mirror of
https://github.com/mollyim/webrtc.git
synced 2025-05-19 08:37:54 +01:00

In order to eliminate the WebRTC Subtree mirror in Chromium, WebRTC is moving the content of the src/webrtc directory up to the src/ directory. NOPRESUBMIT=true NOTREECHECKS=true NOTRY=true TBR=tommi@webrtc.org Bug: chromium:611808 Change-Id: Iac59c5b51b950f174119565bac87955a7994bc38 Reviewed-on: https://webrtc-review.googlesource.com/1560 Commit-Queue: Mirko Bonadei <mbonadei@webrtc.org> Reviewed-by: Henrik Kjellander <kjellander@webrtc.org> Cr-Commit-Position: refs/heads/master@{#19845}
28 lines
1 KiB
C++
28 lines
1 KiB
C++
/*
|
|
* Copyright (c) 2016 The WebRTC project authors. All Rights Reserved.
|
|
*
|
|
* Use of this source code is governed by a BSD-style license
|
|
* that can be found in the LICENSE file in the root of the source
|
|
* tree. An additional intellectual property rights grant can be found
|
|
* in the file PATENTS. All contributing project authors may
|
|
* be found in the AUTHORS file in the root of the source tree.
|
|
*/
|
|
|
|
#include <stddef.h>
|
|
#include <stdint.h>
|
|
|
|
#include "webrtc/p2p/base/stun.h"
|
|
|
|
namespace webrtc {
|
|
void FuzzOneInput(const uint8_t* data, size_t size) {
|
|
const char* message = reinterpret_cast<const char*>(data);
|
|
|
|
// Normally we'd check the integrity first, but those checks are
|
|
// fuzzed separately in stun_validator_fuzzer.cc. We still want to
|
|
// fuzz this target since the integrity checks could be forged by a
|
|
// malicious adversary who receives a call.
|
|
std::unique_ptr<cricket::IceMessage> stun_msg(new cricket::IceMessage());
|
|
rtc::ByteBufferReader buf(message, size);
|
|
stun_msg->Read(&buf);
|
|
}
|
|
} // namespace webrtc
|