Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: split_uri_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 23 38.3%
gold [1:9] 13 21.6%
yellow [10:29] 0 0.0%
greenyellow [30:49] 2 3.33%
lawngreen 50+ 22 36.6%
All colors 60 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
4 28 coap_dtls_is_supported call site: 00028 coap_log_impl
4 40 coap_tls_is_supported call site: 00040 coap_log_impl
4 50 coap_wss_is_supported call site: 00050 coap_log_impl
2 25 coap_dtls_is_supported call site: 00025 coap_log_impl
2 33 coap_split_uri_sub call site: 00033 coap_log_impl
2 37 coap_tls_is_supported call site: 00037 coap_log_impl
2 46 coap_ws_is_supported call site: 00046 coap_log_impl
1 0 EP call site: 00000 coap_split_uri
1 6 coap_split_uri_sub call site: 00006 vsnprintf
1 17 coap_log_impl call site: 00017 snprintf

Runtime coverage analysis

Covered functions
14
Functions that are reachable but not covered
13
Reachable functions
27
Percentage of reachable functions covered
51.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/oss-fuzz/split_uri_target.c 1
src/coap_uri.c 2
src/coap_debug.c 4
src/coap_time.c 3
src/coap_openssl.c 2
src/coap_strm_posix.c 1
src/coap_ws.c 2

Fuzzer: pdu_parse_ws_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 99 23.9%
gold [1:9] 13 3.14%
yellow [10:29] 10 2.42%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 291 70.4%
All colors 413 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
14 384 coap_pdu_encode_header call site: 00384 coap_log_impl
8 230 coap_show_pdu call site: 00230 coap_log_impl
7 335 coap_show_pdu call site: 00335 coap_log_impl
6 374 coap_show_pdu call site: 00374 coap_pdu_encode_header
4 53 coap_pdu_parse2 call site: 00053 coap_log_impl
4 94 coap_pdu_parse_opt call site: 00094 coap_log_impl
4 143 coap_get_query call site: 00143 coap_log_impl
4 179 coap_dtls_is_supported call site: 00179 coap_log_impl
4 191 coap_tls_is_supported call site: 00191 coap_log_impl
4 201 coap_wss_is_supported call site: 00201 coap_log_impl
3 31 coap_pdu_parse2 call site: 00031 coap_log_impl
2 25 coap_pdu_clear call site: 00025 coap_pdu_parse

Runtime coverage analysis

Covered functions
77
Functions that are reachable but not covered
18
Reachable functions
94
Percentage of reachable functions covered
80.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/oss-fuzz/pdu_parse_ws_target.c 1
src/coap_net.c 2
src/coap_time.c 4
src/coap_prng.c 2
src/coap_mem.c 4
src/coap_openssl.c 5
src/coap_pdu.c 18
src/coap_debug.c 13
src/coap_option.c 12
src/coap_encode.c 3
src/coap_uri.c 6
src/coap_str.c 3
src/coap_strm_posix.c 1
src/coap_ws.c 2
src/coap_block.c 1

Fuzzer: pdu_parse_udp_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 98 23.7%
gold [1:9] 14 3.38%
yellow [10:29] 11 2.66%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 290 70.2%
All colors 413 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
20 378 coap_pdu_encode_header call site: 00378 coap_log_impl
8 230 coap_show_pdu call site: 00230 coap_log_impl
7 335 coap_show_pdu call site: 00335 coap_log_impl
4 56 coap_pdu_parse_header call site: 00056 coap_log_impl
4 94 coap_pdu_parse_opt call site: 00094 coap_log_impl
4 143 coap_get_query call site: 00143 coap_log_impl
4 179 coap_dtls_is_supported call site: 00179 coap_log_impl
4 191 coap_tls_is_supported call site: 00191 coap_log_impl
4 201 coap_wss_is_supported call site: 00201 coap_log_impl
3 31 coap_pdu_parse2 call site: 00031 coap_log_impl
3 374 coap_show_pdu call site: 00374 coap_pdu_encode_header
2 25 coap_pdu_clear call site: 00025 coap_pdu_parse

Runtime coverage analysis

Covered functions
77
Functions that are reachable but not covered
18
Reachable functions
94
Percentage of reachable functions covered
80.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/oss-fuzz/pdu_parse_udp_target.c 1
src/coap_net.c 2
src/coap_time.c 4
src/coap_prng.c 2
src/coap_mem.c 4
src/coap_openssl.c 5
src/coap_pdu.c 18
src/coap_debug.c 13
src/coap_option.c 12
src/coap_encode.c 3
src/coap_uri.c 6
src/coap_str.c 3
src/coap_strm_posix.c 1
src/coap_ws.c 2
src/coap_block.c 1

Fuzzer: pdu_parse_tcp_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 96 23.2%
gold [1:9] 11 2.66%
yellow [10:29] 12 2.90%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 294 71.1%
All colors 413 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
8 230 coap_show_pdu call site: 00230 coap_log_impl
7 335 coap_show_pdu call site: 00335 coap_log_impl
6 374 coap_show_pdu call site: 00374 coap_pdu_encode_header
5 393 coap_pdu_encode_header call site: 00393 coap_log_impl
4 94 coap_pdu_parse_opt call site: 00094 coap_log_impl
4 143 coap_get_query call site: 00143 coap_log_impl
4 179 coap_dtls_is_supported call site: 00179 coap_log_impl
4 191 coap_tls_is_supported call site: 00191 coap_log_impl
4 201 coap_wss_is_supported call site: 00201 coap_log_impl
3 31 coap_pdu_parse2 call site: 00031 coap_log_impl
3 53 coap_pdu_parse2 call site: 00053 coap_log_impl
3 57 coap_pdu_parse_header call site: 00057 coap_log_impl

Runtime coverage analysis

Covered functions
77
Functions that are reachable but not covered
18
Reachable functions
94
Percentage of reachable functions covered
80.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/oss-fuzz/pdu_parse_tcp_target.c 1
src/coap_net.c 2
src/coap_time.c 4
src/coap_prng.c 2
src/coap_mem.c 4
src/coap_openssl.c 5
src/coap_pdu.c 18
src/coap_debug.c 13
src/coap_option.c 12
src/coap_encode.c 3
src/coap_uri.c 6
src/coap_str.c 3
src/coap_strm_posix.c 1
src/coap_ws.c 2
src/coap_block.c 1

Fuzzer: oscore_decrypt_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 4249 90.6%
gold [1:9] 137 2.92%
yellow [10:29] 243 5.18%
greenyellow [30:49] 34 0.72%
lawngreen 50+ 26 0.55%
All colors 4689 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
803 2715 coap_session_free call site: 02715 coap_session_max_pdu_size_lkd
714 3800 coap_oscore_decrypt_pdu call site: 03800 coap_free_resource
581 2065 oscore_free_context call site: 02065 coap_session_release_lkd
261 1505 oscore_new_association call site: 01505 coap_io_process_lkd
137 396 coap_option_filter_op call site: 00396 handle_request
112 848 coap_pdu_encode_header call site: 00848 coap_send_internal
101 4558 coap_free_context_lkd call site: 04558 coap_new_endpoint_lkd
92 755 coap_add_option_internal call site: 00755 coap_add_data_large_request_lkd
88 1349 coap_send_internal call site: 01349 coap_session_disconnected_lkd
87 3711 coap_oscore_decrypt_pdu call site: 03711 coap_handle_event_lkd
66 1061 coap_add_data_after call site: 01061 coap_rebuild_pdu_for_proxy
65 171 coap_dtls_new_context call site: 00171 coap_session_str

Runtime coverage analysis

Covered functions
180
Functions that are reachable but not covered
588
Reachable functions
761
Percentage of reachable functions covered
22.73%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/oss-fuzz/oscore_decrypt_target.c 1
src/coap_net.c 58
src/coap_time.c 5
src/coap_prng.c 2
src/coap_mem.c 5
src/coap_openssl.c 65
src/coap_debug.c 16
src/coap_oscore.c 21
src/coap_str.c 10
src/coap_io.c 10
src/coap_session.c 54
src/coap_address.c 14
src/coap_netif.c 11
src/coap_resource.c 19
src/coap_pdu.c 35
src/coap_io_posix.c 4
src/coap_option.c 21
src/coap_encode.c 6
src/coap_block.c 51
src/coap_async.c 4
src/coap_proxy.c 22
src/coap_uri.c 15
src/coap_strm_posix.c 6
src/coap_ws.c 2
src/coap_cache.c 5
./include/coap3/coap_uri.h 1
src/oscore/oscore_cose.c 19
src/oscore/oscore_context.c 21
src/oscore/oscore.c 8
src/oscore/oscore_cbor.c 11
src/coap_dgrm_posix.c 4
src/oscore/oscore_crypto.c 4
/usr/include/openssl/ssl.h 3
src/coap_dtls.c 4
/usr/include/openssl/x509v3.h 3
./include/coap3/coap_pdu_internal.h 1
src/coap_subscribe.c 3

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
coap_ws_close /src/libcoap/src/coap_ws.c 1 ['N/A'] 38 0 378 50 17 664 2 6732 218
coap_persist_startup /src/libcoap/src/coap_subscribe.c 5 ['N/A', 'N/A', 'N/A', 'N/A', 'int'] 72 0 30 3 2 665 0 6686 170
hnd_get_wellknown_lkd /src/libcoap/src/coap_net.c 5 ['N/A', 'N/A', 'N/A', 'N/A', 'N/A'] 35 0 304 50 16 652 0 6621 107
coap_netif_dgrm_write /src/libcoap/src/coap_netif.c 3 ['N/A', 'N/A', 'size_t'] 8 0 155 30 9 61 0 302 61
coap_tls_engine_configure /src/libcoap/src/coap_openssl.c 1 ['N/A'] 6 0 575 124 34 32 0 121 54
coap_context_set_psk /src/libcoap/src/coap_net.c 4 ['N/A', 'N/A', 'N/A', 'size_t'] 8 0 27 3 2 49 0 193 45
coap_add_resource /src/libcoap/src/coap_resource.c 2 ['N/A', 'N/A'] 71 0 18 3 2 651 0 6577 45
coap_op_resource_deleted /src/libcoap/src/coap_subscribe.c 3 ['N/A', 'N/A', 'N/A'] 6 0 252 40 16 37 0 129 40
coap_join_mcast_group_intf /src/libcoap/src/coap_net.c 3 ['N/A', 'N/A', 'N/A'] 6 0 24 3 2 37 0 126 38
coap_session_set_type_server /src/libcoap/src/coap_session.c 1 ['N/A'] 66 0 18 3 2 648 0 6550 36

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
64.0%
599 / 929
Cyclomatic complexity statically reachable by fuzzers
85.0%
7429 / 8739

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

tests/oss-fuzz/split_uri_target.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['coap_dtls_is_supported', 'coap_tls_is_supported', 'coap_wss_is_supported', 'coap_split_uri_sub', 'coap_ws_is_supported', 'coap_log_impl']

tests/oss-fuzz/pdu_parse_ws_target.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['coap_pdu_encode_header', 'coap_show_pdu', 'coap_pdu_parse2', 'coap_pdu_parse_opt', 'coap_get_query', 'coap_dtls_is_supported', 'coap_tls_is_supported', 'coap_wss_is_supported']

tests/oss-fuzz/pdu_parse_udp_target.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['coap_pdu_encode_header', 'coap_show_pdu', 'coap_pdu_parse_header', 'coap_pdu_parse_opt', 'coap_get_query', 'coap_dtls_is_supported', 'coap_tls_is_supported', 'coap_wss_is_supported', 'coap_pdu_parse2']

tests/oss-fuzz/pdu_parse_tcp_target.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['coap_show_pdu', 'coap_pdu_encode_header', 'coap_pdu_parse_opt', 'coap_get_query', 'coap_dtls_is_supported', 'coap_tls_is_supported', 'coap_wss_is_supported', 'coap_pdu_parse2']

tests/oss-fuzz/oscore_decrypt_target.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['coap_session_free', 'coap_oscore_decrypt_pdu', 'oscore_free_context', 'oscore_new_association', 'coap_option_filter_op', 'coap_pdu_encode_header', 'coap_free_context_lkd', 'coap_add_option_internal', 'coap_send_internal']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/libcoap/src/coap_prng.c ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer']
/src/libcoap/src/coap_mem.c ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer']
/src/libcoap/src/coap_debug.c ['split_uri_fuzzer', 'pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['split_uri_fuzzer', 'pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer']
/src/libcoap/src/coap_pdu.c ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer']
/usr/include/openssl/x509v3.h ['oscore_decrypt_fuzzer'] []
/src/libcoap/src/coap_io.c ['oscore_decrypt_fuzzer'] []
/src/libcoap/src/coap_openssl.c ['split_uri_fuzzer', 'pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['split_uri_fuzzer', 'pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer']
/src/libcoap/tests/oss-fuzz/split_uri_target.c ['split_uri_fuzzer'] []
/usr/include/openssl/ssl.h ['oscore_decrypt_fuzzer'] []
/src/libcoap/src/coap_strm_posix.c ['split_uri_fuzzer', 'pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['split_uri_fuzzer', 'pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer']
/src/libcoap/tests/oss-fuzz/pdu_parse_ws_target.c ['pdu_parse_ws_fuzzer'] []
/src/libcoap/src/coap_subscribe.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/src/coap_async.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/src/oscore/oscore_context.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/src/coap_io_posix.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/src/coap_uri.c ['split_uri_fuzzer', 'pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['split_uri_fuzzer', 'pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer']
/src/libcoap/src/coap_netif.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/src/coap_ws.c ['split_uri_fuzzer', 'pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['split_uri_fuzzer', 'pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer']
/src/libcoap/src/coap_time.c ['split_uri_fuzzer', 'pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['split_uri_fuzzer', 'pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer']
/src/libcoap/tests/oss-fuzz/pdu_parse_tcp_target.c ['pdu_parse_tcp_fuzzer'] []
/src/libcoap/./include/coap3/coap_address.h [] []
/src/libcoap/src/coap_session.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/src/coap_dtls.c ['oscore_decrypt_fuzzer'] []
/src/libcoap/src/coap_encode.c ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer']
/src/libcoap/./include/coap3/coap_uri.h ['oscore_decrypt_fuzzer'] []
/src/libcoap/src/coap_str.c ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer']
/src/libcoap/src/oscore/oscore_crypto.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/src/oscore/oscore_cbor.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/src/oscore/oscore_cose.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/tests/oss-fuzz/oscore_decrypt_target.c ['oscore_decrypt_fuzzer'] []
/src/libcoap/src/coap_dgrm_posix.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/src/coap_cache.c ['oscore_decrypt_fuzzer'] []
/src/libcoap/src/coap_option.c ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer']
/src/libcoap/src/coap_proxy.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/tests/oss-fuzz/pdu_parse_udp_target.c ['pdu_parse_udp_fuzzer'] []
/src/libcoap/src/coap_resource.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/src/coap_net.c ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer']
/src/libcoap/src/oscore/oscore.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/src/coap_oscore.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/src/coap_address.c ['oscore_decrypt_fuzzer'] ['oscore_decrypt_fuzzer']
/src/libcoap/src/coap_block.c ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer', 'oscore_decrypt_fuzzer'] ['pdu_parse_ws_fuzzer', 'pdu_parse_udp_fuzzer', 'pdu_parse_tcp_fuzzer']
/src/libcoap/./include/coap3/coap_pdu_internal.h ['oscore_decrypt_fuzzer'] []

Directories in report

Directory
/src/libcoap/./include/coap3/
/usr/include/openssl/
/src/libcoap/src/oscore/
/src/libcoap/tests/oss-fuzz/
/src/libcoap/src/