service.h" +#include "accesstoken_fuzzdata.h" #include "fuzzer/FuzzedDataProvider.h" #include "hap_info_parcel.h" #include "iaccess_token_manager.h" @@ -26,6 +27,7 @@ using namespace std; using namespace OHOS::Security::AccessToken; const int CONSTANTS_NUMBER_TEN = 10; static const int32_t ROOT_UID = 0; +const static int32_t FLAG_SIZE = 16; namespace OHOS { void InitHapInfoParams(const std::string& bundleName, FuzzedDataProvider& provider, HapInfoParams& param) @@ -40,7 +42,7 @@ void InitHapInfoParams(const std::string& bundleName, FuzzedDataProvider& provid param.isSystemApp = provider.ConsumeBool(); param.appDistributionType = provider.ConsumeRandomLengthString(); param.isRestore = provider.ConsumeBool(); - param.tokenID = provider.ConsumeIntegral(); + param.tokenID = ConsumeTokenId(provider); param.isAtomicService = provider.ConsumeBool(); } @@ -70,8 +72,7 @@ void InitHapPolicy(const std::string& permissionName, const std::string& bundleN .permissionName = permissionName, .grantStatus = static_cast(provider.ConsumeIntegralInRange( 0, static_cast(PermissionState::PERMISSION_GRANTED))), - .grantFlag = provider.ConsumeIntegralInRange( - 0, static_cast(PermissionFlag::PERMISSION_ALLOW_THIS_TIME)), + .grantFlag = 1 << (provider.ConsumeIntegral() % FLAG_SIZE), }; PreAuthorizationInfo info = { @@ -84,7 +85,8 @@ void InitHapPolicy(const std::string& permissionName, const std::string& bundleN policy.domain = provider.ConsumeRandomLengthString(); policy.permList = { def }; policy.permStateList = { state }; - policy.aclRequestedList = {provider.ConsumeRandomLengthString()}; + std::string aclPermissionName = ConsumePermissionName(provider); + policy.aclRequestedList = {aclPermissionName}; policy.preAuthorizationInfo = { info }; policy.checkIgnore = static_cast(provider.ConsumeIntegralInRange( 0, static_cast(HapPolicyCheckIgnore::ACL_IGNORE_CHECK))); @@ -99,7 +101,7 @@ bool AllocHapTokenServiceFuzzTest(const uint8_t* data, size_t size) } FuzzedDataProvider provider(data, size); - std::string permissionName = provider.ConsumeRandomLengthString(); + std::string permissionName = ConsumePermissionName(provider); std::string bundleName = provider.ConsumeRandomLengthString(); HapInfoParcel hapInfoParcel; diff --git a/test/fuzztest/normalize_service/accesstoken/allochaptokenservice_fuzzer/corpus/init b/test/fuzztest/normalize_service/accesstoken/allochaptokenservice_fuzzer/corpus/init deleted file mode 100644 index 65af8ee8d..000000000 --- a/test/fuzztest/normalize_service/accesstoken/allochaptokenservice_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2025 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/normalize_service/accesstoken/allochaptokenservice_fuzzer/corpus/init0 b/test/fuzztest/normalize_service/accesstoken/allochaptokenservice_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..729b2390a9e7f70f13ce5c0fdd6462d583e0c840 GIT binary patch literal 1000 zcmVnXm4{aaAk6BX>)UFZ*DF_K}|(cL0kZ1Z*4ARcwudDY-KKEVQpn{VO#)X zVQpn{VP9cza9jXxZ*FB=08MFJ0CY-R0An{?0CsX*0B>k-b1raYa&2jIb7^mGE<-_0 zMN&ar08UC=08dC<0P02oNcy4C%plEIFfSSST2E;r*3gB`BLwMC$p8o${jJ<~qt$tW z^WtiRN|*S@B88SsHi_L_YQ;Y7c_88qGVCOv6Z|nkV$a~)0jKr&@BbA$5^CY^kW16C zDPdQq|?%2KavQUU<7aV@EB}QQ=XVPFaDeo7Z#&vmBc!lSw-Uc zzQwlk>(qYXNAx`d0`y!U!e{hJ>set@4jpY^oAS}E(v~yCr#f8b#u(Y=ejAX@d53$ zj)&<139BJ-gD~-;d4O$Qz+w>`?<$4<{eR{7pYJY7qY}v=)3cH=NjAGfxrNqVA{sI(qlGwL~lau7A+twP3SUCpy5GbXviP2s91l_6EiLJ#Zz+r z&d#x56=}MT+B&cMvjP;LppcAhvPcGWeu6fzq~7QPs8^xtv$0zFbuf)8i3kk&*ZQZk zx$`Or^PP#I=Fg_l$S9KXLPR@OWhRjXkv5rw0jTVzC=v03YTNtQWqaS~%wCYA<2{GB zVUNK|UY**%A7lv&dU;0oPrk)M;ms%b8^G@u=wjP}1Q;YrWW1Kr2)3EzM>X`k=SusT zD&Z3)QZU7fIefoTJ9u8+3m%@x!|&|NyZ=FENTW-<-9PNhxF*kgUEfViSTH~o5%yK_ zS%29tw}LSO7JFHJdQ39DM9MOyLhe;sF4F WbAc290Du4h0Du7i0Dxow0Dyt*@Y~e@ literal 0 HcmV?d00001 diff --git a/test/fuzztest/normalize_service/accesstoken/gethaptokenidservice_fuzzer/corpus/init b/test/fuzztest/normalize_service/accesstoken/gethaptokenidservice_fuzzer/corpus/init deleted file mode 100644 index f3c5c238f..000000000 --- a/test/fuzztest/normalize_service/accesstoken/gethaptokenidservice_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2025 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -0x6f0x680x6f0x730x2e0x670x6c0x6f0x620x610x6c0x2e0x730x790x730x740x650x6d0x720x650x735c0000000000 \ No newline at end of file diff --git a/test/fuzztest/normalize_service/accesstoken/gethaptokenidservice_fuzzer/corpus/init0 b/test/fuzztest/normalize_service/accesstoken/gethaptokenidservice_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..c5517a61662c3fb2fb60cad61f133760b39b5254 GIT binary patch literal 50 zcmYe!&(+J%$S>9_PEO5BP0CL!N{M0kr`cpCXSeA$hw#aRUvo}HWOq#YwT6L#p&(); + AccessTokenID tokenId = ConsumeTokenId(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); if (!datas.WriteUint32(tokenId)) { diff --git a/test/fuzztest/normalize_service/accesstoken/getpermissionflagservice_fuzzer/corpus/init b/test/fuzztest/normalize_service/accesstoken/getpermissionflagservice_fuzzer/corpus/init deleted file mode 100644 index 65af8ee8d..000000000 --- a/test/fuzztest/normalize_service/accesstoken/getpermissionflagservice_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2025 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/normalize_service/accesstoken/getpermissionflagservice_fuzzer/corpus/init0 b/test/fuzztest/normalize_service/accesstoken/getpermissionflagservice_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/normalize_service/accesstoken/getpermissionflagservice_fuzzer/getpermissionflagservice_fuzzer.cpp b/test/fuzztest/normalize_service/accesstoken/getpermissionflagservice_fuzzer/getpermissionflagservice_fuzzer.cpp index b96edd3fb..f3fca708e 100644 --- a/test/fuzztest/normalize_service/accesstoken/getpermissionflagservice_fuzzer/getpermissionflagservice_fuzzer.cpp +++ b/test/fuzztest/normalize_service/accesstoken/getpermissionflagservice_fuzzer/getpermissionflagservice_fuzzer.cpp @@ -22,6 +22,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -39,8 +40,8 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); - std::string permissionName = provider.ConsumeRandomLengthString(); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); MessageParcel sendData; sendData.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); if (!sendData.WriteUint32(tokenId) || !sendData.WriteString(permissionName)) { diff --git a/test/fuzztest/normalize_service/accesstoken/grantpermissionservice_fuzzer/corpus/init b/test/fuzztest/normalize_service/accesstoken/grantpermissionservice_fuzzer/corpus/init deleted file mode 100644 index 65af8ee8d..000000000 --- a/test/fuzztest/normalize_service/accesstoken/grantpermissionservice_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2025 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/normalize_service/accesstoken/grantpermissionservice_fuzzer/corpus/init0 b/test/fuzztest/normalize_service/accesstoken/grantpermissionservice_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/normalize_service/accesstoken/grantpermissionservice_fuzzer/grantpermissionservice_fuzzer.cpp b/test/fuzztest/normalize_service/accesstoken/grantpermissionservice_fuzzer/grantpermissionservice_fuzzer.cpp index ff212044b..887d806b9 100644 --- a/test/fuzztest/normalize_service/accesstoken/grantpermissionservice_fuzzer/grantpermissionservice_fuzzer.cpp +++ b/test/fuzztest/normalize_service/accesstoken/grantpermissionservice_fuzzer/grantpermissionservice_fuzzer.cpp @@ -23,6 +23,7 @@ #undef private #include "access_token.h" +#include "accesstoken_fuzzdata.h" #include "accesstoken_info_manager.h" #include "accesstoken_kit.h" #include "accesstoken_manager_service.h" @@ -30,6 +31,7 @@ #include "iaccess_token_manager.h" #include "token_setproc.h" + using namespace std; using namespace OHOS::Security::AccessToken; static HapInfoParams g_InfoParms = { @@ -68,8 +70,8 @@ bool GrantPermissionServiceFuzzTest(const uint8_t* data, size_t size) } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); - std::string permissionName = provider.ConsumeRandomLengthString(); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); uint32_t flagIndex = provider.ConsumeIntegral() % FLAG_LIST_SIZE; PermissionFlag flag = FLAG_LIST[flagIndex]; diff --git a/test/fuzztest/normalize_service/accesstoken/inithaptokenservice_fuzzer/corpus/init b/test/fuzztest/normalize_service/accesstoken/inithaptokenservice_fuzzer/corpus/init deleted file mode 100644 index 65af8ee8d..000000000 --- a/test/fuzztest/normalize_service/accesstoken/inithaptokenservice_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2025 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/normalize_service/accesstoken/inithaptokenservice_fuzzer/corpus/init0 b/test/fuzztest/normalize_service/accesstoken/inithaptokenservice_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..bce21b247b4eabb1b70b0fa5867b6e1d28c18422 GIT binary patch literal 1000 zcmVnXm4{aaAk6BX>)UFZ*DF_K}|(cL0kZ1Z*4ARcwudDY-KKEVQpn{VO#)X zVQpn{VP9cza9jXxZ*FB=0B1*B0CH1Y0C-Yd07zk60A+bx09R>T08gLn0)U+IrR5^Z zCi3(ahd66SG+mZ+3+o>c<=#6dQmR0^vsf$aWUw~3^^&r`RU|sM>Ho(&K~Jn%Gi@jw zZ$5p^jK+bFM=z3`kHebC&|`ydavP1D>_x)tF`YhX9tiv`6-fV*um6`{v%Ng5F$yYEyEKayH7QAW)@&IRfBLf)>cVRrXOerY_~ZzAp@~ zJuq2Hji48^xnZ2gFlYMr9?dHK66VQo*MUrGdGBpY8E8JJNZ|8l;SoQu%!EyEhUE9O zwDC)tfg;&%xl4Y%V#|dF=N`W2FO$g0qPL%Ja?14@x{t^+FXopVD>FuAYQMjM70NH7JPL z2SXK}`8ePtM9=oSb%z+-qHmD-Xty8zw2w|BROUDR0RQv|CSHX8fk=t-dkxPals4JL zu_Gh&AM2Jj@$IxprE z?bT9kNG-=iiXPR3ka*e4&+QM(k8qYJD(M}T$S#!)%}@vsCyYS(04a?@^VbV>l4h(= zTVN2F9zDMGL4+q6K0qzHj?Lu;g@)16*bEb+oxZ3(a;sF4F W|A7<$0Du4h0Du7i0Dxow0DytECE6?i literal 0 HcmV?d00001 diff --git a/test/fuzztest/normalize_service/accesstoken/inithaptokenservice_fuzzer/inithaptokenservice_fuzzer.cpp b/test/fuzztest/normalize_service/accesstoken/inithaptokenservice_fuzzer/inithaptokenservice_fuzzer.cpp index 23c502e95..ad25924f5 100644 --- a/test/fuzztest/normalize_service/accesstoken/inithaptokenservice_fuzzer/inithaptokenservice_fuzzer.cpp +++ b/test/fuzztest/normalize_service/accesstoken/inithaptokenservice_fuzzer/inithaptokenservice_fuzzer.cpp @@ -17,6 +17,7 @@ #include +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "hap_info_parcel.h" @@ -40,7 +41,7 @@ void InitHapInfoParams(const std::string& bundleName, FuzzedDataProvider& provid param.isSystemApp = provider.ConsumeBool(); param.appDistributionType = provider.ConsumeRandomLengthString(); param.isRestore = provider.ConsumeBool(); - param.tokenID = provider.ConsumeIntegral(); + param.tokenID = ConsumeTokenId(provider); param.isAtomicService = provider.ConsumeBool(); } @@ -99,7 +100,7 @@ bool InitHapTokenServiceFuzzTest(const uint8_t* data, size_t size) } FuzzedDataProvider provider(data, size); - std::string permissionName = provider.ConsumeRandomLengthString(); + std::string permissionName = ConsumePermissionName(provider); std::string bundleName = provider.ConsumeRandomLengthString(); HapInfoParcel hapInfoParcel; diff --git a/test/fuzztest/normalize_service/accesstoken/revokepermissionservice_fuzzer/corpus/init b/test/fuzztest/normalize_service/accesstoken/revokepermissionservice_fuzzer/corpus/init deleted file mode 100644 index 65af8ee8d..000000000 --- a/test/fuzztest/normalize_service/accesstoken/revokepermissionservice_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2025 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/normalize_service/accesstoken/revokepermissionservice_fuzzer/corpus/init0 b/test/fuzztest/normalize_service/accesstoken/revokepermissionservice_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/normalize_service/accesstoken/revokepermissionservice_fuzzer/revokepermissionservice_fuzzer.cpp b/test/fuzztest/normalize_service/accesstoken/revokepermissionservice_fuzzer/revokepermissionservice_fuzzer.cpp index eefc29c51..55e030e1c 100644 --- a/test/fuzztest/normalize_service/accesstoken/revokepermissionservice_fuzzer/revokepermissionservice_fuzzer.cpp +++ b/test/fuzztest/normalize_service/accesstoken/revokepermissionservice_fuzzer/revokepermissionservice_fuzzer.cpp @@ -22,6 +22,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -50,8 +51,8 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); - std::string permissionName = provider.ConsumeRandomLengthString(); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); diff --git a/test/fuzztest/services/accesstoken/allochaptokenstub_fuzzer/allochaptokenstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/allochaptokenstub_fuzzer/allochaptokenstub_fuzzer.cpp index 10ea73663..626d8ac9f 100644 --- a/test/fuzztest/services/accesstoken/allochaptokenstub_fuzzer/allochaptokenstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/allochaptokenstub_fuzzer/allochaptokenstub_fuzzer.cpp @@ -18,6 +18,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "hap_info_parcel.h" @@ -27,6 +28,7 @@ using namespace std; using namespace OHOS::Security::AccessToken; const int CONSTANTS_NUMBER_TWO = 2; static const int32_t ROOT_UID = 0; +const static int32_t FLAG_SIZE = 16; namespace OHOS { void InitHapInfoParams(const std::string& bundleName, FuzzedDataProvider& provider, HapInfoParams& param) @@ -41,7 +43,7 @@ namespace OHOS { param.isSystemApp = provider.ConsumeBool(); param.appDistributionType = provider.ConsumeRandomLengthString(); param.isRestore = provider.ConsumeBool(); - param.tokenID = provider.ConsumeIntegral(); + param.tokenID = ConsumeTokenId(provider); param.isAtomicService = provider.ConsumeBool(); } @@ -71,8 +73,7 @@ namespace OHOS { .permissionName = permissionName, .grantStatus = static_cast(provider.ConsumeIntegralInRange( 0, static_cast(PermissionState::PERMISSION_GRANTED))), - .grantFlag = provider.ConsumeIntegralInRange( - 0, static_cast(PermissionFlag::PERMISSION_ALLOW_THIS_TIME)), + .grantFlag = 1 << (provider.ConsumeIntegral() % FLAG_SIZE), }; PreAuthorizationInfo info = { @@ -85,7 +86,7 @@ namespace OHOS { policy.domain = provider.ConsumeRandomLengthString(); policy.permList = { def }; policy.permStateList = { state }; - policy.aclRequestedList = {provider.ConsumeRandomLengthString()}; + policy.aclRequestedList = {ConsumePermissionName(provider)}; policy.preAuthorizationInfo = { info }; policy.checkIgnore = static_cast(provider.ConsumeIntegralInRange( 0, static_cast(HapPolicyCheckIgnore::ACL_IGNORE_CHECK))); @@ -100,7 +101,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - std::string permissionName = provider.ConsumeRandomLengthString(); + std::string permissionName = ConsumePermissionName(provider); std::string bundleName = provider.ConsumeRandomLengthString(); HapInfoParcel hapInfoParcel; diff --git a/test/fuzztest/services/accesstoken/allochaptokenstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/allochaptokenstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/allochaptokenstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/allochaptokenstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/allochaptokenstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..729b2390a9e7f70f13ce5c0fdd6462d583e0c840 GIT binary patch literal 1000 zcmVnXm4{aaAk6BX>)UFZ*DF_K}|(cL0kZ1Z*4ARcwudDY-KKEVQpn{VO#)X zVQpn{VP9cza9jXxZ*FB=08MFJ0CY-R0An{?0CsX*0B>k-b1raYa&2jIb7^mGE<-_0 zMN&ar08UC=08dC<0P02oNcy4C%plEIFfSSST2E;r*3gB`BLwMC$p8o${jJ<~qt$tW z^WtiRN|*S@B88SsHi_L_YQ;Y7c_88qGVCOv6Z|nkV$a~)0jKr&@BbA$5^CY^kW16C zDPdQq|?%2KavQUU<7aV@EB}QQ=XVPFaDeo7Z#&vmBc!lSw-Uc zzQwlk>(qYXNAx`d0`y!U!e{hJ>set@4jpY^oAS}E(v~yCr#f8b#u(Y=ejAX@d53$ zj)&<139BJ-gD~-;d4O$Qz+w>`?<$4<{eR{7pYJY7qY}v=)3cH=NjAGfxrNqVA{sI(qlGwL~lau7A+twP3SUCpy5GbXviP2s91l_6EiLJ#Zz+r z&d#x56=}MT+B&cMvjP;LppcAhvPcGWeu6fzq~7QPs8^xtv$0zFbuf)8i3kk&*ZQZk zx$`Or^PP#I=Fg_l$S9KXLPR@OWhRjXkv5rw0jTVzC=v03YTNtQWqaS~%wCYA<2{GB zVUNK|UY**%A7lv&dU;0oPrk)M;ms%b8^G@u=wjP}1Q;YrWW1Kr2)3EzM>X`k=SusT zD&Z3)QZU7fIefoTJ9u8+3m%@x!|&|NyZ=FENTW-<-9PNhxF*kgUEfViSTH~o5%yK_ zS%29tw}LSO7JFHJdQ39DM9MOyLhe;sF4F WbAc290Du4h0Du7i0Dxow0Dyt*@Y~e@ literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/alloclocaltokenidstub_fuzzer/alloclocaltokenidstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/alloclocaltokenidstub_fuzzer/alloclocaltokenidstub_fuzzer.cpp index 98c769efe..d593cb536 100644 --- a/test/fuzztest/services/accesstoken/alloclocaltokenidstub_fuzzer/alloclocaltokenidstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/alloclocaltokenidstub_fuzzer/alloclocaltokenidstub_fuzzer.cpp @@ -22,6 +22,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -40,7 +41,7 @@ namespace OHOS { FuzzedDataProvider provider(data, size); std::string remoteDeviceID = provider.ConsumeRandomLengthString(); - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); MessageParcel inData; inData.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); diff --git a/test/fuzztest/services/accesstoken/alloclocaltokenidstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/alloclocaltokenidstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/alloclocaltokenidstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/alloclocaltokenidstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/alloclocaltokenidstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..3cb0ebde09d81deb7359841e58eb42136b06faa8 GIT binary patch literal 20 bcmZ?qbIvfV3^a^k_{6|$eWy(D^4SIeL!<|J literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/clearusergrantedpermissionstatestub_fuzzer/clearusergrantedpermissionstatestub_fuzzer.cpp b/test/fuzztest/services/accesstoken/clearusergrantedpermissionstatestub_fuzzer/clearusergrantedpermissionstatestub_fuzzer.cpp index 1fa95d9a6..3d080035c 100644 --- a/test/fuzztest/services/accesstoken/clearusergrantedpermissionstatestub_fuzzer/clearusergrantedpermissionstatestub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/clearusergrantedpermissionstatestub_fuzzer/clearusergrantedpermissionstatestub_fuzzer.cpp @@ -22,6 +22,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -39,7 +40,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); MessageParcel sendData; sendData.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); if (!sendData.WriteUint32(tokenId)) { diff --git a/test/fuzztest/services/accesstoken/clearusergrantedpermissionstatestub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/clearusergrantedpermissionstatestub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/clearusergrantedpermissionstatestub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/clearusergrantedpermissionstatestub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/clearusergrantedpermissionstatestub_fuzzer/corpus/init0 new file mode 100644 index 000000000..37dbd59e0 --- /dev/null +++ b/test/fuzztest/services/accesstoken/clearusergrantedpermissionstatestub_fuzzer/corpus/init0 @@ -0,0 +1,2 @@ +8ZQ-9 +aо \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/deleteremotehaptokeninfostub_fuzzer/deleteremotehaptokeninfostub_fuzzer.cpp b/test/fuzztest/services/accesstoken/deleteremotehaptokeninfostub_fuzzer/deleteremotehaptokeninfostub_fuzzer.cpp index afa6f19b4..dbff8141f 100644 --- a/test/fuzztest/services/accesstoken/deleteremotehaptokeninfostub_fuzzer/deleteremotehaptokeninfostub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/deleteremotehaptokeninfostub_fuzzer/deleteremotehaptokeninfostub_fuzzer.cpp @@ -15,6 +15,7 @@ #include "deleteremotehaptokeninfostub_fuzzer.h" +#include "accesstoken_fuzzdata.h" #include "fuzzer/FuzzedDataProvider.h" #include "hap_token_info_for_sync_parcel.h" #include "i_token_sync_manager.h" @@ -49,7 +50,7 @@ bool DeleteRemoteHapTokenInfoStubFuzzTest(const uint8_t* data, size_t size) } FuzzedDataProvider provider(data, size); - AccessTokenID tokenID = provider.ConsumeIntegral(); + AccessTokenID tokenID = ConsumeTokenId(provider); UpdateRemoteHapTokenInfo(); diff --git a/test/fuzztest/services/accesstoken/deleteremotetokenstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/deleteremotetokenstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/deleteremotetokenstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/deleteremotetokenstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/deleteremotetokenstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..3cb0ebde09d81deb7359841e58eb42136b06faa8 GIT binary patch literal 20 bcmZ?qbIvfV3^a^k_{6|$eWy(D^4SIeL!<|J literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/deleteremotetokenstub_fuzzer/deleteremotetokenstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/deleteremotetokenstub_fuzzer/deleteremotetokenstub_fuzzer.cpp index 37ab57ac3..83ce1e229 100644 --- a/test/fuzztest/services/accesstoken/deleteremotetokenstub_fuzzer/deleteremotetokenstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/deleteremotetokenstub_fuzzer/deleteremotetokenstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_info_manager.h" #include "accesstoken_kit.h" #include "accesstoken_manager_service.h" @@ -43,8 +44,8 @@ namespace OHOS { FuzzedDataProvider provider(data, size); std::string deviceID = provider.ConsumeRandomLengthString(); - AccessTokenID tokenId = provider.ConsumeIntegral(); - + AccessTokenID tokenId = ConsumeTokenId(provider); + MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); if (!datas.WriteString(deviceID)) { diff --git a/test/fuzztest/services/accesstoken/dumptokeninfostub_fuzzer/dumptokeninfostub_fuzzer.cpp b/test/fuzztest/services/accesstoken/dumptokeninfostub_fuzzer/dumptokeninfostub_fuzzer.cpp index e29b4ac34..af0674857 100644 --- a/test/fuzztest/services/accesstoken/dumptokeninfostub_fuzzer/dumptokeninfostub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/dumptokeninfostub_fuzzer/dumptokeninfostub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -35,7 +36,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); diff --git a/test/fuzztest/services/accesstoken/getaccesstokenid_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/getaccesstokenid_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/getaccesstokenid_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/getaccesstokenid_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/getaccesstokenid_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..78779e2e2ce8bb524950ccae5de5895ce8d7e711 GIT binary patch literal 30 lcmYdHPEIW@F3HbM&5JKiEh@`QPK{wu_EQOBdUwB84gj}g3y}Z- literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/getdefpermissionstub_fuzzer/getdefpermissionstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/getdefpermissionstub_fuzzer/getdefpermissionstub_fuzzer.cpp index 80a4152eb..35774859f 100644 --- a/test/fuzztest/services/accesstoken/getdefpermissionstub_fuzzer/getdefpermissionstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/getdefpermissionstub_fuzzer/getdefpermissionstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -37,7 +38,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - std::string permissionName = provider.ConsumeRandomLengthString(); + std::string permissionName = ConsumePermissionName(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); diff --git a/test/fuzztest/services/accesstoken/gethaptokenidstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/gethaptokenidstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/gethaptokenidstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/gethaptokenidstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/gethaptokenidstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..c5517a61662c3fb2fb60cad61f133760b39b5254 GIT binary patch literal 50 zcmYe!&(+J%$S>9_PEO5BP0CL!N{M0kr`cpCXSeA$hw#aRUvo}HWOq#YwT6L#p& #include #undef private - +#include "accesstoken_fuzzdata.h" #include "accesstoken_info_manager.h" #include "accesstoken_kit.h" #include "accesstoken_manager_service.h" @@ -42,7 +42,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); diff --git a/test/fuzztest/services/accesstoken/gethaptokeninfostub_fuzzer/gethaptokeninfostub_fuzzer.cpp b/test/fuzztest/services/accesstoken/gethaptokeninfostub_fuzzer/gethaptokeninfostub_fuzzer.cpp index 9d1480999..12819cda8 100644 --- a/test/fuzztest/services/accesstoken/gethaptokeninfostub_fuzzer/gethaptokeninfostub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/gethaptokeninfostub_fuzzer/gethaptokeninfostub_fuzzer.cpp @@ -15,6 +15,7 @@ #include "gethaptokeninfostub_fuzzer.h" +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -34,7 +35,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); if (!datas.WriteUint32(tokenId)) { diff --git a/test/fuzztest/services/accesstoken/getkernelpermissionsstub_fuzzer/getkernelpermissionsstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/getkernelpermissionsstub_fuzzer/getkernelpermissionsstub_fuzzer.cpp index 0aedbb44b..149b4902a 100644 --- a/test/fuzztest/services/accesstoken/getkernelpermissionsstub_fuzzer/getkernelpermissionsstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/getkernelpermissionsstub_fuzzer/getkernelpermissionsstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -35,7 +36,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); diff --git a/test/fuzztest/services/accesstoken/getnativetokenidstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/getnativetokenidstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/getnativetokenidstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/getnativetokenidstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/getnativetokenidstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..78779e2e2ce8bb524950ccae5de5895ce8d7e711 GIT binary patch literal 30 lcmYdHPEIW@F3HbM&5JKiEh@`QPK{wu_EQOBdUwB84gj}g3y}Z- literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/getnativetokeninfostub_fuzzer/getnativetokeninfostub_fuzzer.cpp b/test/fuzztest/services/accesstoken/getnativetokeninfostub_fuzzer/getnativetokeninfostub_fuzzer.cpp index 74064f09a..4313c7c46 100644 --- a/test/fuzztest/services/accesstoken/getnativetokeninfostub_fuzzer/getnativetokeninfostub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/getnativetokeninfostub_fuzzer/getnativetokeninfostub_fuzzer.cpp @@ -22,6 +22,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -39,7 +40,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); MessageParcel inData; inData.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); if (!inData.WriteUint32(tokenId)) { diff --git a/test/fuzztest/services/accesstoken/getpermissionflagstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/getpermissionflagstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/getpermissionflagstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/getpermissionflagstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/getpermissionflagstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/getpermissionflagstub_fuzzer/getpermissionflagstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/getpermissionflagstub_fuzzer/getpermissionflagstub_fuzzer.cpp index 3d9e4b292..8d2c407dc 100644 --- a/test/fuzztest/services/accesstoken/getpermissionflagstub_fuzzer/getpermissionflagstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/getpermissionflagstub_fuzzer/getpermissionflagstub_fuzzer.cpp @@ -22,6 +22,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -39,8 +40,8 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); - std::string permissionName = provider.ConsumeRandomLengthString(); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); MessageParcel sendData; sendData.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); if (!sendData.WriteUint32(tokenId) || !sendData.WriteString(permissionName)) { diff --git a/test/fuzztest/services/accesstoken/getpermissionrequesttogglestatusstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/getpermissionrequesttogglestatusstub_fuzzer/corpus/init deleted file mode 100644 index 61a7da989..000000000 --- a/test/fuzztest/services/accesstoken/getpermissionrequesttogglestatusstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ diff --git a/test/fuzztest/services/accesstoken/getpermissionrequesttogglestatusstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/getpermissionrequesttogglestatusstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..4d63c39515f181fc115ae151cd1bf661c6ae68b4 GIT binary patch literal 30 kcmaFZb)e_{nM#E_d}8-E_=Me^-oL9cHHCqJ0f-wK0Q(RPr~m)} literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/getpermissionrequesttogglestatusstub_fuzzer/getpermissionrequesttogglestatusstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/getpermissionrequesttogglestatusstub_fuzzer/getpermissionrequesttogglestatusstub_fuzzer.cpp index 64d1b8ba5..924d52cbc 100644 --- a/test/fuzztest/services/accesstoken/getpermissionrequesttogglestatusstub_fuzzer/getpermissionrequesttogglestatusstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/getpermissionrequesttogglestatusstub_fuzzer/getpermissionrequesttogglestatusstub_fuzzer.cpp @@ -22,6 +22,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -39,7 +40,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - std::string permissionName = provider.ConsumeRandomLengthString(); + std::string permissionName = ConsumePermissionName(provider); int32_t userID = provider.ConsumeIntegral(); MessageParcel sendData; if (!sendData.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()) || diff --git a/test/fuzztest/services/accesstoken/getpermissionsstatusstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/getpermissionsstatusstub_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/services/accesstoken/getpermissionsstatusstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/getpermissionsstatusstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/getpermissionsstatusstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/getpermissionsstatusstub_fuzzer/getpermissionsstatusstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/getpermissionsstatusstub_fuzzer/getpermissionsstatusstub_fuzzer.cpp index 1cb3a6048..0ad990580 100644 --- a/test/fuzztest/services/accesstoken/getpermissionsstatusstub_fuzzer/getpermissionsstatusstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/getpermissionsstatusstub_fuzzer/getpermissionsstatusstub_fuzzer.cpp @@ -22,6 +22,7 @@ #include #undef private #include "access_token.h" +#include "accesstoken_fuzzdata.h" #include "accesstoken_kit.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" @@ -47,8 +48,8 @@ size_t g_baseFuzzPos = 0; } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); - std::string permissionName = provider.ConsumeRandomLengthString(); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); PermissionListState perm = { .permissionName = permissionName, .state = static_cast(provider.ConsumeIntegralInRange( diff --git a/test/fuzztest/services/accesstoken/getpermissionusedtypestub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/getpermissionusedtypestub_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/services/accesstoken/getpermissionusedtypestub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/getpermissionusedtypestub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/getpermissionusedtypestub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/getpermissionusedtypestub_fuzzer/getpermissionusedtypestub_fuzzer.cpp b/test/fuzztest/services/accesstoken/getpermissionusedtypestub_fuzzer/getpermissionusedtypestub_fuzzer.cpp index 4646653b0..b598bce8f 100644 --- a/test/fuzztest/services/accesstoken/getpermissionusedtypestub_fuzzer/getpermissionusedtypestub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/getpermissionusedtypestub_fuzzer/getpermissionusedtypestub_fuzzer.cpp @@ -23,6 +23,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "hap_info_parcel.h" @@ -41,8 +42,8 @@ bool GetPermissionUsedTypeStubFuzzTest(const uint8_t* data, size_t size) } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); - std::string permissionName = provider.ConsumeRandomLengthString(); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); diff --git a/test/fuzztest/services/accesstoken/getremotehaptokeninfostub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/getremotehaptokeninfostub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/getremotehaptokeninfostub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/getremotehaptokeninfostub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/getremotehaptokeninfostub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d9bc53f51dbda02469560b7d4efe48b61feb174a GIT binary patch literal 30 lcmccr&F9gVH|pySN!A@_ldk+**0yQF*%Sr_1|V)|000Oj4nqI{ literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/getremotehaptokeninfostub_fuzzer/getremotehaptokeninfostub_fuzzer.cpp b/test/fuzztest/services/accesstoken/getremotehaptokeninfostub_fuzzer/getremotehaptokeninfostub_fuzzer.cpp index 1c39a066f..1a09d0c85 100644 --- a/test/fuzztest/services/accesstoken/getremotehaptokeninfostub_fuzzer/getremotehaptokeninfostub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/getremotehaptokeninfostub_fuzzer/getremotehaptokeninfostub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "fuzzer/FuzzedDataProvider.h" #include "i_token_sync_manager.h" #include "token_sync_manager_service.h" @@ -36,7 +37,7 @@ namespace OHOS { FuzzedDataProvider provider(data, size); std::string deviceID = provider.ConsumeRandomLengthString(); - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); MessageParcel datas; datas.WriteInterfaceToken(ITokenSyncManager::GetDescriptor()); diff --git a/test/fuzztest/services/accesstoken/getremotenativetokenidstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/getremotenativetokenidstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/getremotenativetokenidstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/getremotenativetokenidstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/getremotenativetokenidstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d9bc53f51dbda02469560b7d4efe48b61feb174a GIT binary patch literal 30 lcmccr&F9gVH|pySN!A@_ldk+**0yQF*%Sr_1|V)|000Oj4nqI{ literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/getremotenativetokenidstub_fuzzer/getremotenativetokenidstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/getremotenativetokenidstub_fuzzer/getremotenativetokenidstub_fuzzer.cpp index f6e748eb8..532bcce4b 100644 --- a/test/fuzztest/services/accesstoken/getremotenativetokenidstub_fuzzer/getremotenativetokenidstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/getremotenativetokenidstub_fuzzer/getremotenativetokenidstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_info_manager.h" #include "accesstoken_kit.h" #include "accesstoken_manager_service.h" @@ -43,7 +44,7 @@ namespace OHOS { FuzzedDataProvider provider(data, size); std::string deviceID = provider.ConsumeRandomLengthString(); - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); diff --git a/test/fuzztest/services/accesstoken/getreqpermissionbynamestub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/getreqpermissionbynamestub_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/services/accesstoken/getreqpermissionbynamestub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/getreqpermissionbynamestub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/getreqpermissionbynamestub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/getreqpermissionbynamestub_fuzzer/getreqpermissionbynamestub_fuzzer.cpp b/test/fuzztest/services/accesstoken/getreqpermissionbynamestub_fuzzer/getreqpermissionbynamestub_fuzzer.cpp index e1a82def8..999aab8ea 100644 --- a/test/fuzztest/services/accesstoken/getreqpermissionbynamestub_fuzzer/getreqpermissionbynamestub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/getreqpermissionbynamestub_fuzzer/getreqpermissionbynamestub_fuzzer.cpp @@ -20,6 +20,8 @@ #include #undef private +#include "accesstoken_fuzzdata.h" +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -35,8 +37,8 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); - std::string permissionName = provider.ConsumeRandomLengthString(); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); if (!datas.WriteUint32(tokenId) || !datas.WriteString(permissionName)) { diff --git a/test/fuzztest/services/accesstoken/getreqpermissionsstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/getreqpermissionsstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/getreqpermissionsstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/getreqpermissionsstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/getreqpermissionsstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/getreqpermissionsstub_fuzzer/getreqpermissionsstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/getreqpermissionsstub_fuzzer/getreqpermissionsstub_fuzzer.cpp index 68722a954..9064ae8ad 100644 --- a/test/fuzztest/services/accesstoken/getreqpermissionsstub_fuzzer/getreqpermissionsstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/getreqpermissionsstub_fuzzer/getreqpermissionsstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -37,7 +38,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); diff --git a/test/fuzztest/services/accesstoken/getseccompenhancestub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/getseccompenhancestub_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/services/accesstoken/getseccompenhancestub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/getseccompenhancestub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/getseccompenhancestub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/getselfpermissionsstatestub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/getselfpermissionsstatestub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/getselfpermissionsstatestub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/getselfpermissionsstatestub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/getselfpermissionsstatestub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/getselfpermissionsstatestub_fuzzer/getselfpermissionsstatestub_fuzzer.cpp b/test/fuzztest/services/accesstoken/getselfpermissionsstatestub_fuzzer/getselfpermissionsstatestub_fuzzer.cpp index 211bd26b0..4d7c195fa 100644 --- a/test/fuzztest/services/accesstoken/getselfpermissionsstatestub_fuzzer/getselfpermissionsstatestub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/getselfpermissionsstatestub_fuzzer/getselfpermissionsstatestub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -37,7 +38,7 @@ namespace OHOS { FuzzedDataProvider provider(data, size); PermissionListState perm = { - .permissionName = provider.ConsumeRandomLengthString(), + .permissionName = ConsumePermissionName(provider), .state = static_cast(provider.ConsumeIntegralInRange( 0, static_cast(PermissionOper::BUTT_OPER))), }; diff --git a/test/fuzztest/services/accesstoken/getselfpermissionstatusstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/getselfpermissionstatusstub_fuzzer/corpus/init deleted file mode 100644 index 65af8ee8d..000000000 --- a/test/fuzztest/services/accesstoken/getselfpermissionstatusstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2025 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/getselfpermissionstatusstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/getselfpermissionstatusstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/getselfpermissionstatusstub_fuzzer/getselfpermissionstatusstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/getselfpermissionstatusstub_fuzzer/getselfpermissionstatusstub_fuzzer.cpp index 6de8ea977..a6c3efcce 100644 --- a/test/fuzztest/services/accesstoken/getselfpermissionstatusstub_fuzzer/getselfpermissionstatusstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/getselfpermissionstatusstub_fuzzer/getselfpermissionstatusstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -36,7 +37,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - std::string permissionName = provider.ConsumeRandomLengthString(); + std::string permissionName = ConsumePermissionName(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); if (!datas.WriteString(permissionName)) { diff --git a/test/fuzztest/services/accesstoken/gettokenidbyuseridstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/gettokenidbyuseridstub_fuzzer/corpus/init deleted file mode 100644 index 2aea1356e..000000000 --- a/test/fuzztest/services/accesstoken/gettokenidbyuseridstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2025 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ diff --git a/test/fuzztest/services/accesstoken/gettokenidbyuseridstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/gettokenidbyuseridstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..f0ea7b716a557f111038a658bbb04ab0c6a9404b GIT binary patch literal 30 mcmb1f++5lg*xvasK8x#;>goM%6PAAr{BSqZ^=JwM0|Nl!qz)ng literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/gettokentypestub_fuzzer/gettokentypestub_fuzzer.cpp b/test/fuzztest/services/accesstoken/gettokentypestub_fuzzer/gettokentypestub_fuzzer.cpp index 3c9a47a65..704a5d8b1 100644 --- a/test/fuzztest/services/accesstoken/gettokentypestub_fuzzer/gettokentypestub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/gettokentypestub_fuzzer/gettokentypestub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -35,7 +36,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); MessageParcel in; in.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); if (!in.WriteUint32(tokenId)) { diff --git a/test/fuzztest/services/accesstoken/grantpermissionforspecifiedtimestub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/grantpermissionforspecifiedtimestub_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/services/accesstoken/grantpermissionforspecifiedtimestub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/grantpermissionforspecifiedtimestub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/grantpermissionforspecifiedtimestub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/grantpermissionforspecifiedtimestub_fuzzer/grantpermissionforspecifiedtimestub_fuzzer.cpp b/test/fuzztest/services/accesstoken/grantpermissionforspecifiedtimestub_fuzzer/grantpermissionforspecifiedtimestub_fuzzer.cpp index 74ea69bb4..0d61a72d8 100644 --- a/test/fuzztest/services/accesstoken/grantpermissionforspecifiedtimestub_fuzzer/grantpermissionforspecifiedtimestub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/grantpermissionforspecifiedtimestub_fuzzer/grantpermissionforspecifiedtimestub_fuzzer.cpp @@ -22,6 +22,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "hap_info_parcel.h" @@ -40,8 +41,8 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); - std::string permissionName = provider.ConsumeRandomLengthString(); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); uint32_t onceTime = provider.ConsumeIntegral(); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); diff --git a/test/fuzztest/services/accesstoken/grantpermissionstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/grantpermissionstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/grantpermissionstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/grantpermissionstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/grantpermissionstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/grantpermissionstub_fuzzer/grantpermissionstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/grantpermissionstub_fuzzer/grantpermissionstub_fuzzer.cpp index 7668fec79..8c6a4aa3a 100644 --- a/test/fuzztest/services/accesstoken/grantpermissionstub_fuzzer/grantpermissionstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/grantpermissionstub_fuzzer/grantpermissionstub_fuzzer.cpp @@ -23,6 +23,7 @@ #undef private #include "access_token.h" +#include "accesstoken_fuzzdata.h" #include "accesstoken_info_manager.h" #include "accesstoken_kit.h" #include "accesstoken_manager_service.h" @@ -48,6 +49,17 @@ static HapPolicyParams g_PolicyPrams = { const int CONSTANTS_NUMBER_TWO = 2; const int CONSTANTS_NUMBER_THREE = 3; static const int32_t ROOT_UID = 0; +static const vector FLAG_LIST = { + PERMISSION_DEFAULT_FLAG, + PERMISSION_USER_SET, + PERMISSION_USER_FIXED, + PERMISSION_SYSTEM_FIXED, + PERMISSION_PRE_AUTHORIZED_CANCELABLE, + PERMISSION_COMPONENT_SET, + PERMISSION_FIXED_FOR_SECURITY_POLICY, + PERMISSION_ALLOW_THIS_TIME +}; +static const uint32_t FLAG_LIST_SIZE = 8; namespace OHOS { bool GrantPermissionStubFuzzTest(const uint8_t* data, size_t size) @@ -57,10 +69,10 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); - std::string permissionName = provider.ConsumeRandomLengthString(); - uint32_t flag = provider.ConsumeIntegralInRange( - 0, static_cast(PermissionFlag::PERMISSION_ALLOW_THIS_TIME)); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); + uint32_t flagIndex = provider.ConsumeIntegral() % FLAG_LIST_SIZE; + uint32_t flag = FLAG_LIST[flagIndex]; int32_t grantMode = static_cast(provider.ConsumeIntegralInRange(1, 2)); MessageParcel datas; diff --git a/test/fuzztest/services/accesstoken/inithaptokenstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/inithaptokenstub_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/services/accesstoken/inithaptokenstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/inithaptokenstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/inithaptokenstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..bce21b247b4eabb1b70b0fa5867b6e1d28c18422 GIT binary patch literal 1000 zcmVnXm4{aaAk6BX>)UFZ*DF_K}|(cL0kZ1Z*4ARcwudDY-KKEVQpn{VO#)X zVQpn{VP9cza9jXxZ*FB=0B1*B0CH1Y0C-Yd07zk60A+bx09R>T08gLn0)U+IrR5^Z zCi3(ahd66SG+mZ+3+o>c<=#6dQmR0^vsf$aWUw~3^^&r`RU|sM>Ho(&K~Jn%Gi@jw zZ$5p^jK+bFM=z3`kHebC&|`ydavP1D>_x)tF`YhX9tiv`6-fV*um6`{v%Ng5F$yYEyEKayH7QAW)@&IRfBLf)>cVRrXOerY_~ZzAp@~ zJuq2Hji48^xnZ2gFlYMr9?dHK66VQo*MUrGdGBpY8E8JJNZ|8l;SoQu%!EyEhUE9O zwDC)tfg;&%xl4Y%V#|dF=N`W2FO$g0qPL%Ja?14@x{t^+FXopVD>FuAYQMjM70NH7JPL z2SXK}`8ePtM9=oSb%z+-qHmD-Xty8zw2w|BROUDR0RQv|CSHX8fk=t-dkxPals4JL zu_Gh&AM2Jj@$IxprE z?bT9kNG-=iiXPR3ka*e4&+QM(k8qYJD(M}T$S#!)%}@vsCyYS(04a?@^VbV>l4h(= zTVN2F9zDMGL4+q6K0qzHj?Lu;g@)16*bEb+oxZ3(a;sF4F W|A7<$0Du4h0Du7i0Dxow0DytECE6?i literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/inithaptokenstub_fuzzer/inithaptokenstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/inithaptokenstub_fuzzer/inithaptokenstub_fuzzer.cpp index 465f60c7d..091e8c6a9 100644 --- a/test/fuzztest/services/accesstoken/inithaptokenstub_fuzzer/inithaptokenstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/inithaptokenstub_fuzzer/inithaptokenstub_fuzzer.cpp @@ -17,6 +17,7 @@ #include +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "hap_info_parcel.h" @@ -40,7 +41,7 @@ namespace OHOS { param.isSystemApp = provider.ConsumeBool(); param.appDistributionType = provider.ConsumeRandomLengthString(); param.isRestore = provider.ConsumeBool(); - param.tokenID = provider.ConsumeIntegral(); + param.tokenID = ConsumeTokenId(provider); param.isAtomicService = provider.ConsumeBool(); } @@ -99,7 +100,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - std::string permissionName = provider.ConsumeRandomLengthString(); + std::string permissionName = ConsumePermissionName(provider); std::string bundleName = provider.ConsumeRandomLengthString(); HapInfoParcel hapInfoParcel; diff --git a/test/fuzztest/services/accesstoken/registerpermstatechangecallbackstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/registerpermstatechangecallbackstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/registerpermstatechangecallbackstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/registerpermstatechangecallbackstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/registerpermstatechangecallbackstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/registerpermstatechangecallbackstub_fuzzer/registerpermstatechangecallbackstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/registerpermstatechangecallbackstub_fuzzer/registerpermstatechangecallbackstub_fuzzer.cpp index aaafac5b8..74284fef8 100644 --- a/test/fuzztest/services/accesstoken/registerpermstatechangecallbackstub_fuzzer/registerpermstatechangecallbackstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/registerpermstatechangecallbackstub_fuzzer/registerpermstatechangecallbackstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_client.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" @@ -54,8 +55,8 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); - std::string permissionName = provider.ConsumeRandomLengthString(); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); PermStateChangeScope scopeInfo; scopeInfo.permList = { permissionName }; diff --git a/test/fuzztest/services/accesstoken/registerselfpermstatechangecallbackstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/registerselfpermstatechangecallbackstub_fuzzer/corpus/init deleted file mode 100644 index 65af8ee8d..000000000 --- a/test/fuzztest/services/accesstoken/registerselfpermstatechangecallbackstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2025 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/registerselfpermstatechangecallbackstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/registerselfpermstatechangecallbackstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/registerselfpermstatechangecallbackstub_fuzzer/registerselfpermstatechangecallbackstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/registerselfpermstatechangecallbackstub_fuzzer/registerselfpermstatechangecallbackstub_fuzzer.cpp index c059674e1..02ddbb7e5 100644 --- a/test/fuzztest/services/accesstoken/registerselfpermstatechangecallbackstub_fuzzer/registerselfpermstatechangecallbackstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/registerselfpermstatechangecallbackstub_fuzzer/registerselfpermstatechangecallbackstub_fuzzer.cpp @@ -22,6 +22,7 @@ #undef private #include "access_token.h" #define private public +#include "accesstoken_fuzzdata.h" #include "accesstoken_id_manager.h" #include "accesstoken_kit.h" #include "accesstoken_manager_client.h" @@ -87,8 +88,8 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); - std::string permissionName = provider.ConsumeRandomLengthString(); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); PermStateChangeScope scopeInfo; scopeInfo.permList = { permissionName }; diff --git a/test/fuzztest/services/accesstoken/requestapppermonsettingstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/requestapppermonsettingstub_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/services/accesstoken/requestapppermonsettingstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/requestapppermonsettingstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/requestapppermonsettingstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/requestapppermonsettingstub_fuzzer/requestapppermonsettingstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/requestapppermonsettingstub_fuzzer/requestapppermonsettingstub_fuzzer.cpp index 958918019..4609f556c 100644 --- a/test/fuzztest/services/accesstoken/requestapppermonsettingstub_fuzzer/requestapppermonsettingstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/requestapppermonsettingstub_fuzzer/requestapppermonsettingstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -35,7 +36,7 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); diff --git a/test/fuzztest/services/accesstoken/revokepermissionstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/revokepermissionstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/revokepermissionstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/revokepermissionstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/revokepermissionstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/revokepermissionstub_fuzzer/revokepermissionstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/revokepermissionstub_fuzzer/revokepermissionstub_fuzzer.cpp index c17a2572a..dd64ba4f0 100644 --- a/test/fuzztest/services/accesstoken/revokepermissionstub_fuzzer/revokepermissionstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/revokepermissionstub_fuzzer/revokepermissionstub_fuzzer.cpp @@ -22,6 +22,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -30,6 +31,17 @@ using namespace std; using namespace OHOS::Security::AccessToken; const int CONSTANTS_NUMBER_TWO = 2; static const int32_t ROOT_UID = 0; +static const vector FLAG_LIST = { + PERMISSION_DEFAULT_FLAG, + PERMISSION_USER_SET, + PERMISSION_USER_FIXED, + PERMISSION_SYSTEM_FIXED, + PERMISSION_PRE_AUTHORIZED_CANCELABLE, + PERMISSION_COMPONENT_SET, + PERMISSION_FIXED_FOR_SECURITY_POLICY, + PERMISSION_ALLOW_THIS_TIME +}; +static const uint32_t FLAG_LIST_SIZE = 8; namespace OHOS { bool RevokePermissionStubFuzzTest(const uint8_t* data, size_t size) @@ -39,16 +51,15 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); - std::string testName = provider.ConsumeRandomLengthString(); - uint32_t flag = static_cast(provider.ConsumeIntegralInRange( - 0, static_cast(PermissionFlag::PERMISSION_ALLOW_THIS_TIME))); - int32_t grantMode = static_cast(provider.ConsumeIntegralInRange(1, 2)); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); + uint32_t flagIndex = provider.ConsumeIntegral() % FLAG_LIST_SIZE; + uint32_t flag = FLAG_LIST[flagIndex]; MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); - if (!datas.WriteUint32(tokenId) || !datas.WriteString(testName) || - !datas.WriteInt32(flag) || !datas.WriteInt32(grantMode)) { + if (!datas.WriteUint32(tokenId) || !datas.WriteString(permissionName) || + !datas.WriteInt32(flag)) { return false; } uint32_t code = static_cast( diff --git a/test/fuzztest/services/accesstoken/setpermdialogcapstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/setpermdialogcapstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/setpermdialogcapstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/setpermdialogcapstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/setpermdialogcapstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..c5517a61662c3fb2fb60cad61f133760b39b5254 GIT binary patch literal 50 zcmYe!&(+J%$S>9_PEO5BP0CL!N{M0kr`cpCXSeA$hw#aRUvo}HWOq#YwT6L#p& #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -30,6 +31,7 @@ using namespace std; using namespace OHOS::Security::AccessToken; const int CONSTANTS_NUMBER_TWO = 2; static const int32_t ROOT_UID = 0; +static const int STATUS_MAX = 2; namespace OHOS { bool SetPermissionRequestToggleStatusStubFuzzTest(const uint8_t* data, size_t size) @@ -39,8 +41,8 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - std::string permissionName = provider.ConsumeRandomLengthString(); - uint32_t status = provider.ConsumeIntegral(); + std::string permissionName = ConsumePermissionName(provider); + uint32_t status = provider.ConsumeIntegral() % STATUS_MAX; int32_t userID = provider.ConsumeIntegral(); MessageParcel sendData; if (!sendData.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()) || diff --git a/test/fuzztest/services/accesstoken/verifyaccesstokenstub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/verifyaccesstokenstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/accesstoken/verifyaccesstokenstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/verifyaccesstokenstub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/verifyaccesstokenstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/verifyaccesstokenstub_fuzzer/verifyaccesstokenstub_fuzzer.cpp b/test/fuzztest/services/accesstoken/verifyaccesstokenstub_fuzzer/verifyaccesstokenstub_fuzzer.cpp index c8a1063ff..50168cc73 100644 --- a/test/fuzztest/services/accesstoken/verifyaccesstokenstub_fuzzer/verifyaccesstokenstub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/verifyaccesstokenstub_fuzzer/verifyaccesstokenstub_fuzzer.cpp @@ -20,10 +20,12 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" + using namespace std; using namespace OHOS::Security::AccessToken; @@ -35,8 +37,8 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); - std::string permissionName = provider.ConsumeRandomLengthString(); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); diff --git a/test/fuzztest/services/accesstoken/verifyaccesstokenwithliststub_fuzzer/corpus/init b/test/fuzztest/services/accesstoken/verifyaccesstokenwithliststub_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/services/accesstoken/verifyaccesstokenwithliststub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/accesstoken/verifyaccesstokenwithliststub_fuzzer/corpus/init0 b/test/fuzztest/services/accesstoken/verifyaccesstokenwithliststub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..f60f31e126bb5af7dc96e29538f2b723ca2e0e96 GIT binary patch literal 40 ycmV+@0N4NgrlMav*APb=ZQdk*3b8O=rn4Hq=zstK0Dw(Umf?Vgxe~1a literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/accesstoken/verifyaccesstokenwithliststub_fuzzer/verifyaccesstokenwithliststub_fuzzer.cpp b/test/fuzztest/services/accesstoken/verifyaccesstokenwithliststub_fuzzer/verifyaccesstokenwithliststub_fuzzer.cpp index 0c7351ac9..786a24f4b 100644 --- a/test/fuzztest/services/accesstoken/verifyaccesstokenwithliststub_fuzzer/verifyaccesstokenwithliststub_fuzzer.cpp +++ b/test/fuzztest/services/accesstoken/verifyaccesstokenwithliststub_fuzzer/verifyaccesstokenwithliststub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_manager_service.h" #include "fuzzer/FuzzedDataProvider.h" #include "iaccess_token_manager.h" @@ -36,12 +37,12 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); int32_t permSize = provider.ConsumeIntegral() % MAX_PERMISSION_SIZE; std::vector permissionList; for (int32_t i = 0; i < permSize; i++) { - permissionList.emplace_back(provider.ConsumeRandomLengthString()); + permissionList.emplace_back(ConsumePermissionName(provider)); } MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); diff --git a/test/fuzztest/services/privacy/addpermissionusedrecordasyncstub_fuzzer/addpermissionusedrecordasyncstub_fuzzer.cpp b/test/fuzztest/services/privacy/addpermissionusedrecordasyncstub_fuzzer/addpermissionusedrecordasyncstub_fuzzer.cpp index 794b360c7..6734e9d4a 100644 --- a/test/fuzztest/services/privacy/addpermissionusedrecordasyncstub_fuzzer/addpermissionusedrecordasyncstub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/addpermissionusedrecordasyncstub_fuzzer/addpermissionusedrecordasyncstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "fuzzer/FuzzedDataProvider.h" #include "iprivacy_manager.h" #include "privacy_manager_service.h" @@ -40,8 +41,8 @@ namespace OHOS { datas.WriteInterfaceToken(IPrivacyManager::GetDescriptor()); AddPermParamInfoParcel infoParcel; - infoParcel.info.tokenId = provider.ConsumeIntegral(); - infoParcel.info.permissionName = provider.ConsumeRandomLengthString(); + infoParcel.info.tokenId = ConsumeTokenId(provider); + infoParcel.info.permissionName = ConsumePermissionName(provider); infoParcel.info.successCount = provider.ConsumeIntegral(); infoParcel.info.failCount = provider.ConsumeIntegral(); infoParcel.info.type = static_cast(provider.ConsumeIntegralInRange( diff --git a/test/fuzztest/services/privacy/addpermissionusedrecordasyncstub_fuzzer/corpus/init b/test/fuzztest/services/privacy/addpermissionusedrecordasyncstub_fuzzer/corpus/init deleted file mode 100644 index 65af8ee8d..000000000 --- a/test/fuzztest/services/privacy/addpermissionusedrecordasyncstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2025 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/privacy/addpermissionusedrecordasyncstub_fuzzer/corpus/init0 b/test/fuzztest/services/privacy/addpermissionusedrecordasyncstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..a87f2abb506114aefca1cfae678360d784cbf996 GIT binary patch literal 50 zcmeCWeSebDll4X-f0mfd4;Ku1$dqLxSEQq{&p+CC8Uq7^5d%X*3J^;Mv%GFNJn2D9 F0{{-!6FmR` literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/privacy/addpermissionusedrecordstub_fuzzer/addpermissionusedrecordstub_fuzzer.cpp b/test/fuzztest/services/privacy/addpermissionusedrecordstub_fuzzer/addpermissionusedrecordstub_fuzzer.cpp index 42f424e14..6b9d0a4be 100644 --- a/test/fuzztest/services/privacy/addpermissionusedrecordstub_fuzzer/addpermissionusedrecordstub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/addpermissionusedrecordstub_fuzzer/addpermissionusedrecordstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "fuzzer/FuzzedDataProvider.h" #include "iprivacy_manager.h" #include "privacy_manager_service.h" @@ -40,8 +41,8 @@ namespace OHOS { datas.WriteInterfaceToken(IPrivacyManager::GetDescriptor()); AddPermParamInfoParcel infoParcel; - infoParcel.info.tokenId = provider.ConsumeIntegral(); - infoParcel.info.permissionName = provider.ConsumeRandomLengthString(); + infoParcel.info.tokenId = ConsumeTokenId(provider); + infoParcel.info.permissionName = ConsumePermissionName(provider); infoParcel.info.successCount = provider.ConsumeIntegral(); infoParcel.info.failCount = provider.ConsumeIntegral(); infoParcel.info.type = static_cast(provider.ConsumeIntegralInRange( diff --git a/test/fuzztest/services/privacy/addpermissionusedrecordstub_fuzzer/corpus/init b/test/fuzztest/services/privacy/addpermissionusedrecordstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/privacy/addpermissionusedrecordstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/privacy/addpermissionusedrecordstub_fuzzer/corpus/init0 b/test/fuzztest/services/privacy/addpermissionusedrecordstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..a87f2abb506114aefca1cfae678360d784cbf996 GIT binary patch literal 50 zcmeCWeSebDll4X-f0mfd4;Ku1$dqLxSEQq{&p+CC8Uq7^5d%X*3J^;Mv%GFNJn2D9 F0{{-!6FmR` literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/privacy/getpermissionusedrecordsasyncstub_fuzzer/corpus/init b/test/fuzztest/services/privacy/getpermissionusedrecordsasyncstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/privacy/getpermissionusedrecordsasyncstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/privacy/getpermissionusedrecordsasyncstub_fuzzer/corpus/init0 b/test/fuzztest/services/privacy/getpermissionusedrecordsasyncstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d6928cddb4282f690353fdb6f136e3e869f6163c GIT binary patch literal 200 zcmYdEEz3+!^>m40NGi=s$w~D~%uS79$j`_x)+73`tee^%Q)zwu*tI`-ChNs|z6dWd`8JDZvb~V>=~=P= zuOC%9-^cQ#!~VjOiA`PF*VEpnDxOtw(K{$r{ki|7;lh8PlpM+?FU~w4>2)XR;JM>F tlIQ+kus`?B?!B+hSpE?@>|FJ;nZ?sf=($2x%Zo253}Dc}2&Y*=EC6E>RyzOy literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/privacy/getpermissionusedrecordsasyncstub_fuzzer/getpermissionusedrecordsasyncstub_fuzzer.cpp b/test/fuzztest/services/privacy/getpermissionusedrecordsasyncstub_fuzzer/getpermissionusedrecordsasyncstub_fuzzer.cpp index 0ab6b7e11..3a366d69a 100644 --- a/test/fuzztest/services/privacy/getpermissionusedrecordsasyncstub_fuzzer/getpermissionusedrecordsasyncstub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/getpermissionusedrecordsasyncstub_fuzzer/getpermissionusedrecordsasyncstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "errors.h" #include "fuzzer/FuzzedDataProvider.h" #include "iprivacy_manager.h" @@ -48,11 +49,11 @@ namespace OHOS { FuzzedDataProvider provider(data, size); PermissionUsedRequest request = { - .tokenId = provider.ConsumeIntegral(), + .tokenId = ConsumeTokenId(provider), .isRemote = provider.ConsumeBool(), .deviceId = provider.ConsumeRandomLengthString(), .bundleName = provider.ConsumeRandomLengthString(), - .permissionList = {provider.ConsumeRandomLengthString()}, + .permissionList = {ConsumePermissionName(provider)}, .beginTimeMillis = provider.ConsumeIntegral(), .endTimeMillis = provider.ConsumeIntegral(), .flag = static_cast(provider.ConsumeIntegralInRange( diff --git a/test/fuzztest/services/privacy/getpermissionusedrecordsstub_fuzzer/corpus/init b/test/fuzztest/services/privacy/getpermissionusedrecordsstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/privacy/getpermissionusedrecordsstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/privacy/getpermissionusedrecordsstub_fuzzer/corpus/init0 b/test/fuzztest/services/privacy/getpermissionusedrecordsstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..d6928cddb4282f690353fdb6f136e3e869f6163c GIT binary patch literal 200 zcmYdEEz3+!^>m40NGi=s$w~D~%uS79$j`_x)+73`tee^%Q)zwu*tI`-ChNs|z6dWd`8JDZvb~V>=~=P= zuOC%9-^cQ#!~VjOiA`PF*VEpnDxOtw(K{$r{ki|7;lh8PlpM+?FU~w4>2)XR;JM>F tlIQ+kus`?B?!B+hSpE?@>|FJ;nZ?sf=($2x%Zo253}Dc}2&Y*=EC6E>RyzOy literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/privacy/getpermissionusedrecordsstub_fuzzer/getpermissionusedrecordsstub_fuzzer.cpp b/test/fuzztest/services/privacy/getpermissionusedrecordsstub_fuzzer/getpermissionusedrecordsstub_fuzzer.cpp index cd1ac4d96..a7fc4cd53 100644 --- a/test/fuzztest/services/privacy/getpermissionusedrecordsstub_fuzzer/getpermissionusedrecordsstub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/getpermissionusedrecordsstub_fuzzer/getpermissionusedrecordsstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "fuzzer/FuzzedDataProvider.h" #include "iprivacy_manager.h" #include "permission_used_request.h" @@ -38,11 +39,11 @@ namespace OHOS { FuzzedDataProvider provider(data, size); PermissionUsedRequest request = { - .tokenId = provider.ConsumeIntegral(), + .tokenId = ConsumeTokenId(provider), .isRemote = provider.ConsumeBool(), .deviceId = provider.ConsumeRandomLengthString(), .bundleName = provider.ConsumeRandomLengthString(), - .permissionList = {provider.ConsumeRandomLengthString()}, + .permissionList = {ConsumePermissionName(provider)}, .beginTimeMillis = provider.ConsumeIntegral(), .endTimeMillis = provider.ConsumeIntegral(), .flag = static_cast(provider.ConsumeIntegralInRange( diff --git a/test/fuzztest/services/privacy/getpermissionusedtypeinfosstub_fuzzer/corpus/init b/test/fuzztest/services/privacy/getpermissionusedtypeinfosstub_fuzzer/corpus/init deleted file mode 100644 index e7c3fecd8..000000000 --- a/test/fuzztest/services/privacy/getpermissionusedtypeinfosstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2024 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/privacy/getpermissionusedtypeinfosstub_fuzzer/corpus/init0 b/test/fuzztest/services/privacy/getpermissionusedtypeinfosstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/privacy/getpermissionusedtypeinfosstub_fuzzer/getpermissionusedtypeinfosstub_fuzzer.cpp b/test/fuzztest/services/privacy/getpermissionusedtypeinfosstub_fuzzer/getpermissionusedtypeinfosstub_fuzzer.cpp index 6e80274e1..0cc965f9f 100644 --- a/test/fuzztest/services/privacy/getpermissionusedtypeinfosstub_fuzzer/getpermissionusedtypeinfosstub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/getpermissionusedtypeinfosstub_fuzzer/getpermissionusedtypeinfosstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "fuzzer/FuzzedDataProvider.h" #include "iprivacy_manager.h" #include "privacy_manager_service.h" @@ -35,13 +36,15 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); MessageParcel datas; datas.WriteInterfaceToken(IPrivacyManager::GetDescriptor()); - if (!datas.WriteUint32(provider.ConsumeIntegral())) { + if (!datas.WriteUint32(tokenId)) { return false; } - if (!datas.WriteString(provider.ConsumeRandomLengthString())) { + if (!datas.WriteString(permissionName)) { return false; } diff --git a/test/fuzztest/services/privacy/isallowedusingpermissionstub_fuzzer/corpus/init b/test/fuzztest/services/privacy/isallowedusingpermissionstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/privacy/isallowedusingpermissionstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/privacy/isallowedusingpermissionstub_fuzzer/corpus/init0 b/test/fuzztest/services/privacy/isallowedusingpermissionstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/privacy/isallowedusingpermissionstub_fuzzer/isallowedusingpermissionstub_fuzzer.cpp b/test/fuzztest/services/privacy/isallowedusingpermissionstub_fuzzer/isallowedusingpermissionstub_fuzzer.cpp index 39a569879..1c8da86e8 100644 --- a/test/fuzztest/services/privacy/isallowedusingpermissionstub_fuzzer/isallowedusingpermissionstub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/isallowedusingpermissionstub_fuzzer/isallowedusingpermissionstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "fuzzer/FuzzedDataProvider.h" #include "iprivacy_manager.h" #include "privacy_manager_service.h" @@ -35,13 +36,15 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); MessageParcel datas; datas.WriteInterfaceToken(IPrivacyManager::GetDescriptor()); - if (!datas.WriteUint32(provider.ConsumeIntegral())) { + if (!datas.WriteUint32(tokenId)) { return false; } - if (!datas.WriteString(provider.ConsumeRandomLengthString())) { + if (!datas.WriteString(permissionName)) { return false; } if (!datas.WriteInt32(provider.ConsumeIntegral())) { diff --git a/test/fuzztest/services/privacy/registerpermactivestatuscallbackstub_fuzzer/registerpermactivestatuscallbackstub_fuzzer.cpp b/test/fuzztest/services/privacy/registerpermactivestatuscallbackstub_fuzzer/registerpermactivestatuscallbackstub_fuzzer.cpp index 09ee03fb6..2d15b047f 100644 --- a/test/fuzztest/services/privacy/registerpermactivestatuscallbackstub_fuzzer/registerpermactivestatuscallbackstub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/registerpermactivestatuscallbackstub_fuzzer/registerpermactivestatuscallbackstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "fuzzer/FuzzedDataProvider.h" #include "iprivacy_manager.h" #include "perm_active_status_change_callback.h" @@ -56,7 +57,7 @@ namespace OHOS { FuzzedDataProvider provider(data, size); - std::vector permList = {provider.ConsumeRandomLengthString()}; + std::vector permList = {ConsumePermissionName(provider)}; auto callback = std::make_shared(permList); callback->type_ = PERM_INACTIVE; sptr callbackWrap = nullptr; diff --git a/test/fuzztest/services/privacy/removepermissionusedrecordsstub_fuzzer/corpus/init b/test/fuzztest/services/privacy/removepermissionusedrecordsstub_fuzzer/corpus/init deleted file mode 100644 index e4ceac1bc..000000000 --- a/test/fuzztest/services/privacy/removepermissionusedrecordsstub_fuzzer/corpus/init +++ /dev/null @@ -1,14 +0,0 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -FUZZ \ No newline at end of file diff --git a/test/fuzztest/services/privacy/removepermissionusedrecordsstub_fuzzer/corpus/init0 b/test/fuzztest/services/privacy/removepermissionusedrecordsstub_fuzzer/corpus/init0 new file mode 100644 index 0000000000000000000000000000000000000000..7c1b44fdbf9c63cea76689b90ebd0e964c18ef27 GIT binary patch literal 50 zcmV-20L}lz3=A#pyS>~rP_n&(z@)AYH$`aI44gOi-Wl^cChrT7uTfrkU!J^V0001h If3651fNEM6jQ{`u literal 0 HcmV?d00001 diff --git a/test/fuzztest/services/privacy/removepermissionusedrecordsstub_fuzzer/removepermissionusedrecordsstub_fuzzer.cpp b/test/fuzztest/services/privacy/removepermissionusedrecordsstub_fuzzer/removepermissionusedrecordsstub_fuzzer.cpp index 2eb66bfbb..3fbc72500 100644 --- a/test/fuzztest/services/privacy/removepermissionusedrecordsstub_fuzzer/removepermissionusedrecordsstub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/removepermissionusedrecordsstub_fuzzer/removepermissionusedrecordsstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "fuzzer/FuzzedDataProvider.h" #include "iprivacy_manager.h" #include "privacy_manager_service.h" @@ -35,13 +36,15 @@ namespace OHOS { } FuzzedDataProvider provider(data, size); + AccessTokenID tokenId = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); MessageParcel datas; datas.WriteInterfaceToken(IPrivacyManager::GetDescriptor()); - if (!datas.WriteUint32(provider.ConsumeIntegral())) { + if (!datas.WriteUint32(tokenId)) { return false; } - if (!datas.WriteString(provider.ConsumeRandomLengthString())) { + if (!datas.WriteString(permissionName)) { return false; } diff --git a/test/fuzztest/services/privacy/sethapwithfgreminderstub_fuzzer/sethapwithfgreminderstub_fuzzer.cpp b/test/fuzztest/services/privacy/sethapwithfgreminderstub_fuzzer/sethapwithfgreminderstub_fuzzer.cpp index e984d9192..da3724faf 100644 --- a/test/fuzztest/services/privacy/sethapwithfgreminderstub_fuzzer/sethapwithfgreminderstub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/sethapwithfgreminderstub_fuzzer/sethapwithfgreminderstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "accesstoken_kit.h" #include "fuzzer/FuzzedDataProvider.h" #include "iprivacy_manager.h" @@ -70,7 +71,7 @@ namespace OHOS { GetNativeToken(); if (size > sizeof(uint32_t) + sizeof(bool)) { - AccessTokenID tokenId = provider.ConsumeIntegral(); + AccessTokenID tokenId = ConsumeTokenId(provider); bool isAllowed = provider.ConsumeBool(); MessageParcel datas; diff --git a/test/fuzztest/services/privacy/setmutepolicystub_fuzzer/setmutepolicystub_fuzzer.cpp b/test/fuzztest/services/privacy/setmutepolicystub_fuzzer/setmutepolicystub_fuzzer.cpp index b49e02e09..77f3f71a8 100644 --- a/test/fuzztest/services/privacy/setmutepolicystub_fuzzer/setmutepolicystub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/setmutepolicystub_fuzzer/setmutepolicystub_fuzzer.cpp @@ -31,6 +31,8 @@ using namespace std; using namespace OHOS::Security::AccessToken; const int CONSTANTS_NUMBER_TWO = 2; static const int32_t ROOT_UID = 0; +static const uint32_t ACTIVE_CHANGE_CHANGE_TYPE_MAX = 4; +static const uint32_t CALLER_TYPE_MAX = 2; namespace OHOS { const uint8_t* g_baseFuzzData = nullptr; @@ -73,8 +75,8 @@ size_t g_baseFuzzPos = 0; GetNativeToken(); if (size > sizeof(uint32_t) + sizeof(bool) + sizeof(uint32_t)) { - uint32_t policyType = provider.ConsumeIntegral(); - uint32_t callerType = provider.ConsumeIntegral(); + uint32_t policyType = provider.ConsumeIntegralInRange(0, ACTIVE_CHANGE_CHANGE_TYPE_MAX); + uint32_t callerType = provider.ConsumeIntegralInRange(0, CALLER_TYPE_MAX); bool isMute = provider.ConsumeBool(); uint32_t tokenID = provider.ConsumeIntegral(); diff --git a/test/fuzztest/services/privacy/startusingpermissioncallbackstub_fuzzer/startusingpermissioncallbackstub_fuzzer.cpp b/test/fuzztest/services/privacy/startusingpermissioncallbackstub_fuzzer/startusingpermissioncallbackstub_fuzzer.cpp index e123996b9..e390a6e2f 100644 --- a/test/fuzztest/services/privacy/startusingpermissioncallbackstub_fuzzer/startusingpermissioncallbackstub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/startusingpermissioncallbackstub_fuzzer/startusingpermissioncallbackstub_fuzzer.cpp @@ -15,6 +15,7 @@ #include "startusingpermissioncallbackstub_fuzzer.h" +#include "accesstoken_fuzzdata.h" #include "constant.h" #include "fuzzer/FuzzedDataProvider.h" #include "iprivacy_manager.h" @@ -113,7 +114,7 @@ bool StartUsingPermissionCallbackStubFuzzTest(const uint8_t* data, size_t size) } FuzzedDataProvider provider(data, size); - AccessTokenID tokenID = provider.ConsumeIntegral(); + AccessTokenID tokenID = ConsumeTokenId(provider); int32_t pid = provider.ConsumeIntegral(); std::string permissionName; int32_t opCode = provider.ConsumeIntegral() % g_permSize; diff --git a/test/fuzztest/services/privacy/startusingpermissionstub_fuzzer/startusingpermissionstub_fuzzer.cpp b/test/fuzztest/services/privacy/startusingpermissionstub_fuzzer/startusingpermissionstub_fuzzer.cpp index 658295ce4..e52e7b191 100644 --- a/test/fuzztest/services/privacy/startusingpermissionstub_fuzzer/startusingpermissionstub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/startusingpermissionstub_fuzzer/startusingpermissionstub_fuzzer.cpp @@ -15,6 +15,7 @@ #include "startusingpermissionstub_fuzzer.h" +#include "accesstoken_fuzzdata.h" #include "constant.h" #include "fuzzer/FuzzedDataProvider.h" #include "iprivacy_manager.h" @@ -83,7 +84,7 @@ bool StartUsingPermissionStubFuzzTest(const uint8_t* data, size_t size) } FuzzedDataProvider provider(data, size); - AccessTokenID tokenID = provider.ConsumeIntegral(); + AccessTokenID tokenID = ConsumeTokenId(provider); int32_t pid = provider.ConsumeIntegral(); std::string permissionName; int32_t opCode = provider.ConsumeIntegral() % g_permSize; diff --git a/test/fuzztest/services/privacy/stopusingpermissionstub_fuzzer/stopusingpermissionstub_fuzzer.cpp b/test/fuzztest/services/privacy/stopusingpermissionstub_fuzzer/stopusingpermissionstub_fuzzer.cpp index 7967d5252..3996e052d 100644 --- a/test/fuzztest/services/privacy/stopusingpermissionstub_fuzzer/stopusingpermissionstub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/stopusingpermissionstub_fuzzer/stopusingpermissionstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "fuzzer/FuzzedDataProvider.h" #include "iprivacy_manager.h" #include "privacy_manager_service.h" @@ -37,11 +38,13 @@ namespace OHOS { FuzzedDataProvider provider(data, size); MessageParcel datas; + AccessTokenID tokenID = ConsumeTokenId(provider); + std::string permissionName = ConsumePermissionName(provider); datas.WriteInterfaceToken(IPrivacyManager::GetDescriptor()); - if (!datas.WriteUint32(provider.ConsumeIntegral())) { + if (!datas.WriteUint32(tokenID)) { return false; } - if (!datas.WriteString(provider.ConsumeRandomLengthString())) { + if (!datas.WriteString(permissionName)) { return false; } if (!datas.WriteInt32(provider.ConsumeIntegral())) { diff --git a/test/fuzztest/services/privacy/unregisterpermactivestatuscallbackstub_fuzzer/unregisterpermactivestatuscallbackstub_fuzzer.cpp b/test/fuzztest/services/privacy/unregisterpermactivestatuscallbackstub_fuzzer/unregisterpermactivestatuscallbackstub_fuzzer.cpp index a86e9062d..098c2fa41 100644 --- a/test/fuzztest/services/privacy/unregisterpermactivestatuscallbackstub_fuzzer/unregisterpermactivestatuscallbackstub_fuzzer.cpp +++ b/test/fuzztest/services/privacy/unregisterpermactivestatuscallbackstub_fuzzer/unregisterpermactivestatuscallbackstub_fuzzer.cpp @@ -20,6 +20,7 @@ #include #undef private +#include "accesstoken_fuzzdata.h" #include "fuzzer/FuzzedDataProvider.h" #include "iprivacy_manager.h" #include "perm_active_status_change_callback.h" @@ -59,7 +60,7 @@ namespace OHOS { MessageParcel datas; datas.WriteInterfaceToken(IPrivacyManager::GetDescriptor()); - std::vector permList = {provider.ConsumeRandomLengthString()}; + std::vector permList = {ConsumePermissionName(provider)}; auto callback = std::make_shared(permList); callback->type_ = PERM_INACTIVE; -- Gitee