Index: webrtc/test/fuzzers/stun_parser_fuzzer.cc |
diff --git a/webrtc/test/fuzzers/stun_parser_fuzzer.cc b/webrtc/test/fuzzers/stun_parser_fuzzer.cc |
deleted file mode 100644 |
index 02f10b195cbc80423a264d39266b7842d3901337..0000000000000000000000000000000000000000 |
--- a/webrtc/test/fuzzers/stun_parser_fuzzer.cc |
+++ /dev/null |
@@ -1,28 +0,0 @@ |
-/* |
- * Copyright (c) 2016 The WebRTC project authors. All Rights Reserved. |
- * |
- * Use of this source code is governed by a BSD-style license |
- * that can be found in the LICENSE file in the root of the source |
- * tree. An additional intellectual property rights grant can be found |
- * in the file PATENTS. All contributing project authors may |
- * be found in the AUTHORS file in the root of the source tree. |
- */ |
- |
-#include <stddef.h> |
-#include <stdint.h> |
- |
-#include "webrtc/p2p/base/stun.h" |
- |
-namespace webrtc { |
-void FuzzOneInput(const uint8_t* data, size_t size) { |
- const char* message = reinterpret_cast<const char*>(data); |
- |
- // Normally we'd check the integrity first, but those checks are |
- // fuzzed separately in stun_validator_fuzzer.cc. We still want to |
- // fuzz this target since the integrity checks could be forged by a |
- // malicious adversary who receives a call. |
- std::unique_ptr<cricket::IceMessage> stun_msg(new cricket::IceMessage()); |
- rtc::ByteBufferReader buf(message, size); |
- stun_msg->Read(&buf); |
-} |
-} // namespace webrtc |