| macro(fuzzer name) |
| add_executable(${name} ${name}.cc) |
| target_compile_options(${name} PRIVATE "-Wno-missing-prototypes") |
| target_link_libraries(${name} crypto ${ARGN}) |
| if(LIBFUZZER_FROM_DEPS) |
| set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer-no-link") |
| target_link_libraries(${name} Fuzzer) |
| else() |
| set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer") |
| endif() |
| set_target_properties( |
| ${name} |
| PROPERTIES |
| CXX_STANDARD 17 |
| CXX_STANDARD_REQUIRED YES) |
| endmacro() |
| |
| fuzzer(arm_cpuinfo) |
| fuzzer(bn_div) |
| fuzzer(bn_mod_exp) |
| fuzzer(cert) |
| fuzzer(client ssl) |
| fuzzer(conf) |
| fuzzer(crl_getcrlstatusforcert_fuzzer pki) |
| fuzzer(crl_parse_crl_certificatelist_fuzzer pki) |
| fuzzer(crl_parse_crl_tbscertlist_fuzzer pki) |
| fuzzer(crl_parse_issuing_distribution_point_fuzzer pki) |
| fuzzer(decode_client_hello_inner ssl) |
| fuzzer(der_roundtrip) |
| fuzzer(dtls_client ssl) |
| fuzzer(dtls_server ssl) |
| fuzzer(ocsp_parse_ocsp_cert_id_fuzzer pki) |
| fuzzer(ocsp_parse_ocsp_response_data_fuzzer pki) |
| fuzzer(ocsp_parse_ocsp_response_fuzzer pki) |
| fuzzer(ocsp_parse_ocsp_single_response_fuzzer pki) |
| fuzzer(parse_authority_key_identifier_fuzzer pki) |
| fuzzer(parse_certificate_fuzzer pki) |
| fuzzer(parse_crldp_fuzzer pki) |
| fuzzer(pkcs12) |
| fuzzer(pkcs8) |
| fuzzer(privkey) |
| fuzzer(read_pem) |
| fuzzer(server ssl) |
| fuzzer(session ssl) |
| fuzzer(spki) |
| fuzzer(ssl_ctx_api ssl) |
| fuzzer(verify_name_match_fuzzer pki) |
| fuzzer(verify_name_match_normalizename_fuzzer pki) |
| fuzzer(verify_name_match_verifynameinsubtree_fuzzer pki) |