1 /*
2  * Copyright (c) 2022-2024 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include "allochaptoken_fuzzer.h"
17 
18 #include <iostream>
19 #include <thread>
20 #include <string>
21 #include <vector>
22 #undef private
23 #include "accesstoken_fuzzdata.h"
24 #include "accesstoken_kit.h"
25 
26 using namespace std;
27 using namespace OHOS::Security::AccessToken;
28 
29 namespace OHOS {
AllocHapTokenFuzzTest(const uint8_t * data,size_t size)30     bool AllocHapTokenFuzzTest(const uint8_t* data, size_t size)
31     {
32         AccessTokenIDEx tokenIdEx = {0};
33         if ((data == nullptr) || (size == 0)) {
34             return false;
35         }
36 
37         AccessTokenFuzzData fuzzData(data, size);
38 
39         std::string permissionName(fuzzData.GenerateRandomString());
40         std::string bundleName(fuzzData.GenerateRandomString());
41         PermissionDef testPermDef;
42         testPermDef.permissionName = permissionName;
43         testPermDef.bundleName = bundleName;
44         testPermDef.grantMode = 1;
45         testPermDef.availableLevel = APL_NORMAL;
46         testPermDef.label = fuzzData.GenerateRandomString();
47         testPermDef.labelId = 1;
48         testPermDef.description = fuzzData.GenerateRandomString();
49         testPermDef.descriptionId = 1;
50 
51         PermissionStateFull testState;
52         testState.permissionName = permissionName;
53         testState.isGeneral = true;
54         testState.resDeviceID = {fuzzData.GenerateRandomString()};
55         testState.grantStatus = {PermissionState::PERMISSION_GRANTED};
56         testState.grantFlags = {1};
57         HapInfoParams TestInfoParms = {
58             .userID = 1,
59             .bundleName = bundleName,
60             .instIndex = 0,
61             .appIDDesc = fuzzData.GenerateRandomString()
62         };
63         HapPolicyParams TestPolicyPrams = {
64             .apl = APL_NORMAL,
65             .domain = fuzzData.GenerateRandomString(),
66             .permList = {testPermDef},
67             .permStateList = {testState}
68         };
69 
70         tokenIdEx = AccessTokenKit::AllocHapToken(TestInfoParms, TestPolicyPrams);
71 
72         return tokenIdEx.tokenIdExStruct.tokenID != 0;
73     }
74 }
75 
76 /* Fuzzer entry point */
LLVMFuzzerTestOneInput(const uint8_t * data,size_t size)77 extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
78 {
79     /* Run your code on data */
80     OHOS::AllocHapTokenFuzzTest(data, size);
81     return 0;
82 }
83