blob: 36ec9fbb7c83a58554ebb9c9950573f516f6fdc2 [file] [log] [blame] [edit]
macro(fuzzer name)
add_executable(${name} ${name}.cc)
target_compile_options(${name} PRIVATE "-Wno-missing-prototypes")
target_link_libraries(${name} crypto ${ARGN})
if(LIBFUZZER_FROM_DEPS)
set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer-no-link")
target_link_libraries(${name} Fuzzer)
else()
set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer")
endif()
set_target_properties(
${name}
PROPERTIES
CXX_STANDARD 17
CXX_STANDARD_REQUIRED YES)
endmacro()
fuzzer(arm_cpuinfo)
fuzzer(bn_div)
fuzzer(bn_mod_exp)
fuzzer(cert)
fuzzer(client ssl)
fuzzer(conf)
fuzzer(crl_getcrlstatusforcert_fuzzer pki)
fuzzer(crl_parse_crl_certificatelist_fuzzer pki)
fuzzer(crl_parse_crl_tbscertlist_fuzzer pki)
fuzzer(crl_parse_issuing_distribution_point_fuzzer pki)
fuzzer(decode_client_hello_inner ssl)
fuzzer(der_roundtrip)
fuzzer(dtls_client ssl)
fuzzer(dtls_server ssl)
fuzzer(ocsp_parse_ocsp_cert_id_fuzzer pki)
fuzzer(ocsp_parse_ocsp_response_data_fuzzer pki)
fuzzer(ocsp_parse_ocsp_response_fuzzer pki)
fuzzer(ocsp_parse_ocsp_single_response_fuzzer pki)
fuzzer(parse_authority_key_identifier_fuzzer pki)
fuzzer(parse_certificate_fuzzer pki)
fuzzer(parse_crldp_fuzzer pki)
fuzzer(pkcs12)
fuzzer(pkcs8)
fuzzer(privkey)
fuzzer(read_pem)
fuzzer(server ssl)
fuzzer(session ssl)
fuzzer(spki)
fuzzer(ssl_ctx_api ssl)
fuzzer(verify_name_match_fuzzer pki)
fuzzer(verify_name_match_normalizename_fuzzer pki)
fuzzer(verify_name_match_verifynameinsubtree_fuzzer pki)