@@ -39,23 +39,21 @@ FUZZ_TARGET_INIT(data_stream_addr_man, initialize_addrman)
39
39
class AddrManDeterministic : public AddrMan
40
40
{
41
41
public:
42
- FuzzedDataProvider& m_fuzzed_data_provider;
43
-
44
42
explicit AddrManDeterministic (std::vector<bool > asmap, FuzzedDataProvider& fuzzed_data_provider)
45
43
: AddrMan(std::move(asmap), /* deterministic */ true, /* consistency_check_ratio */ 0)
46
- , m_fuzzed_data_provider(fuzzed_data_provider)
47
44
{
48
45
WITH_LOCK (m_impl->cs , m_impl->insecure_rand = FastRandomContext{ConsumeUInt256 (fuzzed_data_provider)});
49
46
}
50
47
51
48
/* *
52
49
* Generate a random address. Always returns a valid address.
53
50
*/
54
- CNetAddr RandAddr (FastRandomContext& fast_random_context) EXCLUSIVE_LOCKS_REQUIRED(m_impl->cs)
51
+ CNetAddr RandAddr (FuzzedDataProvider& fuzzed_data_provider, FastRandomContext& fast_random_context)
52
+ EXCLUSIVE_LOCKS_REQUIRED(m_impl->cs)
55
53
{
56
54
CNetAddr addr;
57
- if (m_fuzzed_data_provider .remaining_bytes () > 1 && m_fuzzed_data_provider .ConsumeBool ()) {
58
- addr = ConsumeNetAddr (m_fuzzed_data_provider );
55
+ if (fuzzed_data_provider .remaining_bytes () > 1 && fuzzed_data_provider .ConsumeBool ()) {
56
+ addr = ConsumeNetAddr (fuzzed_data_provider );
59
57
} else {
60
58
// The networks [1..6] correspond to CNetAddr::BIP155Network (private).
61
59
static const std::map<uint8_t , uint8_t > net_len_map = {{1 , ADDR_IPV4_SIZE},
@@ -89,27 +87,27 @@ class AddrManDeterministic : public AddrMan
89
87
/* *
90
88
* Fill this addrman with lots of addresses from lots of sources.
91
89
*/
92
- void Fill ()
90
+ void Fill (FuzzedDataProvider& fuzzed_data_provider )
93
91
{
94
92
LOCK (m_impl->cs );
95
93
96
94
// Add some of the addresses directly to the "tried" table.
97
95
98
96
// 0, 1, 2, 3 corresponding to 0%, 100%, 50%, 33%
99
- const size_t n = m_fuzzed_data_provider .ConsumeIntegralInRange <size_t >(0 , 3 );
97
+ const size_t n = fuzzed_data_provider .ConsumeIntegralInRange <size_t >(0 , 3 );
100
98
101
- const size_t num_sources = m_fuzzed_data_provider .ConsumeIntegralInRange <size_t >(1 , 50 );
99
+ const size_t num_sources = fuzzed_data_provider .ConsumeIntegralInRange <size_t >(1 , 50 );
102
100
CNetAddr prev_source;
103
101
// Generate a FastRandomContext seed to use inside the loops instead of
104
- // m_fuzzed_data_provider . When m_fuzzed_data_provider is exhausted it
102
+ // fuzzed_data_provider . When fuzzed_data_provider is exhausted it
105
103
// just returns 0.
106
- FastRandomContext fast_random_context{ConsumeUInt256 (m_fuzzed_data_provider )};
104
+ FastRandomContext fast_random_context{ConsumeUInt256 (fuzzed_data_provider )};
107
105
for (size_t i = 0 ; i < num_sources; ++i) {
108
- const auto source = RandAddr (fast_random_context);
106
+ const auto source = RandAddr (fuzzed_data_provider, fast_random_context);
109
107
const size_t num_addresses = fast_random_context.randrange (500 ) + 1 ; // [1..500]
110
108
111
109
for (size_t j = 0 ; j < num_addresses; ++j) {
112
- const auto addr = CAddress{CService{RandAddr (fast_random_context), 8333 }, NODE_NETWORK};
110
+ const auto addr = CAddress{CService{RandAddr (fuzzed_data_provider, fast_random_context), 8333 }, NODE_NETWORK};
113
111
const auto time_penalty = fast_random_context.randrange (100000001 );
114
112
m_impl->Add_ (addr, source, time_penalty);
115
113
@@ -310,7 +308,7 @@ FUZZ_TARGET_INIT(addrman_serdeser, initialize_addrman)
310
308
311
309
CDataStream data_stream (SER_NETWORK, PROTOCOL_VERSION);
312
310
313
- addr_man1.Fill ();
311
+ addr_man1.Fill (fuzzed_data_provider );
314
312
data_stream << addr_man1;
315
313
data_stream >> addr_man2;
316
314
assert (addr_man1 == addr_man2);
0 commit comments