forked from CodeIntelligenceTesting/jazzer
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathJsonSanitizerIdempotenceFuzzer.java
36 lines (32 loc) · 1.28 KB
/
JsonSanitizerIdempotenceFuzzer.java
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
/*
* Copyright 2024 Code Intelligence GmbH
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.example;
import com.code_intelligence.jazzer.api.FuzzedDataProvider;
import com.google.json.JsonSanitizer;
public class JsonSanitizerIdempotenceFuzzer {
public static void fuzzerTestOneInput(FuzzedDataProvider data) {
String input = data.consumeRemainingAsString();
String validJson;
try {
validJson = JsonSanitizer.sanitize(input, 10);
} catch (Exception e) {
return;
}
// Ensure that sanitizing twice does not give different output (idempotence). Since failure to
// be idempotent is not a security issue in itself, fail with a regular AssertionError.
assert JsonSanitizer.sanitize(validJson).equals(validJson) : "Not idempotent";
}
}