Run the comment converter on fuzz/ and tool/

Change-Id: I5ff73db09cc2871fca9cc18a74ad52636c6e753d
Reviewed-on: https://boringssl-review.googlesource.com/19485
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: Adam Langley <agl@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/fuzz/cert.cc b/fuzz/cert.cc
index b27237b..0bfcac4 100644
--- a/fuzz/cert.cc
+++ b/fuzz/cert.cc
@@ -19,10 +19,10 @@
 extern "C" int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) {
   X509 *x509 = d2i_X509(NULL, &buf, len);
   if (x509 != NULL) {
-    /* Extract the public key. */
+    // Extract the public key.
     EVP_PKEY_free(X509_get_pubkey(x509));
 
-    /* Reserialize the structure. */
+    // Reserialize the structure.
     uint8_t *der = NULL;
     i2d_X509(x509, &der);
     OPENSSL_free(der);
diff --git a/tool/internal.h b/tool/internal.h
index a3d608a..a6c8eca 100644
--- a/tool/internal.h
+++ b/tool/internal.h
@@ -90,4 +90,4 @@
 extern const size_t kDERRSAPrivate4096Len;
 
 
-#endif /* !OPENSSL_HEADER_TOOL_INTERNAL_H */
+#endif  // !OPENSSL_HEADER_TOOL_INTERNAL_H
diff --git a/tool/speed.cc b/tool/speed.cc
index cf7e70e..87aa2de 100644
--- a/tool/speed.cc
+++ b/tool/speed.cc
@@ -153,9 +153,9 @@
   TimeResults results;
   if (!TimeFunction(&results,
                     [key, &sig, &fake_sha256_hash, &sig_len]() -> bool {
-        /* Usually during RSA signing we're using a long-lived |RSA| that has
-         * already had all of its |BN_MONT_CTX|s constructed, so it makes
-         * sense to use |key| directly here. */
+        // Usually during RSA signing we're using a long-lived |RSA| that has
+        // already had all of its |BN_MONT_CTX|s constructed, so it makes
+        // sense to use |key| directly here.
         return RSA_sign(NID_sha256, fake_sha256_hash, sizeof(fake_sha256_hash),
                         sig.get(), &sig_len, key);
       })) {
@@ -167,11 +167,11 @@
 
   if (!TimeFunction(&results,
                     [key, &fake_sha256_hash, &sig, sig_len]() -> bool {
-        /* Usually during RSA verification we have to parse an RSA key from a
-         * certificate or similar, in which case we'd need to construct a new
-         * RSA key, with a new |BN_MONT_CTX| for the public modulus. If we were
-         * to use |key| directly instead, then these costs wouldn't be
-         * accounted for. */
+        // Usually during RSA verification we have to parse an RSA key from a
+        // certificate or similar, in which case we'd need to construct a new
+        // RSA key, with a new |BN_MONT_CTX| for the public modulus. If we were
+        // to use |key| directly instead, then these costs wouldn't be
+        // accounted for.
         bssl::UniquePtr<RSA> verify_key(RSA_new());
         if (!verify_key) {
           return false;
diff --git a/tool/transport_common.h b/tool/transport_common.h
index b149671..0bc6053 100644
--- a/tool/transport_common.h
+++ b/tool/transport_common.h
@@ -65,4 +65,4 @@
 // success and false otherwise.
 bool DoHTTPTunnel(int sock, const std::string &hostname_and_port);
 
-#endif  /* !OPENSSL_HEADER_TOOL_TRANSPORT_COMMON_H */
+#endif  // !OPENSSL_HEADER_TOOL_TRANSPORT_COMMON_H