/* * Copyright (c) 2023 Huawei Device Co., Ltd. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "updatehaptokenstub_fuzzer.h" #include #include #include #include #include #include #include #undef private #include "accesstoken_fuzzdata.h" #include "service/accesstoken_manager_service.h" using namespace std; using namespace OHOS::Security::AccessToken; const int CONSTANTS_NUMBER_TWO = 2; static const int32_t ROOT_UID = 0; namespace OHOS { void ConstructorParam(AccessTokenFuzzData& fuzzData, HapPolicyParcel& hapPolicyParcel) { std::string permissionName(fuzzData.GenerateRandomString()); PermissionDef testPermDef = {.permissionName = permissionName, .bundleName = fuzzData.GenerateRandomString(), .grantMode = 1, .availableLevel = APL_NORMAL, .label = fuzzData.GenerateRandomString(), .labelId = 1, .description = fuzzData.GenerateRandomString(), .descriptionId = 1}; PermissionStateFull testState = {.permissionName = permissionName, .isGeneral = true, .resDeviceID = {fuzzData.GenerateRandomString()}, .grantStatus = {PermissionState::PERMISSION_GRANTED}, .grantFlags = {1}}; HapPolicyParams policy = {.apl = APL_NORMAL, .domain = fuzzData.GenerateRandomString(), .permList = {testPermDef}, .permStateList = {testState}}; hapPolicyParcel.hapPolicyParameter = policy; } bool UpdateHapTokenStubFuzzTest(const uint8_t* data, size_t size) { if ((data == nullptr) || (size == 0)) { return false; } AccessTokenFuzzData fuzzData(data, size); AccessTokenID tokenId = fuzzData.GetData(); int32_t apiVersion = 8; HapPolicyParcel hapPolicyParcel; ConstructorParam(fuzzData, hapPolicyParcel); MessageParcel datas; datas.WriteInterfaceToken(IAccessTokenManager::GetDescriptor()); if (!datas.WriteUint32(tokenId)) { return false; } if (!datas.WriteBool(false)) { return false; } if (!datas.WriteString(fuzzData.GenerateRandomString())) { return false; } if (!datas.WriteInt32(apiVersion)) { return false; } if (!datas.WriteParcelable(&hapPolicyParcel)) { return false; } uint32_t code = static_cast(AccessTokenInterfaceCode::UPDATE_HAP_TOKEN); MessageParcel reply; MessageOption option; bool enable = ((size % CONSTANTS_NUMBER_TWO) == 0); if (enable) { setuid(CONSTANTS_NUMBER_TWO); } DelayedSingleton::GetInstance()->OnRemoteRequest(code, datas, reply, option); setuid(ROOT_UID); return true; } } /* Fuzzer entry point */ extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { /* Run your code on data */ OHOS::UpdateHapTokenStubFuzzTest(data, size); return 0; }