commit | a4acdb5760dd27d5d9e3a961778f456081e82bee | [log] [tgz] |
---|---|---|
author | sergeyu <sergeyu@chromium.org> | Thu Jan 19 18:53:35 2017 |
committer | Commit bot <commit-bot@chromium.org> | Thu Jan 19 18:53:35 2017 |
tree | 8b12513c0e2b3698f1b2b409c0dbc68a006aaa53 | |
parent | 7bc4ea00d0ae0dd78fd9684582eb7bcabfbca6b4 [diff] |
Fix PseudoTcp to handle incoming packets with invalid SEQ field Previously PseudoTcp::process() didn't handle the case when the peer sends a packet that's outside of the receive window, which was causing DCHECK failures in the fuzzer. BUG=681849 Review-Url: https://codereview.webrtc.org/2640173002 Cr-Original-Commit-Position: refs/heads/master@{#16169} Cr-Mirrored-From: https://chromium.googlesource.com/external/webrtc Cr-Mirrored-Commit: d74886350e432547e7a70095170fe1a9a0dab0c8