Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: fuzz_crypto_ext

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1 5.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 19 95.0%
All colors 20 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
1 3 mhd_MD5_init_one_time(mhd_Md5CtxExt*) call site: 00003

Runtime coverage analysis

Covered functions
11
Functions that are reachable but not covered
4
Reachable functions
25
Percentage of reachable functions covered
84.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/fuzz_crypto_ext.cpp 3
/src/mhd2/src/mhd2/md5_ext_gnutls.c 4
/src/mhd2/src/mhd2/sha256_ext_gnutls.c 4

Fuzzer: fuzz_libinfo

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 7 13.2%
gold [1:9] 22 41.5%
yellow [10:29] 17 32.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 7 13.2%
All colors 53 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
4 39 mhd_lib_init_global_if_needed() call site: 00039 fprintf
3 13 mhd_mclock_init_once() call site: 00013 clock_gettime

Runtime coverage analysis

Covered functions
21
Functions that are reachable but not covered
14
Reachable functions
53
Percentage of reachable functions covered
73.58%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/fuzz_libinfo.cpp 1
/src/mhd2/src/mhd2/lib_get_info.c 2
/src/mhd2/src/mhd2/mhd_lib_init.c 8
/src/mhd2/src/mhd2/mhd_panic.c 2
/src/mhd2/src/mhd2/mhd_mono_clock.c 1
/src/mhd2/src/mhd2/mhd_send.c 2
/src/mhd2/src/mhd2/tls_gnu_funcs.c 3
/src/mhd2/src/mhd2/h2/hpack/h2_huffman_codec.c 3

Fuzzer: fuzz_str

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1 2.04%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 48 97.9%
All colors 49 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
1 8 fuzz_tokens(FuzzedDataProvider&) call site: 00008

Runtime coverage analysis

Covered functions
37
Functions that are reachable but not covered
14
Reachable functions
75
Percentage of reachable functions covered
81.33%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/fuzz_str.cpp 8
/src/mhd2/src/mhd2/mhd_str.c 29
/src/mhd2/src/mhd2/mhd_enum_to_str.c 2

Fuzzer: fuzz_response

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 15 9.49%
gold [1:9] 2 1.26%
yellow [10:29] 6 3.79%
greenyellow [30:49] 2 1.26%
lawngreen 50+ 133 84.1%
All colors 158 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
6 45 response_add_header_no_check(MHD_Response*, unsigned long, char const*, unsigned long, char const*) call site: 00045 pthread_mutex_unlock
3 154 mhd_response_deinit_content_data(MHD_Response*) call site: 00154
2 61 MHD_response_set_options call site: 00061 pthread_mutex_unlock
1 29 add_headers(FuzzedDataProvider&, MHD_Response*) call site: 00029 pthread_mutex_lock
1 65 response_make_reusable(MHD_Response*) call site: 00065 pthread_mutex_destroy
1 124 response_add_auth_digest_challenge_int(MHD_Response*, char const*, char const*, char const*, MHD_Bool, MHD_DigestAuthMultiQOP, MHD_DigestAuthMultiAlgo, MHD_Bool, MHD_Bool) call site: 00124
1 145 LLVMFuzzerTestOneInput call site: 00145

Runtime coverage analysis

Covered functions
48
Functions that are reachable but not covered
23
Reachable functions
101
Percentage of reachable functions covered
77.23%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/fuzz_response.cpp 7
/src/mhd2/src/mhd2/response_from.c 8
/src/mhd2/src/mhd2/response_add_header.c 6
/src/mhd2/src/mhd2/mhd_str.c 4
/src/mhd2/src/mhd2/mhd_panic.c 1
/src/mhd_helper.cpp 2
/src/mhd2/src/include/microhttpd2_generated_response_options.h 8
/src/mhd2/src/mhd2/response_set_options.c 1
/src/mhd2/src/mhd2/response_funcs.c 2
/src/mhd2/src/mhd2/response_auth_basic.c 2
/src/mhd2/src/mhd2/response_auth_digest.c 4
/src/mhd2/src/mhd2/http_status_str.c 1
/src/mhd2/src/mhd2/response_destroy.c 3

Fuzzer: fuzz_mhd2

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 184 57.1%
gold [1:9] 21 6.52%
yellow [10:29] 0 0.0%
greenyellow [30:49] 1 0.31%
lawngreen 50+ 116 36.0%
All colors 322 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
102 211 MHD_daemon_destroy call site: 00211 close
29 3 fuzz_digest_auth_calc(FuzzedDataProvider&) call site: 00003 strlen
18 37 fuzz_digest_auth_calc(FuzzedDataProvider&) call site: 00037 strlen
8 201 fuzz_daemon_lifecycle(FuzzedDataProvider&) call site: 00201 clock_gettime
6 80 response_add_header_no_check(MHD_Response*, unsigned long, char const*, unsigned long, char const*) call site: 00080 pthread_mutex_unlock
5 179 daemon_configuration(FuzzedDataProvider&, MHD_Daemon*) call site: 00179 strlen
3 33 fuzz_digest_auth_calc(FuzzedDataProvider&) call site: 00033 MHD_digest_auth_calc_userhash
3 125 mhd_response_deinit_content_data(MHD_Response*) call site: 00125
3 149 mhd_mclock_init_once() call site: 00149 clock_gettime
2 94 MHD_response_set_options call site: 00094 pthread_mutex_unlock
1 64 fuzz_response_config(FuzzedDataProvider&, MHD_Response*) call site: 00064 pthread_mutex_lock
1 98 response_make_reusable(MHD_Response*) call site: 00098 pthread_mutex_destroy

Runtime coverage analysis

Covered functions
66
Functions that are reachable but not covered
182
Reachable functions
288
Percentage of reachable functions covered
36.81%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/fuzz_mhd2.cpp 8
/src/mhd2/src/mhd2/auth_digest.c 4
/src/mhd2/src/mhd2/md5_int.c 4
/src/mhd2/src/mhd2/sha256_int.c 4
/src/mhd2/src/mhd2/sha512_256_int.c 4
/src/mhd2/src/mhd2/mhd_str.c 5
/src/mhd2/src/mhd2/response_from.c 5
/src/mhd2/src/mhd2/response_add_header.c 6
/src/mhd2/src/mhd2/mhd_panic.c 2
/src/mhd2/src/include/microhttpd2_generated_response_options.h 4
/src/mhd2/src/mhd2/response_set_options.c 1
/src/mhd2/src/mhd2/response_funcs.c 2
/src/mhd2/src/mhd2/response_destroy.c 3
/src/mhd2/src/mhd2/response_auth_digest.c 1
/src/mhd2/src/mhd2/daemon_create.c 1
/src/mhd2/src/mhd2/mhd_lib_init.c 6
/src/mhd2/src/mhd2/mhd_mono_clock.c 2
/src/mhd2/src/mhd2/mhd_send.c 2
/src/mhd2/src/mhd2/tls_gnu_funcs.c 8
/src/mhd2/src/mhd2/h2/hpack/h2_huffman_codec.c 3
/src/mhd2/src/include/microhttpd2_generated_daemon_options.h 7
/src/mhd2/src/mhd2/daemon_set_options.c 1
/src/mhd2/src/mhd2/daemon_get_info.c 2
/src/mhd2/src/mhd2/events_process.c 3
/src/mhd2/src/mhd2/conn_timeout.c 2
/src/mhd2/src/mhd2/daemon_start.c 22
/src/mhd2/src/mhd2/daemon_funcs.c 4
/src/mhd2/src/mhd2/daemon_logger.c 1
/src/mhd2/src/mhd2/upgrade_proc.c 1
/src/mhd2/src/mhd2/h2/h2_comm.c 1
/src/mhd2/src/mhd2/h2/h2_conn_streams.c 2
/src/mhd2/src/mhd2/h2/h2_req_items_funcs.c 1
/src/mhd2/src/mhd2/h2/hpack/mhd_hpack_codec.c 2
/src/mhd2/src/mhd2/mempool_funcs.c 1
/src/mhd2/src/mhd2/stream_funcs.c 5
/src/mhd2/src/mhd2/mhd_sockets_funcs.c 2
/src/mhd2/src/mhd2/stream_process_reply.c 1
/src/mhd2/src/mhd2/extr_events_funcs.c 1
/src/mhd2/src/mhd2/daemon_add_conn.c 2

Fuzzer: fuzz_daemon_connection

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 243 66.3%
gold [1:9] 115 31.4%
yellow [10:29] 6 1.63%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 2 0.54%
All colors 366 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
50 223 mhd_daemon_claim_lbuf_up_to(MHD_Daemon*, unsigned long) call site: 00223 realloc
38 284 prepare_body_and_process(MHD_Connection&, std::__1::basic_string , std::__1::allocator >&, unsigned long, bool) call site: 00284 snprintf
23 164 mhd_stream_parse_request_headers(MHD_Connection*) call site: 00164
17 193 detect_post_enc(MHD_Connection*) call site: 00193
16 323 LLVMFuzzerTestOneInput call site: 00323
14 341 LLVMFuzzerTestOneInput call site: 00341 getsockopt
11 125 request_add_get_arg(void*, MHD_String const*, MHD_StringNullable const*) call site: 00125
9 110 mhd_parse_http_method(unsigned long, char const*) call site: 00110
6 54 mhd_socket_set_hard_close(int) call site: 00054 gnutls_bye
6 94 get_request_line_inner(MHD_Connection*) call site: 00094
5 154 mhd_stream_parse_request_headers(MHD_Connection*) call site: 00154
4 69 mhd_daemon_reclaim_lbuf(MHD_Daemon*, unsigned long) call site: 00069 fprintf

Runtime coverage analysis

Covered functions
73
Functions that are reachable but not covered
123
Reachable functions
259
Percentage of reachable functions covered
52.51%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/fuzz_daemon_connection.cpp 1
/src/mhd2/src/mhd2/mempool_funcs.c 7
/src/connection_helper.cpp 16
/src/mhd2/src/mhd2/stream_funcs.c 8
/src/mhd2/src/mhd2/request_funcs.c 2
/src/mhd2/src/mhd2/stream_process_request.c 22
/src/mhd2/src/mhd2/mhd_sockets_funcs.c 2
/src/mhd2/src/mhd2/tls_gnu_funcs.c 3
/src/mhd2/src/mhd2/conn_timeout.c 1
/src/mhd2/src/mhd2/daemon_logger.c 1
/src/mhd2/src/mhd2/respond_with_error.c 1
/src/mhd2/src/mhd2/daemon_funcs.c 8
/src/mhd2/src/mhd2/mhd_panic.c 1
/src/mhd2/src/mhd2/response_destroy.c 3
/src/mhd2/src/mhd2/response_auth_digest.c 1
/src/mhd2/src/mhd2/response_add_header.c 1
/src/mhd2/src/mhd2/response_funcs.c 1
/src/mhd2/src/mhd2/response_from.c 2
/src/mhd2/src/mhd2/mhd_str.c 9
/src/mhd2/src/mhd2/request_get_value.c 1
/src/mhd2/src/mhd2/h2/h2_req_get_items.c 1
/src/mhd2/src/mhd2/h2/h2_req_items_funcs.c 2
/src/mhd2/src/mhd2/post_parser_funcs.c 20
/src/mhd2/src/mhd2/stream_process_states.c 1
/src/mhd2/src/mhd2/h2/h2_comm.c 1
/src/mhd2/src/mhd2/conn_tls_check.c 1
/src/mhd2/src/mhd2/mhd_socket_error_funcs.c 2

Fuzzer: fuzz_crypto_int

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 0 0.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 25 100.%
All colors 25 100

Runtime coverage analysis

Covered functions
16
Functions that are reachable but not covered
0
Reachable functions
31
Percentage of reachable functions covered
100.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/fuzz_crypto_int.cpp 4
/src/mhd2/src/mhd2/md5_int.c 4
/src/mhd2/src/mhd2/sha256_int.c 4
/src/mhd2/src/mhd2/sha512_256_int.c 4

Fuzzer: fuzz_connection

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 135 35.0%
gold [1:9] 6 1.55%
yellow [10:29] 12 3.11%
greenyellow [30:49] 6 1.55%
lawngreen 50+ 226 58.7%
All colors 385 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 293 prepare_body_and_process(MHD_Connection&, std::__1::basic_string , std::__1::allocator >&, unsigned long, bool) call site: 00293 pthread_mutex_lock
12 167 mhd_stream_parse_request_headers(MHD_Connection*) call site: 00167
9 110 mhd_parse_http_method(unsigned long, char const*) call site: 00110
6 54 mhd_socket_set_hard_close(int) call site: 00054 gnutls_bye
6 355 check_post_leftovers(MHD_Connection*) call site: 00355
5 154 mhd_stream_parse_request_headers(MHD_Connection*) call site: 00154
5 180 mhd_stream_parse_request_headers(MHD_Connection*) call site: 00180
5 362 check_post_leftovers(MHD_Connection*) call site: 00362
5 368 check_post_leftovers(MHD_Connection*) call site: 00368
4 69 mhd_daemon_reclaim_lbuf(MHD_Daemon*, unsigned long) call site: 00069 fprintf
4 129 mhd_stream_get_no_space_err_status_code(MHD_Connection*, MHD_ProcRecvDataStage, unsigned long, char const*) call site: 00129
4 146 mhd_stream_parse_request_headers(MHD_Connection*) call site: 00146

Runtime coverage analysis

Covered functions
111
Functions that are reachable but not covered
60
Reachable functions
260
Percentage of reachable functions covered
76.92%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/fuzz_connection.cpp 2
/src/mhd2/src/mhd2/mempool_funcs.c 8
/src/connection_helper.cpp 15
/src/mhd2/src/mhd2/stream_funcs.c 9
/src/mhd2/src/mhd2/request_funcs.c 2
/src/mhd2/src/mhd2/stream_process_request.c 19
/src/mhd2/src/mhd2/mhd_sockets_funcs.c 2
/src/mhd2/src/mhd2/tls_gnu_funcs.c 1
/src/mhd2/src/mhd2/conn_timeout.c 3
/src/mhd2/src/mhd2/daemon_logger.c 1
/src/mhd2/src/mhd2/respond_with_error.c 1
/src/mhd2/src/mhd2/daemon_funcs.c 8
/src/mhd2/src/mhd2/mhd_panic.c 1
/src/mhd2/src/mhd2/response_destroy.c 3
/src/mhd2/src/mhd2/response_auth_digest.c 1
/src/mhd2/src/mhd2/response_add_header.c 1
/src/mhd2/src/mhd2/response_funcs.c 1
/src/mhd2/src/mhd2/response_from.c 2
/src/mhd2/src/mhd2/mhd_str.c 9
/src/mhd2/src/mhd2/request_get_value.c 1
/src/mhd2/src/mhd2/h2/h2_req_get_items.c 1
/src/mhd2/src/mhd2/h2/h2_req_items_funcs.c 2
/src/mhd2/src/mhd2/post_parser_funcs.c 26
/src/mhd2/src/mhd2/mhd_mono_clock.c 1

Fuzzer: fuzz_daemon

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1716 94.2%
gold [1:9] 74 4.06%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 31 1.70%
All colors 1821 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
1053 729 daemon_start_internal(MHD_Daemon*, DaemonOptions*) call site: 00729 MHD_HTTP_status_code_to_string
371 42 MHD_daemon_create call site: 00042 MHD_digest_auth_check
117 443 start_daemon_once() call site: 00443 MHD_daemon_destroy
30 649 daemon_start_internal(MHD_Daemon*, DaemonOptions*) call site: 00649 calloc
24 415 start_daemon_once() call site: 00415 MHD_digest_auth_check_digest
20 620 create_bind_listen_stream_socket_inner(MHD_Daemon*, DaemonOptions*, bool, bool, MHD_StatusCode) call site: 00620 close
17 591 create_bind_listen_stream_socket_inner(MHD_Daemon*, DaemonOptions*, bool, bool, MHD_StatusCode) call site: 00591 __errno_location
17 708 init_individual_conns(MHD_Daemon*, DaemonOptions*) call site: 00708
9 579 create_bind_listen_stream_socket(MHD_Daemon*, DaemonOptions*) call site: 00579 ntohs
5 564 daemon_start_internal(MHD_Daemon*, DaemonOptions*) call site: 00564
4 36 mhd_lib_init_global_if_needed() call site: 00036 fprintf
4 615 create_bind_listen_stream_socket_inner(MHD_Daemon*, DaemonOptions*, bool, bool, MHD_StatusCode) call site: 00615 close

Runtime coverage analysis

Covered functions
56
Functions that are reachable but not covered
1132
Reachable functions
1236
Percentage of reachable functions covered
8.41%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/fuzz_daemon.cpp 2
/src/mhd2/src/mhd2/daemon_create.c 1
/src/mhd2/src/mhd2/mhd_lib_init.c 6
/src/mhd2/src/mhd2/mhd_panic.c 2
/src/mhd2/src/mhd2/mhd_mono_clock.c 2
/src/mhd2/src/mhd2/mhd_send.c 14
/src/mhd2/src/mhd2/tls_gnu_funcs.c 22
/src/mhd2/src/mhd2/h2/hpack/h2_huffman_codec.c 5
/src/mhd_helper.cpp 26
/src/mhd_helper.h 4
/src/mhd2/src/mhd2/action.c 5
/src/mhd2/src/mhd2/request_get_value.c 5
/src/mhd2/src/mhd2/response_from.c 4
/src/mhd2/src/mhd2/response_funcs.c 3
/src/mhd2/src/mhd2/response_destroy.c 4
/src/mhd2/src/mhd2/h2/h2_action.c 1
/src/mhd2/src/mhd2/response_auth_digest.c 4
/src/mhd2/src/mhd2/response_add_header.c 5
/src/mhd2/src/mhd2/daemon_logger.c 1
/src/mhd2/src/mhd2/request_get_info.c 2
/src/mhd2/src/mhd2/h2/h2_req_get_items.c 2
/src/mhd2/src/mhd2/h2/h2_req_items_funcs.c 12
/src/mhd2/src/mhd2/auth_digest.c 27
/src/mhd2/src/mhd2/request_auth_get.c 1
/src/mhd2/src/mhd2/mhd_str.c 25
/src/mhd2/src/mhd2/stream_funcs.c 12
/src/mhd2/src/mhd2/mempool_funcs.c 10
/src/mhd2/src/mhd2/auth_basic.c 2
/src/mhd2/src/include/microhttpd2.h 2
/src/mhd2/src/mhd2/response_auth_basic.c 2
/src/mhd2/src/mhd2/daemon_funcs.c 10
/src/mhd2/src/mhd2/md5_int.c 4
/src/mhd2/src/mhd2/sha256_int.c 4
/src/mhd2/src/mhd2/sha512_256_int.c 4
/src/mhd2/src/mhd2/stream_process_request.c 29
/src/mhd2/src/include/microhttpd2_generated_daemon_options.h 3
/src/mhd2/src/mhd2/daemon_set_options.c 1
/src/mhd2/src/mhd2/daemon_start.c 52
/src/mhd2/src/mhd2/events_process.c 28
/src/mhd2/src/mhd2/upgrade_proc.c 3
/src/mhd2/src/mhd2/h2/h2_comm.c 9
/src/mhd2/src/mhd2/h2/h2_conn_streams.c 20
/src/mhd2/src/mhd2/h2/hpack/mhd_hpack_codec.c 55
/src/mhd2/src/mhd2/mhd_sockets_funcs.c 4
/src/mhd2/src/mhd2/conn_timeout.c 5
/src/mhd2/src/mhd2/stream_process_reply.c 17
/src/mhd2/src/mhd2/extr_events_funcs.c 1
/src/mhd2/src/mhd2/daemon_add_conn.c 11
/src/mhd2/src/mhd2/mhd_tls_common.c 1
/src/mhd2/src/mhd2/mhd_threads.c 5
/src/mhd2/src/mhd2/conn_data_process.c 1
/src/mhd2/src/mhd2/stream_process_states.c 3
/src/mhd2/src/mhd2/respond_with_error.c 1
/src/mhd2/src/mhd2/mhd_tls_internal.c 1
/src/mhd2/src/mhd2/h2/h2_proc_settings.c 4
/src/mhd2/src/mhd2/h2/h2_proc_out.c 8
/src/mhd2/src/mhd2/h2/h2_frame_codec.c 26
/src/mhd2/src/mhd2/h2/h2_proc_conn.c 5
/src/mhd2/src/mhd2/h2/h2_settings.h 3
/src/mhd2/src/mhd2/h2/h2_proc_in.c 2
/src/mhd2/src/mhd2/h2/h2_req_fields.c 7
/src/mhd2/src/mhd2/h2/h2_app_cb.c 2
/src/mhd2/src/mhd2/h2/h2_reply_funcs.c 6
/src/mhd2/src/mhd2/mhd_read_file.c 1
/src/mhd2/src/mhd2/request_funcs.c 2
/src/mhd2/src/mhd2/post_parser_funcs.c 26
/src/mhd2/src/mhd2/http_status_str.c 2
/src/mhd2/src/mhd2/mhd_rng.c 1
/src/mhd2/src/mhd2/conn_tls_check.c 1
/src/mhd2/src/mhd2/mhd_socket_error_funcs.c 2
/src/mhd2/src/mhd2/conn_data_recv.c 1
/src/mhd2/src/mhd2/mhd_recv.c 2
/src/mhd2/src/mhd2/sckt_recv.c 1
/src/mhd2/src/mhd2/conn_data_send.c 2

Analyses and suggestions

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

/src/fuzz_crypto_ext.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['mhd_MD5_init_one_time(mhd_Md5CtxExt*)']

/src/fuzz_libinfo.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['mhd_lib_init_global_if_needed()', 'mhd_mclock_init_once()']

/src/fuzz_str.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['fuzz_tokens(FuzzedDataProvider&)']

/src/fuzz_response.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['response_add_header_no_check(MHD_Response*, unsigned long, char const*, unsigned long, char const*)', 'mhd_response_deinit_content_data(MHD_Response*)', 'MHD_response_set_options', 'add_headers(FuzzedDataProvider&, MHD_Response*)', 'response_make_reusable(MHD_Response*)', 'response_add_auth_digest_challenge_int(MHD_Response*, char const*, char const*, char const*, MHD_Bool, MHD_DigestAuthMultiQOP, MHD_DigestAuthMultiAlgo, MHD_Bool, MHD_Bool)', 'LLVMFuzzerTestOneInput']

/src/fuzz_mhd2.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['MHD_daemon_destroy', 'fuzz_digest_auth_calc(FuzzedDataProvider&)', 'fuzz_digest_auth_calc(FuzzedDataProvider&)', 'fuzz_daemon_lifecycle(FuzzedDataProvider&)', 'response_add_header_no_check(MHD_Response*, unsigned long, char const*, unsigned long, char const*)', 'daemon_configuration(FuzzedDataProvider&, MHD_Daemon*)', 'fuzz_digest_auth_calc(FuzzedDataProvider&)', 'mhd_response_deinit_content_data(MHD_Response*)', 'mhd_mclock_init_once()', 'MHD_response_set_options']

/src/fuzz_daemon_connection.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['mhd_daemon_claim_lbuf_up_to(MHD_Daemon*, unsigned long)', 'prepare_body_and_process(MHD_Connection&, std::__1::basic_string, std::__1::allocator >&, unsigned long, bool)', 'mhd_stream_parse_request_headers(MHD_Connection*)', 'detect_post_enc(MHD_Connection*)', 'LLVMFuzzerTestOneInput', 'request_add_get_arg(void*, MHD_String const*, MHD_StringNullable const*)', 'mhd_parse_http_method(unsigned long, char const*)', 'mhd_socket_set_hard_close(int)', 'get_request_line_inner(MHD_Connection*)']

/src/fuzz_crypto_int.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


/src/fuzz_connection.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['prepare_body_and_process(MHD_Connection&, std::__1::basic_string, std::__1::allocator >&, unsigned long, bool)', 'mhd_stream_parse_request_headers(MHD_Connection*)', 'mhd_parse_http_method(unsigned long, char const*)', 'mhd_socket_set_hard_close(int)', 'check_post_leftovers(MHD_Connection*)', 'mhd_stream_parse_request_headers(MHD_Connection*)', 'mhd_stream_parse_request_headers(MHD_Connection*)', 'check_post_leftovers(MHD_Connection*)', 'check_post_leftovers(MHD_Connection*)', 'mhd_daemon_reclaim_lbuf(MHD_Daemon*, unsigned long)']

/src/fuzz_daemon.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['daemon_start_internal(MHD_Daemon*, DaemonOptions*)', 'MHD_daemon_create', 'start_daemon_once()', 'daemon_start_internal(MHD_Daemon*, DaemonOptions*)', 'start_daemon_once()', 'create_bind_listen_stream_socket_inner(MHD_Daemon*, DaemonOptions*, bool, bool, MHD_StatusCode)', 'create_bind_listen_stream_socket_inner(MHD_Daemon*, DaemonOptions*, bool, bool, MHD_StatusCode)', 'init_individual_conns(MHD_Daemon*, DaemonOptions*)', 'create_bind_listen_stream_socket(MHD_Daemon*, DaemonOptions*)', 'daemon_start_internal(MHD_Daemon*, DaemonOptions*)']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
mhd_mclock_init_once() 66 27 40.90% ['fuzz_mhd2', 'fuzz_libinfo', 'fuzz_daemon']
mhd_str_pct_decode_strict_n(charconst*,unsignedlong,char*,unsignedlong) 68 36 52.94% ['fuzz_str', 'fuzz_daemon']
mhd_str_pct_decode_lenient_n(charconst*,unsignedlong,char*,unsignedlong,bool*) 97 52 53.60% ['fuzz_str', 'fuzz_daemon', 'fuzz_daemon_connection', 'fuzz_connection']
mhd_str_quote(charconst*,unsignedlong,char*,unsignedlong) 41 20 48.78% ['fuzz_str', 'fuzz_daemon', 'fuzz_response']
MHD_daemon_get_info_fixed_sz 120 4 3.333% ['fuzz_mhd2']
MHD_daemon_get_info_dynamic_sz 46 4 8.695% ['fuzz_mhd2']
MHD_daemon_set_options 267 53 19.85% ['fuzz_mhd2', 'fuzz_daemon']
mhd_conn_tls_check(MHD_Connection*) 74 12 16.21% ['fuzz_daemon', 'fuzz_daemon_connection']
detect_post_enc(MHD_Connection*) 57 15 26.31% ['fuzz_daemon', 'fuzz_daemon_connection', 'fuzz_connection']
mhd_request_get_value_n(MHD_Request*,MHD_ValueKind,unsignedlong,charconst*,MHD_StringNullable*) 56 30 53.57% ['fuzz_daemon', 'fuzz_daemon_connection', 'fuzz_connection']
mhd_conn_start_closing(MHD_Connection*,mhd_ConnCloseReason,charconst*) 268 56 20.89% ['fuzz_mhd2', 'fuzz_daemon', 'fuzz_daemon_connection', 'fuzz_connection']
conn_start_socket_closing(MHD_Connection*,bool) 34 10 29.41% ['fuzz_mhd2', 'fuzz_daemon', 'fuzz_daemon_connection', 'fuzz_connection']
mhd_stream_get_request_line(MHD_Connection*) 46 22 47.82% ['fuzz_daemon', 'fuzz_daemon_connection', 'fuzz_connection']
mhd_stream_parse_request_headers(MHD_Connection*) 242 98 40.49% ['fuzz_daemon', 'fuzz_daemon_connection', 'fuzz_connection']
mhd_conn_event_loop_state_update(MHD_Connection*) 125 18 14.39% ['fuzz_daemon', 'fuzz_daemon_connection']
fuzz_mhd_stream_process_post_finish(MHD_Connection&,MHD_Daemon&,std::__1::basic_string ,std::__1::allocator >const&) 45 19 42.22% ['fuzz_connection']
mhd_monotonic_msec_counter() 45 18 40.0% ['fuzz_mhd2', 'fuzz_daemon', 'fuzz_connection']
check_post_leftovers_urlenc(MHD_Connection*,unsignedlong*,char*) 126 21 16.66% ['fuzz_daemon', 'fuzz_connection']
check_post_leftovers_mpart(MHD_Connection*,unsignedlong*,char*) 118 24 20.33% ['fuzz_daemon', 'fuzz_connection']
check_post_leftovers_text(MHD_Connection*,unsignedlong*,char*) 97 16 16.49% ['fuzz_daemon', 'fuzz_connection']
mhd_stream_get_no_space_err_status_code(MHD_Connection*,MHD_ProcRecvDataStage,unsignedlong,charconst*) 151 45 29.80% ['fuzz_daemon', 'fuzz_daemon_connection', 'fuzz_connection']
mhd_stream_process_upload_action(MHD_Connection*,MHD_UploadActionconst*,bool) 68 26 38.23% ['fuzz_daemon', 'fuzz_daemon_connection', 'fuzz_connection']
daemon_set_work_mode(MHD_Daemon*,DaemonOptions*) 71 12 16.90% ['fuzz_daemon']
daemon_init_net(MHD_Daemon*,DaemonOptions*) 53 29 54.71% ['fuzz_daemon']
daemon_choose_and_preinit_events(MHD_Daemon*,DaemonOptions*) 164 69 42.07% ['fuzz_daemon']
create_bind_listen_stream_socket_inner(MHD_Daemon*,DaemonOptions*,bool,bool,MHD_StatusCode) 544 135 24.81% ['fuzz_daemon']
daemon_init_tls(MHD_Daemon*,DaemonOptions*) 41 12 29.26% ['fuzz_daemon']
set_d_threading_type(MHD_Daemon*) 43 12 27.90% ['fuzz_daemon']
allocate_events(MHD_Daemon*) 108 39 36.11% ['fuzz_daemon']
init_daemon_fds_monitoring(MHD_Daemon*) 155 46 29.67% ['fuzz_daemon']
wait_for_response(int) 32 17 53.12% ['fuzz_daemon']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/mhd2/src/mhd2/daemon_set_options.c ['fuzz_mhd2', 'fuzz_daemon'] ['fuzz_mhd2', 'fuzz_daemon']
/src/fuzz_daemon.cpp ['fuzz_daemon'] ['fuzz_daemon']
/src/mhd2/src/mhd2/mhd_tls_common.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/mhd_mono_clock.c ['fuzz_libinfo', 'fuzz_mhd2', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_libinfo', 'fuzz_mhd2', 'fuzz_connection', 'fuzz_daemon']
/src/mhd_helper.cpp ['fuzz_response', 'fuzz_daemon'] ['fuzz_response', 'fuzz_daemon']
/src/fuzz_mhd2.cpp ['fuzz_mhd2'] ['fuzz_mhd2']
/src/mhd2/src/mhd2/h2/hpack/h2_huffman_codec.c ['fuzz_libinfo', 'fuzz_mhd2', 'fuzz_daemon'] ['fuzz_libinfo', 'fuzz_mhd2', 'fuzz_daemon']
/src/mhd2/src/mhd2/conn_data_process.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/md5_ext_gnutls.c ['fuzz_crypto_ext'] ['fuzz_crypto_ext']
/src/mhd2/src/mhd2/post_parser_funcs.c ['fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_daemon_connection', 'fuzz_connection']
/src/mhd2/src/mhd2/mhd_str.c ['fuzz_str', 'fuzz_response', 'fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_str', 'fuzz_response', 'fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection']
/usr/local/bin/../include/c++/v1/stdexcept [] []
/src/mhd2/src/mhd2/upgrade_prep.c [] []
/src/mhd2/src/mhd2/h2/h2_proc_in.c ['fuzz_daemon'] []
/src/fuzz_crypto_ext.cpp ['fuzz_crypto_ext'] ['fuzz_crypto_ext']
/src/mhd2/src/mhd2/mhd_panic.c ['fuzz_libinfo', 'fuzz_response', 'fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_libinfo', 'fuzz_mhd2', 'fuzz_daemon']
/src/mhd2/src/mhd2/mhd_threads.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/./mhd_lib_init_impl.h [] []
/src/mhd2/src/mhd2/h2/h2_proc_out.c ['fuzz_daemon'] []
/src/fuzz_response.cpp ['fuzz_response'] ['fuzz_response']
/src/mhd2/src/mhd2/mhd_recv.c ['fuzz_daemon'] []
/src/fuzz_crypto_int.cpp ['fuzz_crypto_int'] ['fuzz_crypto_int']
/src/mhd2/src/mhd2/daemon_add_conn.c ['fuzz_mhd2', 'fuzz_daemon'] []
/src/mhd2/src/mhd2/h2/h2_app_cb.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/request_get_info.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/stream_funcs.c ['fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_daemon_connection', 'fuzz_connection']
/src/mhd2/src/mhd2/h2/h2_req_get_items.c ['fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] []
/src/mhd2/src/mhd2/mhd_send.c ['fuzz_libinfo', 'fuzz_mhd2', 'fuzz_daemon'] ['fuzz_libinfo', 'fuzz_mhd2', 'fuzz_daemon']
/src/mhd_helper.h ['fuzz_daemon'] []
/src/mhd2/src/mhd2/stream_process_reply.c ['fuzz_mhd2', 'fuzz_daemon'] []
/src/mhd2/src/mhd2/mempool_funcs.c ['fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_daemon_connection', 'fuzz_connection']
/src/connection_helper.cpp ['fuzz_daemon_connection', 'fuzz_connection'] ['fuzz_daemon_connection', 'fuzz_connection']
/src/mhd2/src/include/microhttpd2_generated_daemon_options.h ['fuzz_mhd2', 'fuzz_daemon'] ['fuzz_mhd2', 'fuzz_daemon']
/src/mhd2/src/mhd2/request_funcs.c ['fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_daemon_connection', 'fuzz_connection']
/src/mhd2/src/mhd2/daemon_start.c ['fuzz_mhd2', 'fuzz_daemon'] ['fuzz_mhd2', 'fuzz_daemon']
/src/mhd2/src/mhd2/response_funcs.c ['fuzz_response', 'fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_response', 'fuzz_mhd2']
/src/mhd2/src/mhd2/conn_data_recv.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/response_destroy.c ['fuzz_response', 'fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_response', 'fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection']
/src/mhd2/src/mhd2/h2/hpack/mhd_hpack_codec.c ['fuzz_mhd2', 'fuzz_daemon'] []
/src/fuzz_libinfo.cpp ['fuzz_libinfo'] ['fuzz_libinfo']
/src/mhd2/src/mhd2/sha256_int.c ['fuzz_mhd2', 'fuzz_crypto_int', 'fuzz_daemon'] ['fuzz_crypto_int']
/src/mhd2/src/mhd2/response_add_header.c ['fuzz_response', 'fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_response', 'fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection']
/src/mhd2/src/mhd2/h2/h2_comm.c ['fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_daemon'] []
/src/mhd2/src/mhd2/daemon_funcs.c ['fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_daemon_connection', 'fuzz_connection']
/src/mhd2/src/mhd2/h2/h2_conn_streams.c ['fuzz_mhd2', 'fuzz_daemon'] []
/src/mhd2/src/mhd2/http_status_str.c ['fuzz_response', 'fuzz_daemon'] []
/src/mhd2/src/mhd2/response_auth_basic.c ['fuzz_response', 'fuzz_daemon'] ['fuzz_response']
/src/mhd2/src/mhd2/mhd_rng.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/request_get_value.c ['fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_daemon_connection', 'fuzz_connection']
/src/fuzz_daemon_connection.cpp ['fuzz_daemon_connection'] ['fuzz_daemon_connection']
/src/mhd2/src/mhd2/response_set_options.c ['fuzz_response', 'fuzz_mhd2'] ['fuzz_response', 'fuzz_mhd2']
/src/mhd2/src/mhd2/mhd_sockets_funcs.c ['fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_daemon_connection', 'fuzz_connection']
/src/mhd2/src/mhd2/response_from.c ['fuzz_response', 'fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_response', 'fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection']
/src/mhd2/src/mhd2/h2/h2_req_fields.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/respond_with_error.c ['fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_daemon_connection', 'fuzz_connection']
/src/mhd2/src/mhd2/mhd_read_file.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/extr_events_funcs.c ['fuzz_mhd2', 'fuzz_daemon'] []
/src/mhd2/src/mhd2/h2/h2_proc_conn.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/daemon_logger.c ['fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_daemon_connection', 'fuzz_connection']
/src/mhd2/src/mhd2/sckt_recv.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/stream_process_request.c ['fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_daemon_connection', 'fuzz_connection']
/src/fuzz_str.cpp ['fuzz_str'] ['fuzz_str']
/src/mhd2/src/mhd2/conn_timeout.c ['fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_daemon_connection', 'fuzz_connection']
/src/mhd2/src/mhd2/lib_get_info.c ['fuzz_libinfo'] ['fuzz_libinfo']
/src/mhd2/src/mhd2/events_process.c ['fuzz_mhd2', 'fuzz_daemon'] []
/src/mhd2/src/mhd2/mhd_enum_to_str.c ['fuzz_str'] []
/src/mhd2/src/mhd2/mhd_socket_error_funcs.c ['fuzz_daemon_connection', 'fuzz_daemon'] []
/src/mhd2/src/mhd2/h2/h2_action.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/h2/h2_settings.h ['fuzz_daemon'] []
/src/mhd2/src/mhd2/auth_digest.c ['fuzz_mhd2', 'fuzz_daemon'] ['fuzz_mhd2']
/usr/local/bin/../include/c++/v1/string [] []
/src/mhd2/src/mhd2/conn_data_send.c ['fuzz_daemon'] []
/src/mhd2/src/include/microhttpd2_generated_response_options.h ['fuzz_response', 'fuzz_mhd2'] ['fuzz_response', 'fuzz_mhd2']
/src/mhd2/src/mhd2/conn_tls_check.c ['fuzz_daemon_connection', 'fuzz_daemon'] ['fuzz_daemon_connection']
/src/mhd2/src/mhd2/sha512_256_int.c ['fuzz_mhd2', 'fuzz_crypto_int', 'fuzz_daemon'] ['fuzz_crypto_int']
/src/fuzz_connection.cpp ['fuzz_connection'] ['fuzz_connection']
/src/mhd2/src/mhd2/request_auth_get.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/mhd_tls_internal.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/daemon_get_info.c ['fuzz_mhd2'] ['fuzz_mhd2']
/src/mhd2/src/mhd2/daemon_logger_default.c [] []
/src/mhd2/src/mhd2/auth_basic.c ['fuzz_daemon'] []
/src/mhd2/src/include/microhttpd2.h ['fuzz_daemon'] []
/src/mhd2/src/mhd2/mhd_lib_init.c ['fuzz_libinfo', 'fuzz_mhd2', 'fuzz_daemon'] ['fuzz_libinfo', 'fuzz_mhd2', 'fuzz_daemon']
/src/mhd2/src/mhd2/tls_gnu_funcs.c ['fuzz_libinfo', 'fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_libinfo', 'fuzz_mhd2', 'fuzz_daemon']
/src/mhd2/src/mhd2/daemon_create.c ['fuzz_mhd2', 'fuzz_daemon'] ['fuzz_mhd2', 'fuzz_daemon']
/src/mhd2/src/mhd2/md5_int.c ['fuzz_mhd2', 'fuzz_crypto_int', 'fuzz_daemon'] ['fuzz_crypto_int']
/src/mhd2/src/mhd2/h2/h2_req_items_funcs.c ['fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] []
/src/mhd2/src/mhd2/action.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/upgrade_proc.c ['fuzz_mhd2', 'fuzz_daemon'] []
/src/mhd2/src/mhd2/h2/h2_frame_codec.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/h2/h2_reply_funcs.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/response_auth_digest.c ['fuzz_response', 'fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection', 'fuzz_daemon'] ['fuzz_response', 'fuzz_mhd2', 'fuzz_daemon_connection', 'fuzz_connection']
/src/mhd2/src/mhd2/stream_process_states.c ['fuzz_daemon_connection', 'fuzz_daemon'] ['fuzz_daemon_connection']
/src/mhd2/src/mhd2/h2/h2_proc_settings.c ['fuzz_daemon'] []
/src/mhd2/src/mhd2/sha256_ext_gnutls.c ['fuzz_crypto_ext'] ['fuzz_crypto_ext']

Directories in report

Directory
/src/
/src/mhd2/src/include/
/src/mhd2/src/mhd2/h2/
/usr/local/bin/../include/c++/v1/
/src/mhd2/src/mhd2/h2/hpack/
/src/mhd2/src/mhd2/
/src/mhd2/src/mhd2/./