OSS-Fuzz: Code comment tweaks for compr. targets

(oversight from 171b875b27)
This commit is contained in:
DRC 2021-04-21 11:04:42 -05:00
Родитель 4de8f6922a
Коммит 55ec9b3b89
3 изменённых файлов: 7 добавлений и 7 удалений

Просмотреть файл

@ -88,9 +88,9 @@ extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
if (ti != 2)
flags |= TJFLAG_NOREALLOC;
/* tjLoadImage() ignores 0-pixel images and images larger than 1 Megapixel
when FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION is defined (yes, that's
a dirty hack), so we don't need to check the width and height here. */
/* tjLoadImage() refuses to load images larger than 1 Megapixel when
FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION is defined (yes, that's a dirty
hack), so we don't need to check the width and height here. */
if ((srcBuf = tjLoadImage(filename, &width, 1, &height, &pf,
flags)) == NULL)
continue;

Просмотреть файл

@ -97,9 +97,9 @@ extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
else
restartEnv[11] = '0';
/* tjLoadImage() ignores 0-pixel images and images larger than 1 Megapixel
when FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION is defined (yes, that's
a dirty hack), so we don't need to check the width and height here. */
/* tjLoadImage() refuses to load images larger than 1 Megapixel when
FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION is defined (yes, that's a dirty
hack), so we don't need to check the width and height here. */
if ((srcBuf = tjLoadImage(filename, &width, 1, &height, &pf,
flags)) == NULL)
continue;

Просмотреть файл

@ -2093,7 +2093,7 @@ DLLEXPORT unsigned char *tjLoadImage(const char *filename, int *width,
src->input_file = file;
#ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
/* Ignore images larger than 1 Megapixel when fuzzing. */
/* Refuse to load images larger than 1 Megapixel when fuzzing. */
if (flags & TJFLAG_FUZZING)
src->max_pixels = 1048576;
#endif