<feed xmlns='http://www.w3.org/2005/Atom'>
<title>openjpeg/tests/fuzzers, branch master</title>
<subtitle>Fork of openjpeg library for JPEG2000 encoding and decoding</subtitle>
<id>https://git.carlh.net/cgit/openjpeg/atom?h=master</id>
<link rel='self' href='https://git.carlh.net/cgit/openjpeg/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/'/>
<updated>2022-05-13T16:18:47Z</updated>
<entry>
<title>Separate fuzz targets to increase coverage (#1416)</title>
<updated>2022-05-13T16:18:47Z</updated>
<author>
<name>Navidem</name>
<email>navid.emamdoost@gmail.com</email>
</author>
<published>2022-05-13T16:18:47Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=cf90ff0c57ad5b12aa6e227d7202960a5770144d'/>
<id>urn:sha1:cf90ff0c57ad5b12aa6e227d7202960a5770144d</id>
<content type='text'>
</content>
</entry>
<entry>
<title>tests/fuzzers/build_seed_corpus.sh: add htj2k files</title>
<updated>2021-09-27T06:04:57Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2021-09-27T06:04:57Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=714c63efee203a46fe366d22c0077425052bb62c'/>
<id>urn:sha1:714c63efee203a46fe366d22c0077425052bb62c</id>
<content type='text'>
</content>
</entry>
<entry>
<title>tests/fuzzers: link fuzz binaries using $LIB_FUZZING_ENGINE. (#1230)</title>
<updated>2020-01-13T17:07:54Z</updated>
<author>
<name>Max Moroz</name>
<email>dor3s1@gmail.com</email>
</author>
<published>2020-01-13T17:07:54Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=b63a433ba168bad5fa10e83de04d6305e6a222e2'/>
<id>urn:sha1:b63a433ba168bad5fa10e83de04d6305e6a222e2</id>
<content type='text'>
This was changed some time ago (https://google.github.io/oss-fuzz/getting-started/new-project-guide/) but the build didn't fail as there is a fallback mechanism. The main advantage of the new approach is that for libFuzzer this produces more performant binaries (as `$LIB_FUZZING_ENGINE` expands into `-fsanitize=fuzzer`, which links libFuzzer from the compiler-rt, allowing better optimization tricks).

I'm also experimenting with dataflow (https://github.com/google/oss-fuzz/issues/1632) on your project, and the dataflow config doesn't have a fallback (as it's a new configuration), therefore I'm proposing a change to migrate from `-lFuzzingEngine` to `$LIB_FUZZING_ENGINE`.
</content>
</entry>
<entry>
<title>opj_decompress_fuzzer: remove checks regarding input dimensions (fixes #1079)</title>
<updated>2019-06-15T07:55:16Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2019-06-15T07:55:16Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=8db9d25dcf360528fd1e094e4f9274c0635e90cc'/>
<id>urn:sha1:8db9d25dcf360528fd1e094e4f9274c0635e90cc</id>
<content type='text'>
</content>
</entry>
<entry>
<title>opj_decompress_fuzzer.cpp: reject images with too big tiles. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2918. Credit to OSS Fuzz</title>
<updated>2017-08-17T10:01:16Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2017-08-17T10:01:16Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=1ab6e0e07a67193564811c5720a69cb28f09a809'/>
<id>urn:sha1:1ab6e0e07a67193564811c5720a69cb28f09a809</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add tests/fuzzers for OSS Fuzz (#965)</title>
<updated>2017-07-03T13:42:35Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2017-07-03T12:14:03Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=1a8eac6a90ca61f3703f9b97afc2ec4918f0ab55'/>
<id>urn:sha1:1a8eac6a90ca61f3703f9b97afc2ec4918f0ab55</id>
<content type='text'>
</content>
</entry>
</feed>
