scripted-diff: Use new FUZZ_TARGET macro everywhere

-BEGIN VERIFY SCRIPT-

  ren() { sed --regexp-extended -i "s|$1|$2|g" $(git grep -l --extended-regexp "$1"); }

  # Replace FUZZ_TARGET_INIT
  ren 'FUZZ_TARGET_INIT\((.+), (.+)\)' 'FUZZ_TARGET(\1, .init = \2)'

  # Delete unused FUZZ_TARGET_INIT
  sed -i -e '37,39d' src/test/fuzz/fuzz.h

-END VERIFY SCRIPT-
This commit is contained in:
MarcoFalke 2023-07-11 14:33:31 +02:00
parent fa36ad8b09
commit fa6dfaaf45
No known key found for this signature in database
46 changed files with 54 additions and 57 deletions

View File

@ -46,7 +46,7 @@ void initialize_addrman()
return NetGroupManager(asmap); return NetGroupManager(asmap);
} }
FUZZ_TARGET_INIT(data_stream_addr_man, initialize_addrman) FUZZ_TARGET(data_stream_addr_man, .init = initialize_addrman)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
CDataStream data_stream = ConsumeDataStream(fuzzed_data_provider); CDataStream data_stream = ConsumeDataStream(fuzzed_data_provider);
@ -233,7 +233,7 @@ public:
} }
}; };
FUZZ_TARGET_INIT(addrman, initialize_addrman) FUZZ_TARGET(addrman, .init = initialize_addrman)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
SetMockTime(ConsumeTime(fuzzed_data_provider)); SetMockTime(ConsumeTime(fuzzed_data_provider));
@ -311,7 +311,7 @@ FUZZ_TARGET_INIT(addrman, initialize_addrman)
} }
// Check that serialize followed by unserialize produces the same addrman. // Check that serialize followed by unserialize produces the same addrman.
FUZZ_TARGET_INIT(addrman_serdeser, initialize_addrman) FUZZ_TARGET(addrman_serdeser, .init = initialize_addrman)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
SetMockTime(ConsumeTime(fuzzed_data_provider)); SetMockTime(ConsumeTime(fuzzed_data_provider));

View File

@ -40,7 +40,7 @@ static bool operator==(const CBanEntry& lhs, const CBanEntry& rhs)
lhs.nBanUntil == rhs.nBanUntil; lhs.nBanUntil == rhs.nBanUntil;
} }
FUZZ_TARGET_INIT(banman, initialize_banman) FUZZ_TARGET(banman, .init = initialize_banman)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
SetMockTime(ConsumeTime(fuzzed_data_provider)); SetMockTime(ConsumeTime(fuzzed_data_provider));

View File

@ -31,7 +31,7 @@ void InitRandData()
} // namespace } // namespace
FUZZ_TARGET_INIT(bitdeque, InitRandData) FUZZ_TARGET(bitdeque, .init = InitRandData)
{ {
FuzzedDataProvider provider(buffer.data(), buffer.size()); FuzzedDataProvider provider(buffer.data(), buffer.size());
FastRandomContext ctx(true); FastRandomContext ctx(true);

View File

@ -23,7 +23,7 @@ void initialize_block()
SelectParams(ChainType::REGTEST); SelectParams(ChainType::REGTEST);
} }
FUZZ_TARGET_INIT(block, initialize_block) FUZZ_TARGET(block, .init = initialize_block)
{ {
CDataStream ds(buffer, SER_NETWORK, INIT_PROTO_VERSION); CDataStream ds(buffer, SER_NETWORK, INIT_PROTO_VERSION);
CBlock block; CBlock block;

View File

@ -41,7 +41,7 @@ void initialize_coins_view()
g_setup = testing_setup.get(); g_setup = testing_setup.get();
} }
FUZZ_TARGET_INIT(coins_view, initialize_coins_view) FUZZ_TARGET(coins_view, .init = initialize_coins_view)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
CCoinsView backend_coins_view; CCoinsView backend_coins_view;

View File

@ -28,7 +28,7 @@ void initialize_connman()
g_setup = testing_setup.get(); g_setup = testing_setup.get();
} }
FUZZ_TARGET_INIT(connman, initialize_connman) FUZZ_TARGET(connman, .init = initialize_connman)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
SetMockTime(ConsumeTime(fuzzed_data_provider)); SetMockTime(ConsumeTime(fuzzed_data_provider));

View File

@ -14,7 +14,7 @@ void initialize_descriptor_parse()
SelectParams(ChainType::MAIN); SelectParams(ChainType::MAIN);
} }
FUZZ_TARGET_INIT(descriptor_parse, initialize_descriptor_parse) FUZZ_TARGET(descriptor_parse, .init = initialize_descriptor_parse)
{ {
const std::string descriptor(buffer.begin(), buffer.end()); const std::string descriptor(buffer.begin(), buffer.end());
FlatSigningProvider signing_provider; FlatSigningProvider signing_provider;

View File

@ -49,7 +49,7 @@ void initialize_deserialize()
} }
#define FUZZ_TARGET_DESERIALIZE(name, code) \ #define FUZZ_TARGET_DESERIALIZE(name, code) \
FUZZ_TARGET_INIT(name, initialize_deserialize) \ FUZZ_TARGET(name, .init = initialize_deserialize) \
{ \ { \
try { \ try { \
code \ code \

View File

@ -34,9 +34,6 @@ void FuzzFrameworkRegisterTarget(std::string_view name, TypeTestOneInput target,
#define FUZZ_TARGET(...) DETAIL_FUZZ(__VA_ARGS__) #define FUZZ_TARGET(...) DETAIL_FUZZ(__VA_ARGS__)
#endif #endif
#define FUZZ_TARGET_INIT(name, init_fun) \
FUZZ_TARGET(name, .init = init_fun)
#define DETAIL_FUZZ(name, ...) \ #define DETAIL_FUZZ(name, ...) \
void name##_fuzz_target(FuzzBufferType); \ void name##_fuzz_target(FuzzBufferType); \
struct name##_Before_Main { \ struct name##_Before_Main { \

View File

@ -46,7 +46,7 @@ public:
} }
}; };
FUZZ_TARGET_INIT(headers_sync_state, initialize_headers_sync_state_fuzz) FUZZ_TARGET(headers_sync_state, .init = initialize_headers_sync_state_fuzz)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
auto mock_time{ConsumeTime(fuzzed_data_provider)}; auto mock_time{ConsumeTime(fuzzed_data_provider)};

View File

@ -18,7 +18,7 @@ void initialize_i2p()
static const auto testing_setup = MakeNoLogFileContext<>(); static const auto testing_setup = MakeNoLogFileContext<>();
} }
FUZZ_TARGET_INIT(i2p, initialize_i2p) FUZZ_TARGET(i2p, .init = initialize_i2p)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};

View File

@ -46,7 +46,7 @@ void initialize_integer()
SelectParams(ChainType::REGTEST); SelectParams(ChainType::REGTEST);
} }
FUZZ_TARGET_INIT(integer, initialize_integer) FUZZ_TARGET(integer, .init = initialize_integer)
{ {
if (buffer.size() < sizeof(uint256) + sizeof(uint160)) { if (buffer.size() < sizeof(uint256) + sizeof(uint160)) {
return; return;

View File

@ -35,7 +35,7 @@ void initialize_key()
SelectParams(ChainType::REGTEST); SelectParams(ChainType::REGTEST);
} }
FUZZ_TARGET_INIT(key, initialize_key) FUZZ_TARGET(key, .init = initialize_key)
{ {
const CKey key = [&] { const CKey key = [&] {
CKey k; CKey k;
@ -308,7 +308,7 @@ FUZZ_TARGET_INIT(key, initialize_key)
} }
} }
FUZZ_TARGET_INIT(ellswift_roundtrip, initialize_key) FUZZ_TARGET(ellswift_roundtrip, .init = initialize_key)
{ {
FuzzedDataProvider fdp{buffer.data(), buffer.size()}; FuzzedDataProvider fdp{buffer.data(), buffer.size()};
@ -327,7 +327,7 @@ FUZZ_TARGET_INIT(ellswift_roundtrip, initialize_key)
assert(key.VerifyPubKey(decoded_pubkey)); assert(key.VerifyPubKey(decoded_pubkey));
} }
FUZZ_TARGET_INIT(bip324_ecdh, initialize_key) FUZZ_TARGET(bip324_ecdh, .init = initialize_key)
{ {
FuzzedDataProvider fdp{buffer.data(), buffer.size()}; FuzzedDataProvider fdp{buffer.data(), buffer.size()};

View File

@ -18,7 +18,7 @@ void initialize_key_io()
SelectParams(ChainType::MAIN); SelectParams(ChainType::MAIN);
} }
FUZZ_TARGET_INIT(key_io, initialize_key_io) FUZZ_TARGET(key_io, .init = initialize_key_io)
{ {
const std::string random_string(buffer.begin(), buffer.end()); const std::string random_string(buffer.begin(), buffer.end());

View File

@ -23,7 +23,7 @@ void initialize_load_external_block_file()
g_setup = testing_setup.get(); g_setup = testing_setup.get();
} }
FUZZ_TARGET_INIT(load_external_block_file, initialize_load_external_block_file) FUZZ_TARGET(load_external_block_file, .init = initialize_load_external_block_file)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
FuzzedFileProvider fuzzed_file_provider = ConsumeFile(fuzzed_data_provider); FuzzedFileProvider fuzzed_file_provider = ConsumeFile(fuzzed_data_provider);

View File

@ -23,7 +23,7 @@ void initialize_message()
SelectParams(ChainType::REGTEST); SelectParams(ChainType::REGTEST);
} }
FUZZ_TARGET_INIT(message, initialize_message) FUZZ_TARGET(message, .init = initialize_message)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
const std::string random_message = fuzzed_data_provider.ConsumeRandomLengthString(1024); const std::string random_message = fuzzed_data_provider.ConsumeRandomLengthString(1024);

View File

@ -30,7 +30,7 @@ void initialize_miner()
} }
// Test that the MiniMiner can run with various outpoints and feerates. // Test that the MiniMiner can run with various outpoints and feerates.
FUZZ_TARGET_INIT(mini_miner, initialize_miner) FUZZ_TARGET(mini_miner, .init = initialize_miner)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
CTxMemPool pool{CTxMemPool::Options{}}; CTxMemPool pool{CTxMemPool::Options{}};
@ -106,7 +106,7 @@ FUZZ_TARGET_INIT(mini_miner, initialize_miner)
} }
// Test that MiniMiner and BlockAssembler build the same block given the same transactions and constraints. // Test that MiniMiner and BlockAssembler build the same block given the same transactions and constraints.
FUZZ_TARGET_INIT(mini_miner_selection, initialize_miner) FUZZ_TARGET(mini_miner_selection, .init = initialize_miner)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
CTxMemPool pool{CTxMemPool::Options{}}; CTxMemPool pool{CTxMemPool::Options{}};

View File

@ -1058,7 +1058,7 @@ void FuzzInitSmart()
} }
/** Fuzz target that runs TestNode on nodes generated using ConsumeNodeStable. */ /** Fuzz target that runs TestNode on nodes generated using ConsumeNodeStable. */
FUZZ_TARGET_INIT(miniscript_stable, FuzzInit) FUZZ_TARGET(miniscript_stable, .init = FuzzInit)
{ {
FuzzedDataProvider provider(buffer.data(), buffer.size()); FuzzedDataProvider provider(buffer.data(), buffer.size());
TestNode(GenNode([&](Type needed_type) { TestNode(GenNode([&](Type needed_type) {
@ -1067,7 +1067,7 @@ FUZZ_TARGET_INIT(miniscript_stable, FuzzInit)
} }
/** Fuzz target that runs TestNode on nodes generated using ConsumeNodeSmart. */ /** Fuzz target that runs TestNode on nodes generated using ConsumeNodeSmart. */
FUZZ_TARGET_INIT(miniscript_smart, FuzzInitSmart) FUZZ_TARGET(miniscript_smart, .init = FuzzInitSmart)
{ {
/** The set of types we aim to construct nodes for. Together they cover all. */ /** The set of types we aim to construct nodes for. Together they cover all. */
static constexpr std::array<Type, 4> BASE_TYPES{"B"_mst, "V"_mst, "K"_mst, "W"_mst}; static constexpr std::array<Type, 4> BASE_TYPES{"B"_mst, "V"_mst, "K"_mst, "W"_mst};
@ -1079,7 +1079,7 @@ FUZZ_TARGET_INIT(miniscript_smart, FuzzInitSmart)
} }
/* Fuzz tests that test parsing from a string, and roundtripping via string. */ /* Fuzz tests that test parsing from a string, and roundtripping via string. */
FUZZ_TARGET_INIT(miniscript_string, FuzzInit) FUZZ_TARGET(miniscript_string, .init = FuzzInit)
{ {
FuzzedDataProvider provider(buffer.data(), buffer.size()); FuzzedDataProvider provider(buffer.data(), buffer.size());
auto str = provider.ConsumeRemainingBytesAsString(); auto str = provider.ConsumeRemainingBytesAsString();

View File

@ -27,7 +27,7 @@ void initialize_net()
static const auto testing_setup = MakeNoLogFileContext<>(ChainType::MAIN); static const auto testing_setup = MakeNoLogFileContext<>(ChainType::MAIN);
} }
FUZZ_TARGET_INIT(net, initialize_net) FUZZ_TARGET(net, .init = initialize_net)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
SetMockTime(ConsumeTime(fuzzed_data_provider)); SetMockTime(ConsumeTime(fuzzed_data_provider));

View File

@ -22,7 +22,7 @@ void initialize_p2p_transport_serialization()
SelectParams(ChainType::REGTEST); SelectParams(ChainType::REGTEST);
} }
FUZZ_TARGET_INIT(p2p_transport_serialization, initialize_p2p_transport_serialization) FUZZ_TARGET(p2p_transport_serialization, .init = initialize_p2p_transport_serialization)
{ {
// Construct deserializer, with a dummy NodeId // Construct deserializer, with a dummy NodeId
V1TransportDeserializer deserializer{Params(), NodeId{0}, SER_NETWORK, INIT_PROTO_VERSION}; V1TransportDeserializer deserializer{Params(), NodeId{0}, SER_NETWORK, INIT_PROTO_VERSION};

View File

@ -17,7 +17,7 @@ void initialize_parse_univalue()
SelectParams(ChainType::REGTEST); SelectParams(ChainType::REGTEST);
} }
FUZZ_TARGET_INIT(parse_univalue, initialize_parse_univalue) FUZZ_TARGET(parse_univalue, .init = initialize_parse_univalue)
{ {
const std::string random_string(buffer.begin(), buffer.end()); const std::string random_string(buffer.begin(), buffer.end());
bool valid = true; bool valid = true;

View File

@ -40,7 +40,7 @@ PartiallyDownloadedBlock::CheckBlockFn FuzzedCheckBlock(std::optional<BlockValid
}; };
} }
FUZZ_TARGET_INIT(partially_downloaded_block, initialize_pdb) FUZZ_TARGET(partially_downloaded_block, .init = initialize_pdb)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};

View File

@ -28,7 +28,7 @@ void initialize_policy_estimator()
g_setup = testing_setup.get(); g_setup = testing_setup.get();
} }
FUZZ_TARGET_INIT(policy_estimator, initialize_policy_estimator) FUZZ_TARGET(policy_estimator, .init = initialize_policy_estimator)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
CBlockPolicyEstimator block_policy_estimator{FeeestPath(*g_setup->m_node.args), DEFAULT_ACCEPT_STALE_FEE_ESTIMATES}; CBlockPolicyEstimator block_policy_estimator{FeeestPath(*g_setup->m_node.args), DEFAULT_ACCEPT_STALE_FEE_ESTIMATES};

View File

@ -22,7 +22,7 @@ void initialize_policy_estimator_io()
g_setup = testing_setup.get(); g_setup = testing_setup.get();
} }
FUZZ_TARGET_INIT(policy_estimator_io, initialize_policy_estimator_io) FUZZ_TARGET(policy_estimator_io, .init = initialize_policy_estimator_io)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
FuzzedAutoFileProvider fuzzed_auto_file_provider = ConsumeAutoFile(fuzzed_data_provider); FuzzedAutoFileProvider fuzzed_auto_file_provider = ConsumeAutoFile(fuzzed_data_provider);

View File

@ -23,7 +23,7 @@ void initialize_pow()
SelectParams(ChainType::MAIN); SelectParams(ChainType::MAIN);
} }
FUZZ_TARGET_INIT(pow, initialize_pow) FUZZ_TARGET(pow, .init = initialize_pow)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
const Consensus::Params& consensus_params = Params().GetConsensus(); const Consensus::Params& consensus_params = Params().GetConsensus();
@ -87,7 +87,7 @@ FUZZ_TARGET_INIT(pow, initialize_pow)
} }
FUZZ_TARGET_INIT(pow_transition, initialize_pow) FUZZ_TARGET(pow_transition, .init = initialize_pow)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
const Consensus::Params& consensus_params{Params().GetConsensus()}; const Consensus::Params& consensus_params{Params().GetConsensus()};

View File

@ -58,7 +58,7 @@ void initialize_process_message()
SyncWithValidationInterfaceQueue(); SyncWithValidationInterfaceQueue();
} }
FUZZ_TARGET_INIT(process_message, initialize_process_message) FUZZ_TARGET(process_message, .init = initialize_process_message)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());

View File

@ -33,7 +33,7 @@ void initialize_process_messages()
SyncWithValidationInterfaceQueue(); SyncWithValidationInterfaceQueue();
} }
FUZZ_TARGET_INIT(process_messages, initialize_process_messages) FUZZ_TARGET(process_messages, .init = initialize_process_messages)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());

View File

@ -29,7 +29,7 @@ void initialize_rbf()
g_setup = testing_setup.get(); g_setup = testing_setup.get();
} }
FUZZ_TARGET_INIT(rbf, initialize_rbf) FUZZ_TARGET(rbf, .init = initialize_rbf)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
SetMockTime(ConsumeTime(fuzzed_data_provider)); SetMockTime(ConsumeTime(fuzzed_data_provider));

View File

@ -348,7 +348,7 @@ void initialize_rpc()
} }
} }
FUZZ_TARGET_INIT(rpc, initialize_rpc) FUZZ_TARGET(rpc, .init = initialize_rpc)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
SetMockTime(ConsumeTime(fuzzed_data_provider)); SetMockTime(ConsumeTime(fuzzed_data_provider));

View File

@ -36,7 +36,7 @@ void initialize_script()
SelectParams(ChainType::REGTEST); SelectParams(ChainType::REGTEST);
} }
FUZZ_TARGET_INIT(script, initialize_script) FUZZ_TARGET(script, .init = initialize_script)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
const CScript script{ConsumeScript(fuzzed_data_provider)}; const CScript script{ConsumeScript(fuzzed_data_provider)};

View File

@ -18,7 +18,7 @@ void initialize_script_format()
SelectParams(ChainType::REGTEST); SelectParams(ChainType::REGTEST);
} }
FUZZ_TARGET_INIT(script_format, initialize_script_format) FUZZ_TARGET(script_format, .init = initialize_script_format)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
const CScript script{ConsumeScript(fuzzed_data_provider)}; const CScript script{ConsumeScript(fuzzed_data_provider)};

View File

@ -26,7 +26,7 @@ void initialize_script_sigcache()
g_setup = testing_setup.get(); g_setup = testing_setup.get();
} }
FUZZ_TARGET_INIT(script_sigcache, initialize_script_sigcache) FUZZ_TARGET(script_sigcache, .init = initialize_script_sigcache)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());

View File

@ -30,7 +30,7 @@ void initialize_script_sign()
SelectParams(ChainType::REGTEST); SelectParams(ChainType::REGTEST);
} }
FUZZ_TARGET_INIT(script_sign, initialize_script_sign) FUZZ_TARGET(script_sign, .init = initialize_script_sign)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
const std::vector<uint8_t> key = ConsumeRandomLengthByteVector(fuzzed_data_provider, 128); const std::vector<uint8_t> key = ConsumeRandomLengthByteVector(fuzzed_data_provider, 128);

View File

@ -22,7 +22,7 @@ void initialize_signet()
static const auto testing_setup = MakeNoLogFileContext<>(ChainType::SIGNET); static const auto testing_setup = MakeNoLogFileContext<>(ChainType::SIGNET);
} }
FUZZ_TARGET_INIT(signet, initialize_signet) FUZZ_TARGET(signet, .init = initialize_signet)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
const std::optional<CBlock> block = ConsumeDeserializable<CBlock>(fuzzed_data_provider); const std::optional<CBlock> block = ConsumeDeserializable<CBlock>(fuzzed_data_provider);

View File

@ -26,7 +26,7 @@ void initialize_socks5()
default_socks5_recv_timeout = g_socks5_recv_timeout; default_socks5_recv_timeout = g_socks5_recv_timeout;
} }
FUZZ_TARGET_INIT(socks5, initialize_socks5) FUZZ_TARGET(socks5, .init = initialize_socks5)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
ProxyCredentials proxy_credentials; ProxyCredentials proxy_credentials;

View File

@ -27,7 +27,7 @@ std::string GetArgumentName(const std::string& name)
return name.substr(0, idx); return name.substr(0, idx);
} }
FUZZ_TARGET_INIT(system, initialize_system) FUZZ_TARGET(system, .init = initialize_system)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
ArgsManager args_manager{}; ArgsManager args_manager{};

View File

@ -39,7 +39,7 @@ void initialize_torcontrol()
static const auto testing_setup = MakeNoLogFileContext<>(); static const auto testing_setup = MakeNoLogFileContext<>();
} }
FUZZ_TARGET_INIT(torcontrol, initialize_torcontrol) FUZZ_TARGET(torcontrol, .init = initialize_torcontrol)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};

View File

@ -27,7 +27,7 @@ void initialize_transaction()
SelectParams(ChainType::REGTEST); SelectParams(ChainType::REGTEST);
} }
FUZZ_TARGET_INIT(transaction, initialize_transaction) FUZZ_TARGET(transaction, .init = initialize_transaction)
{ {
CDataStream ds(buffer, SER_NETWORK, INIT_PROTO_VERSION); CDataStream ds(buffer, SER_NETWORK, INIT_PROTO_VERSION);
try { try {

View File

@ -131,7 +131,7 @@ CTxMemPool MakeMempool(FuzzedDataProvider& fuzzed_data_provider, const NodeConte
return CTxMemPool{mempool_opts}; return CTxMemPool{mempool_opts};
} }
FUZZ_TARGET_INIT(tx_pool_standard, initialize_tx_pool) FUZZ_TARGET(tx_pool_standard, .init = initialize_tx_pool)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
const auto& node = g_setup->m_node; const auto& node = g_setup->m_node;
@ -307,7 +307,7 @@ FUZZ_TARGET_INIT(tx_pool_standard, initialize_tx_pool)
Finish(fuzzed_data_provider, tx_pool, chainstate); Finish(fuzzed_data_provider, tx_pool, chainstate);
} }
FUZZ_TARGET_INIT(tx_pool, initialize_tx_pool) FUZZ_TARGET(tx_pool, .init = initialize_tx_pool)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
const auto& node = g_setup->m_node; const auto& node = g_setup->m_node;

View File

@ -30,7 +30,7 @@ void initialize_orphanage()
static const auto testing_setup = MakeNoLogFileContext(); static const auto testing_setup = MakeNoLogFileContext();
} }
FUZZ_TARGET_INIT(txorphan, initialize_orphanage) FUZZ_TARGET(txorphan, .init = initialize_orphanage)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
SetMockTime(ConsumeTime(fuzzed_data_provider)); SetMockTime(ConsumeTime(fuzzed_data_provider));

View File

@ -28,7 +28,7 @@ void initialize_chain()
g_chain = &chain; g_chain = &chain;
} }
FUZZ_TARGET_INIT(utxo_snapshot, initialize_chain) FUZZ_TARGET(utxo_snapshot, .init = initialize_chain)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
std::unique_ptr<const TestingSetup> setup{MakeNoLogFileContext<const TestingSetup>()}; std::unique_ptr<const TestingSetup> setup{MakeNoLogFileContext<const TestingSetup>()};

View File

@ -33,7 +33,7 @@ void initialize_validation_load_mempool()
g_setup = testing_setup.get(); g_setup = testing_setup.get();
} }
FUZZ_TARGET_INIT(validation_load_mempool, initialize_validation_load_mempool) FUZZ_TARGET(validation_load_mempool, .init = initialize_validation_load_mempool)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
SetMockTime(ConsumeTime(fuzzed_data_provider)); SetMockTime(ConsumeTime(fuzzed_data_provider));

View File

@ -111,7 +111,7 @@ void initialize()
constexpr uint32_t MAX_START_TIME = 4102444800; // 2100-01-01 constexpr uint32_t MAX_START_TIME = 4102444800; // 2100-01-01
FUZZ_TARGET_INIT(versionbits, initialize) FUZZ_TARGET(versionbits, .init = initialize)
{ {
const CChainParams& params = *g_params; const CChainParams& params = *g_params;
const int64_t interval = params.GetConsensus().nPowTargetSpacing; const int64_t interval = params.GetConsensus().nPowTargetSpacing;

View File

@ -20,7 +20,7 @@ void initialize_coincontrol()
g_setup = testing_setup.get(); g_setup = testing_setup.get();
} }
FUZZ_TARGET_INIT(coincontrol, initialize_coincontrol) FUZZ_TARGET(coincontrol, .init = initialize_coincontrol)
{ {
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size()); FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
const auto& node = g_setup->m_node; const auto& node = g_setup->m_node;

View File

@ -25,7 +25,7 @@ void initialize_setup()
g_wallet_ptr = std::make_unique<CWallet>(node.chain.get(), "", CreateMockableWalletDatabase()); g_wallet_ptr = std::make_unique<CWallet>(node.chain.get(), "", CreateMockableWalletDatabase());
} }
FUZZ_TARGET_INIT(wallet_fees, initialize_setup) FUZZ_TARGET(wallet_fees, .init = initialize_setup)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
const auto& node{g_setup->m_node}; const auto& node{g_setup->m_node};

View File

@ -79,7 +79,7 @@ struct FuzzedWallet {
} }
}; };
FUZZ_TARGET_INIT(wallet_notifications, initialize_setup) FUZZ_TARGET(wallet_notifications, .init = initialize_setup)
{ {
FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()}; FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
// The total amount, to be distributed to the wallets a and b in txs // The total amount, to be distributed to the wallets a and b in txs