Remove unused Dr. Fuzz function from QuicFramerTest gfe-relnote: n/a (test-only change) PiperOrigin-RevId: 254030961 Change-Id: I22c9be832d2dc1fbf41651f68f18b4ce4b36bbf7
diff --git a/quic/core/quic_framer_test.cc b/quic/core/quic_framer_test.cc index 6dd3603..c2aea06 100644 --- a/quic/core/quic_framer_test.cc +++ b/quic/core/quic_framer_test.cc
@@ -10256,144 +10256,6 @@ EXPECT_EQ(QUIC_INVALID_FRAME_DATA, framer_.error()); } -// Tests for fuzzing with Dr. Fuzz -// Xref http://www.chromium.org/developers/testing/dr-fuzz for more details. -#ifdef __cplusplus -extern "C" { -#endif - -// target function to be fuzzed by Dr. Fuzz -void QuicFramerFuzzFunc(unsigned char* data, - size_t size, - const ParsedQuicVersion& version) { - QuicFramer framer(AllSupportedVersions(), QuicTime::Zero(), - Perspective::IS_SERVER, kQuicDefaultConnectionIdLength); - ASSERT_EQ(GetQuicFlag(FLAGS_quic_supports_tls_handshake), true); - const char* const packet_bytes = reinterpret_cast<const char*>(data); - - // Test the CryptoFramer. - QuicStringPiece crypto_input(packet_bytes, size); - std::unique_ptr<CryptoHandshakeMessage> handshake_message( - CryptoFramer::ParseMessage(crypto_input)); - - // Test the regular QuicFramer with the same input. - NoOpFramerVisitor visitor; - framer.set_visitor(&visitor); - framer.set_version(version); - QuicEncryptedPacket packet(packet_bytes, size); - framer.ProcessPacket(packet); -} - -#ifdef __cplusplus -} -#endif - -TEST_P(QuicFramerTest, FramerFuzzTest) { - // clang-format off - unsigned char packet[] = { - // public flags (8 byte connection_id) - 0x2C, - // connection_id - 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10, - // packet number - 0x12, 0x34, 0x56, 0x78, - // private flags - 0x00, - - // frame type (stream frame with fin) - 0xFF, - // stream id - 0x01, 0x02, 0x03, 0x04, - // offset - 0x3A, 0x98, 0xFE, 0xDC, - 0x32, 0x10, 0x76, 0x54, - // data length - 0x00, 0x0c, - // data - 'h', 'e', 'l', 'l', - 'o', ' ', 'w', 'o', - 'r', 'l', 'd', '!', - }; - - unsigned char packet44[] = { - // type (short header, 4 byte packet number) - 0x32, - // packet number - 0x12, 0x34, 0x56, 0x78, - - // frame type (stream frame with fin, length, and offset bits set) - 0x10 | 0x01 | 0x02 | 0x04, - // stream id - 0x01, 0x02, 0x03, 0x04, - // offset - 0x3A, 0x98, 0xFE, 0xDC, - 0x32, 0x10, 0x76, 0x54, - // data length - 0x00, 0x0c, - // data - 'h', 'e', 'l', 'l', - 'o', ' ', 'w', 'o', - 'r', 'l', 'd', '!', - }; - - unsigned char packet46[] = { - // type (short header, 4 byte packet number) - 0x43, - // packet number - 0x12, 0x34, 0x56, 0x78, - - // frame type (stream frame with fin, length, and offset bits set) - 0x10 | 0x01 | 0x02 | 0x04, - // stream id - 0x01, 0x02, 0x03, 0x04, - // offset - 0x3A, 0x98, 0xFE, 0xDC, - 0x32, 0x10, 0x76, 0x54, - // data length - 0x00, 0x0c, - // data - 'h', 'e', 'l', 'l', - 'o', ' ', 'w', 'o', - 'r', 'l', 'd', '!', - }; - - unsigned char packet99[] = { - // type (short header, 4 byte packet number) - 0x43, - // packet number - 0x12, 0x34, 0x56, 0x78, - - // frame type (IETF_STREAM frame with fin, length, and offset bits set) - 0x08 | 0x01 | 0x02 | 0x04, - // stream id - 0x01, 0x02, 0x03, 0x04, - // offset - 0x3A, 0x98, 0xFE, 0xDC, - 0x32, 0x10, 0x76, 0x54, - // data length - 0x00, 0x0c, - // data - 'h', 'e', 'l', 'l', - 'o', ' ', 'w', 'o', - 'r', 'l', 'd', '!', - }; - // clang-format on - - unsigned char* p = packet; - if (VersionHasIetfQuicFrames(framer_.transport_version())) { - p = packet99; - } else if (framer_.transport_version() > QUIC_VERSION_44) { - p = packet46; - } else if (framer_.transport_version() > QUIC_VERSION_43) { - p = packet44; - } - QuicFramerFuzzFunc(p, - framer_.transport_version() > QUIC_VERSION_43 - ? QUIC_ARRAYSIZE(packet44) - : QUIC_ARRAYSIZE(packet), - framer_.version()); -} - TEST_P(QuicFramerTest, IetfBlockedFrame) { // This test only for version 99. if (!VersionHasIetfQuicFrames(framer_.transport_version())) {