1 /* 2 * Copyright (C) 2023 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 #![allow(missing_docs)] 18 #![no_main] 19 20 use binder_random_parcel_rs::fuzz_service; 21 use keystore2::authorization::AuthorizationManager; 22 use libfuzzer_sys::fuzz_target; 23 24 fuzz_target!(|data: &[u8]| { 25 let authorization_service = AuthorizationManager::new_native_binder().unwrap_or_else(|e| { 26 panic!("Failed to create android.security.authorization service because of {:?}", e); 27 }); 28 fuzz_service(&mut authorization_service.as_binder(), data); 29 }); 30