blob: f6b740a176e0144ac06527f3b407d616a9942535 [file] [log] [blame]
David Drysdale8e1c2672023-11-10 19:12:18 +00001//
2// Copyright (C) 2022 The Android Open-Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15
16package {
17 default_applicable_licenses: ["Android-Apache-2.0"],
18}
19
20rust_binary {
21 name: "android.hardware.security.secretkeeper.trusty",
22 relative_install_path: "hw",
23 vendor: true,
24 init_rc: ["android.hardware.security.secretkeeper.trusty.rc"],
25 vintf_fragments: ["android.hardware.security.secretkeeper.trusty.xml"],
26 srcs: [
27 "src/hal_main.rs",
28 ],
29 rustlibs: [
30 "libandroid_logger",
31 "libbinder_rs",
32 "libauthgraph_hal",
33 "libtrusty-rs",
34 "liblibc",
35 "liblog_rust",
36 "libsecretkeeper_hal",
37 ],
38 defaults: [
39 "secretkeeper_use_latest_hal_aidl_rust",
40 ],
41 prefer_rlib: true,
42}
David Drysdale36dfed92024-01-11 10:00:48 +000043
44cc_defaults {
45 name: "trusty_secretkeeper_fuzz_defaults",
46 srcs: [":trusty_tipc_fuzzer"],
47 fuzz_config: {
48 cc: [
49 "alanstokes@google.com",
50 "drysdale@google.com",
51 "shikhapanwar@google.com",
52 ],
53 componentid: 867125,
54 // TODO: add Secretkeeper hotlist
55 // hotlists: [""],
56 },
57}
58
59cc_fuzz {
60 name: "trusty_secretkeeper_sk_fuzzer",
61 defaults: [
62 "trusty_fuzzer_defaults",
63 "trusty_secretkeeper_fuzz_defaults",
64 ],
65 cflags: [
66 "-DTRUSTY_APP_PORT=\"com.android.trusty.secretkeeper\"",
67 "-DTRUSTY_APP_UUID=\"4582bf12-1f7d-4830-9be5-36e6bd91c2c6\"",
68 "-DTRUSTY_APP_FILENAME=\"secretkeeper_app.syms.elf\"",
69 ],
70}
71
72cc_fuzz {
73 name: "trusty_secretkeeper_ag_fuzzer",
74 defaults: [
75 "trusty_fuzzer_defaults",
76 "trusty_secretkeeper_fuzz_defaults",
77 ],
78 cflags: [
79 "-DTRUSTY_APP_PORT=\"com.android.trusty.secretkeeper.authgraph\"",
80 "-DTRUSTY_APP_UUID=\"4582bf12-1f7d-4830-9be5-36e6bd91c2c6\"",
81 "-DTRUSTY_APP_FILENAME=\"secretkeeper_app.syms.elf\"",
82 ],
83}
84
85cc_fuzz {
86 name: "trusty_secretkeeper_bl_fuzzer",
87 defaults: [
88 "trusty_fuzzer_defaults",
89 "trusty_secretkeeper_fuzz_defaults",
90 ],
91 cflags: [
92 "-DTRUSTY_APP_PORT=\"com.android.trusty.secretkeeper.bootloader\"",
93 "-DTRUSTY_APP_UUID=\"4582bf12-1f7d-4830-9be5-36e6bd91c2c6\"",
94 "-DTRUSTY_APP_FILENAME=\"secretkeeper_app.syms.elf\"",
95 ],
96}