Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues
Report generation date: 2025-06-16

Project overview: libtorrent

High level conclusions

Reachability and coverage overview

Functions statically reachable by fuzzers
1.0%
121 / 8245
Cyclomatic complexity statically reachable by fuzzers
3.0%
498 / 17237
Runtime code coverage of functions
1.0%
78 / 8245

Fuzzers overview

Fuzzer Fuzzer filename Functions Reached Functions unreached Fuzzer depth Files reached Basic blocks reached Cyclomatic complexity Details
torrent_info fuzzers/src/torrent_info.cpp 3 8245 1 1 1 0 torrent_info.cpp
utp fuzzers/src/utp.cpp 7 8245 2 2 1 0 utp.cpp
bdecode_node fuzzers/src/bdecode_node.cpp 26 8238 2 2 28 26 bdecode_node.cpp
add_torrent fuzzers/src/add_torrent.cpp 38 8239 22 62 14 23 add_torrent.cpp
peer_conn fuzzers/src/peer_conn.cpp 83 8217 18 57 45 27 peer_conn.cpp
fuzzers/src/idna.cpp fuzzers/src/idna.cpp 11 8242 4 6 6 8 idna.cpp
fuzzers/src/verify_encoding.cpp fuzzers/src/verify_encoding.cpp 16 8242 3 4 8 5 verify_encoding.cpp
fuzzers/src/parse_int.cpp fuzzers/src/parse_int.cpp 7 8241 2 2 8 7 parse_int.cpp
http_parser fuzzers/src/http_parser.cpp 10 8244 3 3 4 6 http_parser.cpp
fuzzers/src/base64encode.cpp fuzzers/src/base64encode.cpp 12 8242 5 4 4 3 base64encode.cpp
fuzzers/src/parse_url.cpp fuzzers/src/parse_url.cpp 26 8237 4 5 19 35 parse_url.cpp
upnp fuzzers/src/upnp.cpp 17 8239 3 3 21 60 upnp.cpp
file_storage_add_file fuzzers/src/file_storage_add_file.cpp 4 8245 3 2 1 1 file_storage_add_file.cpp
session_params fuzzers/src/session_params.cpp 102 8217 27 67 107 125 session_params.cpp
fuzzers/src/utf8_codepoint.cpp fuzzers/src/utf8_codepoint.cpp 14 8242 3 2 28 30 utf8_codepoint.cpp
fuzzers/src/escape_string.cpp fuzzers/src/escape_string.cpp 6 8244 20 57 12 17 escape_string.cpp
fuzzers/src/base32decode.cpp fuzzers/src/base32decode.cpp 15 8242 20 57 10 11 base32decode.cpp
fuzzers/src/gzip.cpp fuzzers/src/gzip.cpp 48 8229 7 9 87 90 gzip.cpp
http_tracker fuzzers/src/http_tracker.cpp 2 8245 1 1 1 0 http_tracker.cpp
resume_data fuzzers/src/resume_data.cpp 29 8237 25 68 31 30 resume_data.cpp
dht_node fuzzers/src/dht_node.cpp 10 8243 2 2 3 0 dht_node.cpp
fuzzers/src/parse_magnet_uri.cpp fuzzers/src/parse_magnet_uri.cpp 5 8244 2 2 3 1 parse_magnet_uri.cpp
sanitize_path fuzzers/src/sanitize_path.cpp 35 8235 24 65 29 40 sanitize_path.cpp
fuzzers/src/convert_from_native.cpp fuzzers/src/convert_from_native.cpp 4 8244 4 3 2 0 convert_from_native.cpp
fuzzers/src/base32encode.cpp fuzzers/src/base32encode.cpp 14 8243 20 57 3 2 base32encode.cpp
fuzzers/src/escape_path.cpp fuzzers/src/escape_path.cpp 10 8242 3 2 5 4 escape_path.cpp
fuzzers/src/convert_to_native.cpp fuzzers/src/convert_to_native.cpp 4 8244 4 3 2 0 convert_to_native.cpp

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: torrent_info

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1 50.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 50.0%
All colors 2 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
1 0 EP call site: 00000

Runtime coverage analysis

Covered functions
289
Functions that are reachable but not covered
2
Reachable functions
3
Percentage of reachable functions covered
33.33%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/torrent_info.cpp 1

Fuzzer: utp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 2 22.2%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 7 77.7%
All colors 9 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
2 2 LLVMFuzzerTestOneInput call site: 00002 TORRENT_ASSERT

Runtime coverage analysis

Covered functions
136
Functions that are reachable but not covered
6
Reachable functions
7
Percentage of reachable functions covered
14.29%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/utp.cpp 7
src/utp_stream.cpp 1

Fuzzer: bdecode_node

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 2 50.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 2 50.0%
All colors 4 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
2 1 LLVMFuzzerTestOneInput call site: 00001 libtorrent::bdecode

Runtime coverage analysis

Covered functions
27
Functions that are reachable but not covered
25
Reachable functions
26
Percentage of reachable functions covered
3.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/bdecode_node.cpp 2
src/bdecode.cpp 1

Fuzzer: add_torrent

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1898 99.5%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 9 0.47%
All colors 1907 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
1637 216 LLVMFuzzerTestOneInput call site: 00216 libtorrent::create_torrent::generate
213 2 LLVMFuzzerTestOneInput call site: 00002 libtorrent::bitfield::resize
41 1857 LLVMFuzzerTestOneInput call site: 01857 peer_conn::on_message
6 1900 LLVMFuzzerTestOneInput call site: 01900 libtorrent::log_async
1 1854 LLVMFuzzerTestOneInput call site: 01854 peer_conn::close

Runtime coverage analysis

Covered functions
1317
Functions that are reachable but not covered
37
Reachable functions
38
Percentage of reachable functions covered
2.63%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/add_torrent.cpp 23
src/bitfield.cpp 9
include/libtorrent/aux_/byteswap.hpp 1
test/test_storage.cpp 49
include/libtorrent/bitfield.hpp 15
bindings/python/src/session.cpp 34
test/test_dht.cpp 30
examples/client_test.cpp 1
src/random.cpp 18
test/broadcast_socket.cpp 43
simulation/disk_io.cpp 49
include/libtorrent/time.hpp 2
simulation/test_torrent_status.cpp 2
include/libtorrent/error_code.hpp 4
src/alert.cpp 2
src/socks5_stream.cpp 1
tools/disk_io_stress_test.cpp 15
include/libtorrent/torrent_info.hpp 4
test/test_remap_files.cpp 3
simulation/libsimulator/test/catch.hpp 8
src/packet_buffer.cpp 5
test/bittorrent_peer.cpp 51
bindings/python/src/error_code.cpp 2
examples/print.cpp 1
include/libtorrent/io.hpp 8
include/libtorrent/random.hpp 7
include/libtorrent/aux_/win_cng.hpp 10
include/libtorrent/aux_/throw.hpp 1
include/libtorrent/aux_/win_crypto_provider.hpp 10
simulation/libsimulator/test/main.cpp 3
test/test_utils.cpp 1
bindings/python/src/create_torrent.cpp 3
src/create_torrent.cpp 42
include/libtorrent/aux_/heterogeneous_queue.hpp 21
test/test_flags.cpp 3
include/libtorrent/tailqueue.hpp 1
test/test_create_torrent.cpp 2
test/test_truncate.cpp 3
src/path.cpp 56
include/libtorrent/peer_class.hpp 1
simulation/libsimulator/include/simulator/simulator.hpp 6
include/libtorrent/string_view.hpp 1
src/escape_string.cpp 10
include/libtorrent/stat.hpp 4
include/libtorrent/peer_class_type_filter.hpp 2
src/settings_pack.cpp 17
src/bdecode.cpp 9
src/mmap_storage.cpp 26
src/drive_info.cpp 16
include/libtorrent/aux_/ip_helpers.hpp 3
test/setup_transfer.cpp 11
src/ip_helpers.cpp 10
src/socket_io.cpp 1
include/libtorrent/socket_io.hpp 6
simulation/libsimulator/src/http_server.cpp 6
src/storage_utils.cpp 16
include/libtorrent/aux_/container_wrapper.hpp 5
include/libtorrent/aux_/numeric_cast.hpp 5
src/file.cpp 6
bindings/python/src/boost_python.hpp 2
src/kademlia/item.cpp 1
include/libtorrent/debug.hpp 3

Fuzzer: peer_conn

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1655 98.4%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 26 1.54%
All colors 1681 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
1510 17 LLVMFuzzerTestOneInput call site: 00017 libtorrent::create_torrent::generate
114 1556 LLVMFuzzerTestOneInput call site: 01556 peer_conn::on_message
12 4 LLVMFuzzerTestOneInput call site: 00004
9 1543 LLVMFuzzerTestOneInput call site: 01543 libtorrent::broadcast_socket::maybe_abort
7 1671 LLVMFuzzerTestOneInput call site: 01671 message
3 0 EP call site: 00000

Runtime coverage analysis

Covered functions
2301
Functions that are reachable but not covered
82
Reachable functions
83
Percentage of reachable functions covered
1.2%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/peer_conn.cpp 21
simulation/test_torrent_status.cpp 2
examples/client_test.cpp 5
test/bittorrent_peer.cpp 55
bindings/python/src/error_code.cpp 2
examples/print.cpp 1
src/random.cpp 18
test/broadcast_socket.cpp 43
test/test_storage.cpp 49
simulation/disk_io.cpp 49
include/libtorrent/time.hpp 2
include/libtorrent/error_code.hpp 4
src/alert.cpp 2
src/socks5_stream.cpp 1
tools/disk_io_stress_test.cpp 15
include/libtorrent/torrent_info.hpp 4
test/test_remap_files.cpp 3
include/libtorrent/bitfield.hpp 15
simulation/libsimulator/test/catch.hpp 5
src/packet_buffer.cpp 5
include/libtorrent/io.hpp 8
include/libtorrent/random.hpp 7
include/libtorrent/aux_/win_cng.hpp 10
include/libtorrent/aux_/throw.hpp 1
include/libtorrent/aux_/win_crypto_provider.hpp 10
simulation/libsimulator/test/main.cpp 1
test/test_utils.cpp 1
bindings/python/src/create_torrent.cpp 3
src/create_torrent.cpp 42
include/libtorrent/aux_/heterogeneous_queue.hpp 21
test/test_flags.cpp 3
include/libtorrent/tailqueue.hpp 1
test/test_create_torrent.cpp 2
test/test_truncate.cpp 3
src/path.cpp 56
include/libtorrent/peer_class.hpp 1
simulation/libsimulator/include/simulator/simulator.hpp 10
include/libtorrent/string_view.hpp 1
src/escape_string.cpp 10
include/libtorrent/aux_/byteswap.hpp 1
include/libtorrent/stat.hpp 4
include/libtorrent/peer_class_type_filter.hpp 2
src/settings_pack.cpp 17
src/bdecode.cpp 9
src/mmap_storage.cpp 26
src/drive_info.cpp 16
include/libtorrent/aux_/ip_helpers.hpp 3
test/setup_transfer.cpp 31
src/ip_helpers.cpp 10
src/socket_io.cpp 1
include/libtorrent/socket_io.hpp 6
bindings/python/src/session.cpp 7
simulation/libsimulator/src/http_server.cpp 6
src/storage_utils.cpp 16
include/libtorrent/aux_/container_wrapper.hpp 5
include/libtorrent/aux_/numeric_cast.hpp 5
src/file.cpp 6

Fuzzer: fuzzers/src/idna.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 17 94.4%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 5.55%
All colors 18 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
17 0 EP call site: 00000 libtorrent::is_idna

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
10
Reachable functions
11
Percentage of reachable functions covered
9.09%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/idna.cpp 3
src/parse_url.cpp 3
simulation/libsimulator/test/main.cpp 2
simulation/libsimulator/test/catch.hpp 1
bindings/python/src/converters.cpp 2
test/test_dht.cpp 1

Fuzzer: fuzzers/src/verify_encoding.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 16 94.1%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 5.88%
All colors 17 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
16 0 EP call site: 00000 libtorrent::aux::verify_encoding

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
15
Reachable functions
16
Percentage of reachable functions covered
6.25%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/verify_encoding.cpp 2
src/torrent_info.cpp 11
include/libtorrent/aux_/file_progress.hpp 1
simulation/libsimulator/test/catch.hpp 1

Fuzzer: fuzzers/src/parse_int.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 7 87.5%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 12.5%
All colors 8 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
7 0 EP call site: 00000 libtorrent::parse_int

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
6
Reachable functions
7
Percentage of reachable functions covered
14.29%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/parse_int.cpp 2
src/bdecode.cpp 3

Fuzzer: http_parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 26 92.8%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 2 7.14%
All colors 28 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
26 1 LLVMFuzzerTestOneInput call site: 00001 Catch::StringRef::substr

Runtime coverage analysis

Covered functions
21
Functions that are reachable but not covered
9
Reachable functions
10
Percentage of reachable functions covered
10.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/http_parser.cpp 2
test/test_http_parser.cpp 14
simulation/libsimulator/test/catch.hpp 1

Fuzzer: fuzzers/src/base64encode.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 30 96.7%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 3.22%
All colors 31 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
30 0 EP call site: 00000 check_block_fill

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
11
Reachable functions
12
Percentage of reachable functions covered
8.33%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/base64encode.cpp 2
src/escape_string.cpp 8
include/libtorrent/bitfield.hpp 5
tools/disk_io_stress_test.cpp 4

Fuzzer: fuzzers/src/parse_url.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 60 98.3%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 1.63%
All colors 61 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
60 0 EP call site: 00000 libtorrent::parse_url_components

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
25
Reachable functions
26
Percentage of reachable functions covered
3.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/parse_url.cpp 3
src/parse_url.cpp 14
src/escape_string.cpp 1
simulation/libsimulator/test/catch.hpp 1
include/libtorrent/aux_/heterogeneous_queue.hpp 6

Fuzzer: upnp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 42 91.3%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 4 8.69%
All colors 46 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
42 1 LLVMFuzzerTestOneInput call site: 00001 libtorrent::is_space

Runtime coverage analysis

Covered functions
18
Functions that are reachable but not covered
16
Reachable functions
17
Percentage of reachable functions covered
5.88%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/upnp.cpp 4
src/xml_parse.cpp 10
src/string_util.cpp 2

Fuzzer: file_storage_add_file

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 3 60.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 2 40.0%
All colors 5 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
3 1 LLVMFuzzerTestOneInput call site: 00001

Runtime coverage analysis

Covered functions
30
Functions that are reachable but not covered
3
Reachable functions
4
Percentage of reachable functions covered
25.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/file_storage_add_file.cpp 2
bindings/python/src/create_torrent.cpp 1

Fuzzer: session_params

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 2006 99.9%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 2 0.09%
All colors 2008 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
2006 1 LLVMFuzzerTestOneInput call site: 00001 libtorrent::create_torrent::generate

Runtime coverage analysis

Covered functions
145
Functions that are reachable but not covered
101
Reachable functions
102
Percentage of reachable functions covered
0.98%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/session_params.cpp 2
src/session_params.cpp 38
src/session_impl.cpp 4
src/bdecode.cpp 16
src/kademlia/dht_settings.cpp 4
src/kademlia/dht_state.cpp 26
include/libtorrent/aux_/heterogeneous_queue.hpp 21
test/test_storage.cpp 49
tools/disk_io_stress_test.cpp 15
src/packet_buffer.cpp 5
test/bittorrent_peer.cpp 51
simulation/test_torrent_status.cpp 2
bindings/python/src/error_code.cpp 2
examples/print.cpp 1
include/libtorrent/io.hpp 8
src/random.cpp 18
test/broadcast_socket.cpp 43
bindings/python/src/create_torrent.cpp 3
src/create_torrent.cpp 42
include/libtorrent/torrent_info.hpp 4
examples/client_test.cpp 1
test/test_create_torrent.cpp 2
test/test_truncate.cpp 3
src/path.cpp 56
include/libtorrent/peer_class.hpp 1
simulation/libsimulator/include/simulator/simulator.hpp 10
include/libtorrent/string_view.hpp 1
simulation/libsimulator/test/catch.hpp 10
src/escape_string.cpp 10
include/libtorrent/bitfield.hpp 15
include/libtorrent/aux_/byteswap.hpp 1
include/libtorrent/stat.hpp 4
include/libtorrent/peer_class_type_filter.hpp 2
simulation/disk_io.cpp 49
include/libtorrent/time.hpp 2
include/libtorrent/random.hpp 7
include/libtorrent/aux_/win_cng.hpp 10
include/libtorrent/aux_/throw.hpp 1
include/libtorrent/aux_/win_crypto_provider.hpp 10
simulation/libsimulator/test/main.cpp 34
include/libtorrent/error_code.hpp 4
src/alert.cpp 2
src/socks5_stream.cpp 1
test/test_remap_files.cpp 3
src/settings_pack.cpp 17
src/mmap_storage.cpp 26
src/drive_info.cpp 16
include/libtorrent/aux_/ip_helpers.hpp 3
test/setup_transfer.cpp 11
src/ip_helpers.cpp 10
src/socket_io.cpp 1
include/libtorrent/socket_io.hpp 10
bindings/python/src/session.cpp 4
simulation/libsimulator/src/http_server.cpp 6
src/storage_utils.cpp 16
include/libtorrent/aux_/container_wrapper.hpp 5
include/libtorrent/aux_/numeric_cast.hpp 5
src/file.cpp 6
test/test_flags.cpp 3
test/test_utils.cpp 1
include/libtorrent/tailqueue.hpp 1
bindings/python/src/ip_filter.cpp 9
src/ip_filter.cpp 1
src/kademlia/dht_tracker.cpp 3
src/kademlia/routing_table.cpp 2
test/test_bloom_filter.cpp 4
simulation/transfer_sim.hpp 2

Fuzzer: fuzzers/src/utf8_codepoint.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 26 96.2%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 3.70%
All colors 27 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
26 0 EP call site: 00000 libtorrent::parse_utf8_codepoint

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
13
Reachable functions
14
Percentage of reachable functions covered
7.14%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/utf8_codepoint.cpp 2
src/utf8.cpp 10

Fuzzer: fuzzers/src/escape_string.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1531 99.9%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 0.06%
All colors 1532 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
1531 0 EP call site: 00000 libtorrent::create_torrent::generate

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
5
Reachable functions
6
Percentage of reachable functions covered
16.67%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/escape_string.cpp 2
src/escape_string.cpp 12
test/broadcast_socket.cpp 43
test/test_storage.cpp 49
src/random.cpp 18
tools/disk_io_stress_test.cpp 15
src/packet_buffer.cpp 5
test/bittorrent_peer.cpp 51
simulation/test_torrent_status.cpp 2
bindings/python/src/error_code.cpp 2
examples/print.cpp 1
include/libtorrent/io.hpp 8
simulation/disk_io.cpp 49
include/libtorrent/time.hpp 2
include/libtorrent/error_code.hpp 4
src/alert.cpp 2
src/socks5_stream.cpp 1
include/libtorrent/torrent_info.hpp 4
test/test_remap_files.cpp 3
include/libtorrent/bitfield.hpp 15
simulation/libsimulator/test/catch.hpp 5
examples/client_test.cpp 1
include/libtorrent/random.hpp 7
include/libtorrent/aux_/win_cng.hpp 10
include/libtorrent/aux_/throw.hpp 1
include/libtorrent/aux_/win_crypto_provider.hpp 10
simulation/libsimulator/test/main.cpp 1
test/test_utils.cpp 1
bindings/python/src/create_torrent.cpp 3
src/create_torrent.cpp 42
include/libtorrent/aux_/heterogeneous_queue.hpp 21
test/test_flags.cpp 3
include/libtorrent/tailqueue.hpp 1
test/test_create_torrent.cpp 2
test/test_truncate.cpp 3
src/path.cpp 56
include/libtorrent/peer_class.hpp 1
simulation/libsimulator/include/simulator/simulator.hpp 6
include/libtorrent/string_view.hpp 1
include/libtorrent/aux_/byteswap.hpp 1
include/libtorrent/stat.hpp 4
include/libtorrent/peer_class_type_filter.hpp 2
src/settings_pack.cpp 17
src/bdecode.cpp 9
src/mmap_storage.cpp 26
src/drive_info.cpp 16
include/libtorrent/aux_/ip_helpers.hpp 3
test/setup_transfer.cpp 11
src/ip_helpers.cpp 10
src/socket_io.cpp 1
include/libtorrent/socket_io.hpp 6
bindings/python/src/session.cpp 4
simulation/libsimulator/src/http_server.cpp 6
src/storage_utils.cpp 16
include/libtorrent/aux_/container_wrapper.hpp 5
include/libtorrent/aux_/numeric_cast.hpp 5
src/file.cpp 6

Fuzzer: fuzzers/src/base32decode.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1549 99.9%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 0.06%
All colors 1550 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
1549 0 EP call site: 00000 libtorrent::create_torrent::generate

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
14
Reachable functions
15
Percentage of reachable functions covered
6.67%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/base32decode.cpp 2
src/escape_string.cpp 19
test/broadcast_socket.cpp 43
test/test_storage.cpp 49
src/random.cpp 18
tools/disk_io_stress_test.cpp 16
src/packet_buffer.cpp 5
test/bittorrent_peer.cpp 51
simulation/test_torrent_status.cpp 2
bindings/python/src/error_code.cpp 2
examples/print.cpp 1
include/libtorrent/io.hpp 8
simulation/disk_io.cpp 49
include/libtorrent/time.hpp 2
include/libtorrent/error_code.hpp 4
src/alert.cpp 2
src/socks5_stream.cpp 1
include/libtorrent/torrent_info.hpp 4
test/test_remap_files.cpp 3
include/libtorrent/bitfield.hpp 15
simulation/libsimulator/test/catch.hpp 5
examples/client_test.cpp 1
include/libtorrent/random.hpp 7
include/libtorrent/aux_/win_cng.hpp 10
include/libtorrent/aux_/throw.hpp 1
include/libtorrent/aux_/win_crypto_provider.hpp 10
simulation/libsimulator/test/main.cpp 1
test/test_utils.cpp 1
bindings/python/src/create_torrent.cpp 3
src/create_torrent.cpp 42
include/libtorrent/aux_/heterogeneous_queue.hpp 21
test/test_flags.cpp 3
include/libtorrent/tailqueue.hpp 1
test/test_create_torrent.cpp 2
test/test_truncate.cpp 3
src/path.cpp 56
include/libtorrent/peer_class.hpp 1
simulation/libsimulator/include/simulator/simulator.hpp 6
include/libtorrent/string_view.hpp 1
include/libtorrent/aux_/byteswap.hpp 1
include/libtorrent/stat.hpp 4
include/libtorrent/peer_class_type_filter.hpp 2
src/settings_pack.cpp 17
src/bdecode.cpp 9
src/mmap_storage.cpp 26
src/drive_info.cpp 16
include/libtorrent/aux_/ip_helpers.hpp 3
test/setup_transfer.cpp 11
src/ip_helpers.cpp 10
src/socket_io.cpp 1
include/libtorrent/socket_io.hpp 6
bindings/python/src/session.cpp 4
simulation/libsimulator/src/http_server.cpp 6
src/storage_utils.cpp 16
include/libtorrent/aux_/container_wrapper.hpp 5
include/libtorrent/aux_/numeric_cast.hpp 5
src/file.cpp 6

Fuzzer: fuzzers/src/gzip.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 123 99.1%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 0.80%
All colors 124 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
123 0 EP call site: 00000 libtorrent::inflate_gzip

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
47
Reachable functions
48
Percentage of reachable functions covered
2.08%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/gzip.cpp 2
src/gzip.cpp 13
include/libtorrent/peer_class.hpp 1
include/libtorrent/span.hpp 3
include/libtorrent/bitfield.hpp 3
src/puff.cpp 8
test/test_read_resume.cpp 3
src/bitfield.cpp 9
include/libtorrent/aux_/byteswap.hpp 1

Fuzzer: http_tracker

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 0 0.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 4 100.%
All colors 4 100

Runtime coverage analysis

Covered functions
87
Functions that are reachable but not covered
1
Reachable functions
2
Percentage of reachable functions covered
50.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/http_tracker.cpp 2

Fuzzer: resume_data

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 2129 99.8%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 3 0.14%
All colors 2132 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
2129 1 LLVMFuzzerTestOneInput call site: 00001 libtorrent::torrent_info::parse_info_section

Runtime coverage analysis

Covered functions
243
Functions that are reachable but not covered
28
Reachable functions
29
Percentage of reachable functions covered
3.45%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/resume_data.cpp 3
src/read_resume_data.cpp 61
src/bdecode.cpp 19
test/test_create_torrent.cpp 2
bindings/python/src/create_torrent.cpp 3
include/libtorrent/torrent_info.hpp 4
src/kademlia/item.cpp 1
include/libtorrent/info_hash.hpp 3
src/torrent_info.cpp 2
src/receive_buffer.cpp 6
include/libtorrent/aux_/heterogeneous_queue.hpp 24
test/test_storage.cpp 49
tools/disk_io_stress_test.cpp 15
src/packet_buffer.cpp 5
test/bittorrent_peer.cpp 51
simulation/test_torrent_status.cpp 2
bindings/python/src/error_code.cpp 2
examples/print.cpp 1
include/libtorrent/io.hpp 8
src/random.cpp 18
test/broadcast_socket.cpp 43
src/create_torrent.cpp 42
examples/client_test.cpp 1
test/test_truncate.cpp 3
src/path.cpp 56
include/libtorrent/peer_class.hpp 1
simulation/libsimulator/include/simulator/simulator.hpp 6
include/libtorrent/string_view.hpp 1
simulation/libsimulator/test/catch.hpp 5
src/escape_string.cpp 11
include/libtorrent/bitfield.hpp 16
include/libtorrent/aux_/byteswap.hpp 1
include/libtorrent/stat.hpp 4
include/libtorrent/peer_class_type_filter.hpp 2
simulation/disk_io.cpp 49
include/libtorrent/time.hpp 2
include/libtorrent/random.hpp 7
include/libtorrent/aux_/win_cng.hpp 10
include/libtorrent/aux_/throw.hpp 1
include/libtorrent/aux_/win_crypto_provider.hpp 10
simulation/libsimulator/test/main.cpp 1
include/libtorrent/error_code.hpp 4
src/alert.cpp 2
src/socks5_stream.cpp 1
test/test_remap_files.cpp 3
src/settings_pack.cpp 17
src/mmap_storage.cpp 26
src/drive_info.cpp 16
include/libtorrent/aux_/ip_helpers.hpp 3
test/setup_transfer.cpp 11
src/ip_helpers.cpp 10
src/socket_io.cpp 1
include/libtorrent/socket_io.hpp 6
bindings/python/src/session.cpp 4
simulation/libsimulator/src/http_server.cpp 6
src/storage_utils.cpp 16
include/libtorrent/aux_/container_wrapper.hpp 5
include/libtorrent/aux_/numeric_cast.hpp 5
src/file.cpp 6
test/test_flags.cpp 3
test/test_utils.cpp 1
include/libtorrent/tailqueue.hpp 1
test/test_xml.cpp 5
src/bitfield.cpp 9
test/test_dht.cpp 1
src/string_util.cpp 7
src/parse_url.cpp 14
include/libtorrent/file_storage.hpp 2

Fuzzer: dht_node

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 3 27.2%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 8 72.7%
All colors 11 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
2 3 LLVMFuzzerTestOneInput call site: 00003
1 9 LLVMFuzzerTestOneInput call site: 00009

Runtime coverage analysis

Covered functions
286
Functions that are reachable but not covered
9
Reachable functions
10
Percentage of reachable functions covered
10.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/dht_node.cpp 8
src/ip_filter.cpp 2

Fuzzer: fuzzers/src/parse_magnet_uri.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 3 75.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 25.0%
All colors 4 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
3 0 EP call site: 00000 libtorrent::parse_magnet_uri

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
4
Reachable functions
5
Percentage of reachable functions covered
20.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/parse_magnet_uri.cpp 2
src/magnet_uri.cpp 1

Fuzzer: sanitize_path

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1668 99.8%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 2 0.11%
All colors 1670 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
1668 1 LLVMFuzzerTestOneInput call site: 00001 libtorrent::create_torrent::generate

Runtime coverage analysis

Covered functions
16
Functions that are reachable but not covered
34
Reachable functions
35
Percentage of reachable functions covered
2.86%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/sanitize_path.cpp 2
src/torrent_info.cpp 28
include/libtorrent/aux_/container_wrapper.hpp 7
src/receive_buffer.cpp 6
include/libtorrent/aux_/file_progress.hpp 1
examples/print.cpp 1
include/libtorrent/aux_/torrent_list.hpp 13
simulation/libsimulator/test/catch.hpp 5
src/file_progress.cpp 15
include/libtorrent/bitfield.hpp 15
include/libtorrent/torrent_info.hpp 4
test/test_truncate.cpp 3
src/path.cpp 56
include/libtorrent/peer_class.hpp 1
simulation/libsimulator/include/simulator/simulator.hpp 6
include/libtorrent/string_view.hpp 1
src/escape_string.cpp 10
include/libtorrent/aux_/byteswap.hpp 1
include/libtorrent/stat.hpp 4
include/libtorrent/peer_class_type_filter.hpp 2
test/bittorrent_peer.cpp 51
simulation/test_torrent_status.cpp 2
bindings/python/src/error_code.cpp 2
include/libtorrent/io.hpp 8
test/test_storage.cpp 49
src/random.cpp 18
test/broadcast_socket.cpp 43
tools/disk_io_stress_test.cpp 15
src/packet_buffer.cpp 5
simulation/disk_io.cpp 49
include/libtorrent/time.hpp 2
examples/client_test.cpp 1
include/libtorrent/random.hpp 7
include/libtorrent/aux_/win_cng.hpp 10
include/libtorrent/aux_/throw.hpp 1
include/libtorrent/aux_/win_crypto_provider.hpp 10
simulation/libsimulator/test/main.cpp 1
include/libtorrent/error_code.hpp 4
src/alert.cpp 2
src/socks5_stream.cpp 1
test/test_remap_files.cpp 3
test/test_utils.cpp 1
bindings/python/src/create_torrent.cpp 3
src/create_torrent.cpp 42
include/libtorrent/aux_/heterogeneous_queue.hpp 21
test/test_flags.cpp 3
include/libtorrent/tailqueue.hpp 1
test/test_create_torrent.cpp 2
src/settings_pack.cpp 17
src/bdecode.cpp 9
src/mmap_storage.cpp 26
src/drive_info.cpp 16
include/libtorrent/aux_/ip_helpers.hpp 3
test/setup_transfer.cpp 11
src/ip_helpers.cpp 10
src/socket_io.cpp 1
include/libtorrent/socket_io.hpp 6
bindings/python/src/session.cpp 4
simulation/libsimulator/src/http_server.cpp 6
src/storage_utils.cpp 16
include/libtorrent/aux_/numeric_cast.hpp 5
src/file.cpp 6
src/hasher.cpp 9
src/kademlia/item.cpp 1
src/bitfield.cpp 9

Fuzzer: fuzzers/src/convert_from_native.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 17 94.4%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 5.55%
All colors 18 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
17 0 EP call site: 00000 libtorrent::convert_impl

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
3
Reachable functions
4
Percentage of reachable functions covered
25.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/convert_from_native.cpp 2
src/escape_string.cpp 10
include/libtorrent/bitfield.hpp 1

Fuzzer: fuzzers/src/base32encode.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1545 99.9%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 0.06%
All colors 1546 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
1545 0 EP call site: 00000 libtorrent::create_torrent::generate

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
13
Reachable functions
14
Percentage of reachable functions covered
7.14%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/base32encode.cpp 3
src/escape_string.cpp 15
test/broadcast_socket.cpp 43
test/test_storage.cpp 49
src/random.cpp 18
tools/disk_io_stress_test.cpp 16
src/packet_buffer.cpp 5
test/bittorrent_peer.cpp 51
simulation/test_torrent_status.cpp 2
bindings/python/src/error_code.cpp 2
examples/print.cpp 1
include/libtorrent/io.hpp 8
simulation/disk_io.cpp 49
include/libtorrent/time.hpp 2
include/libtorrent/error_code.hpp 4
src/alert.cpp 2
src/socks5_stream.cpp 1
include/libtorrent/torrent_info.hpp 4
test/test_remap_files.cpp 3
include/libtorrent/bitfield.hpp 15
simulation/libsimulator/test/catch.hpp 5
examples/client_test.cpp 1
include/libtorrent/random.hpp 7
include/libtorrent/aux_/win_cng.hpp 10
include/libtorrent/aux_/throw.hpp 1
include/libtorrent/aux_/win_crypto_provider.hpp 10
simulation/libsimulator/test/main.cpp 1
test/test_utils.cpp 1
bindings/python/src/create_torrent.cpp 3
src/create_torrent.cpp 42
include/libtorrent/aux_/heterogeneous_queue.hpp 21
test/test_flags.cpp 3
include/libtorrent/tailqueue.hpp 1
test/test_create_torrent.cpp 2
test/test_truncate.cpp 3
src/path.cpp 56
include/libtorrent/peer_class.hpp 1
simulation/libsimulator/include/simulator/simulator.hpp 6
include/libtorrent/string_view.hpp 1
include/libtorrent/aux_/byteswap.hpp 1
include/libtorrent/stat.hpp 4
include/libtorrent/peer_class_type_filter.hpp 2
src/settings_pack.cpp 17
src/bdecode.cpp 9
src/mmap_storage.cpp 26
src/drive_info.cpp 16
include/libtorrent/aux_/ip_helpers.hpp 3
test/setup_transfer.cpp 11
src/ip_helpers.cpp 10
src/socket_io.cpp 1
include/libtorrent/socket_io.hpp 6
bindings/python/src/session.cpp 4
simulation/libsimulator/src/http_server.cpp 6
src/storage_utils.cpp 16
include/libtorrent/aux_/container_wrapper.hpp 5
include/libtorrent/aux_/numeric_cast.hpp 5
src/file.cpp 6

Fuzzer: fuzzers/src/escape_path.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 12 92.3%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 7.69%
All colors 13 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
12 0 EP call site: 00000 libtorrent::escape_path

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
9
Reachable functions
10
Percentage of reachable functions covered
10.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/escape_path.cpp 2
src/escape_string.cpp 6

Fuzzer: fuzzers/src/convert_to_native.cpp

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 17 94.4%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 5.55%
All colors 18 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
17 0 EP call site: 00000 libtorrent::convert_impl

Runtime coverage analysis

Covered functions
2773
Functions that are reachable but not covered
3
Reachable functions
4
Percentage of reachable functions covered
25.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzzers/src/convert_to_native.cpp 2
src/escape_string.cpp 10
include/libtorrent/bitfield.hpp 1

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

fuzzers/src/torrent_info.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/utp.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput']

fuzzers/src/bdecode_node.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput']

fuzzers/src/add_torrent.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput']

fuzzers/src/peer_conn.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput']

fuzzers/src/idna.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/verify_encoding.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/parse_int.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/http_parser.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput']

fuzzers/src/base64encode.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/parse_url.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/upnp.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput']

fuzzers/src/file_storage_add_file.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput']

fuzzers/src/session_params.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput']

fuzzers/src/utf8_codepoint.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/escape_string.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/base32decode.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/gzip.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/http_tracker.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/resume_data.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput']

fuzzers/src/dht_node.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput']

fuzzers/src/parse_magnet_uri.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/sanitize_path.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput']

fuzzers/src/convert_from_native.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/base32encode.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/escape_path.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


fuzzers/src/convert_to_native.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
libtorrent::aux::packet_buffer::insert(unsignedint,std::__1::unique_ptr ) 48 19 39.58%
libtorrent::aux::timestamp_history::add_sample(unsignedint,bool) 32 14 43.75%
libtorrent::aux::utp_socket_impl::write_payload(unsignedchar*,int) 45 11 24.44%
libtorrent::aux::utp_socket_impl::send_pkt(int) 268 117 43.65%
voidlibtorrent::aux::set_socket_buffer_size (libtorrent::udp_socket&,libtorrent::aux::session_settingsconst&,boost::system::error_code&) 42 14 33.33%
libtorrent::unchoke_sort(std::__1::vector >&,std::__1::chrono::duration >,libtorrent::aux::session_settingsconst&) 66 20 30.30%
libtorrent::create_torrent::create_torrent(libtorrent::file_storage&,int,libtorrent::flags::bitfield_flag ) 56 26 46.42%
libtorrent::create_torrent::generate()const 229 104 45.41%
libtorrent::aux::file_progress::init(libtorrent::piece_pickerconst&,libtorrent::file_storageconst&) 47 19 40.42%
libtorrent::(anonymousnamespace)::handle_backwards_compatible_resume_data(libtorrent::add_torrent_params&) 100 2 2.0%
libtorrent::aux::expand_unspecified_address(libtorrent::span ,libtorrent::span ,std::__1::vector >&) 43 7 16.27%
libtorrent::aux::session_impl::setup_listener(libtorrent::aux::listen_endpoint_tconst&,boost::system::error_code&) 166 84 50.60%
libtorrent::aux::session_impl::on_udp_packet(std::__1::weak_ptr ,std::__1::weak_ptr ,libtorrent::aux::transport,boost::system::error_codeconst&) 98 12 12.24%
libtorrent::aux::session_impl::on_accept_connection(boost::asio::basic_stream_socket ,boost::system::error_codeconst&,std::__1::weak_ptr >,libtorrent::aux::transport) 80 42 52.5%
libtorrent::aux::session_impl::on_tick(boost::system::error_codeconst&) 245 131 53.46%
libtorrent::aux::session_impl::recalculate_unchoke_slots() 94 23 24.46%
libtorrent::aux::session_impl::set_queue_position(libtorrent::torrent*,libtorrent::aux::strong_typedef ) 55 23 41.81%
libtorrent::aux::session_impl::update_unchoke_limit() 33 13 39.39%
libtorrent::aux::session_impl::update_connections_limit() 43 7 16.27%
libtorrent::parse_listen_interfaces(std::__1::basic_string ,std::__1::allocator >const&,std::__1::vector ,std::__1::allocator >,std::__1::allocator ,std::__1::allocator >>>&) 68 36 52.94%
libtorrent::torrent::on_piece_hashed(libtorrent::aux::container_wrapper ,int,std::__1::vector ,std::__1::allocator >>>,libtorrent::aux::strong_typedef ,libtorrent::digest32<160l>const&,libtorrent::storage_errorconst&) 141 6 4.255%
libtorrent::torrent::announce_with_tracker(libtorrent::event_t) 207 8 3.864%
libtorrent::torrent::we_have(libtorrent::aux::strong_typedef ,bool) 71 32 45.07%
libtorrent::torrent::remove_time_critical_piece(libtorrent::aux::strong_typedef ,bool) 37 4 10.81%
libtorrent::torrent::do_pause(bool) 79 43 54.43%
libtorrent::(anonymousnamespace)::extract_files2(libtorrent::bdecode_nodeconst&,libtorrent::file_storage&,std::__1::basic_string ,std::__1::allocator >const&,long,charconst*,bool,int,boost::system::error_code&) 49 24 48.97%
libtorrent::(anonymousnamespace)::extract_single_file2(libtorrent::bdecode_nodeconst&,libtorrent::file_storage&,std::__1::basic_string ,std::__1::allocator >const&,boost::basic_string_view >,long,charconst*,boost::system::error_code&) 54 25 46.29%
libtorrent::tracker_manager::abort_all_requests(bool) 31 10 32.25%
voidlibtorrent::aux::set_socket_buffer_size >,libtorrent::socks5_stream,libtorrent::http_stream,libtorrent::aux::utp_stream,libtorrent::i2p_stream,libtorrent::ssl_stream >>,libtorrent::ssl_stream ,libtorrent::ssl_stream ,libtorrent::ssl_stream >>(libtorrent::aux::polymorphic_socket >,libtorrent::socks5_stream,libtorrent::http_stream,libtorrent::aux::utp_stream,libtorrent::i2p_stream,libtorrent::ssl_stream >>,libtorrent::ssl_stream ,libtorrent::ssl_stream ,libtorrent::ssl_stream >&,libtorrent::aux::session_settingsconst&,boost::system::error_code&) 42 14 33.33%
libtorrent::aux::bandwidth_manager::update_quotas(std::__1::chrono::duration >const&) 68 3 4.411%
libtorrent::bt_peer_connection::on_hashes(int) 64 32 50.0%
libtorrent::bt_peer_connection::on_holepunch() 79 4 5.063%
libtorrent::bt_peer_connection::write_bitfield() 74 22 29.72%
libtorrent::bt_peer_connection::on_receive(boost::system::error_codeconst&,unsignedlong) 49 14 28.57%
libtorrent::bt_peer_connection::on_receive_impl(unsignedlong) 592 184 31.08%
libtorrent::bt_peer_connection::on_sent(boost::system::error_codeconst&,unsignedlong) 41 9 21.95%
libtorrent::error_to_close_reason(boost::system::error_codeconst&) 122 38 31.14%
libtorrent::aux::disk_job_fence::job_complete(libtorrent::aux::mmap_disk_job*,libtorrent::tailqueue &) 61 16 26.22%
libtorrent::aux::get_drive_info(std::__1::basic_string ,std::__1::allocator >const&) 51 21 41.17%
libtorrent::hash_picker::pick_hashes(libtorrent::typed_bitfield >const&) 64 22 34.37%
libtorrent::mmap_disk_io::add_job(libtorrent::aux::mmap_disk_job*,bool) 31 16 51.61%
libtorrent::mmap_storage::initialize(libtorrent::settings_interfaceconst&,libtorrent::storage_error&) 46 24 52.17%
libtorrent::mmap_storage::write(libtorrent::settings_interfaceconst&,libtorrent::span ,libtorrent::aux::strong_typedef ,int,libtorrent::flags::bitfield_flag ,libtorrent::flags::bitfield_flag ,libtorrent::storage_error&)::$_0::operator()(libtorrent::aux::strong_typedef ,long,libtorrent::span ,libtorrent::storage_error&)const 52 13 25.0%
libtorrent::peer_connection::start() 80 33 41.25%
libtorrent::peer_connection::init() 52 28 53.84%
libtorrent::peer_connection::picker_options()const 36 17 47.22%
libtorrent::peer_connection::attach_to_torrent(libtorrent::info_hash_tconst&) 108 46 42.59%
libtorrent::peer_connection::incoming_have(libtorrent::aux::strong_typedef ) 93 51 54.83%
libtorrent::peer_connection::incoming_bitfield(libtorrent::typed_bitfield >const&) 53 29 54.71%
libtorrent::peer_connection::incoming_request(libtorrent::peer_requestconst&) 137 60 43.79%
libtorrent::peer_connection::incoming_piece(libtorrent::peer_requestconst&,charconst*) 186 96 51.61%
libtorrent::peer_connection::on_disk_write_complete(libtorrent::storage_errorconst&,libtorrent::peer_requestconst&,std::__1::shared_ptr ) 77 35 45.45%
libtorrent::peer_connection::add_request(libtorrent::piece_blockconst&,libtorrent::flags::bitfield_flag ) 62 32 51.61%
libtorrent::peer_connection::send_choke() 41 17 41.46%
libtorrent::peer_connection::fill_send_buffer() 93 7 7.526%
libtorrent::peer_list::new_connection(libtorrent::peer_connection_interface&,int,libtorrent::torrent_state*) 182 75 41.20%
libtorrent::peer_list::update_peer_port(int,libtorrent::torrent_peer*,libtorrent::flags::bitfield_flag ,libtorrent::torrent_state*) 52 25 48.07%
libtorrent::piece_picker::inc_refcount(libtorrent::typed_bitfield >const&,libtorrent::torrent_peerconst*) 53 19 35.84%
libtorrent::piece_picker::dec_refcount(libtorrent::typed_bitfield >const&,libtorrent::torrent_peerconst*) 64 27 42.18%
libtorrent::piece_picker::pick_pieces(libtorrent::typed_bitfield >const&,std::__1::vector >&,int,int,libtorrent::torrent_peer*,libtorrent::flags::bitfield_flag ,std::__1::vector ,std::__1::allocator >>const&,int,libtorrent::counters&)const 304 115 37.82%
libtorrent::piece_picker::add_blocks(libtorrent::aux::strong_typedef ,libtorrent::typed_bitfield >const&,std::__1::vector >&,std::__1::vector >&,std::__1::vector >&,int,int,libtorrent::torrent_peer*,std::__1::vector ,std::__1::allocator >>&,libtorrent::flags::bitfield_flag )const 60 23 38.33%
libtorrent::aux::session_impl::incoming_connection(libtorrent::aux::polymorphic_socket >,libtorrent::socks5_stream,libtorrent::http_stream,libtorrent::aux::utp_stream,libtorrent::i2p_stream,libtorrent::ssl_stream >>,libtorrent::ssl_stream ,libtorrent::ssl_stream ,libtorrent::ssl_stream >) 139 69 49.64%
libtorrent::aux::session_impl::recalculate_optimistic_unchoke_slots() 88 27 30.68%
libtorrent::aux::session_impl::try_connect_more_peers() 81 12 14.81%
libtorrent::aux::verify_resume_data(libtorrent::add_torrent_paramsconst&,libtorrent::aux::container_wrapper ,std::__1::allocator >,libtorrent::aux::strong_typedef ,std::__1::vector ,std::__1::allocator >,std::__1::allocator ,std::__1::allocator >>>>const&,libtorrent::file_storageconst&,libtorrent::aux::container_wrapper ,libtorrent::aux::strong_typedef ,std::__1::vector ,std::__1::allocator >>>const&,libtorrent::stat_cache&,std::__1::basic_string ,std::__1::allocator >const&,libtorrent::storage_error&) 84 15 17.85%
libtorrent::aux::initialize_storage(libtorrent::file_storageconst&,std::__1::basic_string ,std::__1::allocator >const&,libtorrent::stat_cache&,libtorrent::aux::container_wrapper ,libtorrent::aux::strong_typedef ,std::__1::vector ,std::__1::allocator >>>const&,std::__1::function ,libtorrent::storage_error&)>,std::__1::function ,std::__1::allocator >const&,std::__1::basic_string ,std::__1::allocator >const&,libtorrent::storage_error&)>,std::__1::function ,long)>,libtorrent::storage_error&) 48 15 31.25%
libtorrent::torrent::do_connect_boost() 33 6 18.18%
libtorrent::torrent::attach_peer(libtorrent::peer_connection*) 141 62 43.97%
libtorrent::torrent_peer_allocator::allocate_peer_entry(int) 37 18 48.64%
libtorrent::torrent_peer_allocator::free_peer_entry(libtorrent::torrent_peer*) 35 15 42.85%
libtorrent::(anonymousnamespace)::ut_pex_plugin::tick() 76 6 7.894%
libtorrent::dht::dos_blocker::incoming(boost::asio::ip::addressconst&,std::__1::chrono::time_point >>,libtorrent::dht::dht_logger*) 42 20 47.61%
libtorrent::dht::node::incoming_request(libtorrent::dht::msgconst&,libtorrent::entry&) 286 63 22.02%
libtorrent::dht::routing_table::add_node_impl(libtorrent::dht::node_entry) 144 49 34.02%
libtorrent::dht::rpc_manager::incoming(libtorrent::dht::msgconst&,libtorrent::digest32<160l>*) 51 16 31.37%

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
/src/libtorrent/bindings/python/src/load_torrent.cpp [] []
/src/libtorrent/deps/try_signal/try_signal_mingw.hpp [] []
/src/libtorrent/deps/asio-gnutls/test/gnutls/stream.cpp [] []
/src/libtorrent/include/libtorrent/aux_/disk_job_fence.hpp [] []
/src/libtorrent/include/libtorrent/string_view.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/session_handle.hpp [] []
/src/libtorrent/test/test_transfer.cpp [] []
/src/libtorrent/src/kademlia/rpc_manager.cpp [] []
/src/libtorrent/src/web_peer_connection.cpp [] []
/src/libtorrent/src/disk_io_thread_pool.cpp [] []
/src/libtorrent/src/part_file.cpp [] []
/src/libtorrent/include/libtorrent/aux_/apply_pad_files.hpp [] []
/src/libtorrent/fuzzers/src/utp.cpp ['utp'] ['utp']
/src/libtorrent/include/libtorrent/bitfield.hpp ['add_torrent', 'peer_conn', 'fuzzers/src/base64encode.cpp', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'fuzzers/src/gzip.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/convert_from_native.cpp', 'fuzzers/src/base32encode.cpp', 'fuzzers/src/convert_to_native.cpp'] []
/src/libtorrent/src/torrent_info.cpp ['fuzzers/src/verify_encoding.cpp', 'resume_data', 'sanitize_path'] ['fuzzers/src/verify_encoding.cpp', 'resume_data']
/src/libtorrent/simulation/libsimulator/src/simulation.cpp [] []
/src/libtorrent/test/test_enum_net.cpp [] []
/src/libtorrent/fuzzers/src/utf8_codepoint.cpp ['fuzzers/src/utf8_codepoint.cpp'] ['fuzzers/src/utf8_codepoint.cpp']
/src/libtorrent/include/libtorrent/kademlia/dht_storage.hpp [] []
/src/libtorrent/test/test_ssl.cpp [] []
/src/libtorrent/deps/asio-gnutls/include/boost/asio/gnutls/error.hpp [] []
/src/libtorrent/test/test_file_storage.cpp [] []
/src/libtorrent/include/libtorrent/copy_ptr.hpp [] []
/src/libtorrent/include/libtorrent/aux_/suggest_piece.hpp [] []
/src/libtorrent/simulation/test_transfer.cpp [] []
/src/libtorrent/src/hex.cpp [] []
/src/libtorrent/include/libtorrent/tracker_manager.hpp [] []
/src/libtorrent/test/test_add_torrent.cpp [] []
/src/libtorrent/src/disabled_disk_io.cpp [] []
/src/libtorrent/include/libtorrent/kademlia/traversal_algorithm.hpp [] []
/src/libtorrent/include/libtorrent/peer.hpp [] []
/src/libtorrent/bindings/python/src/torrent_handle.cpp [] []
/src/libtorrent/src/kademlia/dht_tracker.cpp ['session_params'] []
/src/libtorrent/test/test_merkle_tree.cpp [] []
/src/libtorrent/src/mmap_storage.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] ['peer_conn', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'fuzzers/src/base32encode.cpp']
/src/libtorrent/test/test_session_params.cpp [] []
/src/libtorrent/bindings/python/src/boost_python.hpp ['add_torrent'] []
/src/libtorrent/include/libtorrent/kademlia/dht_settings.hpp [] []
/src/libtorrent/include/libtorrent/kademlia/dht_tracker.hpp [] []
/src/libtorrent/include/libtorrent/aux_/session_impl.hpp [] []
/src/libtorrent/include/libtorrent/gzip.hpp [] []
/src/libtorrent/include/libtorrent/index_range.hpp [] []
/src/libtorrent/include/libtorrent/ssl.hpp [] []
/src/libtorrent/include/libtorrent/config.hpp [] []
/src/libtorrent/test/test_utf8.cpp [] []
/src/libtorrent/simulation/test_peer_connection.cpp [] []
/src/libtorrent/src/merkle_tree.cpp [] []
/src/libtorrent/simulation/setup_dht.cpp [] []
/src/libtorrent/src/add_torrent_params.cpp [] []
/src/libtorrent/bindings/python/src/create_torrent.cpp ['add_torrent', 'peer_conn', 'file_storage_add_file', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/upnp.hpp [] []
/src/libtorrent/bindings/python/src/module.cpp [] []
/src/libtorrent/include/libtorrent/aux_/win_cng.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/simulation/test_socks5.cpp [] []
/src/libtorrent/src/kademlia/item.cpp ['add_torrent', 'resume_data', 'sanitize_path'] []
/src/libtorrent/src/close_reason.cpp [] []
/src/libtorrent/simulation/libsimulator/src/io_service.cpp [] []
/src/libtorrent/test/test_direct_dht.cpp [] []
/src/libtorrent/src/kademlia/put_data.cpp [] []
/src/libtorrent/test/settings.cpp [] []
/src/libtorrent/src/stat.cpp [] []
/src/libtorrent/test/main.cpp [] []
/src/libtorrent/src/disk_buffer_holder.cpp [] []
/src/libtorrent/simulation/libsimulator/include/simulator/packet.hpp [] []
/src/libtorrent/include/libtorrent/extensions.hpp [] []
/src/libtorrent/test/make_torrent.cpp [] []
/src/libtorrent/include/libtorrent/aux_/scope_end.hpp [] []
/src/libtorrent/test/test_http_parser.cpp ['http_parser'] []
/src/libtorrent/test/test_alert_manager.cpp [] []
/src/libtorrent/include/libtorrent/aux_/mmap_disk_job.hpp [] []
/src/libtorrent/src/bandwidth_queue_entry.cpp [] []
/src/libtorrent/fuzzers/src/gzip.cpp ['fuzzers/src/gzip.cpp'] ['fuzzers/src/gzip.cpp']
/src/libtorrent/include/libtorrent/udp_socket.hpp [] []
/src/libtorrent/include/libtorrent/socket.hpp [] []
/src/libtorrent/src/kademlia/dos_blocker.cpp [] []
/src/libtorrent/include/libtorrent/aux_/bandwidth_manager.hpp [] []
/src/libtorrent/src/generate_peer_id.cpp [] []
/src/libtorrent/include/libtorrent/aux_/disk_buffer_pool.hpp [] []
/src/libtorrent/test/test_bitfield.cpp [] []
/src/libtorrent/test/test_heterogeneous_queue.cpp [] []
/src/libtorrent/src/platform_util.cpp [] []
/src/libtorrent/test/test_packet_buffer.cpp [] []
/src/libtorrent/simulation/test_utp.cpp [] []
/src/libtorrent/include/libtorrent/hex.hpp [] []
/src/libtorrent/test/udp_tracker.cpp [] []
/src/libtorrent/bindings/python/src/gil.hpp [] []
/src/libtorrent/src/ed25519/key_exchange.cpp [] []
/src/libtorrent/src/drive_info.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] ['peer_conn', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'fuzzers/src/base32encode.cpp']
/src/libtorrent/src/kademlia/get_item.cpp [] []
/src/libtorrent/include/libtorrent/aux_/keepalive.hpp [] []
/src/libtorrent/src/create_torrent.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] ['add_torrent', 'peer_conn', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'fuzzers/src/base32encode.cpp']
/src/libtorrent/fuzzers/src/convert_from_native.cpp ['fuzzers/src/convert_from_native.cpp'] ['fuzzers/src/convert_from_native.cpp']
/src/libtorrent/include/libtorrent/aux_/session_settings.hpp [] []
/src/libtorrent/simulation/disk_io.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] ['add_torrent', 'peer_conn', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'fuzzers/src/base32encode.cpp']
/src/libtorrent/include/libtorrent/disk_buffer_holder.hpp [] []
/src/libtorrent/include/libtorrent/aux_/hasher512.hpp [] []
/src/libtorrent/src/stat_cache.cpp [] []
/src/libtorrent/test/test_resume.cpp [] []
/src/libtorrent/test/test_copy_file.cpp [] []
/src/libtorrent/include/libtorrent/kademlia/item.hpp [] []
/src/libtorrent/src/magnet_uri.cpp ['fuzzers/src/parse_magnet_uri.cpp'] []
/src/libtorrent/src/session_call.cpp [] []
/src/libtorrent/bindings/python/src/string.cpp [] []
/src/libtorrent/test/test_storage.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/fuzzers/src/escape_path.cpp ['fuzzers/src/escape_path.cpp'] ['fuzzers/src/escape_path.cpp']
/src/libtorrent/include/libtorrent/aux_/utp_socket_manager.hpp [] []
/src/libtorrent/include/libtorrent/kademlia/msg.hpp [] []
/src/libtorrent/include/libtorrent/aux_/file_view_pool.hpp [] []
/src/libtorrent/include/libtorrent/kademlia/get_item.hpp [] []
/src/libtorrent/include/libtorrent/session.hpp [] []
/src/libtorrent/test/test_peer_list.cpp [] []
/src/libtorrent/src/ed25519/sc.cpp [] []
/src/libtorrent/include/libtorrent/aux_/file_progress.hpp ['fuzzers/src/verify_encoding.cpp', 'sanitize_path'] []
/src/libtorrent/include/libtorrent/aux_/route.h [] []
/src/libtorrent/bindings/python/src/alert.cpp [] []
/src/libtorrent/include/libtorrent/ip_voter.hpp [] []
/src/libtorrent/include/libtorrent/enum_net.hpp [] []
/src/libtorrent/test/test_crc32.cpp [] []
/src/libtorrent/bindings/python/src/version.cpp [] []
/src/libtorrent/include/libtorrent/aux_/has_block.hpp [] []
/src/libtorrent/bindings/python/src/sha256_hash.cpp [] []
/src/libtorrent/examples/session_view.cpp [] []
/src/libtorrent/fuzzers/src/add_torrent.cpp ['add_torrent'] ['add_torrent']
/src/libtorrent/fuzzers/src/verify_encoding.cpp ['fuzzers/src/verify_encoding.cpp'] ['fuzzers/src/verify_encoding.cpp']
/src/libtorrent/src/proxy_settings.cpp [] []
/src/libtorrent/src/receive_buffer.cpp ['resume_data', 'sanitize_path'] []
/src/libtorrent/deps/asio-gnutls/include/boost/asio/gnutls/stream.hpp [] []
/src/libtorrent/include/libtorrent/kademlia/rpc_manager.hpp [] []
/src/libtorrent/test/test_ip_voter.cpp [] []
/src/libtorrent/include/libtorrent/aux_/merkle_tree.hpp [] []
/src/libtorrent/src/session_handle.cpp [] []
/src/libtorrent/fuzzers/src/parse_magnet_uri.cpp ['fuzzers/src/parse_magnet_uri.cpp'] ['fuzzers/src/parse_magnet_uri.cpp']
/src/libtorrent/include/libtorrent/aux_/dev_random.hpp [] []
/src/libtorrent/include/libtorrent/create_torrent.hpp [] []
/src/libtorrent/examples/print.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/test/test_session.cpp [] []
/src/libtorrent/simulation/libsimulator/test/acceptor.cpp [] []
/src/libtorrent/include/libtorrent/socks5_stream.hpp [] []
/src/libtorrent/src/directory.cpp [] []
/src/libtorrent/simulation/disk_io.hpp [] []
/src/libtorrent/test/test_dht.cpp ['add_torrent', 'fuzzers/src/idna.cpp', 'resume_data'] []
/src/libtorrent/include/libtorrent/assert.hpp [] []
/src/libtorrent/src/web_connection_base.cpp [] []
/src/libtorrent/test/test_peer_priority.cpp [] []
/src/libtorrent/bindings/python/src/sha1_hash.cpp [] []
/src/libtorrent/include/libtorrent/aux_/noexcept_movable.hpp [] []
/src/libtorrent/test/test_file.cpp [] []
/src/libtorrent/simulation/libsimulator/test/udp_socket.cpp [] []
/src/libtorrent/include/libtorrent/kademlia/observer.hpp [] []
/src/libtorrent/src/bandwidth_limit.cpp [] []
/src/libtorrent/include/libtorrent/http_parser.hpp [] []
/src/libtorrent/bindings/python/src/magnet_uri.cpp [] []
/src/libtorrent/src/kademlia/routing_table.cpp ['session_params'] []
/src/libtorrent/src/kademlia/get_peers.cpp [] []
/src/libtorrent/include/libtorrent/fingerprint.hpp [] []
/src/libtorrent/fuzzers/src/peer_conn.cpp ['peer_conn'] ['peer_conn']
/src/libtorrent/src/performance_counters.cpp [] []
/src/libtorrent/src/sha256.cpp [] []
/src/libtorrent/tools/dht_sample.cpp [] []
/src/libtorrent/include/libtorrent/aux_/allocating_handler.hpp [] []
/src/libtorrent/include/libtorrent/bt_peer_connection.hpp [] []
/src/libtorrent/include/libtorrent/kademlia/get_peers.hpp [] []
/src/libtorrent/src/enum_net.cpp [] []
/src/libtorrent/include/libtorrent/file_storage.hpp ['resume_data'] []
/src/libtorrent/include/libtorrent/aux_/announce_entry.hpp [] []
/src/libtorrent/examples/custom_storage.cpp [] []
/src/libtorrent/src/load_torrent.cpp [] []
/src/libtorrent/simulation/libsimulator/include/simulator/chrono.hpp [] []
/src/libtorrent/src/assert.cpp [] []
/src/libtorrent/src/ip_voter.cpp [] []
/src/libtorrent/test/test_apply_pad.cpp [] []
/src/libtorrent/src/ed25519/ge.cpp [] []
/src/libtorrent/simulation/libsimulator/include/simulator/http_server.hpp [] []
/src/libtorrent/include/libtorrent/aux_/file_pointer.hpp [] []
/src/libtorrent/simulation/libsimulator/include/simulator/nat.hpp [] []
/src/libtorrent/test/test_checking.cpp [] []
/src/libtorrent/fuzzers/src/torrent_info.cpp ['torrent_info'] ['torrent_info']
/src/libtorrent/include/libtorrent/aux_/torrent_impl.hpp [] []
/src/libtorrent/test/test_xml.cpp ['resume_data'] []
/src/libtorrent/simulation/test_checking.cpp [] []
/src/libtorrent/test/test_alert_types.cpp [] []
/src/libtorrent/include/libtorrent/peer_request.hpp [] []
/src/libtorrent/src/file_progress.cpp ['sanitize_path'] []
/src/libtorrent/src/ip_notifier.cpp [] []
/src/libtorrent/src/udp_socket.cpp [] []
/src/libtorrent/src/ut_pex.cpp [] []
/src/libtorrent/simulation/libsimulator/include/simulator/handler_allocator.hpp [] []
/src/libtorrent/include/libtorrent/aux_/store_buffer.hpp [] []
/src/libtorrent/simulation/test_timeout.cpp [] []
/src/libtorrent/src/bitfield.cpp ['add_torrent', 'fuzzers/src/gzip.cpp', 'resume_data', 'sanitize_path'] []
/src/libtorrent/include/libtorrent/peer_class.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'fuzzers/src/gzip.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/vector_utils.hpp [] []
/src/libtorrent/simulation/test_v2.cpp [] []
/src/libtorrent/src/settings_pack.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/test/test_dht_storage.cpp [] []
/src/libtorrent/src/piece_picker.cpp [] []
/src/libtorrent/include/libtorrent/units.hpp [] []
/src/libtorrent/src/bloom_filter.cpp [] []
/src/libtorrent/src/cpuid.cpp [] []
/src/libtorrent/include/libtorrent/piece_picker.hpp [] []
/src/libtorrent/include/libtorrent/time.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/bdecode.hpp [] []
/src/libtorrent/include/libtorrent/tailqueue.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/simulation/libsimulator/src/pcap.cpp [] []
/src/libtorrent/deps/asio-gnutls/include/boost/asio/gnutls/host_name_verification.hpp [] []
/src/libtorrent/test/swarm_suite.cpp [] []
/src/libtorrent/src/ed25519/sign.cpp [] []
/src/libtorrent/fuzzers/src/upnp.cpp ['upnp'] ['upnp']
/src/libtorrent/simulation/libsimulator/test/main.cpp ['add_torrent', 'peer_conn', 'fuzzers/src/idna.cpp', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] ['add_torrent', 'peer_conn', 'fuzzers/src/idna.cpp', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'fuzzers/src/base32encode.cpp']
/src/libtorrent/test/test_buffer.cpp [] []
/src/libtorrent/test/test_torrent_info.cpp [] []
/src/libtorrent/src/proxy_base.cpp [] []
/src/libtorrent/src/error_code.cpp [] []
/src/libtorrent/test/test_pe_crypto.cpp [] []
/src/libtorrent/src/smart_ban.cpp [] []
/src/libtorrent/src/socks5_stream.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/disk_interface.hpp [] []
/src/libtorrent/include/libtorrent/kademlia/dht_observer.hpp [] []
/src/libtorrent/src/kademlia/refresh.cpp [] []
/src/libtorrent/simulation/make_proxy_settings.hpp [] []
/src/libtorrent/simulation/libsimulator/src/high_resolution_clock.cpp [] []
/src/libtorrent/test/test_http_connection.cpp [] []
/src/libtorrent/src/peer_class_set.cpp [] []
/src/libtorrent/include/libtorrent/aux_/disk_job_pool.hpp [] []
/src/libtorrent/simulation/test_error_handling.cpp [] []
/src/libtorrent/examples/print.hpp [] []
/src/libtorrent/bindings/c/simple_client.c [] []
/src/libtorrent/include/libtorrent/part_file.hpp [] []
/src/libtorrent/src/torrent_peer.cpp [] []
/src/libtorrent/include/libtorrent/torrent_status.hpp [] []
/src/libtorrent/include/libtorrent/aux_/bandwidth_limit.hpp [] []
/src/libtorrent/test/test_alloca.cpp [] []
/src/libtorrent/src/session_stats.cpp [] []
/src/libtorrent/include/libtorrent/performance_counters.hpp [] []
/src/libtorrent/simulation/libsimulator/src/queue.cpp [] []
/src/libtorrent/include/libtorrent/aux_/unique_ptr.hpp [] []
/src/libtorrent/simulation/test_ip_filter.cpp [] []
/src/libtorrent/simulation/libsimulator/test/catch.hpp ['add_torrent', 'peer_conn', 'fuzzers/src/idna.cpp', 'fuzzers/src/verify_encoding.cpp', 'http_parser', 'fuzzers/src/parse_url.cpp', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/test/test_time.cpp [] []
/src/libtorrent/include/libtorrent/kademlia/dht_state.hpp [] []
/src/libtorrent/include/libtorrent/aux_/portmap.hpp [] []
/src/libtorrent/simulation/test_torrent_status.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/aux_/escape_string.hpp [] []
/src/libtorrent/src/torrent_status.cpp [] []
/src/libtorrent/simulation/libsimulator/src/http_proxy.cpp [] []
/src/libtorrent/src/socket_io.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/src/version.cpp [] []
/src/libtorrent/simulation/test_thread_pool.cpp [] []
/src/libtorrent/include/libtorrent/http_tracker_connection.hpp [] []
/src/libtorrent/test/test_remove_torrent.cpp [] []
/src/libtorrent/simulation/test_fast_extensions.cpp [] []
/src/libtorrent/simulation/libsimulator/include/simulator/sink.hpp [] []
/src/libtorrent/include/libtorrent/aux_/file_descriptor.hpp [] []
/src/libtorrent/include/libtorrent/announce_entry.hpp [] []
/src/libtorrent/include/libtorrent/file.hpp [] []
/src/libtorrent/src/kademlia/traversal_algorithm.cpp [] []
/src/libtorrent/include/libtorrent/aux_/numeric_cast.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/simulation/libsimulator/include/simulator/simulator.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/aux_/win_crypto_provider.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/src/http_parser.cpp [] []
/src/libtorrent/src/identify_client.cpp [] []
/src/libtorrent/include/libtorrent/sha1_hash.hpp [] []
/src/libtorrent/src/udp_tracker_connection.cpp [] []
/src/libtorrent/simulation/libsimulator/src/nat.cpp [] []
/src/libtorrent/src/upnp.cpp [] []
/src/libtorrent/include/libtorrent/stat.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/test/test_bloom_filter.cpp ['session_params'] []
/src/libtorrent/src/kademlia/node_entry.cpp [] []
/src/libtorrent/include/libtorrent/i2p_stream.hpp [] []
/src/libtorrent/src/file.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] ['peer_conn', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'fuzzers/src/base32encode.cpp']
/src/libtorrent/test/test_hasher.cpp [] []
/src/libtorrent/simulation/libsimulator/src/simulator.cpp [] []
/src/libtorrent/include/libtorrent/torrent_peer_allocator.hpp [] []
/src/libtorrent/test/test_truncate.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/aux_/storage_free_list.hpp [] []
/src/libtorrent/include/libtorrent/aux_/byteswap.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'fuzzers/src/gzip.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/aux_/aligned_union.hpp [] []
/src/libtorrent/include/libtorrent/aux_/heterogeneous_queue.hpp ['add_torrent', 'peer_conn', 'fuzzers/src/parse_url.cpp', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] ['add_torrent', 'peer_conn', 'fuzzers/src/parse_url.cpp', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'fuzzers/src/base32encode.cpp']
/src/libtorrent/fuzzers/src/file_storage_add_file.cpp ['file_storage_add_file'] ['file_storage_add_file']
/src/libtorrent/examples/connection_tester.cpp [] []
/src/libtorrent/src/entry.cpp [] []
/src/libtorrent/simulation/test_swarm.cpp [] []
/src/libtorrent/include/libtorrent/optional.hpp [] []
/src/libtorrent/simulation/libsimulator/include/simulator/socks_server.hpp [] []
/src/libtorrent/src/kademlia/node_id.cpp [] []
/src/libtorrent/include/libtorrent/client_data.hpp [] []
/src/libtorrent/include/libtorrent/aux_/set_socket_buffer.hpp [] []
/src/libtorrent/src/parse_url.cpp ['fuzzers/src/idna.cpp', 'fuzzers/src/parse_url.cpp', 'resume_data'] []
/src/libtorrent/src/mmap_disk_io.cpp [] []
/src/libtorrent/src/peer_list.cpp [] []
/src/libtorrent/include/libtorrent/aux_/io.hpp [] []
/src/libtorrent/src/kademlia/msg.cpp [] []
/src/libtorrent/include/libtorrent/torrent_handle.hpp [] []
/src/libtorrent/include/libtorrent/aux_/win_file_handle.hpp [] []
/src/libtorrent/simulation/libsimulator/include/simulator/function.hpp [] []
/src/libtorrent/src/torrent_peer_allocator.cpp [] []
/src/libtorrent/include/libtorrent/peer_class_set.hpp [] []
/src/libtorrent/deps/try_signal/try_signal_msvc.hpp [] []
/src/libtorrent/deps/asio-gnutls/test/gnutls/context.cpp [] []
/src/libtorrent/src/disk_job_pool.cpp [] []
/src/libtorrent/include/libtorrent/aux_/posix_storage.hpp [] []
/src/libtorrent/deps/try_signal/try_signal.cpp [] []
/src/libtorrent/bindings/python/src/peer_info.cpp [] []
/src/libtorrent/src/utp_stream.cpp ['utp'] ['utp']
/src/libtorrent/src/mmap.cpp [] []
/src/libtorrent/test/test_dos_blocker.cpp [] []
/src/libtorrent/src/i2p_stream.cpp [] []
/src/libtorrent/include/libtorrent/kademlia/dos_blocker.hpp [] []
/src/libtorrent/src/pe_crypto.cpp [] []
/src/libtorrent/src/ed25519/sha512.cpp [] []
/src/libtorrent/include/libtorrent/socket_io.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/test/test_stack_allocator.cpp [] []
/src/libtorrent/include/libtorrent/aux_/disk_io_thread_pool.hpp [] []
/src/libtorrent/test/test_similar_torrent.cpp [] []
/src/libtorrent/src/kademlia/dht_settings.cpp ['session_params'] []
/src/libtorrent/src/ed25519/keypair.cpp [] []
/src/libtorrent/simulation/libsimulator/src/http_server.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/aux_/container_wrapper.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/test/test_natpmp.cpp [] []
/src/libtorrent/include/libtorrent/aux_/posix_part_file.hpp [] []
/src/libtorrent/src/ut_metadata.cpp [] []
/src/libtorrent/include/libtorrent/lsd.hpp [] []
/src/libtorrent/src/posix_disk_io.cpp [] []
/src/libtorrent/bindings/python/src/session_settings.cpp [] []
/src/libtorrent/include/libtorrent/kademlia/types.hpp [] []
/src/libtorrent/src/http_tracker_connection.cpp [] []
/src/libtorrent/include/libtorrent/pe_crypto.hpp [] []
/src/libtorrent/test/test_read_resume.cpp ['fuzzers/src/gzip.cpp'] []
/src/libtorrent/src/resolver.cpp [] []
/src/libtorrent/include/libtorrent/aux_/timestamp_history.hpp [] []
/src/libtorrent/include/libtorrent/aux_/strview_less.hpp [] []
/src/libtorrent/bindings/python/src/optional.hpp [] []
/src/libtorrent/deps/asio-gnutls/include/boost/asio/gnutls/context.hpp [] []
/src/libtorrent/fuzzers/src/base32decode.cpp ['fuzzers/src/base32decode.cpp'] ['fuzzers/src/base32decode.cpp']
/src/libtorrent/include/libtorrent/aux_/bandwidth_socket.hpp [] []
/src/libtorrent/include/libtorrent/flags.hpp [] []
/src/libtorrent/simulation/libsimulator/src/sink_forwarder.cpp [] []
/src/libtorrent/src/http_seed_connection.cpp [] []
/src/libtorrent/fuzzers/src/dht_node.cpp ['dht_node'] ['dht_node']
/src/libtorrent/include/libtorrent/info_hash.hpp ['resume_data'] []
/src/libtorrent/src/ffs.cpp [] []
/src/libtorrent/examples/client_test.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/src/gzip.cpp ['fuzzers/src/gzip.cpp'] []
/src/libtorrent/test/test_tracker.cpp [] []
/src/libtorrent/test/test_hash_picker.cpp [] []
/src/libtorrent/include/libtorrent/web_peer_connection.hpp [] []
/src/libtorrent/test/test_create_torrent.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/sliding_average.hpp [] []
/src/libtorrent/src/alert.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] ['add_torrent', 'peer_conn', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'fuzzers/src/base32encode.cpp']
/src/libtorrent/include/libtorrent/aux_/alloca.hpp [] []
/src/libtorrent/test/test_privacy.cpp [] []
/src/libtorrent/include/libtorrent/netlink.hpp [] []
/src/libtorrent/test/test_read_piece.cpp [] []
/src/libtorrent/include/libtorrent/stat_cache.hpp [] []
/src/libtorrent/include/libtorrent/peer_info.hpp [] []
/src/libtorrent/bindings/python/src/fingerprint.cpp [] []
/src/libtorrent/src/kademlia/find_data.cpp [] []
/src/libtorrent/tools/dht_put.cpp [] []
/src/libtorrent/include/libtorrent/torrent_info.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/src/xml_parse.cpp ['upnp'] []
/src/libtorrent/include/libtorrent/aux_/polymorphic_socket.hpp [] []
/src/libtorrent/fuzzers/src/base64encode.cpp ['fuzzers/src/base64encode.cpp'] ['fuzzers/src/base64encode.cpp']
/src/libtorrent/simulation/libsimulator/src/tcp_socket.cpp [] []
/src/libtorrent/src/disk_job_fence.cpp [] []
/src/libtorrent/src/torrent.cpp [] []
/src/libtorrent/fuzzers/src/http_tracker.cpp ['http_tracker'] ['http_tracker']
/src/libtorrent/include/libtorrent/kademlia/node_entry.hpp [] []
/src/libtorrent/include/libtorrent/kademlia/routing_table.hpp [] []
/src/libtorrent/bindings/python/src/datetime.cpp [] []
/src/libtorrent/fuzzers/src/convert_to_native.cpp ['fuzzers/src/convert_to_native.cpp'] ['fuzzers/src/convert_to_native.cpp']
/src/libtorrent/include/libtorrent/web_connection_base.hpp [] []
/src/libtorrent/tools/disk_io_stress_test.cpp ['add_torrent', 'peer_conn', 'fuzzers/src/base64encode.cpp', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/link.hpp [] []
/src/libtorrent/include/libtorrent/peer_class_type_filter.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/fuzzers/src/parse_url.cpp ['fuzzers/src/parse_url.cpp'] ['fuzzers/src/parse_url.cpp']
/src/libtorrent/deps/try_signal/signal_error_code.hpp [] []
/src/libtorrent/src/torrent_handle.cpp [] []
/src/libtorrent/fuzzers/src/session_params.cpp ['session_params'] ['session_params']
/src/libtorrent/test/test_peer_classes.cpp [] []
/src/libtorrent/src/write_resume_data.cpp [] []
/src/libtorrent/simulation/create_torrent.cpp [] []
/src/libtorrent/src/time.cpp [] []
/src/libtorrent/test/test_torrent.cpp [] []
/src/libtorrent/test/make_torrent.hpp [] []
/src/libtorrent/include/libtorrent/proxy_base.hpp [] []
/src/libtorrent/test/dht_server.cpp [] []
/src/libtorrent/deps/asio-gnutls/include/boost/asio/gnutls/verify_context.hpp [] []
/src/libtorrent/simulation/test_web_seed.cpp [] []
/src/libtorrent/src/hasher.cpp ['sanitize_path'] []
/src/libtorrent/include/libtorrent/string_util.hpp [] []
/src/libtorrent/include/libtorrent/aux_/deferred_handler.hpp [] []
/src/libtorrent/src/peer_connection_handle.cpp [] []
/src/libtorrent/simulation/utils.cpp [] []
/src/libtorrent/src/ip_helpers.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/src/sha1_hash.cpp [] []
/src/libtorrent/simulation/test_metadata_extension.cpp [] []
/src/libtorrent/simulation/libsimulator/include/simulator/noexcept_movable.hpp [] []
/src/libtorrent/simulation/libsimulator/src/high_resolution_timer.cpp [] []
/src/libtorrent/bindings/python/src/info_hash.cpp [] []
/src/libtorrent/src/copy_file.cpp [] []
/src/libtorrent/include/libtorrent/peer_connection.hpp [] []
/src/libtorrent/include/libtorrent/aux_/proxy_settings.hpp [] []
/src/libtorrent/include/libtorrent/disk_observer.hpp [] []
/src/libtorrent/src/string_util.cpp ['upnp', 'resume_data'] []
/src/libtorrent/include/libtorrent/aux_/bind_to_device.hpp [] []
/src/libtorrent/include/libtorrent/aux_/throw.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/alert.hpp [] []
/src/libtorrent/test/broadcast_socket.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/torrent_peer.hpp [] []
/src/libtorrent/simulation/libsimulator/include/simulator/mallocator.hpp [] []
/src/libtorrent/simulation/libsimulator/test/resolver.cpp [] []
/src/libtorrent/deps/asio-gnutls/test/unit_test.hpp [] []
/src/libtorrent/src/truncate.cpp [] []
/src/libtorrent/test/enum_if.cpp [] []
/src/libtorrent/include/libtorrent/session_settings.hpp [] []
/src/libtorrent/src/instantiate_connection.cpp [] []
/src/libtorrent/examples/upnp_test.cpp [] []
/src/libtorrent/fuzzers/src/idna.cpp ['fuzzers/src/idna.cpp'] ['fuzzers/src/idna.cpp']
/src/libtorrent/test/bittorrent_peer.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/simulation/libsimulator/src/resolver.cpp [] []
/src/libtorrent/src/storage_utils.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/fuzzers/src/escape_string.cpp ['fuzzers/src/escape_string.cpp'] ['fuzzers/src/escape_string.cpp']
/src/libtorrent/test/test_tailqueue.cpp [] []
/src/libtorrent/include/libtorrent/kademlia/find_data.hpp [] []
/src/libtorrent/include/libtorrent/alert_types.hpp [] []
/src/libtorrent/simulation/test_dht.cpp [] []
/src/libtorrent/src/chained_buffer.cpp [] []
/src/libtorrent/include/libtorrent/random.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/udp_tracker_connection.hpp [] []
/src/libtorrent/test/web_seed_suite.cpp [] []
/src/libtorrent/include/libtorrent/aux_/resolver_interface.hpp [] []
/src/libtorrent/include/libtorrent/session_status.hpp [] []
/src/libtorrent/test/test_string.cpp [] []
/src/libtorrent/include/libtorrent/aux_/netlink_utils.hpp [] []
/src/libtorrent/src/choker.cpp [] []
/src/libtorrent/bindings/python/src/utility.cpp [] []
/src/libtorrent/simulation/libsimulator/test/timer.cpp [] []
/src/libtorrent/test/test_fast_extension.cpp [] []
/src/libtorrent/src/puff.cpp ['fuzzers/src/gzip.cpp'] []
/src/libtorrent/include/libtorrent/peer_connection_handle.hpp [] []
/src/libtorrent/test/test_utils.hpp [] []
/src/libtorrent/src/announce_entry.cpp [] []
/src/libtorrent/include/libtorrent/session_params.hpp [] []
/src/libtorrent/src/lsd.cpp [] []
/src/libtorrent/examples/dump_bdecode.cpp [] []
/src/libtorrent/src/kademlia/sample_infohashes.cpp [] []
/src/libtorrent/simulation/test_http_connection.cpp [] []
/src/libtorrent/src/random.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/test/test_listen_socket.cpp [] []
/src/libtorrent/src/session.cpp [] []
/src/libtorrent/fuzzers/src/bdecode_node.cpp ['bdecode_node'] ['bdecode_node']
/src/libtorrent/include/libtorrent/stack_allocator.hpp [] []
/src/libtorrent/fuzzers/src/parse_int.cpp ['fuzzers/src/parse_int.cpp'] ['fuzzers/src/parse_int.cpp']
/src/libtorrent/test/test_upnp.cpp [] []
/src/libtorrent/test/test_threads.cpp [] []
/src/libtorrent/src/alert_manager.cpp [] []
/src/libtorrent/include/libtorrent/http_seed_connection.hpp [] []
/src/libtorrent/src/crc32c.cpp [] []
/src/libtorrent/src/resolve_links.cpp [] []
/src/libtorrent/include/libtorrent/kademlia/direct_request.hpp [] []
/src/libtorrent/test/test_bencoding.cpp [] []
/src/libtorrent/include/libtorrent/aux_/torrent_list.hpp ['sanitize_path'] []
/src/libtorrent/test/test_flags.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/simulation/libsimulator/src/udp_socket.cpp [] []
/src/libtorrent/test/test_lsd.cpp [] []
/src/libtorrent/src/sha1.cpp [] []
/src/libtorrent/simulation/setup_swarm.cpp [] []
/src/libtorrent/examples/bt-get3.cpp [] []
/src/libtorrent/include/libtorrent/aux_/session_interface.hpp [] []
/src/libtorrent/test/test_settings_pack.cpp [] []
/src/libtorrent/src/posix_storage.cpp [] []
/src/libtorrent/include/libtorrent/kademlia/put_data.hpp [] []
/src/libtorrent/src/http_connection.cpp [] []
/src/libtorrent/src/packet_buffer.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/src/natpmp.cpp [] []
/src/libtorrent/simulation/test_tracker.cpp [] []
/src/libtorrent/test/test_merkle.cpp [] []
/src/libtorrent/include/libtorrent/entry.hpp [] []
/src/libtorrent/src/fingerprint.cpp [] []
/src/libtorrent/bindings/python/src/error_code.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/aux_/mmap.hpp [] []
/src/libtorrent/fuzzers/src/base32encode.cpp ['fuzzers/src/base32encode.cpp'] ['fuzzers/src/base32encode.cpp']
/src/libtorrent/test/test_mmap.cpp [] []
/src/libtorrent/include/libtorrent/aux_/ip_notifier.hpp [] []
/src/libtorrent/include/libtorrent/aux_/listen_socket_handle.hpp [] []
/src/libtorrent/bindings/c/library.cpp [] []
/src/libtorrent/examples/torrent_view.hpp [] []
/src/libtorrent/fuzzers/src/http_parser.cpp ['http_parser'] ['http_parser']
/src/libtorrent/include/libtorrent/piece_block.hpp [] []
/src/libtorrent/src/disk_buffer_pool.cpp [] []
/src/libtorrent/include/libtorrent/storage_defs.hpp [] []
/src/libtorrent/include/libtorrent/aux_/buffer.hpp [] []
/src/libtorrent/test/broadcast_socket.hpp [] []
/src/libtorrent/simulation/test_session.cpp [] []
/src/libtorrent/src/session_impl.cpp ['session_params'] []
/src/libtorrent/include/libtorrent/aux_/packet_pool.hpp [] []
/src/libtorrent/bindings/python/src/bytes.hpp [] []
/src/libtorrent/include/libtorrent/aux_/chained_buffer.hpp [] []
/src/libtorrent/test/test_ffs.cpp [] []
/src/libtorrent/src/session_params.cpp ['session_params'] ['session_params']
/src/libtorrent/include/libtorrent/aux_/session_udp_sockets.hpp [] []
/src/libtorrent/test/test.hpp [] []
/src/libtorrent/src/kademlia/dht_storage.cpp [] []
/src/libtorrent/src/read_resume_data.cpp ['resume_data'] []
/src/libtorrent/src/ed25519/verify.cpp [] []
/src/libtorrent/include/libtorrent/torrent.hpp [] []
/src/libtorrent/include/libtorrent/hash_picker.hpp [] []
/src/libtorrent/test/test_piece_picker.cpp [] []
/src/libtorrent/simulation/transfer_sim.cpp [] []
/src/libtorrent/simulation/libsimulator/src/default_config.cpp [] []
/src/libtorrent/include/libtorrent/session_stats.hpp [] []
/src/libtorrent/src/file_storage.cpp [] []
/src/libtorrent/src/path.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/bindings/python/src/session.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/test/test_magnet.cpp [] []
/src/libtorrent/fuzzers/src/resume_data.cpp ['resume_data'] ['resume_data']
/src/libtorrent/deps/asio-gnutls/include/boost/asio/gnutls/stream_base.hpp [] []
/src/libtorrent/include/libtorrent/error_code.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/simulation/libsimulator/include/simulator/sink_forwarder.hpp [] []
/src/libtorrent/test/test_bandwidth_limiter.cpp [] []
/src/libtorrent/src/ed25519/fe.cpp [] []
/src/libtorrent/include/libtorrent/aux_/set_traffic_class.hpp [] []
/src/libtorrent/include/libtorrent/kademlia/node.hpp [] []
/src/libtorrent/examples/make_torrent.cpp [] []
/src/libtorrent/test/test_priority.cpp [] []
/src/libtorrent/test/test_remap_files.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/aux_/bandwidth_queue_entry.hpp [] []
/src/libtorrent/src/file_view_pool.cpp [] []
/src/libtorrent/src/ssl.cpp [] []
/src/libtorrent/src/session_settings.cpp [] []
/src/libtorrent/src/kademlia/ed25519.cpp [] []
/src/libtorrent/simulation/test_pe_crypto.cpp [] []
/src/libtorrent/simulation/libsimulator/src/socks_server.cpp [] []
/src/libtorrent/include/libtorrent/peer_list.hpp [] []
/src/libtorrent/src/kademlia/dht_state.cpp ['session_params'] []
/src/libtorrent/src/request_blocks.cpp [] []
/src/libtorrent/src/kademlia/node.cpp [] []
/src/libtorrent/include/libtorrent/aux_/invariant_check.hpp [] []
/src/libtorrent/bindings/python/src/torrent_status.cpp [] []
/src/libtorrent/simulation/fake_peer.hpp [] []
/src/libtorrent/test/test_store_buffer.cpp [] []
/src/libtorrent/simulation/libsimulator/src/acceptor.cpp [] []
/src/libtorrent/examples/torrent_view.cpp [] []
/src/libtorrent/src/listen_socket_handle.cpp [] []
/src/libtorrent/src/utp_socket_manager.cpp [] []
/src/libtorrent/deps/try_signal/try_signal_posix.hpp [] []
/src/libtorrent/src/tracker_manager.cpp [] []
/src/libtorrent/test/test_recheck.cpp [] []
/src/libtorrent/simulation/test_dht_storage.cpp [] []
/src/libtorrent/simulation/transfer_sim.hpp ['session_params'] []
/src/libtorrent/include/libtorrent/ip_filter.hpp [] []
/src/libtorrent/src/peer_class.cpp [] []
/src/libtorrent/include/libtorrent/add_torrent_params.hpp [] []
/src/libtorrent/deps/try_signal/signal_error_code.cpp [] []
/src/libtorrent/include/libtorrent/aux_/win_util.hpp [] []
/src/libtorrent/include/libtorrent/settings_pack.hpp [] []
/src/libtorrent/include/libtorrent/bloom_filter.hpp [] []
/src/libtorrent/src/socket_type.cpp [] []
/src/libtorrent/src/ed25519/add_scalar.cpp [] []
/src/libtorrent/src/peer_connection.cpp [] []
/src/libtorrent/include/libtorrent/aux_/packet_buffer.hpp [] []
/src/libtorrent/include/libtorrent/aux_/receive_buffer.hpp [] []
/src/libtorrent/src/bdecode.cpp ['bdecode_node', 'add_torrent', 'peer_conn', 'fuzzers/src/parse_int.cpp', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/span.hpp ['fuzzers/src/gzip.cpp'] []
/src/libtorrent/include/libtorrent/http_connection.hpp [] []
/src/libtorrent/src/bt_peer_connection.cpp [] []
/src/libtorrent/include/libtorrent/kademlia/io.hpp [] []
/src/libtorrent/test/test_ip_filter.cpp [] []
/src/libtorrent/include/libtorrent/aux_/utp_stream.hpp [] []
/src/libtorrent/bindings/python/src/ip_filter.cpp ['session_params'] []
/src/libtorrent/examples/bt-get2.cpp [] []
/src/libtorrent/fuzzers/src/sanitize_path.cpp ['sanitize_path'] ['sanitize_path']
/src/libtorrent/simulation/test_optimistic_unchoke.cpp [] []
/src/libtorrent/include/libtorrent/aux_/ip_helpers.hpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/test/setup_transfer.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/simulation/libsimulator/include/simulator/utils.hpp [] []
/src/libtorrent/bindings/python/src/entry.cpp [] []
/src/libtorrent/src/merkle.cpp [] []
/src/libtorrent/src/peer_info.cpp [] []
/src/libtorrent/test/test.cpp [] []
/src/libtorrent/bindings/python/src/torrent_info.cpp [] []
/src/libtorrent/src/stack_allocator.cpp [] []
/src/libtorrent/test/test_span.cpp [] []
/src/libtorrent/bindings/python/src/converters.cpp ['fuzzers/src/idna.cpp'] []
/src/libtorrent/include/libtorrent/aux_/alert_manager.hpp [] []
/src/libtorrent/src/escape_string.cpp ['add_torrent', 'peer_conn', 'fuzzers/src/base64encode.cpp', 'fuzzers/src/parse_url.cpp', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/convert_from_native.cpp', 'fuzzers/src/base32encode.cpp', 'fuzzers/src/escape_path.cpp', 'fuzzers/src/convert_to_native.cpp'] []
/src/libtorrent/include/libtorrent/union_endpoint.hpp [] []
/src/libtorrent/src/posix_part_file.cpp [] []
/src/libtorrent/simulation/libsimulator/include/simulator/http_proxy.hpp [] []
/src/libtorrent/include/libtorrent/aux_/pool.hpp [] []
/src/libtorrent/include/libtorrent/debug.hpp ['add_torrent'] ['add_torrent']
/src/libtorrent/src/ip_filter.cpp ['session_params', 'dht_node'] ['session_params']
/src/libtorrent/src/timestamp_history.cpp [] []
/src/libtorrent/include/libtorrent/ssl_stream.hpp [] []
/src/libtorrent/include/libtorrent/aux_/string_ptr.hpp [] []
/src/libtorrent/simulation/libsimulator/include/simulator/queue.hpp [] []
/src/libtorrent/test/test_utils.cpp ['add_torrent', 'peer_conn', 'session_params', 'fuzzers/src/escape_string.cpp', 'fuzzers/src/base32decode.cpp', 'resume_data', 'sanitize_path', 'fuzzers/src/base32encode.cpp'] []
/src/libtorrent/include/libtorrent/resolve_links.hpp [] []
/src/libtorrent/include/libtorrent/aux_/lsd.hpp [] []
/src/libtorrent/test/peer_server.cpp [] []
/src/libtorrent/include/libtorrent/http_stream.hpp [] []
/src/libtorrent/src/utf8.cpp ['fuzzers/src/utf8_codepoint.cpp'] []
/src/libtorrent/src/mmap_disk_job.cpp [] []
/src/libtorrent/include/libtorrent/peer_connection_interface.hpp [] []
/src/libtorrent/include/libtorrent/aux_/directory.hpp [] []
/src/libtorrent/src/hash_picker.cpp [] []
/src/libtorrent/src/ed25519/hasher512.cpp [] []
/src/libtorrent/include/libtorrent/bencode.hpp [] []
/src/libtorrent/fuzzers/src/read_bits.hpp [] []
/src/libtorrent/src/bandwidth_manager.cpp [] []

Directories in report

Directory
/src/libtorrent/include/libtorrent/aux_/
/src/libtorrent/src/kademlia/
/src/libtorrent/bindings/python/src/
/src/libtorrent/examples/
/src/libtorrent/deps/asio-gnutls/test/gnutls/
/src/libtorrent/include/libtorrent/
/src/libtorrent/include/libtorrent/kademlia/
/src/libtorrent/fuzzers/src/
/src/libtorrent/simulation/libsimulator/include/simulator/
/src/libtorrent/test/
/src/libtorrent/tools/
/src/libtorrent/simulation/libsimulator/test/
/src/libtorrent/bindings/c/
/src/libtorrent/deps/try_signal/
/src/libtorrent/src/ed25519/
/src/libtorrent/simulation/libsimulator/src/
/src/libtorrent/src/
/src/libtorrent/simulation/
/src/libtorrent/deps/asio-gnutls/test/
/src/libtorrent/deps/asio-gnutls/include/boost/asio/gnutls/

Metadata section

This sections shows the raw data that is used to produce this report. This is mainly used for further processing and developer debugging.

Fuzzer Calltree file Program data file Coverage file
torrent_info fuzzerLogFile-torrent_info.data fuzzerLogFile-torrent_info.data.yaml torrent_info.covreport
utp fuzzerLogFile-utp.data fuzzerLogFile-utp.data.yaml utp.covreport
bdecode_node fuzzerLogFile-bdecode_node.data fuzzerLogFile-bdecode_node.data.yaml bdecode_node.covreport
add_torrent fuzzerLogFile-add_torrent.data fuzzerLogFile-add_torrent.data.yaml add_torrent.covreport
peer_conn fuzzerLogFile-peer_conn.data fuzzerLogFile-peer_conn.data.yaml peer_conn.covreport
fuzzers/src/idna.cpp fuzzerLogFile-idna.data fuzzerLogFile-idna.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport
fuzzers/src/verify_encoding.cpp fuzzerLogFile-verify_encoding.data fuzzerLogFile-verify_encoding.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport
fuzzers/src/parse_int.cpp fuzzerLogFile-parse_int.data fuzzerLogFile-parse_int.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport
http_parser fuzzerLogFile-http_parser.data fuzzerLogFile-http_parser.data.yaml http_parser.covreport
fuzzers/src/base64encode.cpp fuzzerLogFile-base64encode.data fuzzerLogFile-base64encode.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport
fuzzers/src/parse_url.cpp fuzzerLogFile-parse_url.data fuzzerLogFile-parse_url.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport
upnp fuzzerLogFile-upnp.data fuzzerLogFile-upnp.data.yaml upnp.covreport
file_storage_add_file fuzzerLogFile-file_storage_add_file.data fuzzerLogFile-file_storage_add_file.data.yaml file_storage_add_file.covreport
session_params fuzzerLogFile-session_params.data fuzzerLogFile-session_params.data.yaml session_params.covreport
fuzzers/src/utf8_codepoint.cpp fuzzerLogFile-utf8_codepoint.data fuzzerLogFile-utf8_codepoint.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport
fuzzers/src/escape_string.cpp fuzzerLogFile-escape_string.data fuzzerLogFile-escape_string.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport
fuzzers/src/base32decode.cpp fuzzerLogFile-base32decode.data fuzzerLogFile-base32decode.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport
fuzzers/src/gzip.cpp fuzzerLogFile-gzip.data fuzzerLogFile-gzip.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport
http_tracker fuzzerLogFile-http_tracker.data fuzzerLogFile-http_tracker.data.yaml http_tracker.covreport
resume_data fuzzerLogFile-resume_data.data fuzzerLogFile-resume_data.data.yaml resume_data.covreport
dht_node fuzzerLogFile-dht_node.data fuzzerLogFile-dht_node.data.yaml dht_node.covreport
fuzzers/src/parse_magnet_uri.cpp fuzzerLogFile-parse_magnet_uri.data fuzzerLogFile-parse_magnet_uri.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport
sanitize_path fuzzerLogFile-sanitize_path.data fuzzerLogFile-sanitize_path.data.yaml sanitize_path.covreport
fuzzers/src/convert_from_native.cpp fuzzerLogFile-convert_from_native.data fuzzerLogFile-convert_from_native.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport
fuzzers/src/base32encode.cpp fuzzerLogFile-base32encode.data fuzzerLogFile-base32encode.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport
fuzzers/src/escape_path.cpp fuzzerLogFile-escape_path.data fuzzerLogFile-escape_path.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport
fuzzers/src/convert_to_native.cpp fuzzerLogFile-convert_to_native.data fuzzerLogFile-convert_to_native.data.yaml torrent_info.covreport , bdecode_node.covreport , resume_data.covreport , session_params.covreport , peer_conn.covreport , add_torrent.covreport , http_tracker.covreport , file_storage_add_file.covreport , upnp.covreport , sanitize_path.covreport , http_parser.covreport , dht_node.covreport , utp.covreport

Sink analyser for CWEs

This section contains multiple tables, each table contains a list of sink functions/methods found in the project for one of the CWE supported by the sink analyser, together with information like which fuzzers statically reach the sink functions/methods and possible call path to that sink functions/methods if it is not statically reached by any fuzzers. Column 1 is the function/method name of the sink functions/methods found in the project. Column 2 lists all fuzzers (or no fuzzers at all) that have covered that particular function method statically. Column 3 shows a list of possible call paths to reach the specific function/method call if none of the fuzzers cover the target function/method calls. Lastly, column 4 shows possible fuzzer blockers that prevent an existing fuzzer from reaching the target sink functions/methods dynamically.

Sink functions/methods found for CWE22

Target sink Reached by fuzzer Function call path Possible branch blockers
write ['peer_conn'] N/A
Blocker function Arguments type Return type Constants touched
run_storage_tests
in /src/libtorrent/test/test_storage.cpp:331
['std::shared_ptr ', 'file_storage', 'lt::storage_mode_t'] void []
test_remove
in /src/libtorrent/test/test_storage.cpp:439
['std::string'] void []
test_pre_allocate
in /src/libtorrent/test/test_storage.cpp:564
[] void []
test_move_storage_to_self
in /src/libtorrent/test/test_storage.cpp:1467
[] void []
test_move_storage_into_self
in /src/libtorrent/test/test_storage.cpp:1503
[] void []
test_move_storage_reset
in /src/libtorrent/test/test_storage.cpp:1534
['move_flags_t'] void []
send_allow_fast
in /src/libtorrent/test/test_fast_extension.cpp:170
['tcp::socket', 'int'] void []
send_suggest_piece
in /src/libtorrent/test/test_fast_extension.cpp:183
['tcp::socket', 'int'] void []
torrent::unchoke_peer
in /src/libtorrent/src/torrent.cpp:5967
['peer_connection', 'bool'] bool []
send_dht_port
in /src/libtorrent/test/test_fast_extension.cpp:236
['tcp::socket', 'int'] void []
have_all_test
in /src/libtorrent/test/test_fast_extension.cpp:1064
['bool'] void []
send_extension_handshake
in /src/libtorrent/test/test_fast_extension.cpp:320
['tcp::socket', 'entry'] void []
send_ut_metadata_msg
in /src/libtorrent/test/test_fast_extension.cpp:385
['tcp::socket', 'int', 'int', 'int'] void []
test_malicious_peer
in /src/libtorrent/test/test_ssl.cpp:555
[] void []
operator<<(std::ostream&os,StringRefstr)->std::ostream&
in /src/libtorrent/simulation/libsimulator/test/main.cpp:6407
['std::ostream', 'StringRef'] auto []
Catch::Matchers::WithinUlpsMatcher::describe
in /src/libtorrent/simulation/libsimulator/test/main.cpp:8143
[] std::string []
Catch::JsonReporter::JsonReporter
in /src/libtorrent/simulation/libsimulator/test/main.cpp:9933
['ReporterConfig'] void []
Catch::JsonReporter::sectionStarting
in /src/libtorrent/simulation/libsimulator/test/main.cpp:10143
['SectionInfo'] void []
sim::aux::pcap::pcap
in /src/libtorrent/simulation/libsimulator/src/pcap.cpp:78
['char*'] void []
sim::aux::pcap::log_tcp
in /src/libtorrent/simulation/libsimulator/src/pcap.cpp:147
['packet', 'tcp::endpoint', 'tcp::endpoint'] void []
sim::aux::pcap::log_udp
in /src/libtorrent/simulation/libsimulator/src/pcap.cpp:176
['packet', 'udp::endpoint', 'udp::endpoint'] void []
remove_all [] Path 1
Path 2

N/A