1 /* 2 * Copyright (C) 2023 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 #![allow(missing_docs)] 18 #![no_main] 19 #[macro_use] 20 extern crate libfuzzer_sys; 21 22 use binder_random_parcel_rs::fuzz_service; 23 use keystore2::authorization::AuthorizationManager; 24 25 fuzz_target!(|data: &[u8]| { 26 let authorization_service = AuthorizationManager::new_native_binder().unwrap_or_else(|e| { 27 panic!("Failed to create android.security.authorization service because of {:?}", e); 28 }); 29 fuzz_service(&mut authorization_service.as_binder(), data); 30 }); 31