blob: 6523edaf6942ccc5d8ec4bb852e683d76d477252 [file] [log] [blame]
David Drysdale8e1c2672023-11-10 19:12:18 +00001//
2// Copyright (C) 2022 The Android Open-Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15
16package {
17 default_applicable_licenses: ["Android-Apache-2.0"],
18}
19
20rust_binary {
21 name: "android.hardware.security.secretkeeper.trusty",
22 relative_install_path: "hw",
23 vendor: true,
24 init_rc: ["android.hardware.security.secretkeeper.trusty.rc"],
25 vintf_fragments: ["android.hardware.security.secretkeeper.trusty.xml"],
26 srcs: [
27 "src/hal_main.rs",
28 ],
29 rustlibs: [
30 "libandroid_logger",
David Drysdale8e1c2672023-11-10 19:12:18 +000031 "libauthgraph_hal",
David Drysdale7171c672024-01-22 15:03:14 +000032 "libauthgraph_wire",
33 "libbinder_rs",
David Drysdale8e1c2672023-11-10 19:12:18 +000034 "liblibc",
35 "liblog_rust",
36 "libsecretkeeper_hal",
David Drysdale7171c672024-01-22 15:03:14 +000037 "libtrusty-rs",
David Drysdale8e1c2672023-11-10 19:12:18 +000038 ],
39 defaults: [
40 "secretkeeper_use_latest_hal_aidl_rust",
41 ],
42 prefer_rlib: true,
43}
David Drysdale36dfed92024-01-11 10:00:48 +000044
45cc_defaults {
46 name: "trusty_secretkeeper_fuzz_defaults",
47 srcs: [":trusty_tipc_fuzzer"],
48 fuzz_config: {
49 cc: [
50 "alanstokes@google.com",
51 "drysdale@google.com",
52 "shikhapanwar@google.com",
53 ],
54 componentid: 867125,
55 // TODO: add Secretkeeper hotlist
56 // hotlists: [""],
57 },
58}
59
60cc_fuzz {
61 name: "trusty_secretkeeper_sk_fuzzer",
62 defaults: [
63 "trusty_fuzzer_defaults",
64 "trusty_secretkeeper_fuzz_defaults",
65 ],
66 cflags: [
67 "-DTRUSTY_APP_PORT=\"com.android.trusty.secretkeeper\"",
68 "-DTRUSTY_APP_UUID=\"4582bf12-1f7d-4830-9be5-36e6bd91c2c6\"",
69 "-DTRUSTY_APP_FILENAME=\"secretkeeper_app.syms.elf\"",
70 ],
71}
72
73cc_fuzz {
74 name: "trusty_secretkeeper_ag_fuzzer",
75 defaults: [
76 "trusty_fuzzer_defaults",
77 "trusty_secretkeeper_fuzz_defaults",
78 ],
79 cflags: [
80 "-DTRUSTY_APP_PORT=\"com.android.trusty.secretkeeper.authgraph\"",
81 "-DTRUSTY_APP_UUID=\"4582bf12-1f7d-4830-9be5-36e6bd91c2c6\"",
82 "-DTRUSTY_APP_FILENAME=\"secretkeeper_app.syms.elf\"",
83 ],
84}
85
86cc_fuzz {
87 name: "trusty_secretkeeper_bl_fuzzer",
88 defaults: [
89 "trusty_fuzzer_defaults",
90 "trusty_secretkeeper_fuzz_defaults",
91 ],
92 cflags: [
93 "-DTRUSTY_APP_PORT=\"com.android.trusty.secretkeeper.bootloader\"",
94 "-DTRUSTY_APP_UUID=\"4582bf12-1f7d-4830-9be5-36e6bd91c2c6\"",
95 "-DTRUSTY_APP_FILENAME=\"secretkeeper_app.syms.elf\"",
96 ],
97}