Fix fuzzer signatures.

They take a const pointer. See
http://llvm.org/docs/LibFuzzer.html#building

BUG=chromium:655016

Change-Id: Id6c7584c7a875e822b1fbff72163c888d02a9f44
Reviewed-on: https://boringssl-review.googlesource.com/11580
Reviewed-by: Steven Valdez <svaldez@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: Steven Valdez <svaldez@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/fuzz/cert.cc b/fuzz/cert.cc
index b8815a5..9c6824f 100644
--- a/fuzz/cert.cc
+++ b/fuzz/cert.cc
@@ -15,9 +15,8 @@
 #include <openssl/mem.h>
 #include <openssl/x509.h>
 
-extern "C" int LLVMFuzzerTestOneInput(uint8_t *buf, size_t len) {
-  const uint8_t *bufp = buf;
-  X509 *x509 = d2i_X509(NULL, &bufp, len);
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) {
+  X509 *x509 = d2i_X509(NULL, &buf, len);
   if (x509 != NULL) {
     /* Extract the public key. */
     EVP_PKEY_free(X509_get_pubkey(x509));
diff --git a/fuzz/client.cc b/fuzz/client.cc
index e3eb456..ed2daee 100644
--- a/fuzz/client.cc
+++ b/fuzz/client.cc
@@ -257,7 +257,7 @@
 
 static GlobalState g_state;
 
-extern "C" int LLVMFuzzerTestOneInput(uint8_t *buf, size_t len) {
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) {
   RAND_reset_for_fuzzing();
 
   // TODO(davidben): Extract an SSL_SESSION from |buf| and offer it for
diff --git a/fuzz/pkcs8.cc b/fuzz/pkcs8.cc
index 55d3893..a0ee3ee 100644
--- a/fuzz/pkcs8.cc
+++ b/fuzz/pkcs8.cc
@@ -16,7 +16,7 @@
 #include <openssl/evp.h>
 #include <openssl/mem.h>
 
-extern "C" int LLVMFuzzerTestOneInput(uint8_t *buf, size_t len) {
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) {
   CBS cbs;
   CBS_init(&cbs, buf, len);
   EVP_PKEY *pkey = EVP_parse_private_key(&cbs);
diff --git a/fuzz/privkey.cc b/fuzz/privkey.cc
index a7cd1b7..b72cf06 100644
--- a/fuzz/privkey.cc
+++ b/fuzz/privkey.cc
@@ -14,8 +14,7 @@
 
 #include <openssl/evp.h>
 
-extern "C" int LLVMFuzzerTestOneInput(uint8_t *buf, size_t len) {
-  const uint8_t *bufp = buf;
-  EVP_PKEY_free(d2i_AutoPrivateKey(NULL, &bufp, len));
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) {
+  EVP_PKEY_free(d2i_AutoPrivateKey(NULL, &buf, len));
   return 0;
 }
diff --git a/fuzz/read_pem.cc b/fuzz/read_pem.cc
index 511c4ee..b0c347d 100644
--- a/fuzz/read_pem.cc
+++ b/fuzz/read_pem.cc
@@ -17,7 +17,7 @@
 #include <openssl/pem.h>
 
 
-extern "C" int LLVMFuzzerTestOneInput(uint8_t *buf, size_t len) {
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) {
   char *name, *header;
   uint8_t *pem_data;
   long pem_len;
diff --git a/fuzz/server.cc b/fuzz/server.cc
index 9406019..fb5b677 100644
--- a/fuzz/server.cc
+++ b/fuzz/server.cc
@@ -250,7 +250,7 @@
 
 static GlobalState g_state;
 
-extern "C" int LLVMFuzzerTestOneInput(uint8_t *buf, size_t len) {
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) {
   RAND_reset_for_fuzzing();
 
   // TODO(davidben): Extract an SSL_SESSION from |buf| and preconfigure the
diff --git a/fuzz/spki.cc b/fuzz/spki.cc
index 939d719..b54e4b8 100644
--- a/fuzz/spki.cc
+++ b/fuzz/spki.cc
@@ -16,7 +16,7 @@
 #include <openssl/evp.h>
 #include <openssl/mem.h>
 
-extern "C" int LLVMFuzzerTestOneInput(uint8_t *buf, size_t len) {
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) {
   CBS cbs;
   CBS_init(&cbs, buf, len);
   EVP_PKEY *pkey = EVP_parse_public_key(&cbs);
diff --git a/fuzz/ssl_ctx_api.cc b/fuzz/ssl_ctx_api.cc
index 44078f8..20fafa5 100644
--- a/fuzz/ssl_ctx_api.cc
+++ b/fuzz/ssl_ctx_api.cc
@@ -448,7 +448,7 @@
     },
 };
 
-extern "C" int LLVMFuzzerTestOneInput(uint8_t *buf, size_t len) {
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) {
   bssl::UniquePtr<SSL_CTX> ctx(SSL_CTX_new(TLS_method()));
 
   // If the number of functions exceeds this limit then the code needs to do