32    AddrMan addr_man( std::vector<bool>(),  
false,  0);
 
   35    } 
catch (
const std::exception&) {
 
   49        static const std::map<uint8_t, uint8_t> net_len_map = {{1, 
ADDR_IPV4_SIZE},
 
   54        uint8_t net = fast_random_context.
randrange(5) + 1; 
 
   62        s << fast_random_context.
randbytes(net_len_map.at(net));
 
   70        v4_addr.s_addr = 0x05050505;
 
   90    for (
size_t i = 0; i < num_sources; ++i) {
 
   91        const auto source = 
RandAddr(fuzzed_data_provider, fast_random_context);
 
   92        const size_t num_addresses = fast_random_context.randrange(500) + 1; 
 
   94        for (
size_t j = 0; j < num_addresses; ++j) {
 
   96            const auto time_penalty = fast_random_context.randrange(100000001);
 
   97            addrman.
Add({addr}, 
source, time_penalty);
 
   99            if (n > 0 && addrman.
size() % n == 0) {
 
  104            if (fast_random_context.randrange(10) == 0 && prev_source.IsValid()) {
 
  105                addrman.
Add({addr}, prev_source, time_penalty);
 
  116        : 
AddrMan(std::move(asmap),  true,  0)
 
  140        auto addrinfo_hasher = [](
const AddrInfo& a) {
 
  142            auto addr_key = a.GetKey();
 
  143            auto source_key = a.source.GetAddrBytes();
 
  144            hasher.
Write(a.nLastSuccess);
 
  145            hasher.
Write(a.nAttempts);
 
  146            hasher.
Write(a.nRefCount);
 
  147            hasher.
Write(a.fInTried);
 
  148            hasher.
Write(a.GetNetwork());
 
  149            hasher.
Write(a.source.GetNetwork());
 
  150            hasher.
Write(addr_key.size());
 
  151            hasher.
Write(source_key.size());
 
  152            hasher.
Write(addr_key.data(), addr_key.size());
 
  153            hasher.
Write(source_key.data(), source_key.size());
 
  159                   std::tie(
static_cast<const CService&
>(rhs), rhs.source, rhs.nLastSuccess, rhs.nAttempts, rhs.nRefCount, rhs.fInTried);
 
  162        using Addresses = std::unordered_set<
AddrInfo, 
decltype(addrinfo_hasher), 
decltype(addrinfo_eq)>;
 
  164        const size_t num_addresses{
m_impl->mapInfo.size()};
 
  166        Addresses addresses{num_addresses, addrinfo_hasher, addrinfo_eq};
 
  167        for (
const auto& [
id, addr] : 
m_impl->mapInfo) {
 
  168            addresses.insert(addr);
 
  171        Addresses other_addresses{num_addresses, addrinfo_hasher, addrinfo_eq};
 
  172        for (
const auto& [
id, addr] : other.
m_impl->mapInfo) {
 
  173            other_addresses.insert(addr);
 
  176        if (addresses != other_addresses) {
 
  181            if (
id == -1 && other_id == -1) {
 
  184            if ((
id == -1 && other_id != -1) || (
id != -1 && other_id == -1)) {
 
  187            return m_impl->mapInfo.at(
id) == other.
m_impl->mapInfo.at(other_id);
 
  195                if (!IdsReferToSameAddress(
m_impl->vvNew[i][j], other.
m_impl->vvNew[i][j])) {
 
  204                if (!IdsReferToSameAddress(
m_impl->vvTried[i][j], other.
m_impl->vvTried[i][j])) {
 
  225    std::vector<bool> asmap = 
ConsumeAsmap(fuzzed_data_provider);
 
  226    auto addr_man_ptr = std::make_unique<AddrManDeterministic>(asmap, fuzzed_data_provider);
 
  230        const auto ser_version{fuzzed_data_provider.
ConsumeIntegral<int32_t>()};
 
  234        } 
catch (
const std::ios_base::failure&) {
 
  235            addr_man_ptr = std::make_unique<AddrManDeterministic>(asmap, fuzzed_data_provider);
 
  241            fuzzed_data_provider,
 
  249                std::vector<CAddress> addresses;
 
  251                    const std::optional<CAddress> opt_address = ConsumeDeserializable<CAddress>(fuzzed_data_provider);
 
  255                    addresses.push_back(*opt_address);
 
  257                const std::optional<CNetAddr> opt_net_addr = ConsumeDeserializable<CNetAddr>(fuzzed_data_provider);
 
  263                const std::optional<CService> opt_service = ConsumeDeserializable<CService>(fuzzed_data_provider);
 
  269                const std::optional<CService> opt_service = ConsumeDeserializable<CService>(fuzzed_data_provider);
 
  275                const std::optional<CService> opt_service = ConsumeDeserializable<CService>(fuzzed_data_provider);
 
  281                const std::optional<CService> opt_service = ConsumeDeserializable<CService>(fuzzed_data_provider);
 
  287    const AddrMan& const_addr_man{addr_man};
 
  292    (void)const_addr_man.Select(fuzzed_data_provider.
ConsumeBool());
 
  293    (void)const_addr_man.size();
 
  295    data_stream << const_addr_man;
 
  304    std::vector<bool> asmap = 
ConsumeAsmap(fuzzed_data_provider);
 
  311    data_stream << addr_man1;
 
  312    data_stream >> addr_man2;
 
  313    assert(addr_man1 == addr_man2);
 
void ReadFromStream(AddrMan &addr, CDataStream &ssPeers)
Only used by tests.
static constexpr int ADDRMAN_TRIED_BUCKET_COUNT
static constexpr int ADDRMAN_BUCKET_SIZE
static constexpr int ADDRMAN_NEW_BUCKET_COUNT
void SelectParams(const std::string &network)
Sets the params returned by Params() to those for the given chain name.
Extended statistics about a CAddress.
CNetAddr source
where knowledge about this address first came from
bool fInTried
in tried set? (memory only)
int64_t nLastSuccess
last successful connection by us
int nRefCount
reference count in new sets (memory only)
int nAttempts
connection attempts since last successful attempt
AddrManDeterministic(std::vector< bool > asmap, FuzzedDataProvider &fuzzed_data_provider)
bool operator==(const AddrManDeterministic &other)
Compare with another AddrMan.
Stochastic address manager.
std::pair< CAddress, int64_t > SelectTriedCollision()
Randomly select an address in the tried table that another address is attempting to evict.
const std::unique_ptr< AddrManImpl > m_impl
std::vector< CAddress > GetAddr(size_t max_addresses, size_t max_pct, std::optional< Network > network) const
Return all or many randomly selected addresses, optionally by network.
bool Add(const std::vector< CAddress > &vAddr, const CNetAddr &source, int64_t nTimePenalty=0)
Attempt to add one or more addresses to addrman's new table.
void Good(const CService &addr, int64_t nTime=GetAdjustedTime())
Mark an entry as accessible, possibly moving it from "new" to "tried".
void ResolveCollisions()
See if any to-be-evicted tried table entries have been tested and if so resolve the collisions.
void Connected(const CService &addr, int64_t nTime=GetAdjustedTime())
We have successfully connected to this peer.
void Attempt(const CService &addr, bool fCountFailure, int64_t nTime=GetAdjustedTime())
Mark an entry as connection attempted to.
size_t size() const
Return the number of (unique) addresses in all tables.
void SetServices(const CService &addr, ServiceFlags nServices)
Update an entry's service bits.
A CService with information about it as peer.
static const std::string REGTEST
Double ended buffer combining vector and stream-like interfaces.
A combination of a network address (CNetAddr) and a (TCP) port.
uint64_t Finalize() const
Compute the 64-bit SipHash-2-4 of the data written so far.
CSipHasher & Write(uint64_t data)
Hash a 64-bit integer worth of data It is treated as if this was the little-endian interpretation of ...
std::vector< unsigned char > randbytes(size_t len)
Generate random bytes.
uint64_t randrange(uint64_t range) noexcept
Generate a random integer in the range [0..range).
T ConsumeIntegralInRange(T min, T max)
static constexpr size_t ADDR_CJDNS_SIZE
Size of CJDNS address (in bytes).
static constexpr int ADDRV2_FORMAT
A flag that is ORed into the protocol version to designate that addresses should be serialized in (un...
static constexpr size_t ADDR_TORV3_SIZE
Size of TORv3 address (in bytes).
static constexpr size_t ADDR_I2P_SIZE
Size of I2P address (in bytes).
static constexpr size_t ADDR_IPV4_SIZE
Size of IPv4 address (in bytes).
static constexpr size_t ADDR_IPV6_SIZE
Size of IPv6 address (in bytes).
#define WITH_LOCK(cs, code)
Run code while locking a mutex.
FUZZ_TARGET_INIT(data_stream_addr_man, initialize_addrman)
void FillAddrman(AddrMan &addrman, FuzzedDataProvider &fuzzed_data_provider)
Fill addrman with lots of addresses from lots of sources.
std::vector< bool > ConsumeAsmap(FuzzedDataProvider &fuzzed_data_provider) noexcept
CNetAddr RandAddr(FuzzedDataProvider &fuzzed_data_provider, FastRandomContext &fast_random_context)
Generate a random address.
void initialize_addrman()
int64_t ConsumeTime(FuzzedDataProvider &fuzzed_data_provider, const std::optional< int64_t > &min, const std::optional< int64_t > &max) noexcept
CNetAddr ConsumeNetAddr(FuzzedDataProvider &fuzzed_data_provider) noexcept
WeakEnumType ConsumeWeakEnum(FuzzedDataProvider &fuzzed_data_provider, const WeakEnumType(&all_types)[size]) noexcept
std::vector< bool > ConsumeRandomLengthBitVector(FuzzedDataProvider &fuzzed_data_provider, const std::optional< size_t > &max_length=std::nullopt) noexcept
CDataStream ConsumeDataStream(FuzzedDataProvider &fuzzed_data_provider, const std::optional< size_t > &max_length=std::nullopt) noexcept
uint256 ConsumeUInt256(FuzzedDataProvider &fuzzed_data_provider) noexcept
size_t CallOneOf(FuzzedDataProvider &fuzzed_data_provider, Callables... callables)
std::vector< uint8_t > ConsumeRandomLengthByteVector(FuzzedDataProvider &fuzzed_data_provider, const std::optional< size_t > &max_length=std::nullopt) noexcept
constexpr ServiceFlags ALL_SERVICE_FLAGS[]
#define EXCLUSIVE_LOCKS_REQUIRED(...)
void SetMockTime(int64_t nMockTimeIn)
DEPRECATED Use SetMockTime with chrono type.
int64_t GetTime()
DEPRECATED Use either GetTimeSeconds (not mockable) or GetTime<T> (mockable)
bool SanityCheckASMap(const std::vector< bool > &asmap, int bits)
static const int INIT_PROTO_VERSION
initial proto version, to be increased after version/verack negotiation
static const int PROTOCOL_VERSION
network protocol versioning