1 /*
2  * Copyright (C) 2023 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #![allow(missing_docs)]
18 #![no_main]
19 
20 use binder_random_parcel_rs::fuzz_service;
21 use keystore2::authorization::AuthorizationManager;
22 use libfuzzer_sys::fuzz_target;
23 
24 fuzz_target!(|data: &[u8]| {
25     let authorization_service = AuthorizationManager::new_native_binder().unwrap_or_else(|e| {
26         panic!("Failed to create android.security.authorization service because of {:?}", e);
27     });
28     fuzz_service(&mut authorization_service.as_binder(), data);
29 });
30