diff --git a/interfaces/inner_api/dlp_permission/test/unittest/src/dlp_permission_kit_test.cpp b/interfaces/inner_api/dlp_permission/test/unittest/src/dlp_permission_kit_test.cpp index 1b873dd5e924ed1015b8efd0fb0ecc456063a24b..89628f4253a8fc0288a7c20721af6f459c69b733 100644 --- a/interfaces/inner_api/dlp_permission/test/unittest/src/dlp_permission_kit_test.cpp +++ b/interfaces/inner_api/dlp_permission/test/unittest/src/dlp_permission_kit_test.cpp @@ -80,7 +80,6 @@ static const std::string DLP_ENABEL = "const.dlp.dlp_enable"; static const std::string TRUE_VALUE = "true"; static const uint8_t ARRAY_CHAR_SIZE = 62; static const char CHAR_ARRAY[] = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"; -static const uint64_t SYSTEM_APP_MASK = 0x100000000; } // namespace static uint8_t GetRandNum() @@ -100,7 +99,7 @@ static void TestRecordProcessInfo() DLP_LOG_INFO(LABEL, "get self uid is %{public}d", g_selfUid); } -static bool TestSetSelfTokenId(FullTokenID tokenId) +static bool TestSetSelfTokenId(AccessTokenID tokenId) { // set tokenId can only be called by native process int32_t uid = getuid(); @@ -109,9 +108,8 @@ static bool TestSetSelfTokenId(FullTokenID tokenId) return false; } - tokenId |= SYSTEM_APP_MASK; - DLP_LOG_INFO(LABEL, "set self tokenId from %{public}s to %{public}s", - std::to_string(GetSelfTokenID()).c_str(), std::to_string(tokenId).c_str()); + DLP_LOG_INFO(LABEL, "set self tokenId from %{public}u to %{public}d", + static_cast(GetSelfTokenID()), tokenId); if (SetSelfTokenID(tokenId) != DLP_OK) { DLP_LOG_ERROR(LABEL, "set self tokenId fail"); if (setuid(uid) != 0) { diff --git a/services/dlp_permission/sa/BUILD.gn b/services/dlp_permission/sa/BUILD.gn index 522229fc431851e4846b434cd4b466b92b0b7a56..ce357e3e75591aaf0f00b65d0af98de94bd049c2 100644 --- a/services/dlp_permission/sa/BUILD.gn +++ b/services/dlp_permission/sa/BUILD.gn @@ -141,7 +141,6 @@ ohos_shared_library("dlp_permission_service") { "callback/open_dlp_file_callback/open_dlp_file_callback_proxy.cpp", "mock/dlp_credential_service.c", "mock/mock_utils.cpp", - "sa_common/access_token_adapter.cpp", "sa_common/bundle_manager_adapter.cpp", "sa_common/permission_manager_adapter.cpp", "sa_main/dlp_credential.cpp", @@ -185,7 +184,6 @@ ohos_shared_library("dlp_permission_service") { "ability_base:want", "ability_runtime:app_manager", "access_token:libaccesstoken_sdk", - "access_token:libtokenid_sdk", "bundle_framework:appexecfwk_base", "bundle_framework:appexecfwk_core", "c_utils:utils", diff --git a/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp b/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp deleted file mode 100644 index 95b8d26bf278b4e31143e5752534d623c3cc63e2..0000000000000000000000000000000000000000 --- a/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp +++ /dev/null @@ -1,30 +0,0 @@ -/* - * Copyright (c) 2025 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include "access_token_adapter.h" -#include "tokenid_kit.h" -#include "ipc_skeleton.h" -namespace OHOS { -namespace Security { -namespace DlpPermission { - -bool AccessTokenAdapter::IsSystemApp() -{ - return true; -} - -} // namespace DlpPermission -} // namespace Security -} // namespace OHOS \ No newline at end of file diff --git a/services/dlp_permission/sa/sa_common/access_token_adapter.cpp b/services/dlp_permission/sa/sa_common/access_token_adapter.cpp deleted file mode 100644 index e9641bf974d9f990562005f57f84daa2bbf65eba..0000000000000000000000000000000000000000 --- a/services/dlp_permission/sa/sa_common/access_token_adapter.cpp +++ /dev/null @@ -1,31 +0,0 @@ -/* - * Copyright (c) 2025 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include "access_token_adapter.h" -#include "tokenid_kit.h" -#include "ipc_skeleton.h" -namespace OHOS { -namespace Security { -namespace DlpPermission { - -bool AccessTokenAdapter::IsSystemApp() -{ - uint64_t accessTokenIDEx = IPCSkeleton::GetCallingFullTokenID(); - return Security::AccessToken::TokenIdKit::IsSystemAppByFullTokenID(accessTokenIDEx); -} - -} // namespace DlpPermission -} // namespace Security -} // namespace OHOS \ No newline at end of file diff --git a/services/dlp_permission/sa/sa_common/access_token_adapter.h b/services/dlp_permission/sa/sa_common/access_token_adapter.h deleted file mode 100644 index ec1ef48132fbedecf35b59f28ad31d2259f326f1..0000000000000000000000000000000000000000 --- a/services/dlp_permission/sa/sa_common/access_token_adapter.h +++ /dev/null @@ -1,30 +0,0 @@ -/* - * Copyright (c) 2025 Huawei Device Co., Ltd. - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#ifndef ACCESS_TOKEN_ADAPTER_H -#define ACCESS_TOKEN_ADAPTER_H - -namespace OHOS { -namespace Security { -namespace DlpPermission { - -class AccessTokenAdapter { -public: - static bool IsSystemApp(); -}; -} // namespace DlpPermission -} // namespace Security -} // namespace OHOS -#endif // ACCESS_TOKEN_ADAPTER_H \ No newline at end of file diff --git a/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp b/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp index 9bf88d340c22b8da52c2f704ac11d0bdb1f06f55..c79f967377ae4177ce9ae910a6109b8b4fc04eff 100644 --- a/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp +++ b/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp @@ -16,7 +16,6 @@ #include "dlp_permission_service.h" #include #include "accesstoken_kit.h" -#include "access_token_adapter.h" #include "account_adapt.h" #include "app_mgr_client.h" #include "bundle_manager_adapter.h" @@ -179,9 +178,6 @@ void DlpPermissionService::UnregisterAppStateObserver() int32_t DlpPermissionService::GenerateDlpCertificate( const sptr& policyParcel, const sptr& callback) { - if (!AccessTokenAdapter::IsSystemApp()) { - return DLP_SERVICE_ERROR_NOT_SYSTEM_APP; - } if (!PermissionManagerAdapter::CheckPermission(PERMISSION_ACCESS_DLP_FILE) && !PermissionManagerAdapter::CheckPermission(PERMISSION_ENTERPRISE_ACCESS_DLP_FILE)) { return DLP_SERVICE_ERROR_PERMISSION_DENY; @@ -232,9 +228,6 @@ static bool GetApplicationInfo(std::string appId, AppExecFwk::ApplicationInfo& a int32_t DlpPermissionService::ParseDlpCertificate(const sptr& certParcel, const sptr& callback, const std::string& appId, bool offlineAccess) { - if (!AccessTokenAdapter::IsSystemApp()) { - return DLP_SERVICE_ERROR_NOT_SYSTEM_APP; - } if (!PermissionManagerAdapter::CheckPermission(PERMISSION_ACCESS_DLP_FILE) && !PermissionManagerAdapter::CheckPermission(PERMISSION_ENTERPRISE_ACCESS_DLP_FILE)) { return DLP_SERVICE_ERROR_PERMISSION_DENY; @@ -320,24 +313,9 @@ static int32_t CheckWithInstallDlpSandbox(const std::string& bundleName, DLPFile return DLP_OK; } -static void FillDlpSandboxInfo(DlpSandboxInfo& dlpSandboxInfo, const std::string& bundleName, - DLPFileAccess dlpFileAccess, int32_t userId, const std::string& uri) -{ - dlpSandboxInfo.bundleName = bundleName; - dlpSandboxInfo.dlpFileAccess = dlpFileAccess; - dlpSandboxInfo.userId = userId; - dlpSandboxInfo.pid = IPCSkeleton::GetCallingRealPid(); - dlpSandboxInfo.uri = uri; - dlpSandboxInfo.timeStamp = static_cast( - std::chrono::duration_cast(std::chrono::system_clock::now().time_since_epoch()).count()); -} - int32_t DlpPermissionService::InstallDlpSandbox(const std::string& bundleName, DLPFileAccess dlpFileAccess, int32_t userId, SandboxInfo& sandboxInfo, const std::string& uri) { - if (!AccessTokenAdapter::IsSystemApp()) { - return DLP_SERVICE_ERROR_NOT_SYSTEM_APP; - } int32_t res = CheckWithInstallDlpSandbox(bundleName, dlpFileAccess); if (res != DLP_OK) { return res; @@ -348,6 +326,7 @@ int32_t DlpPermissionService::InstallDlpSandbox(const std::string& bundleName, D bool isReadOnly = dlpFileAccess == DLPFileAccess::READ_ONLY; bool isNeedInstall = true; DlpSandboxInfo dlpSandboxInfo; + dlpSandboxInfo.bundleName = bundleName; res = GetAppIndexFromRetentionInfo(bundleName, isReadOnly, uri, dlpSandboxInfo, isNeedInstall); if (res != DLP_OK) { return res; @@ -368,12 +347,19 @@ int32_t DlpPermissionService::InstallDlpSandbox(const std::string& bundleName, D return DLP_SERVICE_ERROR_INSTALL_SANDBOX_FAIL; } } - FillDlpSandboxInfo(dlpSandboxInfo, bundleName, dlpFileAccess, userId, uri); + + dlpSandboxInfo.dlpFileAccess = dlpFileAccess; + dlpSandboxInfo.userId = userId; + dlpSandboxInfo.pid = IPCSkeleton::GetCallingRealPid(); + dlpSandboxInfo.uri = uri; + dlpSandboxInfo.timeStamp = static_cast( + std::chrono::duration_cast(std::chrono::system_clock::now().time_since_epoch()).count()); if (!InsertDlpSandboxInfo(dlpSandboxInfo, !isNeedInstall)) { return DLP_SERVICE_ERROR_INSTALL_SANDBOX_FAIL; } sandboxInfo.appIndex = dlpSandboxInfo.appIndex; sandboxInfo.tokenId = dlpSandboxInfo.tokenId; + std::unique_lock lock(dlpSandboxDataMutex_); auto it = dlpSandboxData_.find(dlpSandboxInfo.uid); if (it == dlpSandboxData_.end()) { @@ -415,9 +401,6 @@ int32_t DlpPermissionService::UninstallDlpSandboxApp(const std::string& bundleNa int32_t DlpPermissionService::UninstallDlpSandbox(const std::string& bundleName, int32_t appIndex, int32_t userId) { - if (!AccessTokenAdapter::IsSystemApp()) { - return DLP_SERVICE_ERROR_NOT_SYSTEM_APP; - } if (!PermissionManagerAdapter::CheckPermission(PERMISSION_ACCESS_DLP_FILE)) { return DLP_SERVICE_ERROR_PERMISSION_DENY; } diff --git a/services/dlp_permission/sa/test/BUILD.gn b/services/dlp_permission/sa/test/BUILD.gn index 0400d28a57d2327b38e2741d37b82d8330d215c5..a189bf009d01bd82208154ee2a731efc48114958 100644 --- a/services/dlp_permission/sa/test/BUILD.gn +++ b/services/dlp_permission/sa/test/BUILD.gn @@ -69,7 +69,6 @@ ohos_unittest("dlp_permission_service_test") { "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback/open_dlp_file_callback_death_recipient.cpp", "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback/open_dlp_file_callback_manager.cpp", "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback/open_dlp_file_callback_proxy.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "${dlp_root_dir}/services/dlp_permission/sa/mock/dlp_credential_service.c", "${dlp_root_dir}/services/dlp_permission/sa/mock/mock_utils.cpp", "${dlp_root_dir}/services/dlp_permission/sa/sa_common/bundle_manager_adapter.cpp", diff --git a/test/fuzztest/dlp_permission/fuzzer/cancelretentionstate_fuzzer/cancelretentionstate_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/cancelretentionstate_fuzzer/cancelretentionstate_fuzzer.cpp index 290b2d1bd07c70129e20786e10768555981eb9e7..01b08f67f32abafe06e50fe7be7a416091d42fe6 100644 --- a/test/fuzztest/dlp_permission/fuzzer/cancelretentionstate_fuzzer/cancelretentionstate_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/cancelretentionstate_fuzzer/cancelretentionstate_fuzzer.cpp @@ -26,11 +26,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -52,9 +47,8 @@ bool CancelRetentionStateFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/cleansandboxconfig_fuzzer/cleansandboxconfig_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/cleansandboxconfig_fuzzer/cleansandboxconfig_fuzzer.cpp index 50cf4ec2c14a379846cc4d04c09c2c062fa719c8..766acc8370a434b30594d99b50cf76d1447b8adc 100644 --- a/test/fuzztest/dlp_permission/fuzzer/cleansandboxconfig_fuzzer/cleansandboxconfig_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/cleansandboxconfig_fuzzer/cleansandboxconfig_fuzzer.cpp @@ -25,11 +25,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -51,9 +46,8 @@ bool SetSandboxConfigFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/clearunreservedsandbox_fuzzer/clearunreservedsandbox_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/clearunreservedsandbox_fuzzer/clearunreservedsandbox_fuzzer.cpp index ddb11c47d949e4de974813f2b65f4263c46c191f..44b3b445a5fdf383c63aca305fa17882a2e4e47c 100644 --- a/test/fuzztest/dlp_permission/fuzzer/clearunreservedsandbox_fuzzer/clearunreservedsandbox_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/clearunreservedsandbox_fuzzer/clearunreservedsandbox_fuzzer.cpp @@ -26,11 +26,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -49,9 +44,8 @@ bool ClearUnreservedSandboxFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/credentialcoverage_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/fuzzer/credentialcoverage_fuzzer/BUILD.gn index e89c4044d9df4c4b19a14da06b74a6dc230bf066..e8bcb358914394e95649946e3161e8e86bee982e 100644 --- a/test/fuzztest/dlp_permission/fuzzer/credentialcoverage_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/fuzzer/credentialcoverage_fuzzer/BUILD.gn @@ -1,109 +1,108 @@ -# Copyright (c) 2023 Huawei Device Co., Ltd. -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -import("//build/config/features.gni") -import("//build/test.gni") -import("../../../../../dlp_permission_service.gni") - -module_output_path = "dlp_permission_service/dlp_permission_service" - -ohos_fuzztest("CredentialCoverageFuzzTest") { - module_out_path = module_output_path - fuzz_config_file = "${dlp_root_dir}/test/fuzztest/dlp_permission/fuzzer/credentialcoverage_fuzzer" - - configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:napi_fuzz_config" ] - - include_dirs = [ - "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/account_adapt", - "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/app_observer", - "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/file_manager", - "${dlp_root_dir}/services/dlp_permission/sa/callback/dlp_sandbox_change_callback", - "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback", - "${dlp_root_dir}/services/dlp_permission/sa/mock", - "${dlp_root_dir}/services/dlp_permission/sa/sa_main", - "${dlp_root_dir}/services/dlp_permission/sa/sa_common", - "${dlp_root_dir}/services/dlp_permission/sa/storage/include", - "${dlp_root_dir}/frameworks/common/include", - "${dlp_root_dir}/frameworks/dlp_permission/include", - "${dlp_root_dir}/interfaces/inner_api/dlp_parse/include", - "${dlp_root_dir}/interfaces/inner_api/dlp_permission/include", - ] - - sources = [ - "${dlp_root_dir}/frameworks/common/src/cert_parcel.cpp", - "${dlp_root_dir}/frameworks/common/src/permission_policy.cpp", - "${dlp_root_dir}/frameworks/common/src/retention_sandbox_info.cpp", - "${dlp_root_dir}/frameworks/common/src/visited_dlp_file_info.cpp", - "${dlp_root_dir}/frameworks/dlp_permission/src/auth_user_info_parcel.cpp", - "${dlp_root_dir}/frameworks/dlp_permission/src/dlp_permission_info_parcel.cpp", - "${dlp_root_dir}/frameworks/dlp_permission/src/dlp_policy_parcel.cpp", - "${dlp_root_dir}/frameworks/dlp_permission/src/dlp_sandbox_callback_info_parcel.cpp", - "${dlp_root_dir}/frameworks/dlp_permission/src/open_dlp_file_callback_info_parcel.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/account_adapt/account_adapt.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/app_observer/app_state_observer.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/app_observer/app_uninstall_observer.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/file_manager/file_operator.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/file_manager/retention_file_manager.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/file_manager/sandbox_json_manager.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/file_manager/visit_record_file_manager.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/file_manager/visit_record_json_manager.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/callback/dlp_sandbox_change_callback/dlp_sandbox_change_callback_death_recipient.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/callback/dlp_sandbox_change_callback/dlp_sandbox_change_callback_manager.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/callback/dlp_sandbox_change_callback/dlp_sandbox_change_callback_proxy.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback/open_dlp_file_callback_death_recipient.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback/open_dlp_file_callback_manager.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback/open_dlp_file_callback_proxy.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/dlp_credential_service.c", - "${dlp_root_dir}/services/dlp_permission/sa/mock/mock_utils.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/sa_common/bundle_manager_adapter.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/sa_common/permission_manager_adapter.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_async_proxy.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/storage/src/dlp_kv_data_storage.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/storage/src/sandbox_config_kv_data_storage.cpp", - "credentialcoverage_fuzzer.cpp" - ] - - deps = [ - "${dlp_root_dir}/services/dlp_permission/sa:dlp_permission_serializer_static", - "${dlp_root_dir}/interfaces/inner_api/dlp_permission:libdlp_permission_sdk", - ] - - external_deps = [ - "ability_base:want", - "ability_runtime:app_manager", - "access_token:libaccesstoken_sdk", - "access_token:libtokensetproc_shared", - "bundle_framework:appexecfwk_base", - "bundle_framework:appexecfwk_core", - "c_utils:utils", - "common_event_service:cesfwk_core", - "common_event_service:cesfwk_innerkits", - "config_policy:configpolicy_util", - "hilog:libhilog", - "hisysevent:libhisysevent", - "init:libbegetutil", - "ipc:ipc_core", - "json:nlohmann_json_static", - "kv_store:distributeddata_inner", - "os_account:domain_account_innerkits", - "os_account:libaccountkits", - "os_account:os_account_innerkits", - "safwk:system_ability_fwk", - "samgr:samgr_proxy", - ] - - cflags_cc = [ "-DHILOG_ENABLE" ] - cflags = [ "-DHILOG_ENABLE" ] -} +# Copyright (c) 2023 Huawei Device Co., Ltd. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +import("//build/config/features.gni") +import("//build/test.gni") +import("../../../../../dlp_permission_service.gni") + +module_output_path = "dlp_permission_service/dlp_permission_service" + +ohos_fuzztest("CredentialCoverageFuzzTest") { + module_out_path = module_output_path + fuzz_config_file = "${dlp_root_dir}/test/fuzztest/dlp_permission/fuzzer/credentialcoverage_fuzzer" + + configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:napi_fuzz_config" ] + + include_dirs = [ + "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/account_adapt", + "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/app_observer", + "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/file_manager", + "${dlp_root_dir}/services/dlp_permission/sa/callback/dlp_sandbox_change_callback", + "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback", + "${dlp_root_dir}/services/dlp_permission/sa/mock", + "${dlp_root_dir}/services/dlp_permission/sa/sa_main", + "${dlp_root_dir}/services/dlp_permission/sa/sa_common", + "${dlp_root_dir}/services/dlp_permission/sa/storage/include", + "${dlp_root_dir}/frameworks/common/include", + "${dlp_root_dir}/frameworks/dlp_permission/include", + "${dlp_root_dir}/interfaces/inner_api/dlp_parse/include", + "${dlp_root_dir}/interfaces/inner_api/dlp_permission/include", + ] + + sources = [ + "${dlp_root_dir}/frameworks/common/src/cert_parcel.cpp", + "${dlp_root_dir}/frameworks/common/src/permission_policy.cpp", + "${dlp_root_dir}/frameworks/common/src/retention_sandbox_info.cpp", + "${dlp_root_dir}/frameworks/common/src/visited_dlp_file_info.cpp", + "${dlp_root_dir}/frameworks/dlp_permission/src/auth_user_info_parcel.cpp", + "${dlp_root_dir}/frameworks/dlp_permission/src/dlp_permission_info_parcel.cpp", + "${dlp_root_dir}/frameworks/dlp_permission/src/dlp_policy_parcel.cpp", + "${dlp_root_dir}/frameworks/dlp_permission/src/dlp_sandbox_callback_info_parcel.cpp", + "${dlp_root_dir}/frameworks/dlp_permission/src/open_dlp_file_callback_info_parcel.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/account_adapt/account_adapt.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/app_observer/app_state_observer.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/app_observer/app_uninstall_observer.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/file_manager/file_operator.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/file_manager/retention_file_manager.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/file_manager/sandbox_json_manager.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/file_manager/visit_record_file_manager.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/adapt_utils/file_manager/visit_record_json_manager.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/callback/dlp_sandbox_change_callback/dlp_sandbox_change_callback_death_recipient.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/callback/dlp_sandbox_change_callback/dlp_sandbox_change_callback_manager.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/callback/dlp_sandbox_change_callback/dlp_sandbox_change_callback_proxy.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback/open_dlp_file_callback_death_recipient.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback/open_dlp_file_callback_manager.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback/open_dlp_file_callback_proxy.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/mock/dlp_credential_service.c", + "${dlp_root_dir}/services/dlp_permission/sa/mock/mock_utils.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/sa_common/bundle_manager_adapter.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/sa_common/permission_manager_adapter.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_async_proxy.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/storage/src/dlp_kv_data_storage.cpp", + "${dlp_root_dir}/services/dlp_permission/sa/storage/src/sandbox_config_kv_data_storage.cpp", + "credentialcoverage_fuzzer.cpp" + ] + + deps = [ + "${dlp_root_dir}/services/dlp_permission/sa:dlp_permission_serializer_static", + "${dlp_root_dir}/interfaces/inner_api/dlp_permission:libdlp_permission_sdk", + ] + + external_deps = [ + "ability_base:want", + "ability_runtime:app_manager", + "access_token:libaccesstoken_sdk", + "access_token:libtokensetproc_shared", + "bundle_framework:appexecfwk_base", + "bundle_framework:appexecfwk_core", + "c_utils:utils", + "common_event_service:cesfwk_core", + "common_event_service:cesfwk_innerkits", + "config_policy:configpolicy_util", + "hilog:libhilog", + "hisysevent:libhisysevent", + "init:libbegetutil", + "ipc:ipc_core", + "json:nlohmann_json_static", + "kv_store:distributeddata_inner", + "os_account:domain_account_innerkits", + "os_account:libaccountkits", + "os_account:os_account_innerkits", + "safwk:system_ability_fwk", + "samgr:samgr_proxy", + ] + + cflags_cc = [ "-DHILOG_ENABLE" ] + cflags = [ "-DHILOG_ENABLE" ] +} \ No newline at end of file diff --git a/test/fuzztest/dlp_permission/fuzzer/credentialcoverage_fuzzer/credentialcoverage_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/credentialcoverage_fuzzer/credentialcoverage_fuzzer.cpp index 9ba495892fd66e6f3fefeea357cabff69684d418..32b876c9214f5467d9bb427ac6b1d4e05703eb64 100644 --- a/test/fuzztest/dlp_permission/fuzzer/credentialcoverage_fuzzer/credentialcoverage_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/credentialcoverage_fuzzer/credentialcoverage_fuzzer.cpp @@ -38,7 +38,6 @@ using namespace OHOS::Security::AccessToken; namespace { const uint32_t BUFFER_LENGTH = 64; const uint32_t TWO = 2; -static const uint64_t SYSTEM_APP_MASK = 0x100000000; } namespace OHOS { @@ -138,9 +137,8 @@ bool CredentialCoverageFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/dlpcredential_fuzzer/dlpcredential_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/dlpcredential_fuzzer/dlpcredential_fuzzer.cpp index 61c644f70dbf08d0d44075e1727014475eda3410..a00ed7649cdcbbc73719f287d5cebfff91219ba2 100644 --- a/test/fuzztest/dlp_permission/fuzzer/dlpcredential_fuzzer/dlpcredential_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/dlpcredential_fuzzer/dlpcredential_fuzzer.cpp @@ -46,10 +46,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; using Json = nlohmann::json; -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { const std::string ENC_DATA_LEN = "encDataLen"; const std::string ENC_DATA = "encData"; @@ -249,9 +245,8 @@ bool DlpCredentialFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/dlpfile_fuzzer/dlpfile_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/dlpfile_fuzzer/dlpfile_fuzzer.cpp index 8cdbd2c73c897e30f0ebea1d213269ebe2eec4c2..c8877339627a3640363e64a8cb020b7ce7c4f608 100644 --- a/test/fuzztest/dlp_permission/fuzzer/dlpfile_fuzzer/dlpfile_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/dlpfile_fuzzer/dlpfile_fuzzer.cpp @@ -40,7 +40,6 @@ static const uint8_t ARRAY_CHAR_SIZE = 62; static const char CHAR_ARRAY[] = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"; static std::string g_accountName = "ohosAnonymousName"; static const std::string DLP_SUFFIX = ".dlp"; -static const uint64_t SYSTEM_APP_MASK = 0x100000000; } static void GenerateRandStr(uint32_t len, const uint8_t *data, std::string& res) @@ -277,9 +276,8 @@ bool DlpFileFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/dlpparse_fuzzer/dlpparse_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/dlpparse_fuzzer/dlpparse_fuzzer.cpp index 9718afc7f89704d5f6388f1acf1d6373431b39d2..5726eff39ccced16ecac0a33a6b72916a2b9780f 100644 --- a/test/fuzztest/dlp_permission/fuzzer/dlpparse_fuzzer/dlpparse_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/dlpparse_fuzzer/dlpparse_fuzzer.cpp @@ -39,7 +39,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; static const char CHAR_ARRAY[] = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"; static const std::string DLP_TEST_DIR = "/data"; static const std::string LOGIN_EVENT = "Ohos.account.event.LOGIN"; @@ -193,9 +192,8 @@ bool DlpFileFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/generatecert_fuzzer/generatecert_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/generatecert_fuzzer/generatecert_fuzzer.cpp index 3d4bfd22b471b9a4b534d3bb65d72b5e625602e5..4a7e7c6b9d7a0b1aced13561bc7ed7cd79e37634 100644 --- a/test/fuzztest/dlp_permission/fuzzer/generatecert_fuzzer/generatecert_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/generatecert_fuzzer/generatecert_fuzzer.cpp @@ -27,11 +27,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { const int32_t KEY_LEN = 16; constexpr int32_t DATA_LENGTH = KEY_LEN * 6; @@ -84,9 +79,8 @@ bool GenerateCertFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/getdlpfilevisitrecord_fuzzer/getdlpfilevisitrecord_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/getdlpfilevisitrecord_fuzzer/getdlpfilevisitrecord_fuzzer.cpp index b2f39b89281e9cbcdc525dba3cc0731e759ac9bd..bd7c0ed28cd238113d3fa3ac8430bbd48716f077 100644 --- a/test/fuzztest/dlp_permission/fuzzer/getdlpfilevisitrecord_fuzzer/getdlpfilevisitrecord_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/getdlpfilevisitrecord_fuzzer/getdlpfilevisitrecord_fuzzer.cpp @@ -26,11 +26,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -49,9 +44,8 @@ bool GetDlpFileVisitRecordFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/getdlpgatheringpolicy_fuzzer/getdlpgatheringpolicy_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/getdlpgatheringpolicy_fuzzer/getdlpgatheringpolicy_fuzzer.cpp index 2fffa61502618896f2f90a88931c8014f21e14da..137f16476acf8297ac46595aedc647cf968b77f7 100644 --- a/test/fuzztest/dlp_permission/fuzzer/getdlpgatheringpolicy_fuzzer/getdlpgatheringpolicy_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/getdlpgatheringpolicy_fuzzer/getdlpgatheringpolicy_fuzzer.cpp @@ -28,11 +28,6 @@ constexpr uint8_t STATUS_NUM = 2; using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -50,9 +45,8 @@ bool GetDlpGatheringPolicyFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/getdlpsupportfiletype_fuzzer/getdlpsupportfiletype_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/getdlpsupportfiletype_fuzzer/getdlpsupportfiletype_fuzzer.cpp index 0e7d0625fe4525d602558233c06e9accd6f02429..594d9c342be0f6ad4dfd4c09a765e49ebbc6765d 100644 --- a/test/fuzztest/dlp_permission/fuzzer/getdlpsupportfiletype_fuzzer/getdlpsupportfiletype_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/getdlpsupportfiletype_fuzzer/getdlpsupportfiletype_fuzzer.cpp @@ -26,11 +26,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -49,9 +44,8 @@ bool GetDlpSupportFileTypeFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/getmdmpolicy_fuzzer/getmdmpolicy_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/getmdmpolicy_fuzzer/getmdmpolicy_fuzzer.cpp index 6d06af8513885e03471641e4c4c8e9f8d0cbcec0..b45aebbd8f469882e20ea837b05d1d8198284193 100644 --- a/test/fuzztest/dlp_permission/fuzzer/getmdmpolicy_fuzzer/getmdmpolicy_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/getmdmpolicy_fuzzer/getmdmpolicy_fuzzer.cpp @@ -26,11 +26,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -49,9 +44,8 @@ bool GetMDMPolicyFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/getretentionsandboxlist_fuzzer/getretentionsandboxlist_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/getretentionsandboxlist_fuzzer/getretentionsandboxlist_fuzzer.cpp index bbdfee8a7f2bc5259ab649c69d5bd68b90bdef8f..52eacfebd5023bc48184a4d0ce86486acae4b4a2 100644 --- a/test/fuzztest/dlp_permission/fuzzer/getretentionsandboxlist_fuzzer/getretentionsandboxlist_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/getretentionsandboxlist_fuzzer/getretentionsandboxlist_fuzzer.cpp @@ -26,11 +26,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -52,9 +47,8 @@ bool GetRetentionSandboxListFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/getsandboxconfig_fuzzer/getsandboxconfig_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/getsandboxconfig_fuzzer/getsandboxconfig_fuzzer.cpp index 974aae825efb9e5a8584fe50afdc883ef7519653..33f8cecfa5e538e4f01af6fbf951b4325db58bf5 100644 --- a/test/fuzztest/dlp_permission/fuzzer/getsandboxconfig_fuzzer/getsandboxconfig_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/getsandboxconfig_fuzzer/getsandboxconfig_fuzzer.cpp @@ -25,12 +25,8 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { + static std::string Uint8ArrayToString(const uint8_t* buff, size_t size) { std::string str = ""; @@ -59,9 +55,8 @@ bool SetSandboxConfigFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/installdlpsandbox_fuzzer/installdlpsandbox_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/installdlpsandbox_fuzzer/installdlpsandbox_fuzzer.cpp index f5f00d80f2b737a79753998a7dcd11b936afaba9..b50e1818a2b9fa434c4b446bccc3b47cf4118a49 100644 --- a/test/fuzztest/dlp_permission/fuzzer/installdlpsandbox_fuzzer/installdlpsandbox_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/installdlpsandbox_fuzzer/installdlpsandbox_fuzzer.cpp @@ -26,11 +26,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { const int32_t TWO = 2; static void FuzzTest(const uint8_t* data, size_t size) @@ -59,9 +54,8 @@ bool InstallDlpSandboxFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/parsecert_fuzzer/parsecert_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/parsecert_fuzzer/parsecert_fuzzer.cpp index 56ebd6bd7e6d1b243582708cceaa600fde75c2d0..2254a7b622380317889524cd6cf510751fd8ea5d 100644 --- a/test/fuzztest/dlp_permission/fuzzer/parsecert_fuzzer/parsecert_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/parsecert_fuzzer/parsecert_fuzzer.cpp @@ -27,11 +27,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { const int32_t APPID_LENGTH = 30; const int32_t TWO = 2; @@ -62,9 +57,8 @@ bool ParseCertFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/parsedlpheader_fuzzer/parsedlpheader_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/parsedlpheader_fuzzer/parsedlpheader_fuzzer.cpp index c2e205a3ad83ce0ea66fbfa21d21a665ce6f0628..65a9bcd807d275e3b41280de7e519478ba4a3330 100644 --- a/test/fuzztest/dlp_permission/fuzzer/parsedlpheader_fuzzer/parsedlpheader_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/parsedlpheader_fuzzer/parsedlpheader_fuzzer.cpp @@ -52,11 +52,6 @@ ssize_t write(int fd, const void* buf, size_t count) using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; using namespace std; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static const uint32_t BUFFERSIZE = 40; const int32_t ONE = 10; @@ -109,9 +104,8 @@ bool ParseCertFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/permissioncoverage_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/fuzzer/permissioncoverage_fuzzer/BUILD.gn index 17cecda24e50287b3d099a4369466a92abbb9e7e..45a13b72f2d58112deab7678c62d369c11fa3b74 100644 --- a/test/fuzztest/dlp_permission/fuzzer/permissioncoverage_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/fuzzer/permissioncoverage_fuzzer/BUILD.gn @@ -63,7 +63,6 @@ ohos_fuzztest("PermissionCoverageFuzzTest") { "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback/open_dlp_file_callback_death_recipient.cpp", "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback/open_dlp_file_callback_manager.cpp", "${dlp_root_dir}/services/dlp_permission/sa/callback/open_dlp_file_callback/open_dlp_file_callback_proxy.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "${dlp_root_dir}/services/dlp_permission/sa/mock/dlp_credential_service.c", "${dlp_root_dir}/services/dlp_permission/sa/mock/mock_utils.cpp", "${dlp_root_dir}/services/dlp_permission/sa/sa_common/bundle_manager_adapter.cpp", diff --git a/test/fuzztest/dlp_permission/fuzzer/permissioncoverage_fuzzer/permissioncoverage_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/permissioncoverage_fuzzer/permissioncoverage_fuzzer.cpp index 508c818752d973907203c14ae2ad45ddd04363d1..0610dd3b8b509566c60d7a6f23ffdf0f20791a3f 100644 --- a/test/fuzztest/dlp_permission/fuzzer/permissioncoverage_fuzzer/permissioncoverage_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/permissioncoverage_fuzzer/permissioncoverage_fuzzer.cpp @@ -38,8 +38,7 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; namespace { -const uint32_t BUFFER_LENGTH = 64; -static const uint64_t SYSTEM_APP_MASK = 0x100000000; + const uint32_t BUFFER_LENGTH = 64; } namespace OHOS { @@ -67,9 +66,8 @@ bool PermissionCoverageFuzzer(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/permissionproxy_fuzzer/permissionproxy_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/permissionproxy_fuzzer/permissionproxy_fuzzer.cpp index aed4747b56bb171892fd17f3213528f50b5d84f8..ee27ac18b1572f6cdaf7a8876ec8991164774004 100644 --- a/test/fuzztest/dlp_permission/fuzzer/permissionproxy_fuzzer/permissionproxy_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/permissionproxy_fuzzer/permissionproxy_fuzzer.cpp @@ -38,7 +38,6 @@ namespace { static constexpr int32_t DLP_PERMISSION_SERVICE_SA_ID = 3521; constexpr int32_t SA_LOAD_TIME = 4 * 1000; const uint32_t BUFFER_LENGTH = 64; -static const uint64_t SYSTEM_APP_MASK = 0x100000000; } namespace OHOS { @@ -123,9 +122,8 @@ bool PermissionProxyFuzzer(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/registerdlpsandboxchangecallback_fuzzer/registerdlpsandboxchangecallback_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/registerdlpsandboxchangecallback_fuzzer/registerdlpsandboxchangecallback_fuzzer.cpp index 26be4421d0c5ec3b8e3c354a8d2ee7d542cca44f..73802be8427c0829e0a0eefc086379cab6651f42 100644 --- a/test/fuzztest/dlp_permission/fuzzer/registerdlpsandboxchangecallback_fuzzer/registerdlpsandboxchangecallback_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/registerdlpsandboxchangecallback_fuzzer/registerdlpsandboxchangecallback_fuzzer.cpp @@ -35,10 +35,6 @@ public: void DlpSandboxChangeCallback(DlpSandboxCallbackInfo& result) override {} }; -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -59,9 +55,8 @@ bool RegisterRegisterDlpSandboxChangeCallbackFuzzer(const uint8_t* data, size_t /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/registeropendlpfilecallback_fuzzer/registeropendlpfilecallback_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/registeropendlpfilecallback_fuzzer/registeropendlpfilecallback_fuzzer.cpp index 73e7d02340161f02b37a6984fa781b605010eceb..91f66409e0adbdf7c6a246ee0e41d84b0f30805a 100644 --- a/test/fuzztest/dlp_permission/fuzzer/registeropendlpfilecallback_fuzzer/registeropendlpfilecallback_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/registeropendlpfilecallback_fuzzer/registeropendlpfilecallback_fuzzer.cpp @@ -35,10 +35,6 @@ public: void OnOpenDlpFile(OpenDlpFileCallbackInfo& result) override {} }; -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -58,9 +54,8 @@ bool RegisterRegisterOpenDlpFileCallbackFuzzer(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/removemdmpolicy_fuzzer/removemdmpolicy_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/removemdmpolicy_fuzzer/removemdmpolicy_fuzzer.cpp index f18b7da3cffe21f678151c0347b629cbcb6fa1ac..c784835952128f466a1e0ed18c0de0afb4c85baa 100644 --- a/test/fuzztest/dlp_permission/fuzzer/removemdmpolicy_fuzzer/removemdmpolicy_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/removemdmpolicy_fuzzer/removemdmpolicy_fuzzer.cpp @@ -26,11 +26,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -49,9 +44,8 @@ bool RemoveMDMPolicyFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/setmdmpolicy_fuzzer/setmdmpolicy_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/setmdmpolicy_fuzzer/setmdmpolicy_fuzzer.cpp index 95c4693f977b06fca80689d2ec6b63e2feb91eb8..99e31eb1ca9e9b07a1b82579530a36a72fb82f8d 100644 --- a/test/fuzztest/dlp_permission/fuzzer/setmdmpolicy_fuzzer/setmdmpolicy_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/setmdmpolicy_fuzzer/setmdmpolicy_fuzzer.cpp @@ -26,11 +26,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -52,9 +47,8 @@ bool SetMDMPolicyFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/setreadflag_fuzzer/setreadflag_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/setreadflag_fuzzer/setreadflag_fuzzer.cpp index 8ad6e13087f5e05c3784a4583be175989fc35e3c..86fd7345499757a42671e80776970caa4f999a8f 100644 --- a/test/fuzztest/dlp_permission/fuzzer/setreadflag_fuzzer/setreadflag_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/setreadflag_fuzzer/setreadflag_fuzzer.cpp @@ -23,11 +23,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -48,9 +43,8 @@ bool SetReadFlagFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/setsandboxconfig_fuzzer/setsandboxconfig_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/setsandboxconfig_fuzzer/setsandboxconfig_fuzzer.cpp index 3812b54e7cb780bdf5fc76b442527f83fe89eb19..9165a20d43e6e15b68297059c79ba12702892501 100644 --- a/test/fuzztest/dlp_permission/fuzzer/setsandboxconfig_fuzzer/setsandboxconfig_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/setsandboxconfig_fuzzer/setsandboxconfig_fuzzer.cpp @@ -25,11 +25,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -50,9 +45,8 @@ bool SetSandboxConfigFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/uninstalldlpsandbox_fuzzer/uninstalldlpsandbox_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/uninstalldlpsandbox_fuzzer/uninstalldlpsandbox_fuzzer.cpp index 31e6ca0dc5ac2c65dab1da794f048ab717b23803..87bb1391f897efa0864cc1b31b15751873848556 100644 --- a/test/fuzztest/dlp_permission/fuzzer/uninstalldlpsandbox_fuzzer/uninstalldlpsandbox_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/uninstalldlpsandbox_fuzzer/uninstalldlpsandbox_fuzzer.cpp @@ -26,11 +26,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -56,9 +51,8 @@ bool UninstallDlpSandboxFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/unregisterdlpsandboxchangecallback_fuzzer/unregisterdlpsandboxchangecallback_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/unregisterdlpsandboxchangecallback_fuzzer/unregisterdlpsandboxchangecallback_fuzzer.cpp index f90e70e98efbf63aefcb8351548820e0955a7945..4fc0d8aa1257ec19e2f00eef73a4364d3223966a 100644 --- a/test/fuzztest/dlp_permission/fuzzer/unregisterdlpsandboxchangecallback_fuzzer/unregisterdlpsandboxchangecallback_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/unregisterdlpsandboxchangecallback_fuzzer/unregisterdlpsandboxchangecallback_fuzzer.cpp @@ -27,11 +27,6 @@ constexpr u_int8_t STATUS_NUM = 2; using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -49,9 +44,8 @@ bool UnRegisterDlpSandboxChangeCallbackFuzzTest(const uint8_t* data, size_t size /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/fuzzer/unregisteropendlpfilecallback_fuzzer/unregisteropendlpfilecallback_fuzzer.cpp b/test/fuzztest/dlp_permission/fuzzer/unregisteropendlpfilecallback_fuzzer/unregisteropendlpfilecallback_fuzzer.cpp index 8a845143abb8de16819f855786b2c47c70e033c9..93f3e2b2dfc6f97bbfc6097783fd2673e73b5033 100644 --- a/test/fuzztest/dlp_permission/fuzzer/unregisteropendlpfilecallback_fuzzer/unregisteropendlpfilecallback_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/fuzzer/unregisteropendlpfilecallback_fuzzer/unregisteropendlpfilecallback_fuzzer.cpp @@ -35,10 +35,6 @@ public: void OnOpenDlpFile(OpenDlpFileCallbackInfo& result) override {} }; -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static void FuzzTest(const uint8_t* data, size_t size) { @@ -58,9 +54,8 @@ bool UnRegisterUnregisterOpenDlpFileCallbackFuzzer(const uint8_t* data, size_t s /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/bundlemanageradapter_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/bundlemanageradapter_fuzzer/BUILD.gn index 21bd52cd83d465388d98ce7e1d89ef3bbdb62240..b50c8faeb1d53b358d3e4023667f98ce32fed8ee 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/bundlemanageradapter_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/bundlemanageradapter_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("BundleManagerAdapterFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_need_skip_timer_config" ] sources = [ - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "${dlp_root_dir}/services/dlp_permission/sa/sa_common/bundle_manager_adapter.cpp", "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", "bundlemanageradapter_fuzzer.cpp", diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/bundlemanageradapter_fuzzer/bundlemanageradapter_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/bundlemanageradapter_fuzzer/bundlemanageradapter_fuzzer.cpp index c4b482ec25ab629be5262a2f8036f17410918433..11dfd06da836bb0bd7dd64e098559b74a8b38242 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/bundlemanageradapter_fuzzer/bundlemanageradapter_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/bundlemanageradapter_fuzzer/bundlemanageradapter_fuzzer.cpp @@ -46,10 +46,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; using unordered_json = nlohmann::ordered_json; -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { const std::string ENC_DATA_LEN = "encDataLen"; const std::string ENC_DATA = "encData"; @@ -208,9 +204,8 @@ bool BundleManagerAdapterFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/cancelretentionstatestub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/cancelretentionstatestub_fuzzer/BUILD.gn index b61ba7508040bf7173ef53e5bff4073474918c2a..d5b06653a61e2eb86df9dbf4673ecc29ae1deafd 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/cancelretentionstatestub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/cancelretentionstatestub_fuzzer/BUILD.gn @@ -25,7 +25,6 @@ ohos_fuzztest("CancelRetentionStateStubFuzzTest") { sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "cancelretentionstatestub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/cancelretentionstatestub_fuzzer/cancelretentionstatestub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/cancelretentionstatestub_fuzzer/cancelretentionstatestub_fuzzer.cpp index 6b95c3fcf8ab2c461208b130e149892c72eefa23..88f6d7d2a3b5554eb42d399d3ccf750102596134 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/cancelretentionstatestub_fuzzer/cancelretentionstatestub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/cancelretentionstatestub_fuzzer/cancelretentionstatestub_fuzzer.cpp @@ -27,11 +27,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; static void FuzzTest(const uint8_t* data, size_t size) @@ -64,9 +59,8 @@ bool CancelRetentionStateFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/cleansandboxconfigstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/cleansandboxconfigstub_fuzzer/BUILD.gn index d499a3f2d3950fd7a83a337bbea11bfe1ea24b75..d56b106b6196ccd1402a23841d4876b5d84be5a3 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/cleansandboxconfigstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/cleansandboxconfigstub_fuzzer/BUILD.gn @@ -25,7 +25,6 @@ ohos_fuzztest("CleanSandboxConfigStubFuzzTest") { sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "cleansandboxconfigstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/cleansandboxconfigstub_fuzzer/cleansandboxconfigstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/cleansandboxconfigstub_fuzzer/cleansandboxconfigstub_fuzzer.cpp index b51975fca9ec28ec152e15da2f70adb4800871ef..909bd4d69d68aac28d39bd15f10bcceaa0aabf0f 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/cleansandboxconfigstub_fuzzer/cleansandboxconfigstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/cleansandboxconfigstub_fuzzer/cleansandboxconfigstub_fuzzer.cpp @@ -35,7 +35,6 @@ namespace { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; const int32_t DEFAULT_USERID = 100; constexpr uint8_t STATUS_NUM = 2; -static const uint64_t SYSTEM_APP_MASK = 0x100000000; } int32_t GetCallingUserId(void) @@ -87,9 +86,8 @@ bool SetSandboxConfigFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/clearunreservedsandboxstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/clearunreservedsandboxstub_fuzzer/BUILD.gn index 93c376b1f9b761bb8175a1b4d35f672788750dbb..49b7654af4c0471a100adcb2e63ea37112f38e2c 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/clearunreservedsandboxstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/clearunreservedsandboxstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("ClearUnreservedSandboxStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_need_skip_timer_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "clearunreservedsandboxstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/clearunreservedsandboxstub_fuzzer/clearunreservedsandboxstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/clearunreservedsandboxstub_fuzzer/clearunreservedsandboxstub_fuzzer.cpp index 44d4576e8a0ecd8e31f18f66b543fcfda1f054e2..48621cc0e879b915f8c34e66756c417c52a7c387 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/clearunreservedsandboxstub_fuzzer/clearunreservedsandboxstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/clearunreservedsandboxstub_fuzzer/clearunreservedsandboxstub_fuzzer.cpp @@ -29,11 +29,6 @@ constexpr uint8_t STATUS_NUM = 2; using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; static void FuzzTest(const uint8_t* data, size_t size) @@ -66,9 +61,8 @@ bool ClearUnreservedSandboxFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/dlppermissionservicesnormal_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/dlppermissionservicesnormal_fuzzer/BUILD.gn index 221b8a696afefe4cf54f2aa622a2a645109862ef..7ac40eb2b3c6668869f75ff311b6d6af828f0179 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/dlppermissionservicesnormal_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/dlppermissionservicesnormal_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("DlpPermissionServicesNormalFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_need_skip_timer_config" ] sources = [ - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", "dlppermissionservicesnormal_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/dlppermissionservicesnormal_fuzzer/dlppermissionservicesnormal_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/dlppermissionservicesnormal_fuzzer/dlppermissionservicesnormal_fuzzer.cpp index 2c92635cf747a2300273ffcf4209d4b05a5b7ee2..156729823bcb20041817dff3baf335bd8a884f57 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/dlppermissionservicesnormal_fuzzer/dlppermissionservicesnormal_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/dlppermissionservicesnormal_fuzzer/dlppermissionservicesnormal_fuzzer.cpp @@ -34,10 +34,6 @@ using namespace OHOS::Security::AccessToken; static const int32_t DEFAULT_USER_ID = 100; -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; static constexpr uint8_t STATUS_NUM = 2; @@ -218,9 +214,8 @@ bool DlpPermissionServicesNormalFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(DEFAULT_USER_ID, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/generatecertstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/generatecertstub_fuzzer/BUILD.gn index bf0870e4974ed02de34449b26494bb7bb42e9e2c..aea32afadbcc57c2b77eee5e617db12a81e30588 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/generatecertstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/generatecertstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("GenerateCertStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "generatecertstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/generatecertstub_fuzzer/generatecertstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/generatecertstub_fuzzer/generatecertstub_fuzzer.cpp index 347b31d9f96f9ae79cfa054bd9919702443d11b1..90c0081d0889fe672aaca9a75301ffc9f113d29f 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/generatecertstub_fuzzer/generatecertstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/generatecertstub_fuzzer/generatecertstub_fuzzer.cpp @@ -30,11 +30,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr OHOS::HiviewDFX::HiLogLabel LABEL = { LOG_CORE, SECURITY_DOMAIN_DLP_PERMISSION, "GenerateCertFuzzTest" }; @@ -128,9 +123,8 @@ bool GenerateCertFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/getdlpfilevisitrecordstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/getdlpfilevisitrecordstub_fuzzer/BUILD.gn index b2cff104d81b946e68ae03adc830aa4135b33309..9577a0e9ea256e55c489a0213f2bd12c481eb4c6 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/getdlpfilevisitrecordstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/getdlpfilevisitrecordstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("GetDlpFileVisitRecordStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_need_skip_timer_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "getdlpfilevisitrecordstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/getdlpfilevisitrecordstub_fuzzer/getdlpfilevisitrecordstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/getdlpfilevisitrecordstub_fuzzer/getdlpfilevisitrecordstub_fuzzer.cpp index 0001d2028af17c6fa77679f612fdf56cef959c6e..e96705877e82baf7c842154909b61068d2ef3eb3 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/getdlpfilevisitrecordstub_fuzzer/getdlpfilevisitrecordstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/getdlpfilevisitrecordstub_fuzzer/getdlpfilevisitrecordstub_fuzzer.cpp @@ -29,11 +29,6 @@ constexpr uint8_t STATUS_NUM = 2; using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -67,9 +62,8 @@ bool GetDlpFileVisitRecordFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/getdlpgatheringpolicystub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/getdlpgatheringpolicystub_fuzzer/BUILD.gn index 36c6ba0c6256f3294624b4d8fefa19e653e8f766..b686c140ba770076999cc7001a1403f4d0522309 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/getdlpgatheringpolicystub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/getdlpgatheringpolicystub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("GetDlpGatheringPolicyStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "getdlpgatheringpolicystub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/getdlpgatheringpolicystub_fuzzer/getdlpgatheringpolicystub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/getdlpgatheringpolicystub_fuzzer/getdlpgatheringpolicystub_fuzzer.cpp index bbbd83100ddb6fb332a657285a666a8b4e515019..dd76aa4f4785629fd9eff5bf03733fd4fa30ff18 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/getdlpgatheringpolicystub_fuzzer/getdlpgatheringpolicystub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/getdlpgatheringpolicystub_fuzzer/getdlpgatheringpolicystub_fuzzer.cpp @@ -29,11 +29,6 @@ constexpr uint8_t STATUS_NUM = 2; using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -67,9 +62,8 @@ bool GetDlpGatheringPolicyFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/getdlpsupportfiletypestub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/getdlpsupportfiletypestub_fuzzer/BUILD.gn index 225a8a4f2fe06759336e732a445134db82cb7747..c245bbdf5310a1c0459c788d698f809d79b896a4 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/getdlpsupportfiletypestub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/getdlpsupportfiletypestub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("GetDlpSupportFileTypeStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_need_skip_timer_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "getdlpsupportfiletypestub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/getdlpsupportfiletypestub_fuzzer/getdlpsupportfiletypestub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/getdlpsupportfiletypestub_fuzzer/getdlpsupportfiletypestub_fuzzer.cpp index 03f76c3ec1aac2187da54fb63e99d4a130a01139..9e5e9906e2d795bf527fd3d0ce392b0d1227b358 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/getdlpsupportfiletypestub_fuzzer/getdlpsupportfiletypestub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/getdlpsupportfiletypestub_fuzzer/getdlpsupportfiletypestub_fuzzer.cpp @@ -28,11 +28,6 @@ constexpr u_int8_t STATUS_NUM = 2; using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -66,9 +61,8 @@ bool GetDlpSupportFileTypeFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/getmdmpolicystub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/getmdmpolicystub_fuzzer/BUILD.gn index d2444a30c763d2d509fba9a9e7deb49b7e9da996..f6b828f3b49958a1be7aaa4f18ec529c99093a4f 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/getmdmpolicystub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/getmdmpolicystub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("GetMDMPolicyStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_need_skip_timer_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "getmdmpolicystub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/getretentionsandboxliststub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/getretentionsandboxliststub_fuzzer/BUILD.gn index 419f33753a058822acc3436825624e762a2f42bd..a00425c2d7094130ebbb196cbb1a5e31a50891ff 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/getretentionsandboxliststub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/getretentionsandboxliststub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("GetRetentionSandboxListStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_need_skip_timer_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "getretentionsandboxliststub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/getretentionsandboxliststub_fuzzer/getretentionsandboxliststub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/getretentionsandboxliststub_fuzzer/getretentionsandboxliststub_fuzzer.cpp index 9045698b7dec0ddbd41c47116b478439055cc043..5369d9da336d2cc45026742420d6e719be097ca9 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/getretentionsandboxliststub_fuzzer/getretentionsandboxliststub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/getretentionsandboxliststub_fuzzer/getretentionsandboxliststub_fuzzer.cpp @@ -27,11 +27,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -64,9 +59,8 @@ bool GetRetentionSandboxListFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxconfigstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxconfigstub_fuzzer/BUILD.gn index cdea76e53b6e1380f75675c263b5f9392d535203..5f7a09a9dce0300e664314438e494f428d74430c 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxconfigstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxconfigstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("GetSandboxConfigStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_need_skip_timer_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "getsandboxconfigstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxconfigstub_fuzzer/getsandboxconfigstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxconfigstub_fuzzer/getsandboxconfigstub_fuzzer.cpp index 21b21fe45cccc1b01661750dea7688d472ba5380..ccec5758eb1a254a3a0e0f1712f895448ed28782 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxconfigstub_fuzzer/getsandboxconfigstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxconfigstub_fuzzer/getsandboxconfigstub_fuzzer.cpp @@ -49,10 +49,6 @@ bool BundleManagerAdapter::GetBundleInfo(const std::string &bundleName, int32_t } } -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -89,9 +85,8 @@ bool SetSandboxConfigFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxexternalauthorizationstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxexternalauthorizationstub_fuzzer/BUILD.gn index cd8e0bf9d99866f56af2088d9aec8c11724125e3..c3f0af7080e011cb30acbafc0ccb70c71f246995 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxexternalauthorizationstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxexternalauthorizationstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("GetSandboxExternalAuthorizationStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "getsandboxexternalauthorizationstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxexternalauthorizationstub_fuzzer/getsandboxexternalauthorizationstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxexternalauthorizationstub_fuzzer/getsandboxexternalauthorizationstub_fuzzer.cpp index a3939256e415676ec6d971bf5e9d9a085888acbf..785e9a473690d9650f43f72d6e8edc317c250095 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxexternalauthorizationstub_fuzzer/getsandboxexternalauthorizationstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/getsandboxexternalauthorizationstub_fuzzer/getsandboxexternalauthorizationstub_fuzzer.cpp @@ -27,11 +27,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -74,9 +69,8 @@ bool GetSandboxExternalAuthorizationFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/installdlpsandboxstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/installdlpsandboxstub_fuzzer/BUILD.gn index dfcf557251fbb5d9ec1d997de21ab70d63d0b027..e25a029d9c0db195b4504112041e0b8af6d8db08 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/installdlpsandboxstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/installdlpsandboxstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("InstallDlpSandboxStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "installdlpsandboxstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/installdlpsandboxstub_fuzzer/installdlpsandboxstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/installdlpsandboxstub_fuzzer/installdlpsandboxstub_fuzzer.cpp index 636221f8b943fb51dd7920684af4116e5cc89d3a..7658dcf505eb7288dabeea7708908892a71e3627 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/installdlpsandboxstub_fuzzer/installdlpsandboxstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/installdlpsandboxstub_fuzzer/installdlpsandboxstub_fuzzer.cpp @@ -28,11 +28,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { const std::string TEST_URI = "datashare:///media/file/8"; constexpr uint32_t MIN_SIZE = 4 * sizeof(int32_t); @@ -81,9 +76,8 @@ bool InstallDlpSandboxFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/isdlpfeatureprovidedstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/isdlpfeatureprovidedstub_fuzzer/BUILD.gn index 8da45c0303ee6d6383cd75905d894985f3e6c89d..1c34644c0c48cd0b613475264ef7db605d5e8516 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/isdlpfeatureprovidedstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/isdlpfeatureprovidedstub_fuzzer/BUILD.gn @@ -23,7 +23,6 @@ ohos_fuzztest("IsDlpFeatureProvidedStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_need_skip_timer_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "isdlpfeatureprovidedstub_fuzzer.cpp", ] deps = [ diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/isindlpsandboxstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/isindlpsandboxstub_fuzzer/BUILD.gn index 97b2fe807b64795bed72ca8627b775f8237e2b8e..c817c4d6658597fa5c6a3f590e154e75b34738bb 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/isindlpsandboxstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/isindlpsandboxstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("IsInDlpSandboxStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "isindlpsandboxstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/isindlpsandboxstub_fuzzer/isindlpsandboxstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/isindlpsandboxstub_fuzzer/isindlpsandboxstub_fuzzer.cpp index 09f97beb6ad342aeb324e18f47d5759061dda287..b4a1017280b218afb29ce2776633c38de2a8a776 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/isindlpsandboxstub_fuzzer/isindlpsandboxstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/isindlpsandboxstub_fuzzer/isindlpsandboxstub_fuzzer.cpp @@ -29,11 +29,6 @@ constexpr uint8_t STATUS_NUM = 2; using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -67,9 +62,8 @@ bool IsInDlpSandboxFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/parsecertstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/parsecertstub_fuzzer/BUILD.gn index 3f3501d6221ba8d547032fcbdaa6106a81cef814..55b0f5bee71c43e1592cee27fb1c73c1e690ae39 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/parsecertstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/parsecertstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("ParseCertStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "parsecertstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/parsecertstub_fuzzer/parsecertstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/parsecertstub_fuzzer/parsecertstub_fuzzer.cpp index afe6b7d35fd6206f1a89ef41c189902a86c6ca01..7997d7084030cc7d47a85a875bee8f279a76daed 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/parsecertstub_fuzzer/parsecertstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/parsecertstub_fuzzer/parsecertstub_fuzzer.cpp @@ -31,11 +31,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; using Json = nlohmann::json; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { const std::string ENC_DATA_LEN = "encDataLen"; const std::string ENC_DATA = "encData"; @@ -111,9 +106,8 @@ bool ParseCertFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/querydlpfileaccessstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/querydlpfileaccessstub_fuzzer/BUILD.gn index 5cbbde7039ae4aa4ed4024445cdf973f7411e861..198753036b6d54e65cfd812d7c85349178c2d0aa 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/querydlpfileaccessstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/querydlpfileaccessstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("QueryDlpFileAccessStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "querydlpfileaccessstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/querydlpfilecopyablebytokenidstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/querydlpfilecopyablebytokenidstub_fuzzer/BUILD.gn index 8422bac7c883e788e58989522263deb766d5ff39..0d222e0742b9274886431b64783dc4d417bb4628 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/querydlpfilecopyablebytokenidstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/querydlpfilecopyablebytokenidstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("QueryDlpFileCopyableByTokenIdStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "querydlpfilecopyablebytokenidstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/querydlpfilecopyablebytokenidstub_fuzzer/querydlpfilecopyablebytokenidstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/querydlpfilecopyablebytokenidstub_fuzzer/querydlpfilecopyablebytokenidstub_fuzzer.cpp index 53fe5ae4a3dfa749cceff040a4ff52353573c932..7a03fc80081328d8a380732c5ec8dcd41b8c7aa8 100755 --- a/test/fuzztest/dlp_permission/stub_fuzzer/querydlpfilecopyablebytokenidstub_fuzzer/querydlpfilecopyablebytokenidstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/querydlpfilecopyablebytokenidstub_fuzzer/querydlpfilecopyablebytokenidstub_fuzzer.cpp @@ -27,11 +27,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -65,9 +60,8 @@ bool QueryDlpFileCopyableByTokenIdFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/registerdlpsandboxchangecallbackstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/registerdlpsandboxchangecallbackstub_fuzzer/BUILD.gn index d92248e501b76c1e9514a2dcf8d41d9ba6fae6be..53dfa9a73fb09ab09e33bec0d6f6445e32006415 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/registerdlpsandboxchangecallbackstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/registerdlpsandboxchangecallbackstub_fuzzer/BUILD.gn @@ -27,7 +27,6 @@ ohos_fuzztest("RegisterDlpSandboxChangeCallbackStubFuzzTest") { ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "registerdlpsandboxchangecallbackstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/registerdlpsandboxchangecallbackstub_fuzzer/registerdlpsandboxchangecallbackstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/registerdlpsandboxchangecallbackstub_fuzzer/registerdlpsandboxchangecallbackstub_fuzzer.cpp index 2a25339a07ee11ee50f7cbc6c711d80d5f4515cb..b8e48765db6b85476d613dbdbaf214df9a897a5b 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/registerdlpsandboxchangecallbackstub_fuzzer/registerdlpsandboxchangecallbackstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/registerdlpsandboxchangecallbackstub_fuzzer/registerdlpsandboxchangecallbackstub_fuzzer.cpp @@ -39,10 +39,6 @@ public: void DlpSandboxChangeCallback(DlpSandboxCallbackInfo& result) override {} }; -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -88,9 +84,8 @@ bool RegisterRegisterDlpSandboxChangeCallbackStubFuzzer(const uint8_t* data, siz /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/registeropendlpfilecallbackstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/registeropendlpfilecallbackstub_fuzzer/BUILD.gn index 1c992bb1bb5ee4d83773acc9191b6e05616a3602..f36c6c7f61e8f1a2ce06375d2e1fe8e1f2905536 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/registeropendlpfilecallbackstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/registeropendlpfilecallbackstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("RegisterOpenDlpFileCallbackStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "registeropendlpfilecallbackstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/registeropendlpfilecallbackstub_fuzzer/registeropendlpfilecallbackstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/registeropendlpfilecallbackstub_fuzzer/registeropendlpfilecallbackstub_fuzzer.cpp index 0b2beb282e989301005d7ad89f8decf418c7b187..2e15edd2bc687a1af67546dc03598ddbc385fd0a 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/registeropendlpfilecallbackstub_fuzzer/registeropendlpfilecallbackstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/registeropendlpfilecallbackstub_fuzzer/registeropendlpfilecallbackstub_fuzzer.cpp @@ -38,10 +38,6 @@ public: void OnOpenDlpFile(OpenDlpFileCallbackInfo& result) override {} }; -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -85,9 +81,8 @@ bool RegisterRegisterOpenDlpFileCallbackStubFuzzer(const uint8_t* data, size_t s /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/removemdmpolicystub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/removemdmpolicystub_fuzzer/BUILD.gn index 790bf2eb7d61948f97d66040ca7a8d7c22beeb66..25aee70bd2c130f476dfc256a463edf36f87080d 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/removemdmpolicystub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/removemdmpolicystub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("RemoveMDMPolicyStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_need_skip_timer_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "removemdmpolicystub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/setmdmpolicystub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/setmdmpolicystub_fuzzer/BUILD.gn index 8afb7ac19b84082c487468c8127d718b41462f42..1c280dcdc2dcbc9f52e91bf4416b603d3408135b 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/setmdmpolicystub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/setmdmpolicystub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("SetMDMPolicyStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_need_skip_timer_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "setmdmpolicystub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/setreadflagstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/setreadflagstub_fuzzer/BUILD.gn index 3d1f364d19b0246ca446f80797b1659b5702659a..8836536169779d432177ac118c005bea283c8f4d 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/setreadflagstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/setreadflagstub_fuzzer/BUILD.gn @@ -25,7 +25,6 @@ ohos_fuzztest("SetReadFlagStubFuzzTest") { sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "setreadflagstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/setreadflagstub_fuzzer/setreadflagstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/setreadflagstub_fuzzer/setreadflagstub_fuzzer.cpp index b035ef8b6d90bb470026f81bd14cda6259aaf709..fbaf1ac1af036e3f789ee3b00021c79f0800f7d2 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/setreadflagstub_fuzzer/setreadflagstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/setreadflagstub_fuzzer/setreadflagstub_fuzzer.cpp @@ -24,11 +24,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -62,9 +57,8 @@ bool SetReadFlagFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/setretentionstatestub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/setretentionstatestub_fuzzer/BUILD.gn index 8e387c779565c20277ee3c03ea8b6aa28210925a..2c9c511b974cd130f531ab70a30d1fb65a0f1c77 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/setretentionstatestub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/setretentionstatestub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("SetRetentionStateStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "setretentionstatestub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/setsandboxconfigstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/setsandboxconfigstub_fuzzer/BUILD.gn index f9aa401c51ea2486c5b50a51d8ff456e34451ceb..780a11e89e9dafb1c0f8f2593dfb1c22fdc38111 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/setsandboxconfigstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/setsandboxconfigstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("SetSandboxConfigStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_need_skip_timer_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "setsandboxconfigstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/setsandboxconfigstub_fuzzer/setsandboxconfigstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/setsandboxconfigstub_fuzzer/setsandboxconfigstub_fuzzer.cpp index 5275117bb34d2f59757d0e7190a3a2a26de29295..16a95717f714b83937228f2564f89ec3fe6f7dbc 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/setsandboxconfigstub_fuzzer/setsandboxconfigstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/setsandboxconfigstub_fuzzer/setsandboxconfigstub_fuzzer.cpp @@ -46,11 +46,6 @@ bool BundleManagerAdapter::GetBundleInfo(const std::string &bundleName, int32_t } } } - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -83,9 +78,8 @@ bool SetSandboxConfigFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/uninstalldlpsandboxstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/uninstalldlpsandboxstub_fuzzer/BUILD.gn index c279b84d63d275e8b5e6204ffcd5b2047c9d2524..f16835ca4e917e7797c0fa1a27f1884c96f5cbb6 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/uninstalldlpsandboxstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/uninstalldlpsandboxstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("UninstallDlpSandboxStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "uninstalldlpsandboxstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/uninstalldlpsandboxstub_fuzzer/uninstalldlpsandboxstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/uninstalldlpsandboxstub_fuzzer/uninstalldlpsandboxstub_fuzzer.cpp index eaab5dc33f894a4f1c178fb4c8e85983e325ef38..28f590ced8f83abe4c04fc94313d6720017e1776 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/uninstalldlpsandboxstub_fuzzer/uninstalldlpsandboxstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/uninstalldlpsandboxstub_fuzzer/uninstalldlpsandboxstub_fuzzer.cpp @@ -27,11 +27,6 @@ using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -75,9 +70,8 @@ bool UninstallDlpSandboxFuzzTest(const uint8_t* data, size_t size) /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/unregisterdlpsandboxchangecallbackstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/unregisterdlpsandboxchangecallbackstub_fuzzer/BUILD.gn index ce4698a08ea96f26f9b69948bbec09e02c0b19bf..e776fdc31723a59059b5671342395b93584f49d7 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/unregisterdlpsandboxchangecallbackstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/unregisterdlpsandboxchangecallbackstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("UnRegisterDlpSandboxChangeCallbackStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "unregisterdlpsandboxchangecallbackstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/unregisterdlpsandboxchangecallbackstub_fuzzer/unregisterdlpsandboxchangecallbackstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/unregisterdlpsandboxchangecallbackstub_fuzzer/unregisterdlpsandboxchangecallbackstub_fuzzer.cpp index a97a96ca6a4a4bd778291e0bea600a6681afbe3e..49f3860f652ec601c54361860507ef7eda8145a6 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/unregisterdlpsandboxchangecallbackstub_fuzzer/unregisterdlpsandboxchangecallbackstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/unregisterdlpsandboxchangecallbackstub_fuzzer/unregisterdlpsandboxchangecallbackstub_fuzzer.cpp @@ -29,11 +29,6 @@ constexpr uint8_t STATUS_NUM = 2; using namespace OHOS::Security::DlpPermission; using namespace OHOS::Security::AccessToken; - -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -68,9 +63,8 @@ bool UnRegisterDlpSandboxChangeCallbackFuzzTest(const uint8_t* data, size_t size /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; } diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/unregisteropendlpfilecallbackstub_fuzzer/BUILD.gn b/test/fuzztest/dlp_permission/stub_fuzzer/unregisteropendlpfilecallbackstub_fuzzer/BUILD.gn index a197721c4e926099694709058048ec995b28d7c2..736cc6d41163a64ecf4e5fb5cc2e4162a506f0d9 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/unregisteropendlpfilecallbackstub_fuzzer/BUILD.gn +++ b/test/fuzztest/dlp_permission/stub_fuzzer/unregisteropendlpfilecallbackstub_fuzzer/BUILD.gn @@ -24,7 +24,6 @@ ohos_fuzztest("UnRegisterOpenDlpFileCallbackStubFuzzTest") { configs = [ "${dlp_root_dir}/test/fuzztest/dlp_permission:stub_fuzz_need_skip_timer_config" ] sources = [ "${dlp_root_dir}/services/dlp_permission/sa/sa_main/dlp_permission_service.cpp", - "${dlp_root_dir}/services/dlp_permission/sa/mock/access_token_adapter_mock.cpp", "unregisteropendlpfilecallbackstub_fuzzer.cpp", ] diff --git a/test/fuzztest/dlp_permission/stub_fuzzer/unregisteropendlpfilecallbackstub_fuzzer/unregisteropendlpfilecallbackstub_fuzzer.cpp b/test/fuzztest/dlp_permission/stub_fuzzer/unregisteropendlpfilecallbackstub_fuzzer/unregisteropendlpfilecallbackstub_fuzzer.cpp index 46fba39fa0850b05d8125c35b567518ff03111f0..a34b071b5d6ef36f178ac6524fc0d154c904fa87 100644 --- a/test/fuzztest/dlp_permission/stub_fuzzer/unregisteropendlpfilecallbackstub_fuzzer/unregisteropendlpfilecallbackstub_fuzzer.cpp +++ b/test/fuzztest/dlp_permission/stub_fuzzer/unregisteropendlpfilecallbackstub_fuzzer/unregisteropendlpfilecallbackstub_fuzzer.cpp @@ -39,10 +39,6 @@ public: void OnOpenDlpFile(OpenDlpFileCallbackInfo& result) override {} }; -namespace { -static const uint64_t SYSTEM_APP_MASK = 0x100000000; -} // namespace - namespace OHOS { static constexpr int32_t SA_ID_DLP_PERMISSION_SERVICE = 3521; @@ -88,9 +84,8 @@ bool UnRegisterUnregisterOpenDlpFileCallbackStubFuzzer(const uint8_t* data, size /* Fuzzer entry point */ extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) { - AccessTokenIDEx tokenIdEx = AccessTokenKit::GetHapTokenIDEx(100, "com.ohos.dlpmanager", 0); // user_id = 100 - tokenIdEx.tokenIDEx |= SYSTEM_APP_MASK; - SetSelfTokenID(tokenIdEx.tokenIDEx); + AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(100, "com.ohos.dlpmanager", 0); // user_id = 100 + SetSelfTokenID(tokenId); return 0; }