mirror of
https://github.com/vel21ripn/nDPI.git
synced 2026-05-02 00:40:17 +00:00
RTP/STUN: look for STUN packets after RTP/RTCP classification (#2465)
After a flow has been classified as RTP or RTCP, nDPI might analyse more packets to look for STUN/DTLS packets, i.e. to try to tell if this flow is a "pure" RTP/RTCP flow or if the RTP/RTCP packets are multiplexed with STUN/DTLS. Useful for proper (sub)classification when the beginning of the flows are not captured or if there are lost packets in the the captured traffic. Disabled by default
This commit is contained in:
parent
070a0908b3
commit
b90d39c4ac
10 changed files with 116 additions and 13 deletions
|
|
@ -218,6 +218,11 @@ extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
|
|||
snprintf(cfg_value, sizeof(cfg_value), "%d", value);
|
||||
ndpi_set_config(ndpi_info_mod, "zoom", "max_packets_extra_dissection", cfg_value);
|
||||
}
|
||||
if(fuzzed_data.ConsumeBool()) {
|
||||
value = fuzzed_data.ConsumeIntegralInRange(0, 0x01 + 1);
|
||||
snprintf(cfg_value, sizeof(cfg_value), "%d", value);
|
||||
ndpi_set_config(ndpi_info_mod, "rtp", "search_for_stun", cfg_value);
|
||||
}
|
||||
if(fuzzed_data.ConsumeBool()) {
|
||||
value = fuzzed_data.ConsumeIntegralInRange(0, 1 + 1);
|
||||
snprintf(cfg_value, sizeof(cfg_value), "%d", value);
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue