• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2022-2025 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  * http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include "UTTest_device_manager_service.h"
17 
18 #include "accesstoken_kit.h"
19 #include "dm_constants.h"
20 #include "dm_device_info.h"
21 #include "dm_log.h"
22 #include "nativetoken_kit.h"
23 #include "token_setproc.h"
24 #include "softbus_common.h"
25 #include "softbus_error_code.h"
26 
27 using namespace OHOS::Security::AccessToken;
28 using namespace testing;
29 using namespace testing::ext;
30 namespace OHOS {
31 namespace DistributedHardware {
32 DM_IMPLEMENT_SINGLE_INSTANCE(DeviceManagerService);
33 
SetUp()34 void DeviceManagerServiceTest::SetUp()
35 {
36     const int32_t permsNum = 4;
37     const int32_t indexZero = 0;
38     const int32_t indexOne = 1;
39     const int32_t indexTwo = 2;
40     const int32_t indexThree = 3;
41     uint64_t tokenId;
42     const char *perms[permsNum];
43     perms[indexZero] = "ohos.permission.DISTRIBUTED_SOFTBUS_CENTER";
44     perms[indexOne] = "ohos.permission.DISTRIBUTED_DATASYNC";
45     perms[indexTwo] = "ohos.permission.ACCESS_SERVICE_DM";
46     perms[indexThree] = "ohos.permission.MONITOR_DEVICE_NETWORK_STATE";
47     NativeTokenInfoParams infoInstance = {
48         .dcapsNum = 0,
49         .permsNum = permsNum,
50         .aclsNum = 0,
51         .dcaps = NULL,
52         .perms = perms,
53         .acls = NULL,
54         .processName = "dsoftbus_service",
55         .aplStr = "system_core",
56     };
57     tokenId = GetAccessTokenId(&infoInstance);
58     SetSelfTokenID(tokenId);
59     OHOS::Security::AccessToken::AccessTokenKit::ReloadNativeTokenInfo();
60 }
61 
TearDown()62 void DeviceManagerServiceTest::TearDown()
63 {
64     Mock::VerifyAndClearExpectations(permissionManagerMock_.get());
65     Mock::VerifyAndClearExpectations(softbusListenerMock_.get());
66     Mock::VerifyAndClearExpectations(kVAdapterManagerMock_.get());
67     Mock::VerifyAndClearExpectations(appManagerMock_.get());
68     Mock::VerifyAndClearExpectations(deviceManagerServiceImplMock_.get());
69     Mock::VerifyAndClearExpectations(softbusCacheMock_.get());
70     Mock::VerifyAndClearExpectations(cryptoMock_.get());
71     Mock::VerifyAndClearExpectations(multipleUserConnectorMock_.get());
72     Mock::VerifyAndClearExpectations(dMCommToolMock_.get());
73     Mock::VerifyAndClearExpectations(deviceProfileConnectorMock_.get());
74     Mock::VerifyAndClearExpectations(deviceNameManagerMock_.get());
75 }
76 
SetUpTestCase()77 void DeviceManagerServiceTest::SetUpTestCase()
78 {
79     DmPermissionManager::dmPermissionManager = permissionManagerMock_;
80     DmSoftbusListener::dmSoftbusListener = softbusListenerMock_;
81     DmKVAdapterManager::dmKVAdapterManager = kVAdapterManagerMock_;
82     DmAppManager::dmAppManager = appManagerMock_;
83     DmDeviceManagerServiceImpl::dmDeviceManagerServiceImpl = deviceManagerServiceImplMock_;
84     DmSoftbusCache::dmSoftbusCache = softbusCacheMock_;
85     DmCrypto::dmCrypto = cryptoMock_;
86     DmMultipleUserConnector::dmMultipleUserConnector = multipleUserConnectorMock_;
87     DmDMCommTool::dmDMCommTool = dMCommToolMock_;
88     DmDeviceProfileConnector::dmDeviceProfileConnector = deviceProfileConnectorMock_;
89     DmDeviceNameManager::dmDeviceNameManager_ = deviceNameManagerMock_;
90 }
91 
TearDownTestCase()92 void DeviceManagerServiceTest::TearDownTestCase()
93 {
94     DmPermissionManager::dmPermissionManager = nullptr;
95     permissionManagerMock_ = nullptr;
96     DmSoftbusListener::dmSoftbusListener = nullptr;
97     softbusListenerMock_ = nullptr;
98     DmKVAdapterManager::dmKVAdapterManager = nullptr;
99     kVAdapterManagerMock_ = nullptr;
100     DmAppManager::dmAppManager = nullptr;
101     appManagerMock_ = nullptr;
102     DmDeviceManagerServiceImpl::dmDeviceManagerServiceImpl = nullptr;
103     deviceManagerServiceImplMock_ = nullptr;
104     DmSoftbusCache::dmSoftbusCache = nullptr;
105     softbusCacheMock_ = nullptr;
106     DmCrypto::dmCrypto = nullptr;
107     cryptoMock_ = nullptr;
108     DmMultipleUserConnector::dmMultipleUserConnector = nullptr;
109     multipleUserConnectorMock_ = nullptr;
110     DmDMCommTool::dmDMCommTool = nullptr;
111     dMCommToolMock_ = nullptr;
112     DmDeviceProfileConnector::dmDeviceProfileConnector = nullptr;
113     deviceProfileConnectorMock_ = nullptr;
114     DmDeviceNameManager::dmDeviceNameManager_ = nullptr;
115     deviceNameManagerMock_ = nullptr;
116 }
117 
118 namespace {
DeletePermission()119 void DeletePermission()
120 {
121     const int32_t permsNum = 1;
122     const int32_t indexZero = 0;
123     uint64_t tokenId;
124     const char *perms[permsNum];
125     perms[indexZero] = "ohos.permission";
126     NativeTokenInfoParams infoInstance = {
127         .dcapsNum = 0,
128         .permsNum = permsNum,
129         .aclsNum = 0,
130         .dcaps = NULL,
131         .perms = perms,
132         .acls = NULL,
133         .processName = "DeviceManagerServiceTest",
134         .aplStr = "system_core",
135     };
136     tokenId = GetAccessTokenId(&infoInstance);
137     SetSelfTokenID(tokenId);
138     OHOS::Security::AccessToken::AccessTokenKit::ReloadNativeTokenInfo();
139 }
140 
141 /**
142  * @tc.name: InitDMServiceListener_001
143  * @tc.desc: Init device manager listener and return DM_OK
144  * @tc.type: FUNC
145  * @tc.require: AR000GHSJK
146  */
147 HWTEST_F(DeviceManagerServiceTest, InitDMServiceListener_001, testing::ext::TestSize.Level1)
148 {
149     int ret = DeviceManagerService::GetInstance().InitDMServiceListener();
150     EXPECT_EQ(ret, DM_OK);
151     DeviceManagerService::GetInstance().UninitDMServiceListener();
152 }
153 
154 /**
155  * @tc.name: PublishDeviceDiscovery_001
156  * @tc.desc: Publish device discovery and return ERR_DM_NO_PERMISSION
157  * @tc.type: FUNC
158  * @tc.require: I5N1K3
159  */
160 HWTEST_F(DeviceManagerServiceTest, PublishDeviceDiscovery_001, testing::ext::TestSize.Level1)
161 {
162     DeletePermission();
163     std::string pkgName = "com.ohos.test12";
164     DmPublishInfo publishInfo;
165     publishInfo.publishId = 1;
166     publishInfo.mode = DM_DISCOVER_MODE_ACTIVE;
167     publishInfo.freq = DM_HIGH;
168     publishInfo.ranging = 1;
169     int ret = DeviceManagerService::GetInstance().PublishDeviceDiscovery(pkgName, publishInfo);
170     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
171     DeviceManagerService::GetInstance().UnPublishDeviceDiscovery(pkgName, publishInfo.publishId);
172 }
173 
174 /**
175  * @tc.name: PublishDeviceDiscovery_002
176  * @tc.desc: Empty pkgName of PublishDeviceDiscovery and return ERR_DM_INPUT_PARA_INVALID
177  * @tc.type: FUNC
178  * @tc.require: I5N1K3
179  */
180 HWTEST_F(DeviceManagerServiceTest, PublishDeviceDiscovery_002, testing::ext::TestSize.Level1)
181 {
182     std::string pkgName;
183     DmPublishInfo publishInfo;
184     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
185     int ret = DeviceManagerService::GetInstance().PublishDeviceDiscovery(pkgName, publishInfo);
186     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
187 }
188 
189 /**
190  * @tc.name: PublishDeviceDiscovery_003
191  * @tc.desc: Call PublishDeviceDiscovery twice with pkgName not null and flag bit not false and return
192  * SOFTBUS_DISCOVER_MANAGER_DUPLICATE_PARAM
193  * @tc.type: FUNC
194  * @tc.require: I5N1K3
195  */
196 HWTEST_F(DeviceManagerServiceTest, PublishDeviceDiscovery_003, testing::ext::TestSize.Level1)
197 {
198     std::string pkgName = "com.ohos.test";
199     DmPublishInfo publishInfo;
200     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillRepeatedly(Return(true));
201     int ret = DeviceManagerService::GetInstance().PublishDeviceDiscovery(pkgName, publishInfo);
202     pkgName = "1com.ohos.test1";
203     ret = DeviceManagerService::GetInstance().PublishDeviceDiscovery(pkgName, publishInfo);
204     EXPECT_EQ(ret, ERR_DM_POINT_NULL);
205 }
206 
207 /**
208  * @tc.name: PublishDeviceDiscovery_004
209  * @tc.desc: Call PublishDeviceDiscovery twice with pkgName not null and flag bit not false and return
210  * SOFTBUS_DISCOVER_MANAGER_DUPLICATE_PARAM
211  * @tc.type: FUNC
212  * @tc.require: I5N1K3
213  */
214 HWTEST_F(DeviceManagerServiceTest, PublishDeviceDiscovery_004, testing::ext::TestSize.Level1)
215 {
216     std::string pkgName = "PublishDeviceDiscovery_004";
217     DmPublishInfo publishInfo;
218     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillRepeatedly(Return(true));
219     DeviceManagerService::GetInstance().InitDMServiceListener();
220     int ret = DeviceManagerService::GetInstance().PublishDeviceDiscovery(pkgName, publishInfo);
221     pkgName = "1com.ohos.test1";
222     ret = DeviceManagerService::GetInstance().PublishDeviceDiscovery(pkgName, publishInfo);
223     EXPECT_TRUE(ret == SOFTBUS_IPC_ERR || ret == SOFTBUS_DISCOVER_MANAGER_DUPLICATE_PARAM || ret == DM_OK);
224     DeviceManagerService::GetInstance().UninitDMServiceListener();
225 }
226 
227 /**
228  * @tc.name: UnPublishDeviceDiscovery_001
229  * @tc.desc: UnPublish device discovery and return SOFTBUS_ERR
230  * @tc.type: FUNC
231  * @tc.require: I5N1K3
232  */
233 HWTEST_F(DeviceManagerServiceTest, UnPublishDeviceDiscovery_001, testing::ext::TestSize.Level1)
234 {
235     std::string pkgName = "com.ohos.test";
236     int32_t publishId = 1;
237     int ret = DeviceManagerService::GetInstance().UnPublishDeviceDiscovery(pkgName, publishId);
238     EXPECT_NE(ret, DM_OK);
239 }
240 
241 /**
242  * @tc.name: UnPublishDeviceDiscovery_002
243  * @tc.desc: UnPublishDeviceDiscovery is initialized, pkgName is null, and its return ERR_DM_INPUT_PARA_INVALID
244  * @tc.type: FUNC
245  * @tc.require: I5N1K3
246  */
247 HWTEST_F(DeviceManagerServiceTest, UnPublishDeviceDiscovery_002, testing::ext::TestSize.Level1)
248 {
249     std::string pkgName;
250     int32_t publishId = 1;
251     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
252     DeviceManagerService::GetInstance().InitDMServiceListener();
253     int ret = DeviceManagerService::GetInstance().UnPublishDeviceDiscovery(pkgName, publishId);
254     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
255     DeviceManagerService::GetInstance().UninitDMServiceListener();
256 }
257 
258 /**
259  * @tc.name: UnPublishDeviceDiscovery_003
260  * @tc.desc: UnPublishDeviceDiscovery is initialized, pkgName is null, and its return ERR_DM_INPUT_PARA_INVALID
261  * @tc.type: FUNC
262  * @tc.require: I5N1K3
263  */
264 HWTEST_F(DeviceManagerServiceTest, UnPublishDeviceDiscovery_003, testing::ext::TestSize.Level1)
265 {
266     std::string pkgName = "com.ohos.test003";
267     int32_t publishId = 1;
268     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
269     DeviceManagerService::GetInstance().InitDMServiceListener();
270     int ret = DeviceManagerService::GetInstance().UnPublishDeviceDiscovery(pkgName, publishId);
271     EXPECT_TRUE(ret == SOFTBUS_DISCOVER_COAP_STOP_PUBLISH_FAIL || ret == SOFTBUS_ERR ||
272                 ret == ERR_DM_INPUT_PARA_INVALID);
273     DeviceManagerService::GetInstance().UninitDMServiceListener();
274 }
275 
276 /**
277  * @tc.name: UnPublishDeviceDiscovery_004
278  * @tc.desc: UnPublishDeviceDiscovery is initialized, pkgName is null, and its return ERR_DM_INPUT_PARA_INVALID
279  * @tc.type: FUNC
280  * @tc.require: I5N1K3
281  */
282 HWTEST_F(DeviceManagerServiceTest, UnPublishDeviceDiscovery_004, testing::ext::TestSize.Level1)
283 {
284     std::string pkgName = "com.ohos.test003";
285     int32_t publishId = 1;
286     int32_t userId = 23;
287     std::string accountId = "hello123";
288     int32_t preUserId = 3;
289     std::vector<std::string> peerUdids;
290     std::string accountName = "openharmony123";
291     std::map<std::string, int32_t> curUserDeviceMap;
292     std::map<std::string, int32_t> preUserDeviceMap;
293     std::multimap<std::string, int32_t> curMultiMap;
294     std::string commonEventType = EventFwk::CommonEventSupport::COMMON_EVENT_USER_SWITCHED;
295     DeviceManagerService::GetInstance().AccountCommonEventCallback(commonEventType, userId, preUserId);
296     commonEventType = EventFwk::CommonEventSupport::COMMON_EVENT_HWID_LOGIN;
297     DMAccountInfo dmAccountInfo;
298     DeviceManagerService::GetInstance().AccountCommonEventCallback(commonEventType, userId, preUserId);
299     commonEventType = EventFwk::CommonEventSupport::COMMON_EVENT_HWID_LOGOUT;
300     EXPECT_CALL(*multipleUserConnectorMock_, GetAccountInfoByUserId(_)).WillOnce(Return(dmAccountInfo));
301     DeviceManagerService::GetInstance().AccountCommonEventCallback(commonEventType, userId, preUserId);
302     commonEventType = EventFwk::CommonEventSupport::COMMON_EVENT_USER_REMOVED;
303     EXPECT_CALL(*deviceManagerServiceImplMock_, GetDeviceIdAndUserId(_)).WillOnce(Return(curMultiMap));
304     DeviceManagerService::GetInstance().AccountCommonEventCallback(commonEventType, userId, preUserId);
305     commonEventType = EventFwk::CommonEventSupport::COMMON_EVENT_BOOT_COMPLETED;
306     DeviceManagerService::GetInstance().AccountCommonEventCallback(commonEventType, userId, preUserId);
307     DeviceManagerService::GetInstance().HandleAccountLogout(userId, accountId, pkgName);
308     EXPECT_CALL(*deviceManagerServiceImplMock_, GetDeviceIdAndUserId(_)).WillOnce(Return(curMultiMap));
309     DeviceManagerService::GetInstance().HandleUserRemoved(preUserId);
310     DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
311     DeviceManagerService::GetInstance().SendAccountLogoutBroadCast(peerUdids, accountId, accountName, userId);
312     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
313     DeletePermission();
314     int ret = DeviceManagerService::GetInstance().UnPublishDeviceDiscovery(pkgName, publishId);
315     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
316 }
317 
318 /**
319  * @tc.name: GetTrustedDeviceList_001
320  * @tc.desc:Set the intFlag of GetTrustedDeviceList to true and pkgName = null; Return ERR_DM_INPUT_PARA_INVALID
321  * @tc.type: FUNC
322  * @tc.require: AR000GHSJK
323  */
324 HWTEST_F(DeviceManagerServiceTest, GetTrustedDeviceList_001, testing::ext::TestSize.Level1)
325 {
326     std::string pkgName;
327     std::string extra = "jdddd";
328     std::vector<DmDeviceInfo> deviceList;
329     int ret = DeviceManagerService::GetInstance().GetTrustedDeviceList(pkgName, extra, deviceList);
330     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
331 }
332 
333 /**
334  * @tc.name: GetTrustedDeviceList_002
335  * @tc.desc:Set the intFlag of GetTrustedDeviceList to true; Return DM_OK
336  * @tc.type: FUNC
337  * @tc.require: AR000GHSJK
338  */
339 HWTEST_F(DeviceManagerServiceTest, GetTrustedDeviceList_002, testing::ext::TestSize.Level1)
340 {
341     std::string pkgName = "ohos_test";
342     std::string extra = "jdddd";
343     std::vector<DmDeviceInfo> deviceList;
344     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
345     int ret = DeviceManagerService::GetInstance().GetTrustedDeviceList(pkgName, extra, deviceList);
346     EXPECT_EQ(ret, ERR_DM_POINT_NULL);
347 }
348 
349 /**
350  * @tc.name: GetTrustedDeviceList_003
351  * @tc.desc:Set the intFlag of GetTrustedDeviceList to true; Return DM_OK
352  * @tc.type: FUNC
353  * @tc.require: AR000GHSJK
354  */
355 HWTEST_F(DeviceManagerServiceTest, GetTrustedDeviceList_003, testing::ext::TestSize.Level1)
356 {
357     std::string pkgName = "ohos_test";
358     std::string extra = "jdddd";
359     std::vector<DmDeviceInfo> deviceList;
360     DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
361     DeviceManagerService::GetInstance().InitDMServiceListener();
362     EXPECT_CALL(*softbusListenerMock_, GetTrustedDeviceList(_)).WillOnce(Return(DM_OK));
363     int ret = DeviceManagerService::GetInstance().GetTrustedDeviceList(pkgName, extra, deviceList);
364     EXPECT_EQ(ret, DM_OK);
365     DeviceManagerService::GetInstance().UninitDMServiceListener();
366     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
367 }
368 
369 /**
370  * @tc.name: ShiftLNNGear_001
371  * @tc.desc:Set the pkgName to null, callerId not to null, and isRefresh to true; Return ERR_DM_INPUT_PARA_INVALID
372  * @tc.type: FUNC
373  * @tc.require: AR000GHSJK
374  */
375 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_001, testing::ext::TestSize.Level1)
376 {
377     std::string pkgName;
378     std::string callerId = "com.ohos.test";
379     bool isRefresh = true;
380     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
381     int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
382     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
383 }
384 
385 /**
386  * @tc.name: ShiftLNNGear_002
387  * @tc.desc:Set the callerId to null, pkgNamenot not to null, and isRefresh to true; Return ERR_DM_INPUT_PARA_INVALID
388  * @tc.type: FUNC
389  * @tc.require: AR000GHSJK
390  */
391 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_002, testing::ext::TestSize.Level1)
392 {
393     std::string pkgName = "com.ohos.test";
394     std::string callerId;
395     bool isRefresh = true;
396     std::vector<DmDeviceInfo> deviceList;
397     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
398     int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
399     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
400 }
401 
402 /**
403  * @tc.name: ShiftLNNGear_003
404  * @tc.desc:Set the callerId and pkgNamenot not to null, and isRefresh to true; Return DM_OK
405  * @tc.type: FUNC
406  * @tc.require: AR000GHSJK
407  */
408 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_003, testing::ext::TestSize.Level1)
409 {
410     const int32_t permsNum = 1;
411     const int32_t indexZero = 0;
412     uint64_t tokenId;
413     const char *perms[permsNum];
414     perms[indexZero] = "ohos.permission";
415     NativeTokenInfoParams infoInstance = {
416         .dcapsNum = 0,
417         .permsNum = permsNum,
418         .aclsNum = 0,
419         .dcaps = NULL,
420         .perms = perms,
421         .acls = NULL,
422         .processName = "DeviceManagerServiceTest",
423         .aplStr = "system_core",
424     };
425     tokenId = GetAccessTokenId(&infoInstance);
426     SetSelfTokenID(tokenId);
427     std::string pkgName = "com.ohos.test";
428     std::string callerId = "com.ohos.test";
429     bool isRefresh = true;
430     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
431     int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
432     EXPECT_NE(ret, DM_OK);
433 }
434 
435 /**
436  * @tc.name: ShiftLNNGear_004
437  * @tc.desc:Set the callerId and pkgNamenot not to null, and isRefresh to false; Return DM_OK
438  * @tc.type: FUNC
439  * @tc.require: AR000GHSJK
440  */
441 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_004, testing::ext::TestSize.Level1)
442 {
443     const int32_t permsNum = 1;
444     const int32_t indexZero = 0;
445     uint64_t tokenId;
446     const char *perms[permsNum];
447     perms[indexZero] = "ohos.permission";
448     NativeTokenInfoParams infoInstance = {
449         .dcapsNum = 0,
450         .permsNum = permsNum,
451         .aclsNum = 0,
452         .dcaps = NULL,
453         .perms = perms,
454         .acls = NULL,
455         .processName = "DeviceManagerServiceTest",
456         .aplStr = "system_core",
457     };
458     tokenId = GetAccessTokenId(&infoInstance);
459     SetSelfTokenID(tokenId);
460     std::string pkgName = "com.ohos.test";
461     std::string callerId = "com.ohos.test";
462     bool isRefresh = false;
463     int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
464     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
465 }
466 
467 /**
468  * @tc.name: ShiftLNNGear_005
469  * @tc.desc:Set the callerId and pkgNamenot not to null, and isRefresh to false; Return DM_OK
470  * @tc.type: FUNC
471  * @tc.require: AR000GHSJK
472  */
473 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_005, testing::ext::TestSize.Level1)
474 {
475     std::string pkgName = "com.ohos.test";
476     std::string callerId = "com.ohos.test";
477     bool isRefresh = false;
478     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
479     int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
480     EXPECT_EQ(ret, DM_OK);
481 }
482 
483 /**
484  * @tc.name: ShiftLNNGear_006
485  * @tc.desc:Set the callerId and pkgNamenot not to null, and isRefresh to true; Return NOT DM_OK
486  * @tc.type: FUNC
487  * @tc.require: AR000GHSJK
488  */
489 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_006, testing::ext::TestSize.Level1)
490 {
491     std::string pkgName = "ShiftLNNGear_006";
492     std::string callerId = "ShiftLNNGear_006";
493     bool isRefresh = true;
494     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
495     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
496     int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
497     EXPECT_EQ(ret, ERR_DM_POINT_NULL);
498 }
499 
500 /**
501  * @tc.name: ShiftLNNGear_007
502  * @tc.desc:Set the callerId and pkgNamenot not to null, and isRefresh to true; Return NOT DM_OK
503  * @tc.type: FUNC
504  * @tc.require: AR000GHSJK
505  */
506 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_007, testing::ext::TestSize.Level1)
507 {
508     std::string pkgName = "ShiftLNNGear_007";
509     std::string callerId = "ShiftLNNGear_007";
510     bool isRefresh = true;
511     DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
512     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
513     EXPECT_CALL(*softbusListenerMock_, ShiftLNNGear(_, _)).WillOnce(Return(ERR_DM_FAILED));
514     int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
515     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
516     EXPECT_EQ(ret, ERR_DM_FAILED);
517 }
518 
519 /**
520  * @tc.name: AuthenticateDevice_001
521  * @tc.desc: Set unsupport authType = 0 and return ERR_DM_INPUT_PARA_INVALID
522  * @tc.type: FUNC
523  * @tc.require: AR000GHSJK
524  */
525 HWTEST_F(DeviceManagerServiceTest, AuthenticateDevice_001, testing::ext::TestSize.Level1)
526 {
527     std::string pkgName = "com.ohos.test";
528     std::string extra = "jdddd";
529     int32_t authType = 1;
530     std::string deviceId;
531     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
532     int32_t ret = DeviceManagerService::GetInstance().AuthenticateDevice(pkgName, authType, deviceId, extra);
533     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
534 }
535 
536 /**
537  * @tc.name: AuthenticateDevice_002
538  * @tc.desc: Set intFlag for GAuthenticateDevice to True and pkgName to null; Return ERR_DM_INPUT_PARA_INVALID
539  * @tc.type: FUNC
540  * @tc.require: AR000GHSJK
541  */
542 HWTEST_F(DeviceManagerServiceTest, AuthenticateDevice_002, testing::ext::TestSize.Level1)
543 {
544     std::string pkgName;
545     std::string extra = "jdddd";
546     int32_t authType = 0;
547     std::string deviceId = " 2345";
548     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
549     int32_t ret = DeviceManagerService::GetInstance().AuthenticateDevice(pkgName, authType, deviceId, extra);
550     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
551 }
552 
553 /**
554  * @tc.name: AuthenticateDevice_003
555  * @tc.desc: Set intFlag for GAuthenticateDevice to True and deviceId to null; Return ERR_DM_BIND_INPUT_PARA_INVALID
556  * @tc.type: FUNC
557  * @tc.require: AR000GHSJK
558  */
559 HWTEST_F(DeviceManagerServiceTest, AuthenticateDevice_003, testing::ext::TestSize.Level1)
560 {
561     std::string pkgName = "com.ohos.test";
562     std::string extra = "jdddd";
563     int32_t authType = 0;
564     std::string deviceId = " 2345";
565     EXPECT_CALL(*kVAdapterManagerMock_, Get(_, _)).WillOnce(Return(ERR_DM_FAILED));
566     EXPECT_CALL(*softbusListenerMock_,
567         GetTargetInfoFromCache(_, _, _)).WillOnce(Return(ERR_DM_BIND_INPUT_PARA_INVALID));
568     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
569     int32_t ret = DeviceManagerService::GetInstance().AuthenticateDevice(pkgName, authType, deviceId, extra);
570     EXPECT_EQ(ret, ERR_DM_BIND_INPUT_PARA_INVALID);
571 }
572 
573 /**
574  * @tc.name: AuthenticateDevice_004
575  * @tc.desc: Set intFlag for GAuthenticateDevice to True and deviceId to null; Return ERR_DM_NO_PERMISSION
576  * @tc.type: FUNC
577  * @tc.require: AR000GHSJK
578  */
579 HWTEST_F(DeviceManagerServiceTest, AuthenticateDevice_004, testing::ext::TestSize.Level1)
580 {
581     std::string pkgName = "com.ohos.test";
582     std::string extra = "jdddd";
583     int32_t authType = 0;
584     std::string deviceId = " 2345";
585     DeletePermission();
586     int32_t ret = DeviceManagerService::GetInstance().AuthenticateDevice(pkgName, authType, deviceId, extra);
587     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
588 }
589 
590 /**
591  * @tc.name: UnAuthenticateDevice_001
592  * @tc.desc: 将UnAuthenticateDevice的intFlag设置为false,设置pkgName = "com.ohos.test";Return ERR_DM_NO_PERMISSION
593  * @tc.type: FUNC
594  * @tc.require: AR000GHSJK
595  */
596 HWTEST_F(DeviceManagerServiceTest, UnAuthenticateDevice_001, testing::ext::TestSize.Level1)
597 {
598     DeletePermission();
599     std::string pkgName = "com.ohos.test";
600     std::string networkId = "12345";
601     int ret = DeviceManagerService::GetInstance().UnAuthenticateDevice(pkgName, networkId);
602     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
603 }
604 
605 /**
606  * @tc.name: UnAuthenticateDevice_002
607  * @tc.desc:  Set intFlag for UnAuthenticateDevice to True and pkgName to null; Return ERR_DM_INPUT_PARA_INVALID
608  * @tc.type: FUNC
609  * @tc.require: AR000GHSJK
610  */
611 HWTEST_F(DeviceManagerServiceTest, UnAuthenticateDevice_002, testing::ext::TestSize.Level1)
612 {
613     std::string pkgName;
614     std::string networkId = "12345";
615     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
616     int ret = DeviceManagerService::GetInstance().UnAuthenticateDevice(pkgName, networkId);
617     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
618 }
619 
620 /**
621  * @tc.name: UnAuthenticateDevice_003
622  * @tc.desc: Set intFlag for UnAuthenticateDevice to true and pkgName to com.ohos.test; set deviceId null ,The return
623  * value is ERR_DM_INPUT_PARA_INVALID
624  * @tc.type: FUNC
625  * @tc.require: AR000GHSJK
626  */
627 HWTEST_F(DeviceManagerServiceTest, UnAuthenticateDevice_003, testing::ext::TestSize.Level1)
628 {
629     std::string pkgName = "com.ohos.test";
630     std::string networkId;
631     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
632     int ret = DeviceManagerService::GetInstance().UnAuthenticateDevice(pkgName, networkId);
633     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
634 }
635 
636 /**
637  * @tc.name: UnAuthenticateDevice_004
638  * @tc.desc: Set intFlag for UnAuthenticateDevice to true and pkgName to com.ohos.test; set deviceId null ,The return
639  * value is SOFTBUS_IPC_ERR
640  * @tc.type: FUNC
641  * @tc.require: AR000GHSJK
642  */
643 HWTEST_F(DeviceManagerServiceTest, UnAuthenticateDevice_004, testing::ext::TestSize.Level1)
644 {
645     std::string pkgName = "com.ohos.test";
646     std::string networkId = "12345";
647     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
648     EXPECT_CALL(*softbusListenerMock_, GetUdidByNetworkId(_, _)).WillOnce(Return(ERR_DM_FAILED));
649     int ret = DeviceManagerService::GetInstance().UnAuthenticateDevice(pkgName, networkId);
650     EXPECT_EQ(ret, ERR_DM_FAILED);
651 }
652 
653 /**
654  * @tc.name: GetUdidByNetworkId_001
655  * @tc.desc: Make success for GetUdidByNetworkId,The return value is
656  * SOFTBUS_IPC_ERR
657  * @tc.type: FUNC
658  * @tc.require: AR000GHSJK
659  */
660 HWTEST_F(DeviceManagerServiceTest, GetUdidByNetworkId_001, testing::ext::TestSize.Level1)
661 {
662     std::string pkgName = "com.ohos.test";
663     std::string netWorkId = "123";
664     std::string udid = "123";
665     EXPECT_CALL(*softbusListenerMock_, GetUdidByNetworkId(_, _)).WillOnce(Return(SOFTBUS_IPC_ERR));
666     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
667     int ret = DeviceManagerService::GetInstance().GetUdidByNetworkId(pkgName, netWorkId, udid);
668     EXPECT_EQ(ret, SOFTBUS_IPC_ERR);
669 }
670 
671 /**
672  * @tc.name: GetUdidByNetworkId_002
673  * @tc.desc: Make not init for GetUdidByNetworkId,The return value is
674  * ERR_DM_INPUT_PARA_INVALID
675  * @tc.type: FUNC
676  * @tc.require: AR000GHSJK
677  */
678 HWTEST_F(DeviceManagerServiceTest, GetUdidByNetworkId_002, testing::ext::TestSize.Level1)
679 {
680     std::string pkgName;
681     std::string netWorkId = "111";
682     std::string udid = "2222";
683     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
684     int ret = DeviceManagerService::GetInstance().GetUdidByNetworkId(pkgName, netWorkId, udid);
685     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
686 }
687 
688 /**
689  * @tc.name: GetUdidByNetworkId_003
690  * @tc.desc: Make pkgName empty for GetUdidByNetworkId,The return value is
691  * ERR_DM_INPUT_PARA_INVALID
692  * @tc.type: FUNC
693  * @tc.require: AR000GHSJK
694  */
695 HWTEST_F(DeviceManagerServiceTest, GetUdidByNetworkId_003, testing::ext::TestSize.Level1)
696 {
697     std::string pkgName = "pkgName";
698     std::string netWorkId = "";
699     std::string udid = "";
700     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
701     int ret = DeviceManagerService::GetInstance().GetUdidByNetworkId(pkgName, netWorkId, udid);
702     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
703 }
704 
705 /**
706  * @tc.name: GetUdidByNetworkId_004
707  * @tc.desc: Make pkgName empty for GetUdidByNetworkId,The return value is
708  * ERR_DM_INPUT_PARA_INVALID
709  * @tc.type: FUNC
710  * @tc.require: AR000GHSJK
711  */
712 HWTEST_F(DeviceManagerServiceTest, GetUdidByNetworkId_004, testing::ext::TestSize.Level1)
713 {
714     std::string pkgName = "pkgName";
715     std::string netWorkId = "123";
716     std::string udid = "123";
717     DeletePermission();
718     int ret = DeviceManagerService::GetInstance().GetUdidByNetworkId(pkgName, netWorkId, udid);
719     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
720 }
721 
722 /**
723  * @tc.name: GetUuidByNetworkId_001
724  * @tc.desc: Make success for GetUuidByNetworkId,The return value is
725  * SOFTBUS_IPC_ERR
726  * @tc.type: FUNC
727  * @tc.require: AR000GHSJK
728  */
729 HWTEST_F(DeviceManagerServiceTest, GetUuidByNetworkId_001, testing::ext::TestSize.Level1)
730 {
731     std::string pkgName = "com.ohos.test";
732     std::string netWorkId = "12";
733     std::string uuid = "12";
734     EXPECT_CALL(*softbusListenerMock_, GetUuidByNetworkId(_, _)).WillOnce(Return(SOFTBUS_IPC_ERR));
735     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
736     int ret = DeviceManagerService::GetInstance().GetUuidByNetworkId(pkgName, netWorkId, uuid);
737     EXPECT_EQ(ret, SOFTBUS_IPC_ERR);
738 }
739 
740 /**
741  * @tc.name: GetUuidByNetworkId_002
742  * @tc.desc: Make not init for GetUuidByNetworkId,The return value is
743  * ERR_DM_INPUT_PARA_INVALID
744  * @tc.type: FUNC
745  * @tc.require: AR000GHSJK
746  */
747 HWTEST_F(DeviceManagerServiceTest, GetUuidByNetworkId_002, testing::ext::TestSize.Level1)
748 {
749     std::string pkgName;
750     std::string netWorkId = "12";
751     std::string uuid = "21";
752     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
753     int ret = DeviceManagerService::GetInstance().GetUuidByNetworkId(pkgName, netWorkId, uuid);
754     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
755 }
756 
757 /**
758  * @tc.name: GetUuidByNetworkId_003
759  * @tc.desc: Make pkgName empty for GetUuidByNetworkId,The return value is
760  * ERR_DM_INPUT_PARA_INVALID
761  * @tc.type: FUNC
762  * @tc.require: AR000GHSJK
763  */
764 HWTEST_F(DeviceManagerServiceTest, GetUuidByNetworkId_003, testing::ext::TestSize.Level1)
765 {
766     std::string pkgName = "com.ohos.test";
767     std::string netWorkId = "";
768     std::string uuid = "";
769     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
770     int ret = DeviceManagerService::GetInstance().GetUuidByNetworkId(pkgName, netWorkId, uuid);
771     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
772 }
773 
774 /**
775  * @tc.name: GetUuidByNetworkId_004
776  * @tc.desc: Make pkgName empty for GetUuidByNetworkId,The return value is
777  * ERR_DM_INPUT_PARA_INVALID
778  * @tc.type: FUNC
779  * @tc.require: AR000GHSJK
780  */
781 HWTEST_F(DeviceManagerServiceTest, GetUuidByNetworkId_004, testing::ext::TestSize.Level1)
782 {
783     std::string pkgName = "com.ohos.test";
784     std::string netWorkId = "";
785     std::string uuid = "";
786     DeletePermission();
787     int ret = DeviceManagerService::GetInstance().GetUuidByNetworkId(pkgName, netWorkId, uuid);
788     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
789 }
790 
791 /**
792  * @tc.name: SetUserOperation_001
793  * @tc.desc: Make success for SetUserOperation,The return value is
794  * ERR_DM_NO_PERMISSION
795  * @tc.type: FUNC
796  * @tc.require: AR000GHSJK
797  */
798 HWTEST_F(DeviceManagerServiceTest, SetUserOperation_001, testing::ext::TestSize.Level1)
799 {
800     DeletePermission();
801     std::string pkgName = "com.ohos.test";
802     int32_t action = 0;
803     const std::string param = "{\"test\": \"extra\"}";;
804     int ret = DeviceManagerService::GetInstance().SetUserOperation(pkgName, action, param);
805     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
806 }
807 
808 /**
809  * @tc.name: SetUserOperation_002
810  * @tc.desc: Make pkgName empty for SetUserOperation,The return value is
811  * ERR_DM_INPUT_PARA_INVALID
812  * @tc.type: FUNC
813  * @tc.require: AR000GHSJK
814  */
815 HWTEST_F(DeviceManagerServiceTest, SetUserOperation_002, testing::ext::TestSize.Level1)
816 {
817     std::string pkgName = "";
818     int32_t action = 0;
819     const std::string param = "{\"test\": \"extra\"}";
820     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
821     int ret = DeviceManagerService::GetInstance().SetUserOperation(pkgName, action, param);
822     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
823 }
824 
825 /**
826  * @tc.name: SetUserOperation_003
827  * @tc.desc: Make pkgName empty for SetUserOperation,The return value is
828  * ERR_DM_INPUT_PARA_INVALID
829  * @tc.type: FUNC
830  * @tc.require: AR000GHSJK
831  */
832 HWTEST_F(DeviceManagerServiceTest, SetUserOperation_003, testing::ext::TestSize.Level1)
833 {
834     std::string pkgName = "pkgName";
835     int32_t action = 0;
836     const std::string param;
837     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
838     int ret = DeviceManagerService::GetInstance().SetUserOperation(pkgName, action, param);
839     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
840 }
841 
842 /**
843  * @tc.name: SetUserOperation_004
844  * @tc.desc: Make pkgName empty for SetUserOperation,The return value is
845  * DM_OK
846  * @tc.type: FUNC
847  * @tc.require: AR000GHSJK
848  */
849 HWTEST_F(DeviceManagerServiceTest, SetUserOperation_004, testing::ext::TestSize.Level1)
850 {
851     std::string pkgName = "pkgName";
852     int32_t action = 0;
853     const std::string param = R"({"test":"extra"})";
854     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
855     int ret = DeviceManagerService::GetInstance().SetUserOperation(pkgName, action, param);
856     EXPECT_EQ(ret, DM_OK);
857 }
858 
859 /**
860  * @tc.name: GetLocalDeviceInfo_001
861  * @tc.desc: The return value is DM_OK
862  * @tc.type: FUNC
863  * @tc.require: AR000GHSJK
864  */
865 HWTEST_F(DeviceManagerServiceTest, GetLocalDeviceInfo_001, testing::ext::TestSize.Level1)
866 {
867     DmDeviceInfo info;
868     DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
869     int32_t ret = DeviceManagerService::GetInstance().GetLocalDeviceInfo(info);
870     EXPECT_EQ(ret, DM_OK);
871 }
872 
873 /**
874  * @tc.name: RequestCredential_001
875  * @tc.desc:The return value is ERR_DM_FAILED
876  * @tc.type: FUNC
877  * @tc.require: AR000GHSJK
878  */
879 HWTEST_F(DeviceManagerServiceTest, RequestCredential_001, testing::ext::TestSize.Level1)
880 {
881     const std::string reqJsonStr = "test";
882     std::string returnJsonStr = "returntest";
883     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
884     int32_t ret = DeviceManagerService::GetInstance().RequestCredential(reqJsonStr, returnJsonStr);
885     EXPECT_EQ(ret, ERR_DM_FAILED);
886 }
887 
888 /**
889  * @tc.name: RequestCredential_002
890  * @tc.desc:The return value is ERR_DM_INPUT_PARA_INVALID
891  * @tc.type: FUNC
892  * @tc.require: AR000GHSJK
893  */
894 HWTEST_F(DeviceManagerServiceTest, RequestCredential_002, testing::ext::TestSize.Level1)
895 {
896     const std::string reqJsonStr = "";
897     std::string returnJsonStr = "returntest";
898     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
899     int32_t ret = DeviceManagerService::GetInstance().RequestCredential(reqJsonStr, returnJsonStr);
900     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
901 }
902 
903 /**
904  * @tc.name: RequestCredential_003
905  * @tc.desc:The return value is ERR_DM_FAILED
906  * @tc.type: FUNC
907  * @tc.require: AR000GHSJK
908  */
909 HWTEST_F(DeviceManagerServiceTest, RequestCredential_003, testing::ext::TestSize.Level1)
910 {
911     const std::string reqJsonStr = "test";
912     std::string returnJsonStr = "returntest";
913     DeletePermission();
914     int32_t ret = DeviceManagerService::GetInstance().RequestCredential(reqJsonStr, returnJsonStr);
915     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
916 }
917 
918 /**
919  * @tc.name: ImportCredential_001
920  * @tc.desc:The return value is ERR_DM_FAILED
921  * @tc.type: FUNC
922  * @tc.require: AR000GHSJK
923  */
924 HWTEST_F(DeviceManagerServiceTest, ImportCredential_001, testing::ext::TestSize.Level1)
925 {
926     const std::string pkgName = "pkgNametest";
927     const std::string credentialInfo = "credentialInfotest";
928     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
929     int32_t ret = DeviceManagerService::GetInstance().ImportCredential(pkgName, credentialInfo);
930     EXPECT_EQ(ret, ERR_DM_FAILED);
931 }
932 
933 /**
934  * @tc.name: ImportCredential_002
935  * @tc.desc:The return value is ERR_DM_INPUT_PARA_INVALID
936  * @tc.type: FUNC
937  * @tc.require: AR000GHSJK
938  */
939 HWTEST_F(DeviceManagerServiceTest, ImportCredential_002, testing::ext::TestSize.Level1)
940 {
941     const std::string pkgName = "";
942     const std::string credentialInfo = "";
943     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
944     int32_t ret = DeviceManagerService::GetInstance().ImportCredential(pkgName, credentialInfo);
945     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
946 }
947 
948 /**
949  * @tc.name: ImportCredential_003
950  * @tc.desc:The return value is ERR_DM_FAILED
951  * @tc.type: FUNC
952  * @tc.require: AR000GHSJK
953  */
954 HWTEST_F(DeviceManagerServiceTest, ImportCredential_003, testing::ext::TestSize.Level1)
955 {
956     const std::string pkgName = "pkgNametest";
957     const std::string credentialInfo = "credentialInfotest";
958     DeletePermission();
959     int32_t ret = DeviceManagerService::GetInstance().ImportCredential(pkgName, credentialInfo);
960     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
961 }
962 
963 /**
964  * @tc.name: DeleteCredential_001
965  * @tc.desc:The return value is ERR_DM_FAILED
966  * @tc.type: FUNC
967  * @tc.require: AR000GHSJK
968  */
969 HWTEST_F(DeviceManagerServiceTest, DeleteCredential_001, testing::ext::TestSize.Level1)
970 {
971     const std::string pkgName = "pkgNametest";
972     const std::string deleteInfo = "deleteInfotest";
973     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
974     int32_t ret = DeviceManagerService::GetInstance().DeleteCredential(pkgName, deleteInfo);
975     EXPECT_EQ(ret, ERR_DM_FAILED);
976 }
977 
978 /**
979  * @tc.name: DeleteCredential_002
980  * @tc.desc:The return value is ERR_DM_NO_PERMISSION
981  * @tc.type: FUNC
982  * @tc.require: AR000GHSJK
983  */
984 HWTEST_F(DeviceManagerServiceTest, DeleteCredential_002, testing::ext::TestSize.Level1)
985 {
986     const std::string pkgName = "pkgNametest";
987     const std::string deleteInfo = "deleteInfotest";
988     DeletePermission();
989     int32_t ret = DeviceManagerService::GetInstance().DeleteCredential(pkgName, deleteInfo);
990     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
991 }
992 
993 /**
994  * @tc.name: DeleteCredential_003
995  * @tc.desc:The return value is ERR_DM_INPUT_PARA_INVALID
996  * @tc.type: FUNC
997  * @tc.require: AR000GHSJK
998  */
999 HWTEST_F(DeviceManagerServiceTest, DeleteCredential_003, testing::ext::TestSize.Level1)
1000 {
1001     const std::string pkgName = "";
1002     const std::string deleteInfo = "";
1003     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1004     int32_t ret = DeviceManagerService::GetInstance().DeleteCredential(pkgName, deleteInfo);
1005     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1006 }
1007 
1008 /**
1009  * @tc.name: RegisterCredentialCallback_001
1010  * @tc.desc: The return value is DM_OK
1011  * @tc.type: FUNC
1012  * @tc.require: AR000GHSJK
1013  */
1014 HWTEST_F(DeviceManagerServiceTest, RegisterCredentialCallback_001, testing::ext::TestSize.Level1)
1015 {
1016     const std::string pkgName = "pkgNametest";
1017     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1018     int32_t ret = DeviceManagerService::GetInstance().RegisterCredentialCallback(pkgName);
1019     EXPECT_EQ(ret, DM_OK);
1020 }
1021 
1022 /**
1023  * @tc.name: RegisterCredentialCallback_002
1024  * @tc.desc: The return value is ERR_DM_INPUT_PARA_INVALID
1025  * @tc.type: FUNC
1026  * @tc.require: AR000GHSJK
1027  */
1028 HWTEST_F(DeviceManagerServiceTest, RegisterCredentialCallback_002, testing::ext::TestSize.Level1)
1029 {
1030     const std::string pkgName = "";
1031     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1032     int32_t ret = DeviceManagerService::GetInstance().RegisterCredentialCallback(pkgName);
1033     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1034 }
1035 
1036 /**
1037  * @tc.name: RegisterCredentialCallback_003
1038  * @tc.desc: The return value is ERR_DM_NO_PERMISSION
1039  * @tc.type: FUNC
1040  * @tc.require: AR000GHSJK
1041  */
1042 HWTEST_F(DeviceManagerServiceTest, RegisterCredentialCallback_003, testing::ext::TestSize.Level1)
1043 {
1044     const std::string pkgName = "pkgNametest";
1045     DeletePermission();
1046     int32_t ret = DeviceManagerService::GetInstance().RegisterCredentialCallback(pkgName);
1047     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1048 }
1049 
1050 /**
1051  * @tc.name: UnRegisterCredentialCallback_001
1052  * @tc.desc:The return value is DM_OK
1053  * @tc.type: FUNC
1054  * @tc.require: AR000GHSJK
1055  */
1056 HWTEST_F(DeviceManagerServiceTest, UnRegisterCredentialCallback_001, testing::ext::TestSize.Level1)
1057 {
1058     const std::string pkgName = "pkgNametest";
1059     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1060     int32_t ret = DeviceManagerService::GetInstance().UnRegisterCredentialCallback(pkgName);
1061     EXPECT_EQ(ret, DM_OK);
1062 }
1063 
1064 /**
1065  * @tc.name: UnRegisterCredentialCallback_002
1066  * @tc.desc:The return value is ERR_DM_INPUT_PARA_INVALID
1067  * @tc.type: FUNC
1068  * @tc.require: AR000GHSJK
1069  */
1070 HWTEST_F(DeviceManagerServiceTest, UnRegisterCredentialCallback_002, testing::ext::TestSize.Level1)
1071 {
1072     const std::string pkgName = "";
1073     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1074     int32_t ret = DeviceManagerService::GetInstance().UnRegisterCredentialCallback(pkgName);
1075     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1076 }
1077 
1078 /**
1079  * @tc.name: UnRegisterCredentialCallback_003
1080  * @tc.desc:The return value is ERR_DM_NO_PERMISSION
1081  * @tc.type: FUNC
1082  * @tc.require: AR000GHSJK
1083  */
1084 HWTEST_F(DeviceManagerServiceTest, UnRegisterCredentialCallback_003, testing::ext::TestSize.Level1)
1085 {
1086     const std::string pkgName = "pkgNametest";
1087     DeletePermission();
1088     int32_t ret = DeviceManagerService::GetInstance().UnRegisterCredentialCallback(pkgName);
1089     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1090 }
1091 
1092 /**
1093  * @tc.name: UninitSoftbusListener_001
1094  * @tc.desc: DeviceManagerService::GetInstance().softbusListener_ is nullptr
1095  * @tc.type: FUNC
1096  * @tc.require: AR000GHSJK
1097  */
1098 HWTEST_F(DeviceManagerServiceTest, UninitSoftbusListener_001, testing::ext::TestSize.Level1)
1099 {
1100     DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
1101     DeviceManagerService::GetInstance().UninitSoftbusListener();
1102     EXPECT_EQ(DeviceManagerService::GetInstance().softbusListener_, nullptr);
1103 }
1104 
1105 /**
1106  * @tc.name: UninitDMServiceListener_001
1107  * @tc.desc: DeviceManagerService::GetInstance().listener_ is nullptr
1108  * @tc.type: FUNC
1109  * @tc.require: AR000GHSJK
1110  */
1111 HWTEST_F(DeviceManagerServiceTest, UninitDMServiceListener_001, testing::ext::TestSize.Level1)
1112 {
1113     DeviceManagerService::GetInstance().listener_ = std::make_shared<DeviceManagerServiceListener>();
1114     DeviceManagerService::GetInstance().UninitDMServiceListener();
1115     EXPECT_EQ(DeviceManagerService::GetInstance().listener_, nullptr);
1116 }
1117 
1118 /**
1119  * @tc.name: IsDMServiceImplReady_001
1120  * @tc.desc: The return value is true
1121  * @tc.type: FUNC
1122  * @tc.require: AR000GHSJK
1123  */
1124 HWTEST_F(DeviceManagerServiceTest, IsDMServiceImplReady_001, testing::ext::TestSize.Level1)
1125 {
1126     DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1127     bool ret = DeviceManagerService::GetInstance().IsDMServiceImplReady();
1128     EXPECT_EQ(ret, true);
1129 }
1130 
1131 /**
1132  * @tc.name: GetDeviceInfo_001
1133  * @tc.desc: The return value is ERR_DM_INPUT_PARA_INVALID
1134  * @tc.type: FUNC
1135  * @tc.require: AR000GHSJK
1136  */
1137 HWTEST_F(DeviceManagerServiceTest, GetDeviceInfo_001, testing::ext::TestSize.Level1)
1138 {
1139     std::string networkId = "";
1140     DmDeviceInfo info;
1141     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1142     int32_t ret = DeviceManagerService::GetInstance().GetDeviceInfo(networkId, info);
1143     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1144 }
1145 
1146 /**
1147  * @tc.name: GetDeviceInfo_002
1148  * @tc.desc: The return value is DM_OK
1149  * @tc.type: FUNC
1150  * @tc.require: AR000GHSJK
1151  */
1152 HWTEST_F(DeviceManagerServiceTest, GetDeviceInfo_002, testing::ext::TestSize.Level1)
1153 {
1154     std::string networkId = "networkIdTest";
1155     DmDeviceInfo info;
1156     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1157     int32_t ret = DeviceManagerService::GetInstance().GetDeviceInfo(networkId, info);
1158     EXPECT_EQ(ret, ERR_DM_POINT_NULL);
1159 }
1160 
1161 /**
1162  * @tc.name: GetDeviceInfo_004
1163  * @tc.desc: The return value is DM_OK
1164  * @tc.type: FUNC
1165  * @tc.require: AR000GHSJK
1166  */
1167 HWTEST_F(DeviceManagerServiceTest, GetDeviceInfo_004, testing::ext::TestSize.Level1)
1168 {
1169     std::string networkId = "networkIdTest4";
1170     DmDeviceInfo info;
1171     DeletePermission();
1172     int32_t ret = DeviceManagerService::GetInstance().GetDeviceInfo(networkId, info);
1173     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1174 }
1175 
1176 /**
1177  * @tc.name: CheckApiPermission_001
1178  * @tc.desc: The return value is DM_OK
1179  * @tc.type: FUNC
1180  */
1181 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_001, testing::ext::TestSize.Level1)
1182 {
1183     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1184     int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(0);
1185     EXPECT_EQ(ret, DM_OK);
1186 }
1187 
1188 /**
1189  * @tc.name: RegisterCallerAppId_001
1190  * @tc.desc: Set pkgName null
1191  * @tc.type: FUNC
1192  */
1193 HWTEST_F(DeviceManagerServiceTest, RegisterCallerAppId_001, testing::ext::TestSize.Level1)
1194 {
1195     std::string pkgName;
1196     DeviceManagerService::GetInstance().RegisterCallerAppId(pkgName);
1197     EXPECT_NE(DeviceManagerService::GetInstance().listener_, nullptr);
1198 }
1199 
1200 /**
1201  * @tc.name: RegisterCallerAppId_002
1202  * @tc.desc: Set pkgName null
1203  * @tc.type: FUNC
1204  */
1205 HWTEST_F(DeviceManagerServiceTest, RegisterCallerAppId_002, testing::ext::TestSize.Level1)
1206 {
1207     std::string pkgName;
1208     DeviceManagerService::GetInstance().listener_ = nullptr;
1209     DeviceManagerService::GetInstance().RegisterCallerAppId(pkgName);
1210     EXPECT_EQ(DeviceManagerService::GetInstance().listener_, nullptr);
1211 }
1212 
1213 /**
1214  * @tc.name: UnRegisterDeviceManagerListener_001
1215  * @tc.desc: Set pkgName null
1216  * @tc.type: FUNC
1217  */
1218 HWTEST_F(DeviceManagerServiceTest, UnRegisterCallerAppId_001, testing::ext::TestSize.Level1)
1219 {
1220     std::string pkgName;
1221     DeviceManagerService::GetInstance().UnRegisterCallerAppId(pkgName);
1222     EXPECT_EQ(DeviceManagerService::GetInstance().listener_, nullptr);
1223 }
1224 
1225 /**
1226  * @tc.name: UnRegisterDeviceManagerListener_002
1227  * @tc.desc: Set pkgName null
1228  * @tc.type: FUNC
1229  */
1230 HWTEST_F(DeviceManagerServiceTest, UnRegisterCallerAppId_002, testing::ext::TestSize.Level1)
1231 {
1232     std::string pkgName;
1233     DeviceManagerService::GetInstance().listener_ = nullptr;
1234     DeviceManagerService::GetInstance().UnRegisterCallerAppId(pkgName);
1235     EXPECT_EQ(DeviceManagerService::GetInstance().listener_, nullptr);
1236 }
1237 
1238 HWTEST_F(DeviceManagerServiceTest, BindDevice_001, testing::ext::TestSize.Level1)
1239 {
1240     std::string pkgName;
1241     int32_t authType = 1;
1242     std::string deviceId;
1243     std::string bindParam;
1244     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1245     int32_t ret = DeviceManagerService::GetInstance().BindDevice(pkgName, authType, deviceId, bindParam);
1246     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1247 }
1248 
1249 HWTEST_F(DeviceManagerServiceTest, BindDevice_002, testing::ext::TestSize.Level1)
1250 {
1251     std::string pkgName = "com.ohos.test";
1252     int32_t authType = 1;
1253     std::string deviceId;
1254     std::string bindParam;
1255     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1256     int32_t ret = DeviceManagerService::GetInstance().BindDevice(pkgName, authType, deviceId, bindParam);
1257     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1258 }
1259 
1260 HWTEST_F(DeviceManagerServiceTest, BindDevice_003, testing::ext::TestSize.Level1)
1261 {
1262     std::string pkgName = "com.ohos.test";
1263     int32_t authType = 1;
1264     std::string deviceId = "1234";
1265     std::string bindParam;
1266     EXPECT_CALL(*kVAdapterManagerMock_, Get(_, _)).WillOnce(Return(ERR_DM_FAILED));
1267     EXPECT_CALL(*softbusListenerMock_,
1268         GetTargetInfoFromCache(_, _, _)).WillOnce(Return(ERR_DM_BIND_INPUT_PARA_INVALID));
1269     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1270     int32_t ret = DeviceManagerService::GetInstance().BindDevice(pkgName, authType, deviceId, bindParam);
1271     EXPECT_EQ(ret, ERR_DM_BIND_INPUT_PARA_INVALID);
1272 }
1273 
1274 HWTEST_F(DeviceManagerServiceTest, BindDevice_004, testing::ext::TestSize.Level1)
1275 {
1276     std::string pkgName = "com.ohos.test";
1277     int32_t authType = 1;
1278     std::string deviceId = "1234";
1279     std::string bindParam;
1280     DeletePermission();
1281     int32_t ret = DeviceManagerService::GetInstance().BindDevice(pkgName, authType, deviceId, bindParam);
1282     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1283 }
1284 
1285 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_001, testing::ext::TestSize.Level1)
1286 {
1287     std::string pkgName = "com.ohos.test";
1288     std::string deviceId = "1234";
1289     DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
1290     EXPECT_CALL(*kVAdapterManagerMock_, Get(_, _)).WillOnce(Return(ERR_DM_FAILED));
1291     EXPECT_CALL(*softbusListenerMock_, GetUdidFromDp(_, _)).WillOnce(Return(ERR_DM_FAILED));
1292     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1293     int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId);
1294     EXPECT_NE(ret, DM_OK);
1295     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
1296 }
1297 
1298 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_002, testing::ext::TestSize.Level1)
1299 {
1300     std::string pkgName = "com.ohos.test";
1301     std::string deviceId;
1302     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1303     int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId);
1304     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1305 }
1306 
1307 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_003, testing::ext::TestSize.Level1)
1308 {
1309     std::string pkgName;
1310     std::string deviceId = "1234";
1311     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1312     int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId);
1313     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1314 }
1315 
1316 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_004, testing::ext::TestSize.Level1)
1317 {
1318     std::string pkgName = "com.ohos.test";
1319     std::string deviceId = "1234";
1320     DeletePermission();
1321     int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId);
1322     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1323 }
1324 
1325 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_005, testing::ext::TestSize.Level1)
1326 {
1327     std::string pkgName = "com.ohos.test";
1328     std::string deviceId = "1234";
1329     std::string extra = "extra";
1330     DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
1331     EXPECT_CALL(*kVAdapterManagerMock_, Get(_, _)).WillOnce(Return(ERR_DM_FAILED));
1332     EXPECT_CALL(*softbusListenerMock_, GetUdidFromDp(_, _)).WillOnce(Return(ERR_DM_FAILED));
1333     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1334     int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId, extra);
1335     EXPECT_EQ(ret, ERR_DM_FAILED);
1336     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
1337 }
1338 
1339 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_006, testing::ext::TestSize.Level1)
1340 {
1341     std::string pkgName = "com.ohos.test";
1342     std::string deviceId;
1343     std::string extra = "extra";
1344     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1345     int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId, extra);
1346     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1347 }
1348 
1349 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_007, testing::ext::TestSize.Level1)
1350 {
1351     std::string pkgName;
1352     std::string deviceId = "1234";
1353     std::string extra = "extra";
1354     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1355     int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId, extra);
1356     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1357 }
1358 
1359 HWTEST_F(DeviceManagerServiceTest, UnBindDevice_008, testing::ext::TestSize.Level1)
1360 {
1361     std::string pkgName = "com.ohos.test";
1362     std::string deviceId = "1234";
1363     std::string extra = "extra";
1364     DeletePermission();
1365     int32_t ret = DeviceManagerService::GetInstance().UnBindDevice(pkgName, deviceId, extra);
1366     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1367 }
1368 
1369 HWTEST_F(DeviceManagerServiceTest, OnSessionOpened_001, testing::ext::TestSize.Level1)
1370 {
1371     DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1372     int sessionId = 0;
1373     int result = 0;
1374     void *data = nullptr;
1375     unsigned int dataLen = 0;
1376     int ret = DeviceManagerService::GetInstance().OnSessionOpened(sessionId, result);
1377     DeviceManagerService::GetInstance().OnBytesReceived(sessionId, data, dataLen);
1378     DeviceManagerService::GetInstance().OnSessionClosed(sessionId);
1379     EXPECT_NE(ret, ERR_DM_NOT_INIT);
1380 }
1381 
1382 HWTEST_F(DeviceManagerServiceTest, MineRequestCredential_001, testing::ext::TestSize.Level1)
1383 {
1384     DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1385     std::string pkgName;
1386     std::string returnJsonStr;
1387     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1388     int32_t ret = DeviceManagerService::GetInstance().MineRequestCredential(pkgName, returnJsonStr);
1389     EXPECT_EQ(ret, DM_OK);
1390 }
1391 
1392 HWTEST_F(DeviceManagerServiceTest, MineRequestCredential_002, testing::ext::TestSize.Level1)
1393 {
1394     std::string pkgName;
1395     std::string returnJsonStr;
1396     DeletePermission();
1397     int32_t ret = DeviceManagerService::GetInstance().MineRequestCredential(pkgName, returnJsonStr);
1398     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1399 }
1400 
1401 HWTEST_F(DeviceManagerServiceTest, CheckCredential_001, testing::ext::TestSize.Level1)
1402 {
1403     std::string pkgName;
1404     std::string returnJsonStr;
1405     std::string reqJsonStr;
1406     int32_t ret = DeviceManagerService::GetInstance().CheckCredential(pkgName, reqJsonStr, returnJsonStr);
1407     EXPECT_NE(ret, DM_OK);
1408 }
1409 
1410 HWTEST_F(DeviceManagerServiceTest, CheckCredential_002, testing::ext::TestSize.Level1)
1411 {
1412     DeletePermission();
1413     std::string pkgName;
1414     std::string returnJsonStr;
1415     std::string reqJsonStr;
1416     int32_t ret = DeviceManagerService::GetInstance().CheckCredential(pkgName, reqJsonStr, returnJsonStr);
1417     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1418 }
1419 
1420 HWTEST_F(DeviceManagerServiceTest, ImportCredential_004, testing::ext::TestSize.Level1)
1421 {
1422     DeletePermission();
1423     DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1424     std::string pkgName;
1425     std::string returnJsonStr;
1426     std::string reqJsonStr;
1427     int32_t ret = DeviceManagerService::GetInstance().ImportCredential(pkgName, reqJsonStr, returnJsonStr);
1428     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1429 }
1430 
1431 HWTEST_F(DeviceManagerServiceTest, ImportCredential_005, testing::ext::TestSize.Level1)
1432 {
1433     DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1434     std::string pkgName;
1435     std::string returnJsonStr;
1436     std::string reqJsonStr;
1437     int32_t ret = DeviceManagerService::GetInstance().ImportCredential(pkgName, reqJsonStr, returnJsonStr);
1438     EXPECT_NE(ret, DM_OK);
1439 }
1440 
1441 HWTEST_F(DeviceManagerServiceTest, DeleteCredential_004, testing::ext::TestSize.Level1)
1442 {
1443     DeletePermission();
1444     DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1445     std::string pkgName;
1446     std::string returnJsonStr;
1447     std::string reqJsonStr;
1448     int32_t ret = DeviceManagerService::GetInstance().DeleteCredential(pkgName, reqJsonStr, returnJsonStr);
1449     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1450 }
1451 
1452 HWTEST_F(DeviceManagerServiceTest, DeleteCredential_005, testing::ext::TestSize.Level1)
1453 {
1454     DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1455     std::string pkgName;
1456     std::string returnJsonStr;
1457     std::string reqJsonStr;
1458     int32_t ret = DeviceManagerService::GetInstance().DeleteCredential(pkgName, reqJsonStr, returnJsonStr);
1459     EXPECT_NE(ret, DM_OK);
1460 }
1461 
1462 HWTEST_F(DeviceManagerServiceTest, RegisterUiStateCallback_001, testing::ext::TestSize.Level1)
1463 {
1464     std::string pkgName;
1465     int32_t ret = DeviceManagerService::GetInstance().RegisterUiStateCallback(pkgName);
1466     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1467 }
1468 
1469 HWTEST_F(DeviceManagerServiceTest, RegisterUiStateCallback_002, testing::ext::TestSize.Level1)
1470 {
1471     std::string pkgName = "pkgName";
1472     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1473     int32_t ret = DeviceManagerService::GetInstance().RegisterUiStateCallback(pkgName);
1474     EXPECT_EQ(ret, DM_OK);
1475 }
1476 
1477 HWTEST_F(DeviceManagerServiceTest, RegisterUiStateCallback_003, testing::ext::TestSize.Level1)
1478 {
1479     std::string pkgName = "pkgName";
1480     DeletePermission();
1481     int32_t ret = DeviceManagerService::GetInstance().RegisterUiStateCallback(pkgName);
1482     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1483 }
1484 
1485 HWTEST_F(DeviceManagerServiceTest, UnRegisterUiStateCallback_001, testing::ext::TestSize.Level1)
1486 {
1487     std::string pkgName;
1488     int32_t ret = DeviceManagerService::GetInstance().UnRegisterUiStateCallback(pkgName);
1489     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1490 }
1491 
1492 HWTEST_F(DeviceManagerServiceTest, UnRegisterUiStateCallback_002, testing::ext::TestSize.Level1)
1493 {
1494     std::string pkgName = "pkgName";
1495     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1496     int32_t ret = DeviceManagerService::GetInstance().UnRegisterUiStateCallback(pkgName);
1497     EXPECT_EQ(ret, DM_OK);
1498 }
1499 
1500 HWTEST_F(DeviceManagerServiceTest, UnRegisterUiStateCallback_003, testing::ext::TestSize.Level1)
1501 {
1502     std::string pkgName = "pkgName";
1503     DeletePermission();
1504     int32_t ret = DeviceManagerService::GetInstance().UnRegisterUiStateCallback(pkgName);
1505     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1506 }
1507 
1508 HWTEST_F(DeviceManagerServiceTest, NotifyEvent_001, testing::ext::TestSize.Level1)
1509 {
1510     std::string pkgName;
1511     int32_t eventId = 0;
1512     std::string event;
1513     std::string msg = "";
1514     DeviceManagerService::GetInstance().HandleDeviceNotTrust(msg);
1515     msg =  R"(
1516     {
1517         "authType" : 1,
1518         "userId" : "123",
1519         "credentialData" : "cryptosupportData",
1520         "CRYPTOSUPPORT" : "cryptosupportTest",
1521         "credentialType" : 1,
1522         "credentialId" : "104",
1523         "NETWORK_ID" : "108",
1524         "authCode" : "1234567812345678123456781234567812345678123456781234567812345678",
1525         "serverPk" : "hello",
1526         "pkInfoSignature" : "world",
1527         "pkInfo" : "pkginfo",
1528         "peerDeviceId" : "3515656546"
1529     })";
1530     EXPECT_CALL(*softbusCacheMock_, GetUdidFromCache(_, _)).WillOnce(Return(DM_OK));
1531     DeviceManagerService::GetInstance().HandleDeviceNotTrust(msg);
1532     std::string commonEventType = "helloworld";
1533     DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
1534     DeviceManagerService::GetInstance().ScreenCommonEventCallback(commonEventType);
1535     int32_t ret = DeviceManagerService::GetInstance().NotifyEvent(pkgName, eventId, event);
1536     EXPECT_NE(ret, DM_OK);
1537 }
1538 
1539 HWTEST_F(DeviceManagerServiceTest, NotifyEvent_002, testing::ext::TestSize.Level1)
1540 {
1541     DeletePermission();
1542     std::string pkgName;
1543     int32_t eventId = 0;
1544     std::string event;
1545     int32_t ret = DeviceManagerService::GetInstance().NotifyEvent(pkgName, eventId, event);
1546     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1547 }
1548 
1549 HWTEST_F(DeviceManagerServiceTest, NotifyEvent_003, testing::ext::TestSize.Level1)
1550 {
1551     std::string pkgName;
1552     int32_t eventId = DM_NOTIFY_EVENT_ON_PINHOLDER_EVENT;
1553     std::string event;
1554     DeviceManagerService::GetInstance().InitDMServiceListener();
1555     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1556     int32_t ret = DeviceManagerService::GetInstance().NotifyEvent(pkgName, eventId, event);
1557     EXPECT_EQ(ret, ERR_DM_FAILED);
1558     DeviceManagerService::GetInstance().UninitDMServiceListener();
1559 }
1560 
1561 HWTEST_F(DeviceManagerServiceTest, LoadHardwareFwkService_001, testing::ext::TestSize.Level1)
1562 {
1563     DeviceManagerService::GetInstance().LoadHardwareFwkService();
1564     EXPECT_EQ(DeviceManagerService::GetInstance().softbusListener_, nullptr);
1565 }
1566 
1567 HWTEST_F(DeviceManagerServiceTest, GetEncryptedUuidByNetworkId_001, testing::ext::TestSize.Level1)
1568 {
1569     std::string pkgName;
1570     std::string networkId;
1571     std::string uuid;
1572     int32_t ret = DeviceManagerService::GetInstance().GetEncryptedUuidByNetworkId(pkgName, networkId, uuid);
1573     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1574 }
1575 
1576 HWTEST_F(DeviceManagerServiceTest, GetEncryptedUuidByNetworkId_002, testing::ext::TestSize.Level1)
1577 {
1578     std::string pkgName = "pkgName";
1579     std::string networkId;
1580     std::string uuid;
1581     int32_t ret = DeviceManagerService::GetInstance().GetEncryptedUuidByNetworkId(pkgName, networkId, uuid);
1582     EXPECT_EQ(ret, ERR_DM_POINT_NULL);
1583 }
1584 
1585 HWTEST_F(DeviceManagerServiceTest, GetEncryptedUuidByNetworkId_003, testing::ext::TestSize.Level1)
1586 {
1587     std::string pkgName = "pkgName";
1588     std::string networkId = "network_id";
1589     std::string uuid = "13345689";
1590     if (DeviceManagerService::GetInstance().softbusListener_ == nullptr) {
1591         DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
1592     }
1593     EXPECT_CALL(*softbusListenerMock_, GetUuidByNetworkId(_, _)).WillOnce(Return(ERR_DM_FAILED));
1594     int32_t ret = DeviceManagerService::GetInstance().GetEncryptedUuidByNetworkId(pkgName, networkId, uuid);
1595     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
1596     EXPECT_EQ(ret, ERR_DM_FAILED);
1597 }
1598 
1599 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_002, testing::ext::TestSize.Level1)
1600 {
1601     DeletePermission();
1602     int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(0);
1603     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1604 }
1605 
1606 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_003, testing::ext::TestSize.Level1)
1607 {
1608     DeletePermission();
1609     int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(1);
1610     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1611 }
1612 
1613 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_004, testing::ext::TestSize.Level1)
1614 {
1615     DeletePermission();
1616     int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(2);
1617     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1618 }
1619 
1620 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_005, testing::ext::TestSize.Level1)
1621 {
1622     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1623     int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(1);
1624     EXPECT_EQ(ret, DM_OK);
1625 }
1626 
1627 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_006, testing::ext::TestSize.Level1)
1628 {
1629     int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(2);
1630     EXPECT_NE(ret, ERR_DM_FAILED);
1631 }
1632 
1633 HWTEST_F(DeviceManagerServiceTest, CheckApiPermission_007, testing::ext::TestSize.Level1)
1634 {
1635     int32_t ret = DeviceManagerService::GetInstance().CheckApiPermission(3);
1636     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1637 }
1638 
1639 HWTEST_F(DeviceManagerServiceTest, GetNetworkTypeByNetworkId_001, testing::ext::TestSize.Level1)
1640 {
1641     DeletePermission();
1642     std::string pkgName;
1643     std::string netWorkId;
1644     int32_t networkType = 0;
1645     int32_t ret = DeviceManagerService::GetInstance().GetNetworkTypeByNetworkId(pkgName, netWorkId, networkType);
1646     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1647 }
1648 
1649 HWTEST_F(DeviceManagerServiceTest, GetNetworkTypeByNetworkId_002, testing::ext::TestSize.Level1)
1650 {
1651     std::string pkgName;
1652     std::string netWorkId;
1653     int32_t networkType = 0;
1654     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1655     int32_t ret = DeviceManagerService::GetInstance().GetNetworkTypeByNetworkId(pkgName, netWorkId, networkType);
1656     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1657 }
1658 
1659 HWTEST_F(DeviceManagerServiceTest, GetNetworkTypeByNetworkId_003, testing::ext::TestSize.Level1)
1660 {
1661     std::string pkgName = "pkgName";
1662     std::string netWorkId = "netWorkId";
1663     int32_t networkType = 0;
1664     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1665     int32_t ret = DeviceManagerService::GetInstance().GetNetworkTypeByNetworkId(pkgName, netWorkId, networkType);
1666     EXPECT_EQ(ret, ERR_DM_POINT_NULL);
1667 }
1668 
1669 HWTEST_F(DeviceManagerServiceTest, GetNetworkTypeByNetworkId_004, testing::ext::TestSize.Level1)
1670 {
1671     std::string pkgName = "pkgName";
1672     std::string netWorkId = "netWorkId";
1673     int32_t networkType = 0;
1674     DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
1675     EXPECT_CALL(*softbusListenerMock_, GetNetworkTypeByNetworkId(_, _))
1676         .WillOnce(Return(ERR_DM_FAILED));
1677     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
1678     int32_t ret = DeviceManagerService::GetInstance().GetNetworkTypeByNetworkId(pkgName, netWorkId, networkType);
1679     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
1680     EXPECT_EQ(ret, ERR_DM_FAILED);
1681 }
1682 
1683 HWTEST_F(DeviceManagerServiceTest, ImportAuthCode_001, testing::ext::TestSize.Level1)
1684 {
1685     DeletePermission();
1686     std::string pkgName;
1687     std::string authCode;
1688     int32_t ret = DeviceManagerService::GetInstance().ImportAuthCode(pkgName, authCode);
1689     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1690 }
1691 
1692 HWTEST_F(DeviceManagerServiceTest, ImportAuthCode_002, testing::ext::TestSize.Level1)
1693 {
1694     std::string pkgName = "pkgName";
1695     std::string authCode = "authCode";
1696     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
1697     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1698     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnAuthCode(_)).WillOnce(Return(false));
1699     int32_t ret = DeviceManagerService::GetInstance().ImportAuthCode(pkgName, authCode);
1700     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1701 }
1702 
1703 HWTEST_F(DeviceManagerServiceTest, ExportAuthCode_001, testing::ext::TestSize.Level1)
1704 {
1705     DeletePermission();
1706     std::string authCode;
1707     int32_t ret = DeviceManagerService::GetInstance().ExportAuthCode(authCode);
1708     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1709 }
1710 
1711 HWTEST_F(DeviceManagerServiceTest, ExportAuthCode_002, testing::ext::TestSize.Level1)
1712 {
1713     std::string authCode = "authCode";
1714     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
1715     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1716     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnAuthCode(_)).WillOnce(Return(false));
1717     int32_t ret = DeviceManagerService::GetInstance().ExportAuthCode(authCode);
1718     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1719 }
1720 
1721 HWTEST_F(DeviceManagerServiceTest, UnloadDMServiceImplSo_001, testing::ext::TestSize.Level1)
1722 {
1723     DeviceManagerService::GetInstance().UnloadDMServiceImplSo();
1724     EXPECT_EQ(DeviceManagerService::GetInstance().softbusListener_, nullptr);
1725 }
1726 
1727 HWTEST_F(DeviceManagerServiceTest, StartDiscovering_001, testing::ext::TestSize.Level1)
1728 {
1729     DeletePermission();
1730     std::string pkgName;
1731     std::map<std::string, std::string> discoverParam;
1732     std::map<std::string, std::string> filterOptions;
1733     int32_t ret = DeviceManagerService::GetInstance().StartDiscovering(pkgName, discoverParam, filterOptions);
1734     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1735 }
1736 
1737 HWTEST_F(DeviceManagerServiceTest, StartDiscovering_002, testing::ext::TestSize.Level1)
1738 {
1739     std::string pkgName;
1740     std::map<std::string, std::string> discoverParam;
1741     std::map<std::string, std::string> filterOptions;
1742     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1743     int32_t ret = DeviceManagerService::GetInstance().StartDiscovering(pkgName, discoverParam, filterOptions);
1744     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1745 }
1746 
1747 HWTEST_F(DeviceManagerServiceTest, StartDiscovering_003, testing::ext::TestSize.Level1)
1748 {
1749     std::string pkgName = "pkgName";
1750     std::map<std::string, std::string> discoverParam;
1751     std::map<std::string, std::string> filterOptions;
1752     DeviceManagerService::GetInstance().InitDMServiceListener();
1753     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillRepeatedly(Return(true));
1754     int32_t ret = DeviceManagerService::GetInstance().StartDiscovering(pkgName, discoverParam, filterOptions);
1755     EXPECT_TRUE(ret == SOFTBUS_IPC_ERR || ret == DM_OK || ret == SOFTBUS_DISCOVER_MANAGER_INNERFUNCTION_FAIL);
1756     ret = DeviceManagerService::GetInstance().StopDiscovering(pkgName, discoverParam);
1757     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1758     DeviceManagerService::GetInstance().UninitDMServiceListener();
1759 }
1760 
1761 HWTEST_F(DeviceManagerServiceTest, StartDiscovering_004, testing::ext::TestSize.Level1)
1762 {
1763     std::string pkgName = "pkgName";
1764     std::map<std::string, std::string> discoverParam;
1765     discoverParam[PARAM_KEY_META_TYPE] = "metaType";
1766     discoverParam[PARAM_KEY_SUBSCRIBE_ID] = "123456";
1767     discoverParam[PARAM_KEY_DISC_MEDIUM] =
1768         std::to_string(static_cast<int32_t>(DmExchangeMedium::DM_AUTO));
1769     discoverParam[PARAM_KEY_DISC_FREQ] =
1770         std::to_string(static_cast<int32_t>(DmExchangeFreq::DM_LOW));
1771     std::map<std::string, std::string> filterOptions;
1772     DeviceManagerService::GetInstance().InitDMServiceListener();
1773     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillRepeatedly(Return(true));
1774     int32_t ret = DeviceManagerService::GetInstance().StartDiscovering(pkgName, discoverParam, filterOptions);
1775     EXPECT_TRUE(ret == SOFTBUS_IPC_ERR || ret == DM_OK || ret == SOFTBUS_DISCOVER_MANAGER_INNERFUNCTION_FAIL);
1776     DeviceManagerService::GetInstance().StopDiscovering(pkgName, discoverParam);
1777     DeviceManagerService::GetInstance().UninitDMServiceListener();
1778 }
1779 
1780 HWTEST_F(DeviceManagerServiceTest, StopDiscovering_001, testing::ext::TestSize.Level1)
1781 {
1782     DeletePermission();
1783     std::string pkgName;
1784     std::map<std::string, std::string> discoverParam;
1785     int32_t ret = DeviceManagerService::GetInstance().StopDiscovering(pkgName, discoverParam);
1786     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1787 }
1788 
1789 HWTEST_F(DeviceManagerServiceTest, StopDiscovering_002, testing::ext::TestSize.Level1)
1790 {
1791     std::string pkgName;
1792     std::map<std::string, std::string> discoverParam;
1793     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1794     int32_t ret = DeviceManagerService::GetInstance().StopDiscovering(pkgName, discoverParam);
1795     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1796 }
1797 
1798 HWTEST_F(DeviceManagerServiceTest, StopDiscovering_003, testing::ext::TestSize.Level1)
1799 {
1800     std::string pkgName = "pkgName";
1801     std::map<std::string, std::string> discoverParam;
1802     DeviceManagerService::GetInstance().InitDMServiceListener();
1803     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1804     int32_t ret = DeviceManagerService::GetInstance().StopDiscovering(pkgName, discoverParam);
1805     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1806     DeviceManagerService::GetInstance().UninitDMServiceListener();
1807 }
1808 
1809 HWTEST_F(DeviceManagerServiceTest, EnableDiscoveryListener_001, testing::ext::TestSize.Level1)
1810 {
1811     DeletePermission();
1812     std::string pkgName;
1813     std::map<std::string, std::string> discoverParam;
1814     std::map<std::string, std::string> filterOptions;
1815     int32_t ret = DeviceManagerService::GetInstance().EnableDiscoveryListener(pkgName, discoverParam, filterOptions);
1816     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1817 }
1818 
1819 HWTEST_F(DeviceManagerServiceTest, EnableDiscoveryListener_002, testing::ext::TestSize.Level1)
1820 {
1821     std::string pkgName;
1822     std::map<std::string, std::string> discoverParam;
1823     std::map<std::string, std::string> filterOptions;
1824     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1825     int32_t ret = DeviceManagerService::GetInstance().EnableDiscoveryListener(pkgName, discoverParam, filterOptions);
1826     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1827 }
1828 
1829 HWTEST_F(DeviceManagerServiceTest, EnableDiscoveryListener_003, testing::ext::TestSize.Level1)
1830 {
1831     std::string pkgName = "pkgName";
1832     std::map<std::string, std::string> discoverParam;
1833     std::map<std::string, std::string> filterOptions;
1834     int32_t ret = DeviceManagerService::GetInstance().EnableDiscoveryListener(pkgName, discoverParam, filterOptions);
1835     EXPECT_NE(ret, DM_OK);
1836 }
1837 
1838 HWTEST_F(DeviceManagerServiceTest, EnableDiscoveryListener_004, testing::ext::TestSize.Level1)
1839 {
1840     std::string pkgName = "pkgName";
1841     std::map<std::string, std::string> discoverParam;
1842     std::map<std::string, std::string> filterOptions;
1843     DeviceManagerService::GetInstance().InitDMServiceListener();
1844     int32_t ret = DeviceManagerService::GetInstance().EnableDiscoveryListener(pkgName, discoverParam, filterOptions);
1845     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1846     DeviceManagerService::GetInstance().UninitDMServiceListener();
1847 }
1848 
1849 HWTEST_F(DeviceManagerServiceTest, DisableDiscoveryListener_001, testing::ext::TestSize.Level1)
1850 {
1851     DeletePermission();
1852     std::string pkgName;
1853     std::map<std::string, std::string> extraParam;
1854     int32_t ret = DeviceManagerService::GetInstance().DisableDiscoveryListener(pkgName, extraParam);
1855     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1856 }
1857 
1858 HWTEST_F(DeviceManagerServiceTest, DisableDiscoveryListener_002, testing::ext::TestSize.Level1)
1859 {
1860     std::string pkgName;
1861     std::map<std::string, std::string> extraParam;
1862     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1863     int32_t ret = DeviceManagerService::GetInstance().DisableDiscoveryListener(pkgName, extraParam);
1864     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1865 }
1866 
1867 HWTEST_F(DeviceManagerServiceTest, DisableDiscoveryListener_003, testing::ext::TestSize.Level1)
1868 {
1869     std::string pkgName = "pkgName";
1870     std::map<std::string, std::string> extraParam;
1871     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1872     int32_t ret = DeviceManagerService::GetInstance().DisableDiscoveryListener(pkgName, extraParam);
1873     EXPECT_EQ(ret, ERR_DM_POINT_NULL);
1874 }
1875 
1876 HWTEST_F(DeviceManagerServiceTest, DisableDiscoveryListener_004, testing::ext::TestSize.Level1)
1877 {
1878     std::string pkgName = "pkgName";
1879     std::map<std::string, std::string> extraParam;
1880     DeviceManagerService::GetInstance().InitDMServiceListener();
1881     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1882     int32_t ret = DeviceManagerService::GetInstance().DisableDiscoveryListener(pkgName, extraParam);
1883     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1884     DeviceManagerService::GetInstance().UninitDMServiceListener();
1885 }
1886 
1887 HWTEST_F(DeviceManagerServiceTest, StartAdvertising_001, testing::ext::TestSize.Level1)
1888 {
1889     DeletePermission();
1890     std::string pkgName;
1891     std::map<std::string, std::string> advertiseParam;
1892     int32_t ret = DeviceManagerService::GetInstance().StartAdvertising(pkgName, advertiseParam);
1893     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1894 }
1895 
1896 HWTEST_F(DeviceManagerServiceTest, StartAdvertising_002, testing::ext::TestSize.Level1)
1897 {
1898     std::string pkgName;
1899     std::map<std::string, std::string> advertiseParam;
1900     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1901     int32_t ret = DeviceManagerService::GetInstance().StartAdvertising(pkgName, advertiseParam);
1902     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1903 }
1904 
1905 HWTEST_F(DeviceManagerServiceTest, StartAdvertising_003, testing::ext::TestSize.Level1)
1906 {
1907     std::string pkgName = "com.ohos.test";
1908     std::map<std::string, std::string> advertiseParam;
1909     advertiseParam[PARAM_KEY_META_TYPE] = "metaType";
1910     advertiseParam[PARAM_KEY_PUBLISH_ID] = "123456";
1911     advertiseParam[PARAM_KEY_DISC_MODE] =
1912         std::to_string(static_cast<int32_t>(DmDiscoverMode::DM_DISCOVER_MODE_PASSIVE));
1913     DeviceManagerService::GetInstance().InitDMServiceListener();
1914     int32_t ret = DeviceManagerService::GetInstance().StartAdvertising(pkgName, advertiseParam);
1915     EXPECT_NE(ret, ERR_DM_FAILED);
1916     DeviceManagerService::GetInstance().UninitDMServiceListener();
1917 }
1918 
1919 HWTEST_F(DeviceManagerServiceTest, StopAdvertising_001, testing::ext::TestSize.Level1)
1920 {
1921     DeletePermission();
1922     std::string pkgName;
1923     std::map<std::string, std::string> advertiseParam;
1924     int32_t ret = DeviceManagerService::GetInstance().StopAdvertising(pkgName, advertiseParam);
1925     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1926 }
1927 
1928 HWTEST_F(DeviceManagerServiceTest, StopAdvertising_002, testing::ext::TestSize.Level1)
1929 {
1930     std::string pkgName;
1931     std::map<std::string, std::string> advertiseParam;
1932     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1933     int32_t ret = DeviceManagerService::GetInstance().StopAdvertising(pkgName, advertiseParam);
1934     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1935 }
1936 
1937 HWTEST_F(DeviceManagerServiceTest, StopAdvertising_003, testing::ext::TestSize.Level1)
1938 {
1939     std::string pkgName = "pkgName";
1940     std::map<std::string, std::string> advertiseParam;
1941     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1942     int32_t ret = DeviceManagerService::GetInstance().StopAdvertising(pkgName, advertiseParam);
1943     EXPECT_EQ(ret, ERR_DM_POINT_NULL);
1944 }
1945 
1946 HWTEST_F(DeviceManagerServiceTest, StopAdvertising_004, testing::ext::TestSize.Level1)
1947 {
1948     std::string pkgName = "StopAdvertising_004";
1949     std::map<std::string, std::string> advertiseParam;
1950     DeviceManagerService::GetInstance().InitDMServiceListener();
1951     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1952     int32_t ret = DeviceManagerService::GetInstance().StopAdvertising(pkgName, advertiseParam);
1953     EXPECT_TRUE(ret == SOFTBUS_DISCOVER_COAP_STOP_PUBLISH_FAIL || ret == SOFTBUS_ERR ||
1954                 ret == ERR_DM_INPUT_PARA_INVALID);
1955     DeviceManagerService::GetInstance().UninitDMServiceListener();
1956 }
1957 
1958 HWTEST_F(DeviceManagerServiceTest, StopAdvertising_005, testing::ext::TestSize.Level1)
1959 {
1960     std::string pkgName = "StopAdvertising_005";
1961     std::map<std::string, std::string> advertiseParam;
1962     std::string key = PARAM_KEY_META_TYPE;
1963     std::string value = "125";
1964     advertiseParam.insert(std::make_pair(key, value));
1965     key = PARAM_KEY_PUBLISH_ID;
1966     value = "128";
1967     advertiseParam.insert(std::make_pair(key, value));
1968     DeviceManagerService::GetInstance().InitDMServiceListener();
1969     int32_t ret = DeviceManagerService::GetInstance().StopAdvertising(pkgName, advertiseParam);
1970     EXPECT_NE(ret, DM_OK);
1971     DeviceManagerService::GetInstance().UninitDMServiceListener();
1972 }
1973 
1974 HWTEST_F(DeviceManagerServiceTest, BindTarget_004, testing::ext::TestSize.Level1)
1975 {
1976     DeletePermission();
1977     std::string pkgName;
1978     PeerTargetId targetId;
1979     std::map<std::string, std::string> bindParam;
1980     int32_t ret = DeviceManagerService::GetInstance().BindTarget(pkgName, targetId, bindParam);
1981     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
1982 }
1983 
1984 HWTEST_F(DeviceManagerServiceTest, BindTarget_005, testing::ext::TestSize.Level1)
1985 {
1986     std::string pkgName;
1987     PeerTargetId targetId;
1988     std::map<std::string, std::string> bindParam;
1989     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
1990     int32_t ret = DeviceManagerService::GetInstance().BindTarget(pkgName, targetId, bindParam);
1991     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
1992 }
1993 
1994 HWTEST_F(DeviceManagerServiceTest, BindTarget_006, testing::ext::TestSize.Level1)
1995 {
1996     std::string pkgName = "pkgName";
1997     PeerTargetId targetId;
1998     std::map<std::string, std::string> bindParam;
1999     targetId.wifiIp = "";
2000     DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
2001     DeviceManagerService::GetInstance().dmServiceImpl_ = nullptr;
2002     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2003     int32_t ret = DeviceManagerService::GetInstance().BindTarget(pkgName, targetId, bindParam);
2004     EXPECT_EQ(ret, DM_OK);
2005 }
2006 
2007 HWTEST_F(DeviceManagerServiceTest, UnbindTarget_004, testing::ext::TestSize.Level1)
2008 {
2009     DeletePermission();
2010     std::string pkgName;
2011     PeerTargetId targetId;
2012     std::map<std::string, std::string> unbindParam;
2013     int32_t ret = DeviceManagerService::GetInstance().UnbindTarget(pkgName, targetId, unbindParam);
2014     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2015 }
2016 
2017 HWTEST_F(DeviceManagerServiceTest, UnbindTarget_005, testing::ext::TestSize.Level1)
2018 {
2019     std::string pkgName;
2020     PeerTargetId targetId;
2021     std::map<std::string, std::string> unbindParam;
2022     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2023     int32_t ret = DeviceManagerService::GetInstance().UnbindTarget(pkgName, targetId, unbindParam);
2024     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2025 }
2026 
2027 HWTEST_F(DeviceManagerServiceTest, UnbindTarget_006, testing::ext::TestSize.Level1)
2028 {
2029     std::string pkgName = "pkgName";
2030     PeerTargetId targetId;
2031     std::map<std::string, std::string> unbindParam;
2032     int32_t ret = DeviceManagerService::GetInstance().UnbindTarget(pkgName, targetId, unbindParam);
2033     EXPECT_NE(ret, DM_OK);
2034 }
2035 
2036 HWTEST_F(DeviceManagerServiceTest, RegisterPinHolderCallback_001, testing::ext::TestSize.Level1)
2037 {
2038     DeletePermission();
2039     std::string pkgName;
2040     int32_t ret = DeviceManagerService::GetInstance().RegisterPinHolderCallback(pkgName);
2041     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2042 }
2043 
2044 HWTEST_F(DeviceManagerServiceTest, RegisterPinHolderCallback_002, testing::ext::TestSize.Level1)
2045 {
2046     std::string pkgName = "pkgName";
2047     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2048     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(false));
2049     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2050     int32_t ret = DeviceManagerService::GetInstance().RegisterPinHolderCallback(pkgName);
2051     EXPECT_NE(ret, DM_OK);
2052 }
2053 
2054 HWTEST_F(DeviceManagerServiceTest, CreatePinHolder_001, testing::ext::TestSize.Level1)
2055 {
2056     DeletePermission();
2057     std::string pkgName;
2058     PeerTargetId targetId;
2059     DmPinType pinType = DmPinType::QR_CODE;
2060     std::string payload;
2061     int32_t ret = DeviceManagerService::GetInstance().CreatePinHolder(pkgName, targetId, pinType, payload);
2062     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2063 }
2064 
2065 HWTEST_F(DeviceManagerServiceTest, CreatePinHolder_002, testing::ext::TestSize.Level1)
2066 {
2067     std::string pkgName = "pkgName";
2068     PeerTargetId targetId;
2069     DmPinType pinType = DmPinType::QR_CODE;
2070     std::string payload;
2071     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2072     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(false));
2073     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2074     int32_t ret = DeviceManagerService::GetInstance().CreatePinHolder(pkgName, targetId, pinType, payload);
2075     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2076 }
2077 
2078 HWTEST_F(DeviceManagerServiceTest, DestroyPinHolder_001, testing::ext::TestSize.Level1)
2079 {
2080     DeletePermission();
2081     std::string pkgName;
2082     PeerTargetId targetId;
2083     DmPinType pinType = DmPinType::QR_CODE;
2084     std::string payload;
2085     int32_t ret = DeviceManagerService::GetInstance().DestroyPinHolder(pkgName, targetId, pinType, payload);
2086     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2087 }
2088 
2089 HWTEST_F(DeviceManagerServiceTest, DestroyPinHolder_002, testing::ext::TestSize.Level1)
2090 {
2091     std::string pkgName = "pkgName";
2092     PeerTargetId targetId;
2093     DmPinType pinType = DmPinType::QR_CODE;
2094     std::string payload;
2095     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2096     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(false));
2097     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2098     int32_t ret = DeviceManagerService::GetInstance().DestroyPinHolder(pkgName, targetId, pinType, payload);
2099     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2100 }
2101 
2102 
2103 HWTEST_F(DeviceManagerServiceTest, DpAclAdd_001, testing::ext::TestSize.Level1)
2104 {
2105     DeletePermission();
2106     std::string udid;
2107     int32_t ret = DeviceManagerService::GetInstance().DpAclAdd(udid);
2108     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2109 }
2110 
2111 HWTEST_F(DeviceManagerServiceTest, DpAclAdd_002, testing::ext::TestSize.Level1)
2112 {
2113     std::string udid = "udid";
2114     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2115     int32_t ret = DeviceManagerService::GetInstance().DpAclAdd(udid);
2116     EXPECT_EQ(ret, DM_OK);
2117 }
2118 
2119 HWTEST_F(DeviceManagerServiceTest, GetDeviceSecurityLevel_001, testing::ext::TestSize.Level1)
2120 {
2121     std::string pkgName;
2122     std::string networkId;
2123     int32_t securityLevel = -1;
2124     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2125     int32_t ret = DeviceManagerService::GetInstance().GetDeviceSecurityLevel(pkgName, networkId, securityLevel);
2126     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2127 }
2128 
2129 HWTEST_F(DeviceManagerServiceTest, GetDeviceSecurityLevel_002, testing::ext::TestSize.Level1)
2130 {
2131     std::string pkgName = "com.ohos.test";
2132     std::string invalidNetworkId = "12345";
2133     int32_t securityLevel = -1;
2134     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2135     int32_t ret = DeviceManagerService::GetInstance().GetDeviceSecurityLevel(pkgName, invalidNetworkId, securityLevel);
2136     EXPECT_EQ(ret, ERR_DM_POINT_NULL);
2137 }
2138 
2139 HWTEST_F(DeviceManagerServiceTest, GetDeviceSecurityLevel_003, testing::ext::TestSize.Level1)
2140 {
2141     std::string pkgName = "com.ohos.test";
2142     std::string invalidNetworkId = "12345";
2143     int32_t securityLevel = -1;
2144     DeletePermission();
2145     int32_t ret = DeviceManagerService::GetInstance().GetDeviceSecurityLevel(pkgName, invalidNetworkId, securityLevel);
2146     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2147 }
2148 
2149 HWTEST_F(DeviceManagerServiceTest, GetDeviceSecurityLevel_004, testing::ext::TestSize.Level1)
2150 {
2151     std::string pkgName = "com.ohos.test";
2152     std::string invalidNetworkId;
2153     int32_t securityLevel = -1;
2154     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2155     int32_t ret = DeviceManagerService::GetInstance().GetDeviceSecurityLevel(pkgName, invalidNetworkId, securityLevel);
2156     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2157 }
2158 
2159 HWTEST_F(DeviceManagerServiceTest, GetDeviceSecurityLevel_005, testing::ext::TestSize.Level1)
2160 {
2161     std::string pkgName = "com.ohos.test";
2162     std::string invalidNetworkId;
2163     int32_t securityLevel = 0;
2164     DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
2165     int32_t ret = DeviceManagerService::GetInstance().GetDeviceSecurityLevel(pkgName, invalidNetworkId, securityLevel);
2166     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
2167     EXPECT_NE(ret, DM_OK);
2168 }
2169 
2170 HWTEST_F(DeviceManagerServiceTest, IsSameAccount_001, testing::ext::TestSize.Level1)
2171 {
2172     std::string udid = "";
2173     EXPECT_CALL(*softbusListenerMock_, GetUdidByNetworkId(_, _)).WillOnce(Return(ERR_DM_INPUT_PARA_INVALID));
2174     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2175     int32_t ret = DeviceManagerService::GetInstance().IsSameAccount(udid);
2176     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2177 }
2178 
2179 HWTEST_F(DeviceManagerServiceTest, IsSameAccount_002, testing::ext::TestSize.Level1)
2180 {
2181     std::string udid = "udidTest";
2182     EXPECT_CALL(*softbusListenerMock_, GetUdidByNetworkId(_, _)).WillOnce(Return(ERR_DM_INPUT_PARA_INVALID));
2183     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2184     int32_t ret = DeviceManagerService::GetInstance().IsSameAccount(udid);
2185     EXPECT_NE(ret, DM_OK);
2186 }
2187 
2188 HWTEST_F(DeviceManagerServiceTest, IsSameAccount_003, testing::ext::TestSize.Level1)
2189 {
2190     std::string udid = "udidTest";
2191     DeletePermission();
2192     int32_t ret = DeviceManagerService::GetInstance().IsSameAccount(udid);
2193     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2194 }
2195 
2196 HWTEST_F(DeviceManagerServiceTest, CheckIsSameAccount_001, testing::ext::TestSize.Level1)
2197 {
2198     DmAccessCaller caller;
2199     DmAccessCallee callee;
2200     DeletePermission();
2201     bool ret = DeviceManagerService::GetInstance().CheckIsSameAccount(caller, callee);
2202     EXPECT_FALSE(ret);
2203 }
2204 
2205 
2206 HWTEST_F(DeviceManagerServiceTest, CheckAccessControl_001, testing::ext::TestSize.Level1)
2207 {
2208     DmAccessCaller caller;
2209     DmAccessCallee callee;
2210     DeletePermission();
2211     bool ret = DeviceManagerService::GetInstance().CheckAccessControl(caller, callee);
2212     EXPECT_FALSE(ret);
2213 }
2214 
2215 HWTEST_F(DeviceManagerServiceTest, SetDnPolicy_001, testing::ext::TestSize.Level1)
2216 {
2217     std::string pkgName;
2218     std::map<std::string, std::string> policy;
2219     std::string processName = "collaboration_service";
2220     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_))
2221         .WillOnce(DoAll(SetArgReferee<0>(processName), Return(DM_OK)));
2222     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnSetDnPolicy(_)).WillOnce(Return(true));
2223     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2224     int ret = DeviceManagerService::GetInstance().SetDnPolicy(pkgName, policy);
2225     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2226 }
2227 
2228 HWTEST_F(DeviceManagerServiceTest, SetDnPolicy_002, testing::ext::TestSize.Level1)
2229 {
2230     std::string pkgName = "openharmony123";
2231     std::map<std::string, std::string> policy;
2232     DeletePermission();
2233     int ret = DeviceManagerService::GetInstance().SetDnPolicy(pkgName, policy);
2234     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2235 }
2236 
2237 HWTEST_F(DeviceManagerServiceTest, SetDnPolicy_003, testing::ext::TestSize.Level1)
2238 {
2239     std::string pkgName = "openharmony123";
2240     std::map<std::string, std::string> policy;
2241     std::vector<std::string> peerUdids;
2242     int32_t userId = 1;
2243     uint64_t tokenId = 87;
2244     DeviceManagerService::GetInstance().SendUnBindBroadCast(peerUdids, userId, tokenId, USER);
2245     DeviceManagerService::GetInstance().SendUnBindBroadCast(peerUdids, userId, tokenId, APP);
2246     DeviceManagerService::GetInstance().SendUnBindBroadCast(peerUdids, userId, tokenId, 2);
2247     DeviceManagerService::GetInstance().SendDeviceUnBindBroadCast(peerUdids, userId);
2248     DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
2249     DeviceManagerService::GetInstance().SendDeviceUnBindBroadCast(peerUdids, userId);
2250     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
2251     std::string processName = "collaboration_service";
2252     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_))
2253         .WillOnce(DoAll(SetArgReferee<0>(processName), Return(DM_OK)));
2254     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnSetDnPolicy(_)).WillOnce(Return(true));
2255     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2256     int ret = DeviceManagerService::GetInstance().SetDnPolicy(pkgName, policy);
2257     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2258 }
2259 
2260 HWTEST_F(DeviceManagerServiceTest, DestroyPinHolder_003, testing::ext::TestSize.Level1)
2261 {
2262     std::string pkgName = "";
2263     PeerTargetId targetId;
2264     DmPinType pinType = DmPinType::QR_CODE;
2265     std::string payload;
2266     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2267     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(false));
2268     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2269     int32_t ret = DeviceManagerService::GetInstance().DestroyPinHolder(pkgName, targetId, pinType, payload);
2270     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2271 }
2272 
2273 HWTEST_F(DeviceManagerServiceTest, GetDeviceScreenStatus_001, testing::ext::TestSize.Level1)
2274 {
2275     std::string pkgName;
2276     std::string networkId;
2277     int32_t screenStatus = 1;
2278     DeletePermission();
2279     int ret = DeviceManagerService::GetInstance().GetDeviceScreenStatus(pkgName, networkId, screenStatus);
2280     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2281 }
2282 
2283 HWTEST_F(DeviceManagerServiceTest, GetDeviceScreenStatus_002, testing::ext::TestSize.Level1)
2284 {
2285     std::string pkgName;
2286     std::string networkId;
2287     int32_t screenStatus = 1;
2288     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2289     int ret = DeviceManagerService::GetInstance().GetDeviceScreenStatus(pkgName, networkId, screenStatus);
2290     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2291 }
2292 
2293 HWTEST_F(DeviceManagerServiceTest, GetDeviceScreenStatus_003, testing::ext::TestSize.Level1)
2294 {
2295     std::string pkgName = "pkgname";
2296     std::string networkId = "networkId_003";
2297     int32_t screenStatus = 1;
2298     DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
2299     EXPECT_CALL(*softbusListenerMock_, GetDeviceScreenStatus(_, _)).WillOnce(Return(ERR_DM_FAILED));
2300     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2301     int ret = DeviceManagerService::GetInstance().GetDeviceScreenStatus(pkgName, networkId, screenStatus);
2302     EXPECT_EQ(ret, ERR_DM_FAILED);
2303     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
2304 }
2305 
2306 HWTEST_F(DeviceManagerServiceTest, GetDeviceScreenStatus_004, testing::ext::TestSize.Level1)
2307 {
2308     std::string pkgName = "pkgname";
2309     std::string networkId = "networkId_003";
2310     int32_t screenStatus = 1;
2311     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2312     int ret = DeviceManagerService::GetInstance().GetDeviceScreenStatus(pkgName, networkId, screenStatus);
2313     EXPECT_EQ(ret, ERR_DM_POINT_NULL);
2314 }
2315 
2316 HWTEST_F(DeviceManagerServiceTest, HandleDeviceScreenStatusChange_001, testing::ext::TestSize.Level1)
2317 {
2318     DmDeviceInfo deviceInfo;
2319     DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
2320     DeviceManagerService::GetInstance().IsDMServiceImplReady();
2321     EXPECT_CALL(*softbusCacheMock_, GetUdidFromCache(_, _)).WillOnce(Return(DM_OK));
2322     DeviceManagerService::GetInstance().HandleDeviceScreenStatusChange(deviceInfo);
2323     EXPECT_NE(DeviceManagerService::GetInstance().dmServiceImpl_, nullptr);
2324 }
2325 
2326 HWTEST_F(DeviceManagerServiceTest, EnableDiscoveryListener_005, testing::ext::TestSize.Level1)
2327 {
2328     std::string pkgName = "pkgName";
2329     std::map<std::string, std::string> discoverParam;
2330     std::map<std::string, std::string> filterOptions;
2331     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2332     int32_t ret = DeviceManagerService::GetInstance().EnableDiscoveryListener(pkgName, discoverParam, filterOptions);
2333     EXPECT_EQ(ret, ERR_DM_POINT_NULL);
2334 }
2335 
2336 HWTEST_F(DeviceManagerServiceTest, GetLocalDeviceInfo_002, testing::ext::TestSize.Level1)
2337 {
2338     DmDeviceInfo info;
2339     DeletePermission();
2340     std::string msg = "";
2341     DeviceManagerService::GetInstance().HandleDeviceTrustedChange(msg);
2342     DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
2343     bool result = DeviceManagerService::GetInstance().IsDMServiceImplReady();
2344     EXPECT_TRUE(result);
2345     msg =  R"(
2346     {
2347         "type" : 0,
2348         "userId" : 123,
2349         "accountId" : "28776",
2350         "tokenId" : 16,
2351         "peerUdid" : "104",
2352         "accountName" : "account_xiao"
2353     })";
2354     DeviceManagerService::GetInstance().HandleDeviceTrustedChange(msg);
2355     msg =  R"(
2356     {
2357         "type" : 1,
2358         "userId" : 128,
2359         "accountId" : "28778",
2360         "tokenId" : 17,
2361         "peerUdid" : "108",
2362         "accountName" : "account_li"
2363     })";
2364     DeviceManagerService::GetInstance().HandleDeviceTrustedChange(msg);
2365     msg =  R"(
2366     {
2367         "type" : 2,
2368         "userId" : 124,
2369         "accountId" : "28779",
2370         "tokenId" : 18,
2371         "peerUdid" : "110",
2372         "accountName" : "account_wang"
2373     })";
2374     int32_t ret = DeviceManagerService::GetInstance().GetLocalDeviceInfo(info);
2375     EXPECT_EQ(ret, ERR_DM_POINT_NULL);
2376 }
2377 
2378 HWTEST_F(DeviceManagerServiceTest, GetNetworkIdByUdid_001, testing::ext::TestSize.Level1)
2379 {
2380     std::string pkgName;
2381     std::string udid;
2382     std::string networkId = "networkIdTest_001";
2383     DeletePermission();
2384     int32_t ret = DeviceManagerService::GetInstance().GetNetworkIdByUdid(pkgName, udid, networkId);
2385     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2386 }
2387 
2388 HWTEST_F(DeviceManagerServiceTest, GetNetworkIdByUdid_002, testing::ext::TestSize.Level1)
2389 {
2390     std::string pkgName;
2391     std::string udid;
2392     std::string networkId = "networkIdTest_002";
2393     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2394     int32_t ret = DeviceManagerService::GetInstance().GetNetworkIdByUdid(pkgName, udid, networkId);
2395     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2396 }
2397 
2398 HWTEST_F(DeviceManagerServiceTest, GetNetworkIdByUdid_003, testing::ext::TestSize.Level1)
2399 {
2400     std::string pkgName = "pkgName_003";
2401     std::string udid = "sewdwed98897";
2402     std::string networkId = "networkIdTest_003";
2403     EXPECT_CALL(*softbusCacheMock_, GetNetworkIdFromCache(_, _))
2404         .WillOnce(Return(ERR_DM_FAILED));
2405     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2406     int32_t ret = DeviceManagerService::GetInstance().GetNetworkIdByUdid(pkgName, udid, networkId);
2407     EXPECT_EQ(ret, ERR_DM_FAILED);
2408 }
2409 
2410 HWTEST_F(DeviceManagerServiceTest, StopAuthenticateDevice_001, testing::ext::TestSize.Level1)
2411 {
2412     std::string pkgName;
2413     DeletePermission();
2414     int32_t ret = DeviceManagerService::GetInstance().StopAuthenticateDevice(pkgName);
2415     EXPECT_EQ(ret, ERR_DM_NO_PERMISSION);
2416 }
2417 
2418 HWTEST_F(DeviceManagerServiceTest, StopAuthenticateDevice_002, testing::ext::TestSize.Level1)
2419 {
2420     std::string pkgName;
2421     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2422     int32_t ret = DeviceManagerService::GetInstance().StopAuthenticateDevice(pkgName);
2423     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2424 }
2425 
2426 HWTEST_F(DeviceManagerServiceTest, StopAuthenticateDevice_003, testing::ext::TestSize.Level1)
2427 {
2428     std::string pkgName = "pkgName_003";
2429     DeviceManagerService::GetInstance().isImplsoLoaded_ = false;
2430     DeviceManagerService::GetInstance().IsDMServiceImplReady();
2431     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2432     EXPECT_CALL(*deviceManagerServiceImplMock_, StopAuthenticateDevice(_)).WillOnce(Return(DM_OK));
2433     int32_t ret = DeviceManagerService::GetInstance().StopAuthenticateDevice(pkgName);
2434     EXPECT_EQ(ret, DM_OK);
2435 }
2436 
2437 HWTEST_F(DeviceManagerServiceTest, DestroyPinHolder_004, testing::ext::TestSize.Level1)
2438 {
2439     std::string pkgName = "";
2440     PeerTargetId targetId;
2441     DmPinType pinType = DmPinType::QR_CODE;
2442     std::string payload;
2443     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2444     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2445     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(true));
2446     int32_t ret = DeviceManagerService::GetInstance().DestroyPinHolder(pkgName, targetId, pinType, payload);
2447     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2448 }
2449 
2450 HWTEST_F(DeviceManagerServiceTest, DestroyPinHolder_005, testing::ext::TestSize.Level1)
2451 {
2452     std::string pkgName = "pkgName_005";
2453     PeerTargetId targetId;
2454     DmPinType pinType = DmPinType::QR_CODE;
2455     std::string payload;
2456     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2457     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2458     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(true));
2459     if (DeviceManagerService::GetInstance().pinHolder_ == nullptr) {
2460         DeviceManagerService::GetInstance().InitDMServiceListener();
2461     }
2462     int32_t ret = DeviceManagerService::GetInstance().DestroyPinHolder(pkgName, targetId, pinType, payload);
2463     EXPECT_EQ(ret, ERR_DM_FAILED);
2464 }
2465 
2466 HWTEST_F(DeviceManagerServiceTest, CreatePinHolder_003, testing::ext::TestSize.Level1)
2467 {
2468     std::string pkgName = "";
2469     PeerTargetId targetId;
2470     DmPinType pinType = DmPinType::QR_CODE;
2471     std::string payload;
2472     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2473     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2474     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(true));
2475     int32_t ret = DeviceManagerService::GetInstance().CreatePinHolder(pkgName, targetId, pinType, payload);
2476     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2477 }
2478 
2479 HWTEST_F(DeviceManagerServiceTest, CreatePinHolder_004, testing::ext::TestSize.Level1)
2480 {
2481     std::string pkgName = "pkgName";
2482     PeerTargetId targetId;
2483     DmPinType pinType = DmPinType::QR_CODE;
2484     std::string payload;
2485     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2486     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2487     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(true));
2488     if (DeviceManagerService::GetInstance().pinHolder_ == nullptr) {
2489         DeviceManagerService::GetInstance().InitDMServiceListener();
2490     }
2491     int32_t ret = DeviceManagerService::GetInstance().CreatePinHolder(pkgName, targetId, pinType, payload);
2492     EXPECT_EQ(ret, ERR_DM_FAILED);
2493 }
2494 
2495 HWTEST_F(DeviceManagerServiceTest, RegisterPinHolderCallback_003, testing::ext::TestSize.Level1)
2496 {
2497     std::string pkgName;
2498     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2499     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2500     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(true));
2501     int32_t ret = DeviceManagerService::GetInstance().RegisterPinHolderCallback(pkgName);
2502     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2503 }
2504 
2505 HWTEST_F(DeviceManagerServiceTest, RegisterPinHolderCallback_004, testing::ext::TestSize.Level1)
2506 {
2507     std::string pkgName = "pkgName";
2508     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2509     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2510     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnPinHolder(_)).WillOnce(Return(true));
2511     if (DeviceManagerService::GetInstance().pinHolder_ == nullptr) {
2512         DeviceManagerService::GetInstance().InitDMServiceListener();
2513     }
2514     int32_t ret = DeviceManagerService::GetInstance().RegisterPinHolderCallback(pkgName);
2515     EXPECT_EQ(ret, DM_OK);
2516 }
2517 
2518 /**
2519  * @tc.name: ShiftLNNGear_008
2520  * @tc.desc:Set the callerId and pkgNamenot not to null, and isRefresh to true; Return NOT DM_OK
2521  * @tc.type: FUNC
2522  * @tc.require: AR000GHSJK
2523  */
2524 HWTEST_F(DeviceManagerServiceTest, ShiftLNNGear_008, testing::ext::TestSize.Level1)
2525 {
2526     std::string pkgName = "ShiftLNNGear_008";
2527     std::string callerId = "ShiftLNNGear_008";
2528     bool isRefresh = true;
2529     DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
2530     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2531     EXPECT_CALL(*softbusListenerMock_, ShiftLNNGear(_, _)).WillOnce(Return(ERR_DM_FAILED));
2532     int ret = DeviceManagerService::GetInstance().ShiftLNNGear(pkgName, callerId, isRefresh, false);
2533     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
2534     EXPECT_EQ(ret, ERR_DM_FAILED);
2535 }
2536 
2537 HWTEST_F(DeviceManagerServiceTest, ImportAuthCode_003, testing::ext::TestSize.Level1)
2538 {
2539     std::string pkgName = "pkgName";
2540     std::string authCode;
2541     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2542     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2543     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnAuthCode(_)).WillOnce(Return(true));
2544     int32_t ret = DeviceManagerService::GetInstance().ImportAuthCode(pkgName, authCode);
2545     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2546 }
2547 
2548 HWTEST_F(DeviceManagerServiceTest, ImportAuthCode_004, testing::ext::TestSize.Level1)
2549 {
2550     std::string pkgName = "pkgName";
2551     std::string authCode = "authCode";
2552     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2553     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2554     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnAuthCode(_)).WillOnce(Return(true));
2555     int32_t ret = DeviceManagerService::GetInstance().ImportAuthCode(pkgName, authCode);
2556     EXPECT_EQ(ret, DM_OK);
2557 }
2558 
2559 HWTEST_F(DeviceManagerServiceTest, ExportAuthCode_003, testing::ext::TestSize.Level1)
2560 {
2561     std::string authCode = "authCode";
2562     EXPECT_CALL(*permissionManagerMock_, CheckNewPermission()).WillOnce(Return(true));
2563     EXPECT_CALL(*permissionManagerMock_, GetCallerProcessName(_)).WillOnce(Return(DM_OK));
2564     EXPECT_CALL(*permissionManagerMock_, CheckProcessNameValidOnAuthCode(_)).WillOnce(Return(true));
2565     int32_t ret = DeviceManagerService::GetInstance().ExportAuthCode(authCode);
2566     EXPECT_EQ(ret, DM_OK);
2567 }
2568 
2569 HWTEST_F(DeviceManagerServiceTest, IsSameAccount_004, testing::ext::TestSize.Level1)
2570 {
2571     std::string udid = "udidTest";
2572     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2573     EXPECT_CALL(*softbusListenerMock_, GetUdidByNetworkId(_, _)).WillOnce(Return(DM_OK));
2574     int32_t ret = DeviceManagerService::GetInstance().IsSameAccount(udid);
2575     EXPECT_EQ(ret, ERR_DM_INPUT_PARA_INVALID);
2576 }
2577 
2578 HWTEST_F(DeviceManagerServiceTest, GetDeviceSecurityLevel_006, testing::ext::TestSize.Level1)
2579 {
2580     std::string pkgName = "com.ohos.test";
2581     std::string invalidNetworkId = "networkId";
2582     int32_t securityLevel = 0;
2583     EXPECT_CALL(*permissionManagerMock_, CheckPermission()).WillOnce(Return(true));
2584     DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
2585     EXPECT_CALL(*softbusListenerMock_, GetDeviceSecurityLevel(_, _)).WillOnce(Return(DM_OK));
2586     int32_t ret = DeviceManagerService::GetInstance().GetDeviceSecurityLevel(pkgName, invalidNetworkId, securityLevel);
2587     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
2588     EXPECT_EQ(ret, DM_OK);
2589 }
2590 
2591 HWTEST_F(DeviceManagerServiceTest, GetEncryptedUuidByNetworkId_004, testing::ext::TestSize.Level1)
2592 {
2593     std::string pkgName = "pkgName";
2594     std::string networkId = "network_id";
2595     std::string uuid = "13345689";
2596     if (DeviceManagerService::GetInstance().softbusListener_ == nullptr) {
2597         DeviceManagerService::GetInstance().softbusListener_ = std::make_shared<SoftbusListener>();
2598     }
2599     EXPECT_CALL(*softbusListenerMock_, GetUuidByNetworkId(_, _)).WillOnce(Return(DM_OK));
2600     EXPECT_CALL(*appManagerMock_, GetAppId()).WillOnce(Return("appId"));
2601     int32_t ret = DeviceManagerService::GetInstance().GetEncryptedUuidByNetworkId(pkgName, networkId, uuid);
2602     DeviceManagerService::GetInstance().softbusListener_ = nullptr;
2603     EXPECT_EQ(ret, DM_OK);
2604 }
2605 
2606 HWTEST_F(DeviceManagerServiceTest, OpenAuthSessionWithPara_001, testing::ext::TestSize.Level1)
2607 {
2608     const std::string deviceId = "OpenAuthSessionWithPara";
2609     int32_t actionId = 0;
2610     bool isEnable160m = false;
2611     int32_t ret = DeviceManagerService::GetInstance().OpenAuthSessionWithPara(deviceId, actionId, isEnable160m);
2612     EXPECT_NE(ret, DM_OK);
2613 }
2614 } // namespace
2615 } // namespace DistributedHardware
2616 } // namespace OHOS
2617