/* * Copyright (c) 2024 Huawei Device Co., Ltd. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "inithaptoken_fuzzer.h" #include #include #include #include #include #include #include "accesstoken_fuzzdata.h" #undef private #include "accesstoken_kit.h" using namespace std; using namespace OHOS::Security::AccessToken; const int CONSTANTS_NUMBER_TWO = 2; static const int32_t ROOT_UID = 0; namespace OHOS { bool InitHapTokenFuzzTest(const uint8_t* data, size_t size) { AccessTokenIDEx tokenIdEx = {0}; if ((data == nullptr) || (size == 0)) { return false; } AccessTokenFuzzData fuzzData(data, size); std::string permissionName(fuzzData.GenerateRandomString()); std::string bundleName(fuzzData.GenerateRandomString()); PermissionDef testPermDef; testPermDef.permissionName = permissionName; testPermDef.bundleName = bundleName; testPermDef.grantMode = 1; testPermDef.availableLevel = APL_NORMAL; testPermDef.label = fuzzData.GenerateRandomString(); testPermDef.labelId = 1; testPermDef.description = fuzzData.GenerateRandomString(); testPermDef.descriptionId = 1; PermissionStateFull testState; testState.permissionName = permissionName; testState.isGeneral = true; testState.resDeviceID = {fuzzData.GenerateRandomString()}; testState.grantStatus = {PermissionState::PERMISSION_GRANTED}; testState.grantFlags = {1}; HapInfoParams TestInfoParms = { .userID = 1, .bundleName = bundleName, .instIndex = 0, .appIDDesc = fuzzData.GenerateRandomString() }; HapPolicyParams TestPolicyPrams = { .apl = APL_NORMAL, .domain = fuzzData.GenerateRandomString(), .permList = {testPermDef}, .permStateList = {testState} }; bool enable = ((size % CONSTANTS_NUMBER_TWO) == 0); if (enable) { setuid(CONSTANTS_NUMBER_TWO); } int32_t res = AccessTokenKit::InitHapToken(TestInfoParms, TestPolicyPrams, tokenIdEx); setuid(ROOT_UID); return res == 0; } } /* Fuzzer entry point */ extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { /* Run your code on data */ OHOS::InitHapTokenFuzzTest(data, size); return 0; }