diff --git a/libwvdrmengine/oemcrypto/test/fuzz_tests/oemcrypto_install_oem_private_key_fuzz.cc b/libwvdrmengine/oemcrypto/test/fuzz_tests/oemcrypto_install_oem_private_key_fuzz.cc index bab90660..310999c5 100644 --- a/libwvdrmengine/oemcrypto/test/fuzz_tests/oemcrypto_install_oem_private_key_fuzz.cc +++ b/libwvdrmengine/oemcrypto/test/fuzz_tests/oemcrypto_install_oem_private_key_fuzz.cc @@ -9,27 +9,17 @@ extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { wvoec::RedirectStdoutToFile(); - wvoec::LicenseWithUsageEntryFuzz entry; - entry.Initialize(); - entry.CreateUsageTableHeader(); - // Open a session, create a usage entry. - wvoec::Session* session = entry.license_messages().session(); - session->open(); - entry.InstallTestDrmKey(session); - session->GenerateNonce(); - session->CreateNewUsageEntry(); - std::vector encrypted_usage_header; - session->UpdateUsageEntry(&encrypted_usage_header); + wvoec::SessionFuzz session_fuzz; + session_fuzz.Initialize(); FuzzedDataProvider fuzzed_data(data, size); const OEMCrypto_PrivateKeyType key_type = wvoec::ConvertDataToValidEnum( fuzzed_data, OEMCrypto_PrivateKeyType_MaxValue); const std::vector wrapped_private_key = fuzzed_data.ConsumeRemainingBytes(); - OEMCrypto_InstallOemPrivateKey(session->session_id(), key_type, + OEMCrypto_InstallOemPrivateKey(session_fuzz.session().session_id(), key_type, wrapped_private_key.data(), wrapped_private_key.size()); - session->close(); - OEMCrypto_Terminate(); + session_fuzz.Terminate(); return 0; }