Remove unused Dr. Fuzz function from QuicFramerTest
gfe-relnote: n/a (test-only change)
PiperOrigin-RevId: 254030961
Change-Id: I22c9be832d2dc1fbf41651f68f18b4ce4b36bbf7
diff --git a/quic/core/quic_framer_test.cc b/quic/core/quic_framer_test.cc
index 6dd3603..c2aea06 100644
--- a/quic/core/quic_framer_test.cc
+++ b/quic/core/quic_framer_test.cc
@@ -10256,144 +10256,6 @@
EXPECT_EQ(QUIC_INVALID_FRAME_DATA, framer_.error());
}
-// Tests for fuzzing with Dr. Fuzz
-// Xref http://www.chromium.org/developers/testing/dr-fuzz for more details.
-#ifdef __cplusplus
-extern "C" {
-#endif
-
-// target function to be fuzzed by Dr. Fuzz
-void QuicFramerFuzzFunc(unsigned char* data,
- size_t size,
- const ParsedQuicVersion& version) {
- QuicFramer framer(AllSupportedVersions(), QuicTime::Zero(),
- Perspective::IS_SERVER, kQuicDefaultConnectionIdLength);
- ASSERT_EQ(GetQuicFlag(FLAGS_quic_supports_tls_handshake), true);
- const char* const packet_bytes = reinterpret_cast<const char*>(data);
-
- // Test the CryptoFramer.
- QuicStringPiece crypto_input(packet_bytes, size);
- std::unique_ptr<CryptoHandshakeMessage> handshake_message(
- CryptoFramer::ParseMessage(crypto_input));
-
- // Test the regular QuicFramer with the same input.
- NoOpFramerVisitor visitor;
- framer.set_visitor(&visitor);
- framer.set_version(version);
- QuicEncryptedPacket packet(packet_bytes, size);
- framer.ProcessPacket(packet);
-}
-
-#ifdef __cplusplus
-}
-#endif
-
-TEST_P(QuicFramerTest, FramerFuzzTest) {
- // clang-format off
- unsigned char packet[] = {
- // public flags (8 byte connection_id)
- 0x2C,
- // connection_id
- 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10,
- // packet number
- 0x12, 0x34, 0x56, 0x78,
- // private flags
- 0x00,
-
- // frame type (stream frame with fin)
- 0xFF,
- // stream id
- 0x01, 0x02, 0x03, 0x04,
- // offset
- 0x3A, 0x98, 0xFE, 0xDC,
- 0x32, 0x10, 0x76, 0x54,
- // data length
- 0x00, 0x0c,
- // data
- 'h', 'e', 'l', 'l',
- 'o', ' ', 'w', 'o',
- 'r', 'l', 'd', '!',
- };
-
- unsigned char packet44[] = {
- // type (short header, 4 byte packet number)
- 0x32,
- // packet number
- 0x12, 0x34, 0x56, 0x78,
-
- // frame type (stream frame with fin, length, and offset bits set)
- 0x10 | 0x01 | 0x02 | 0x04,
- // stream id
- 0x01, 0x02, 0x03, 0x04,
- // offset
- 0x3A, 0x98, 0xFE, 0xDC,
- 0x32, 0x10, 0x76, 0x54,
- // data length
- 0x00, 0x0c,
- // data
- 'h', 'e', 'l', 'l',
- 'o', ' ', 'w', 'o',
- 'r', 'l', 'd', '!',
- };
-
- unsigned char packet46[] = {
- // type (short header, 4 byte packet number)
- 0x43,
- // packet number
- 0x12, 0x34, 0x56, 0x78,
-
- // frame type (stream frame with fin, length, and offset bits set)
- 0x10 | 0x01 | 0x02 | 0x04,
- // stream id
- 0x01, 0x02, 0x03, 0x04,
- // offset
- 0x3A, 0x98, 0xFE, 0xDC,
- 0x32, 0x10, 0x76, 0x54,
- // data length
- 0x00, 0x0c,
- // data
- 'h', 'e', 'l', 'l',
- 'o', ' ', 'w', 'o',
- 'r', 'l', 'd', '!',
- };
-
- unsigned char packet99[] = {
- // type (short header, 4 byte packet number)
- 0x43,
- // packet number
- 0x12, 0x34, 0x56, 0x78,
-
- // frame type (IETF_STREAM frame with fin, length, and offset bits set)
- 0x08 | 0x01 | 0x02 | 0x04,
- // stream id
- 0x01, 0x02, 0x03, 0x04,
- // offset
- 0x3A, 0x98, 0xFE, 0xDC,
- 0x32, 0x10, 0x76, 0x54,
- // data length
- 0x00, 0x0c,
- // data
- 'h', 'e', 'l', 'l',
- 'o', ' ', 'w', 'o',
- 'r', 'l', 'd', '!',
- };
- // clang-format on
-
- unsigned char* p = packet;
- if (VersionHasIetfQuicFrames(framer_.transport_version())) {
- p = packet99;
- } else if (framer_.transport_version() > QUIC_VERSION_44) {
- p = packet46;
- } else if (framer_.transport_version() > QUIC_VERSION_43) {
- p = packet44;
- }
- QuicFramerFuzzFunc(p,
- framer_.transport_version() > QUIC_VERSION_43
- ? QUIC_ARRAYSIZE(packet44)
- : QUIC_ARRAYSIZE(packet),
- framer_.version());
-}
-
TEST_P(QuicFramerTest, IetfBlockedFrame) {
// This test only for version 99.
if (!VersionHasIetfQuicFrames(framer_.transport_version())) {