Remove QuicFuzzedDataProvider.
When QPACK fuzzers were added, FuzzedDataProvider was a Chromium-only class in
//base, so I forked that internally as QuicFuzzedDataProviderImpl. It has since
been upstreamed into LLVM (see QuicFuzzedDataProvider), and is available both in
Chrome and internally in the <fuzzer/FuzzedDataProvider.h> header file.
PiperOrigin-RevId: 404400618
diff --git a/quic/core/qpack/fuzzer/qpack_decoder_fuzzer.cc b/quic/core/qpack/fuzzer/qpack_decoder_fuzzer.cc
index 466966a..b3d15f3 100644
--- a/quic/core/qpack/fuzzer/qpack_decoder_fuzzer.cc
+++ b/quic/core/qpack/fuzzer/qpack_decoder_fuzzer.cc
@@ -2,6 +2,8 @@
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
+#include <fuzzer/FuzzedDataProvider.h>
+
#include <cstddef>
#include <cstdint>
#include <limits>
@@ -10,7 +12,6 @@
#include "absl/strings/string_view.h"
#include "quic/core/qpack/qpack_decoder.h"
#include "quic/core/quic_error_codes.h"
-#include "quic/platform/api/quic_fuzzed_data_provider.h"
#include "quic/test_tools/qpack/qpack_decoder_test_utils.h"
#include "quic/test_tools/qpack/qpack_test_utils.h"
@@ -79,7 +80,7 @@
// different ways, so the output could not be expected to match the original
// input.
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
- QuicFuzzedDataProvider provider(data, size);
+ FuzzedDataProvider provider(data, size);
// Maximum 256 byte dynamic table. Such a small size helps test draining
// entries and eviction.
diff --git a/quic/core/qpack/fuzzer/qpack_encoder_stream_receiver_fuzzer.cc b/quic/core/qpack/fuzzer/qpack_encoder_stream_receiver_fuzzer.cc
index 78a1f70..5167536 100644
--- a/quic/core/qpack/fuzzer/qpack_encoder_stream_receiver_fuzzer.cc
+++ b/quic/core/qpack/fuzzer/qpack_encoder_stream_receiver_fuzzer.cc
@@ -2,13 +2,13 @@
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
-#include "quic/core/qpack/qpack_encoder_stream_receiver.h"
+#include <fuzzer/FuzzedDataProvider.h>
#include <cstddef>
#include <cstdint>
#include "absl/strings/string_view.h"
-#include "quic/platform/api/quic_fuzzed_data_provider.h"
+#include "quic/core/qpack/qpack_encoder_stream_receiver.h"
#include "quic/platform/api/quic_logging.h"
namespace quic {
@@ -51,7 +51,7 @@
NoOpDelegate delegate;
QpackEncoderStreamReceiver receiver(&delegate);
- QuicFuzzedDataProvider provider(data, size);
+ FuzzedDataProvider provider(data, size);
while (!delegate.error_detected() && provider.remaining_bytes() != 0) {
// Process up to 64 kB fragments at a time. Too small upper bound might not
diff --git a/quic/core/qpack/fuzzer/qpack_encoder_stream_sender_fuzzer.cc b/quic/core/qpack/fuzzer/qpack_encoder_stream_sender_fuzzer.cc
index d303da0..1281ebf 100644
--- a/quic/core/qpack/fuzzer/qpack_encoder_stream_sender_fuzzer.cc
+++ b/quic/core/qpack/fuzzer/qpack_encoder_stream_sender_fuzzer.cc
@@ -2,13 +2,14 @@
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
+#include <fuzzer/FuzzedDataProvider.h>
+
#include <cstddef>
#include <cstdint>
#include <limits>
#include <string>
#include "quic/core/qpack/qpack_encoder_stream_sender.h"
-#include "quic/platform/api/quic_fuzzed_data_provider.h"
#include "quic/test_tools/qpack/qpack_encoder_test_utils.h"
#include "quic/test_tools/qpack/qpack_test_utils.h"
@@ -24,7 +25,7 @@
QpackEncoderStreamSender sender;
sender.set_qpack_stream_sender_delegate(&delegate);
- QuicFuzzedDataProvider provider(data, size);
+ FuzzedDataProvider provider(data, size);
// Limit string literal length to 2 kB for efficiency.
const uint16_t kMaxStringLength = 2048;
diff --git a/quic/core/qpack/fuzzer/qpack_round_trip_fuzzer.cc b/quic/core/qpack/fuzzer/qpack_round_trip_fuzzer.cc
index c327bdc..43bf3d3 100644
--- a/quic/core/qpack/fuzzer/qpack_round_trip_fuzzer.cc
+++ b/quic/core/qpack/fuzzer/qpack_round_trip_fuzzer.cc
@@ -2,6 +2,8 @@
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
+#include <fuzzer/FuzzedDataProvider.h>
+
#include <algorithm>
#include <cstddef>
#include <cstdint>
@@ -16,7 +18,6 @@
#include "quic/core/qpack/qpack_stream_sender_delegate.h"
#include "quic/core/qpack/value_splitting_header_list.h"
#include "quic/core/quic_error_codes.h"
-#include "quic/platform/api/quic_fuzzed_data_provider.h"
#include "quic/test_tools/qpack/qpack_decoder_test_utils.h"
#include "quic/test_tools/qpack/qpack_encoder_peer.h"
#include "common/quiche_circular_deque.h"
@@ -113,8 +114,7 @@
virtual void OnHeaderBlockEnd(QuicStreamId stream_id) = 0;
};
- DelayedHeaderBlockTransmitter(Visitor* visitor,
- QuicFuzzedDataProvider* provider)
+ DelayedHeaderBlockTransmitter(Visitor* visitor, FuzzedDataProvider* provider)
: visitor_(visitor), provider_(provider) {}
~DelayedHeaderBlockTransmitter() { QUICHE_CHECK(header_blocks_.empty()); }
@@ -241,7 +241,7 @@
};
Visitor* const visitor_;
- QuicFuzzedDataProvider* const provider_;
+ FuzzedDataProvider* const provider_;
std::map<QuicStreamId, std::queue<HeaderBlock>> header_blocks_;
};
@@ -422,7 +422,7 @@
class DelayedStreamDataTransmitter : public QpackStreamSenderDelegate {
public:
DelayedStreamDataTransmitter(QpackStreamReceiver* receiver,
- QuicFuzzedDataProvider* provider)
+ FuzzedDataProvider* provider)
: receiver_(receiver), provider_(provider) {}
~DelayedStreamDataTransmitter() { QUICHE_CHECK(stream_data.empty()); }
@@ -452,12 +452,12 @@
private:
QpackStreamReceiver* const receiver_;
- QuicFuzzedDataProvider* const provider_;
+ FuzzedDataProvider* const provider_;
quiche::QuicheCircularDeque<std::string> stream_data;
};
// Generate header list using fuzzer data.
-spdy::Http2HeaderBlock GenerateHeaderList(QuicFuzzedDataProvider* provider) {
+spdy::Http2HeaderBlock GenerateHeaderList(FuzzedDataProvider* provider) {
spdy::Http2HeaderBlock header_list;
uint8_t header_count = provider->ConsumeIntegral<uint8_t>();
for (uint8_t header_index = 0; header_index < header_count; ++header_index) {
@@ -581,7 +581,7 @@
// encoding then decoding is expected to result in the original header list, and
// this fuzzer checks for that.
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
- QuicFuzzedDataProvider provider(data, size);
+ FuzzedDataProvider provider(data, size);
// Maximum 256 byte dynamic table. Such a small size helps test draining
// entries and eviction.
diff --git a/quic/platform/api/quic_fuzzed_data_provider.h b/quic/platform/api/quic_fuzzed_data_provider.h
deleted file mode 100644
index ef565e2..0000000
--- a/quic/platform/api/quic_fuzzed_data_provider.h
+++ /dev/null
@@ -1,16 +0,0 @@
-// Copyright 2016 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#ifndef QUICHE_QUIC_PLATFORM_API_QUIC_FUZZED_DATA_PROVIDER_H_
-#define QUICHE_QUIC_PLATFORM_API_QUIC_FUZZED_DATA_PROVIDER_H_
-
-#include "net/quic/platform/impl/quic_fuzzed_data_provider_impl.h"
-
-namespace quic {
-
-using QuicFuzzedDataProvider = QuicFuzzedDataProviderImpl;
-
-} // namespace quic
-
-#endif // QUICHE_QUIC_PLATFORM_API_QUIC_FUZZED_DATA_PROVIDER_H_