提交 f3e911d5 编写于 作者: K Kurt Roeckx

Fix formatting of fuzzers

Reviewed-by: NRich Salz <rsalz@openssl.org>
GH: #2023
上级 82cb311f
......@@ -183,11 +183,13 @@ static ASN1_ITEM_EXP *item_type[] = {
NULL
};
int FuzzerInitialize(int *argc, char ***argv) {
int FuzzerInitialize(int *argc, char ***argv)
{
return 1;
}
int FuzzerTestOneInput(const uint8_t *buf, size_t len) {
int FuzzerTestOneInput(const uint8_t *buf, size_t len)
{
int n;
ASN1_PCTX *pctx = ASN1_PCTX_new();
......
......@@ -18,11 +18,13 @@
#include <openssl/x509v3.h>
#include "fuzzer.h"
int FuzzerInitialize(int *argc, char ***argv) {
int FuzzerInitialize(int *argc, char ***argv)
{
return 1;
}
int FuzzerTestOneInput(const uint8_t *buf, size_t len) {
int FuzzerTestOneInput(const uint8_t *buf, size_t len)
{
static BIO *bio_out;
if (bio_out == NULL)
......
......@@ -17,11 +17,13 @@
#include <openssl/bn.h>
#include "fuzzer.h"
int FuzzerInitialize(int *argc, char ***argv) {
int FuzzerInitialize(int *argc, char ***argv)
{
return 1;
}
int FuzzerTestOneInput(const uint8_t *buf, size_t len) {
int FuzzerTestOneInput(const uint8_t *buf, size_t len)
{
static BN_CTX *ctx;
static BIGNUM *b1;
static BIGNUM *b2;
......
......@@ -17,11 +17,13 @@
#include <openssl/bn.h>
#include "fuzzer.h"
int FuzzerInitialize(int *argc, char ***argv) {
int FuzzerInitialize(int *argc, char ***argv)
{
return 1;
}
int FuzzerTestOneInput(const uint8_t *buf, size_t len) {
int FuzzerTestOneInput(const uint8_t *buf, size_t len)
{
static BN_CTX *ctx;
static BIGNUM *b1;
static BIGNUM *b2;
......
......@@ -16,11 +16,13 @@
#include <openssl/cms.h>
#include "fuzzer.h"
int FuzzerInitialize(int *argc, char ***argv) {
int FuzzerInitialize(int *argc, char ***argv)
{
return 1;
}
int FuzzerTestOneInput(const uint8_t *buf, size_t len) {
int FuzzerTestOneInput(const uint8_t *buf, size_t len)
{
CMS_ContentInfo *i;
BIO *in;
if (!len) {
......
......@@ -15,11 +15,13 @@
#include <openssl/conf.h>
#include "fuzzer.h"
int FuzzerInitialize(int *argc, char ***argv) {
int FuzzerInitialize(int *argc, char ***argv)
{
return 1;
}
int FuzzerTestOneInput(const uint8_t *buf, size_t len) {
int FuzzerTestOneInput(const uint8_t *buf, size_t len)
{
CONF *conf;
BIO *in;
long eline;
......
......@@ -12,11 +12,13 @@
#include <openssl/bio.h>
#include "fuzzer.h"
int FuzzerInitialize(int *argc, char ***argv) {
int FuzzerInitialize(int *argc, char ***argv)
{
return 1;
}
int FuzzerTestOneInput(const uint8_t *buf, size_t len) {
int FuzzerTestOneInput(const uint8_t *buf, size_t len)
{
const unsigned char *p = buf;
unsigned char *der = NULL;
......
......@@ -16,11 +16,13 @@
#include <openssl/ct.h>
#include "fuzzer.h"
int FuzzerInitialize(int *argc, char ***argv) {
int FuzzerInitialize(int *argc, char ***argv)
{
return 1;
}
int FuzzerTestOneInput(const uint8_t *buf, size_t len) {
int FuzzerTestOneInput(const uint8_t *buf, size_t len)
{
const uint8_t **pp = &buf;
unsigned char *der = NULL;
STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len);
......
......@@ -22,7 +22,8 @@ int LLVMFuzzerInitialize(int *argc, char ***argv)
return 0;
}
int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) {
int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len)
{
return FuzzerTestOneInput(buf, len);
}
......
......@@ -191,7 +191,8 @@ static const uint8_t kRSAPrivateKeyDER[] = {
static SSL_CTX *ctx;
int FuzzerInitialize(int *argc, char ***argv) {
int FuzzerInitialize(int *argc, char ***argv)
{
const uint8_t *bufp = kRSAPrivateKeyDER;
RSA *privkey;
EVP_PKEY *pkey;
......@@ -216,7 +217,8 @@ int FuzzerInitialize(int *argc, char ***argv) {
return 1;
}
int FuzzerTestOneInput(const uint8_t *buf, size_t len) {
int FuzzerTestOneInput(const uint8_t *buf, size_t len)
{
SSL *server;
BIO *in;
BIO *out;
......
......@@ -12,11 +12,13 @@
#include <openssl/bio.h>
#include "fuzzer.h"
int FuzzerInitialize(int *argc, char ***argv) {
int FuzzerInitialize(int *argc, char ***argv)
{
return 1;
}
int FuzzerTestOneInput(const uint8_t *buf, size_t len) {
int FuzzerTestOneInput(const uint8_t *buf, size_t len)
{
const unsigned char *p = buf;
unsigned char *der = NULL;
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册