Ensure that a conncheck reply is coming from an address and port of a
known remote candidate and that the type of incoming socket matches that
candidate's transport.
Attemps to fix a Coverity issue in which no matching remote_candidate
gets found for a connectivity reply in conn_check_handle_inbound_stun()
(apparently due to transport mismatch), yet
priv_map_reply_to_conn_check_request() still successfully matches it
with a previous request.
return TRUE;
}
+ if (remote_candidate == NULL) {
+ candidate_check_pair_fail (stream, agent, p);
+ if (nice_debug_is_enabled ()) {
+ nice_debug ("Agent %p : pair %p FAILED "
+ "(got a matching pair without a known remote candidate).", agent, p);
+ }
+ return TRUE;
+ }
+
/* note: CONNECTED but not yet READY, see docs */
/* step: handle the possible case of a peer-reflexive