blob: 6a9cfdd0b6f40f7cfc337918559ac9debc598d89 [file] [log] [blame]
David Drysdale6fb22dc2023-11-06 13:23:11 +00001/*
2 * Copyright (C) 2023 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#![allow(missing_docs)]
18#![no_main]
19extern crate libfuzzer_sys;
20
21use authgraph_hal::service::AuthGraphService;
22use authgraph_nonsecure::LocalTa;
23use binder_random_parcel_rs::fuzz_service;
24use libfuzzer_sys::fuzz_target;
25use std::sync::{Arc, Mutex};
26
27fuzz_target!(|data: &[u8]| {
28 let local_ta = LocalTa::new();
29 let service = AuthGraphService::new_as_binder(Arc::new(Mutex::new(local_ta)));
30 fuzz_service(&mut service.as_binder(), data);
31});