diff options
author | Jon Atack <jon@atack.com> | 2021-03-01 21:35:28 +0100 |
---|---|---|
committer | Jon Atack <jon@atack.com> | 2021-03-16 19:52:31 +0100 |
commit | 6423c8175fad3163c10ffdb49e0df48e4e4931f1 (patch) | |
tree | fe0ad5daa524b4802c6e2d60bcb80043d245d876 /src/test/fuzz/socks5.cpp | |
parent | 1b6c463e033f861561d1a46ccf7eec069bbac09f (diff) | |
download | bitcoin-6423c8175fad3163c10ffdb49e0df48e4e4931f1.tar.xz |
p2p, refactor: pass and use uint16_t CService::port as uint16_t
Diffstat (limited to 'src/test/fuzz/socks5.cpp')
-rw-r--r-- | src/test/fuzz/socks5.cpp | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/test/fuzz/socks5.cpp b/src/test/fuzz/socks5.cpp index e5cc4cabe5..d7b32ef46f 100644 --- a/src/test/fuzz/socks5.cpp +++ b/src/test/fuzz/socks5.cpp @@ -38,7 +38,7 @@ FUZZ_TARGET_INIT(socks5, initialize_socks5) // This Socks5(...) fuzzing harness would have caught CVE-2017-18350 within // a few seconds of fuzzing. (void)Socks5(fuzzed_data_provider.ConsumeRandomLengthString(512), - fuzzed_data_provider.ConsumeIntegral<int>(), + fuzzed_data_provider.ConsumeIntegral<uint16_t>(), fuzzed_data_provider.ConsumeBool() ? &proxy_credentials : nullptr, fuzzed_sock); } |