Commit Graph

6 Commits

Author SHA1 Message Date
Google AutoFuzz Team d0f46b554b
Add Google-written opus fuzzers (#6798)
Those fuzzers have been written and used internally with great results,
finding a couple of bugs, both in code and in design,
and have a code coverage of ~80% for the src/ folder,
and ~90% for both silk/ and celt/.

The fuzzers are put here and not upstream in libopus' repository,
because they are written in C++, and I'm not sure it's worth
the complexity of re-implementing FuzzedDataProvider
in C just for the sake of moving those files.

Co-authored-by: Julien Voisin <jvoisin@google.com>
2021-11-08 15:55:07 -05:00
James Zern f0a3de78ff
opus: enable asserts (#4532) 2020-10-14 19:14:36 -07:00
Ravi Jotwani 80fa75131e
[opus] Add new fuzzer (#4118)
* added new opus fuzzer, build working

* added missing license header, cleaned up Dockerfile

* fixed build process

* changed build process depending on C or C++ fuzzer

* converted opus_multi_fuzzer from C++ to C, reverted build script to only accept C files
2020-07-14 16:49:49 -07:00
Felicia Lim be9ec2bcd1
[opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives (#4007)
* [opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives

Without this, a silk_memcpy call could resolve to __memcpy_chk,
which does not have an msan intercept, leading to false use-of-uninitialized-value errors.

* [opus] Consolidate cflags

* [opus] Fix typo
2020-06-21 16:34:41 -07:00
jonathanmetzman 3049c50d48
Migrate projects using -lFuzzingEngine to $LIB_FUZZING_ENGINE (#2325)
Migrate from -lFuzzingEngine to $LIB_FUZZING_ENGINE where possible and not causing breakage
2019-05-01 11:09:55 -04:00
FeliciaLim d83a22c432 [opus] Add Dockerfile and build.sh for decoder (#385)
* [opus] Add Dockerfile and build.sh for decoder

* [opus] http->https and updated auto_ccs in project.yaml

* [opus] Fix copying .options and test corpus zip files
2017-02-14 18:14:17 -08:00