Formatting done via: git ls-files | grep -E '^test\/.*\.(h|cc|mm)' | xargs clang-format -i No-Iwyu: Includes didn't change and it isn't related to formatting Bug: webrtc:42225392 Change-Id: I3a75019dee1ad9bef713d80a5f79cbc56adab472 Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/373903 Reviewed-by: Mirko Bonadei <mbonadei@webrtc.org> Commit-Queue: Danil Chapovalov <danilchap@webrtc.org> Reviewed-by: Harald Alvestrand <hta@webrtc.org> Cr-Commit-Position: refs/heads/main@{#43690}
28 lines
1.0 KiB
C++
28 lines
1.0 KiB
C++
/*
|
|
* Copyright (c) 2016 The WebRTC project authors. All Rights Reserved.
|
|
*
|
|
* Use of this source code is governed by a BSD-style license
|
|
* that can be found in the LICENSE file in the root of the source
|
|
* tree. An additional intellectual property rights grant can be found
|
|
* in the file PATENTS. All contributing project authors may
|
|
* be found in the AUTHORS file in the root of the source tree.
|
|
*/
|
|
|
|
#include <stddef.h>
|
|
#include <stdint.h>
|
|
|
|
#include "api/transport/stun.h"
|
|
|
|
namespace webrtc {
|
|
void FuzzOneInput(const uint8_t* data, size_t size) {
|
|
// Normally we'd check the integrity first, but those checks are
|
|
// fuzzed separately in stun_validator_fuzzer.cc. We still want to
|
|
// fuzz this target since the integrity checks could be forged by a
|
|
// malicious adversary who receives a call.
|
|
std::unique_ptr<cricket::IceMessage> stun_msg(new cricket::IceMessage());
|
|
rtc::ByteBufferReader buf(rtc::MakeArrayView(data, size));
|
|
stun_msg->Read(&buf);
|
|
stun_msg->ValidateMessageIntegrity("");
|
|
}
|
|
} // namespace webrtc
|