The following nodes represent call sites where fuzz blockers occur.
Amount of callsites blocked | Calltree index | Parent function | Callsite | Largest blocked function |
---|---|---|---|---|
10 | 3 | [com.jcraft.jsch.OpenSSHConfigFuzzer].test() | call site: {node_id} | |
1 | 15 | [com.jcraft.jsch.OpenSSHConfig].parse(java.lang.String) | call site: {node_id} |
[com.jcraft.jsch.OpenSSHConfigFuzzer].fuzzerTestOneInput(com.code_intelligence.jazzer.api.FuzzedDataProvider)
[function]
[call site]
00000
[com.jcraft.jsch.OpenSSHConfigFuzzer].
(com.code_intelligence.jazzer.api.FuzzedDataProvider)
[function]
[call site]
00001
[com.jcraft.jsch.OpenSSHConfigFuzzer].test()
[function]
[call site]
00002
[com.code_intelligence.jazzer.api.CannedFuzzedDataProvider].consumeRemainingAsString()
[function]
[call site]
00003
[jaz.Zer].next()
[function]
[call site]
00004
[jaz.Zer].reportFindingIfEnabled()
[function]
[call site]
00005
[jaz.Zer].isSanitizerEnabled(byte)
[function]
[call site]
00006
[jaz.Zer$equals__2].bootstrap$(java.lang.String)
[function]
[call site]
00007
[jaz.Zer$equals__2].
(java.lang.String)
[function]
[call site]
00008
[jaz.Zer].reportFinding()
[function]
[call site]
00009
[com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh].
(java.lang.String)
[function]
[call site]
00010
[com.code_intelligence.jazzer.api.Jazzer].reportFindingFromHook(java.lang.Throwable)
[function]
[call site]
00011
[com.code_intelligence.jazzer.api.Jazzer].rethrowUnchecked(java.lang.Throwable)
[function]
[call site]
00012
[com.code_intelligence.jazzer.api.Jazzer].rethrowUnchecked(java.lang.Throwable)
[function]
[call site]
00013
[com.jcraft.jsch.OpenSSHConfig].parse(java.lang.String)
[function]
[call site]
00014
[com.jcraft.jsch.OpenSSHConfig].
(java.io.BufferedReader)
[function]
[call site]
00015
[com.jcraft.jsch.OpenSSHConfig]._parse(java.io.BufferedReader)
[function]
[call site]
00016