xref: /aosp_15_r20/system/keymint/common/fuzz/fuzz_targets/keyblob.rs (revision 9860b7637a5f185913c70aa0caabe3ecb78441e4)
1 // Copyright 2022, The Android Open Source Project
2 //
3 // Licensed under the Apache License, Version 2.0 (the "License");
4 // you may not use this file except in compliance with the License.
5 // You may obtain a copy of the License at
6 //
7 //     http://www.apache.org/licenses/LICENSE-2.0
8 //
9 // Unless required by applicable law or agreed to in writing, software
10 // distributed under the License is distributed on an "AS IS" BASIS,
11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 // See the License for the specific language governing permissions and
13 // limitations under the License.
14 
15 //! Fuzzer for keyblob parsing.
16 
17 #![no_main]
18 use libfuzzer_sys::fuzz_target;
19 
20 fuzz_target!(|data: &[u8]| {
21     // `data` allegedly holds a CBOR-serialized keyblob that has arrived from userspace.  Do we
22     // trust it? I don't think so...
23     let _ = kmr_common::keyblob::EncryptedKeyBlob::new(data);
24 });
25