Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues
Report generation date: 2023-06-07

Project overview: libyal

High level conclusions

Reachability and coverage overview

Functions statically reachable by fuzzers
56.0%
4202 / 7541
Cyclomatic complexity statically reachable by fuzzers
64.0%
49810 / 77768
Runtime code coverage of functions
41.0%
3087 / 7541

Fuzzers overview

Fuzzer Fuzzer filename Functions Reached Functions unreached Fuzzer depth Files reached Basic blocks reached Cyclomatic complexity Details
libfcrypto_crypt_rc4_fuzzer libfcrypto/ossfuzz/crypt_rc4_fuzzer.cc 11 7 4 3 142 66 crypt_rc4_fuzzer.cc
libfmos_adc_fuzzer libfmos/ossfuzz/adc_fuzzer.cc 8 7 4 3 125 59 adc_fuzzer.cc
libfwnt_lznt1_fuzzer libfwnt/ossfuzz/lznt1_fuzzer.cc 9 7 4 3 155 73 lznt1_fuzzer.cc
libfcrypto_crypt_serpent_ecb_fuzzer libfcrypto/ossfuzz/crypt_serpent_ecb_fuzzer.cc 13 8 4 3 194 89 crypt_serpent_ecb_fuzzer.cc
libfmapi_entry_identifier_fuzzer libfmapi/ossfuzz/entry_identifier_fuzzer.cc 10 8 4 3 112 54 entry_identifier_fuzzer.cc
libfmos_lzvn_fuzzer libfmos/ossfuzz/lzvn_fuzzer.cc 8 7 4 3 143 60 lzvn_fuzzer.cc
libfmapi_lzfu_fuzzer libfmapi/ossfuzz/lzfu_fuzzer.cc 10 9 4 4 155 70 lzfu_fuzzer.cc
libfwnt_security_identifier_fuzzer libfwnt/ossfuzz/security_identifier_fuzzer.cc 11 14 4 3 131 62 security_identifier_fuzzer.cc
libhmac_sha224_context_fuzzer libhmac/ossfuzz/sha224_context_fuzzer.cc 13 12 5 4 190 90 sha224_context_fuzzer.cc
libcaes_crypt_ecb_fuzzer libcaes/ossfuzz/crypt_ecb_fuzzer.cc 14 10 4 3 286 118 crypt_ecb_fuzzer.cc
libwrc_version_information_resource_fuzzer libwrc/ossfuzz/version_information_resource_fuzzer.cc 16 9 5 3 366 158 version_information_resource_fuzzer.cc
libhmac_sha512_context_fuzzer libhmac/ossfuzz/sha512_context_fuzzer.cc 13 12 5 4 190 90 sha512_context_fuzzer.cc
libfcrypto_crypt_serpent_cbc_fuzzer libfcrypto/ossfuzz/crypt_serpent_cbc_fuzzer.cc 13 8 4 3 240 108 crypt_serpent_cbc_fuzzer.cc
libhmac_sha1_context_fuzzer libhmac/ossfuzz/sha1_context_fuzzer.cc 13 12 5 4 190 90 sha1_context_fuzzer.cc
libcaes_crypt_ccm_fuzzer libcaes/ossfuzz/crypt_ccm_fuzzer.cc 15 9 4 3 340 141 crypt_ccm_fuzzer.cc
libhmac_md5_context_fuzzer libhmac/ossfuzz/md5_context_fuzzer.cc 13 12 5 4 188 89 md5_context_fuzzer.cc
libhmac_sha256_context_fuzzer libhmac/ossfuzz/sha256_context_fuzzer.cc 13 12 5 4 190 90 sha256_context_fuzzer.cc
libcaes_crypt_cbc_fuzzer libcaes/ossfuzz/crypt_cbc_fuzzer.cc 15 9 4 3 343 143 crypt_cbc_fuzzer.cc
libfwnt_lzxpress_huffman_fuzzer libfwnt/ossfuzz/lzxpress_huffman_fuzzer.cc 17 9 5 5 385 165 lzxpress_huffman_fuzzer.cc
libcaes_crypt_xts_fuzzer libcaes/ossfuzz/crypt_xts_fuzzer.cc 18 10 4 4 425 177 crypt_xts_fuzzer.cc
libfwnt_lzxpress_fuzzer libfwnt/ossfuzz/lzxpress_fuzzer.cc 8 18 4 3 139 64 lzxpress_fuzzer.cc
libfwnt_security_descriptor_fuzzer libfwnt/ossfuzz/security_descriptor_fuzzer.cc 23 40 5 7 494 204 security_descriptor_fuzzer.cc
libfmos_lzfse_fuzzer libfmos/ossfuzz/lzfse_fuzzer.cc 22 7 5 6 619 254 lzfse_fuzzer.cc
libfwnt_lzx_fuzzer libfwnt/ossfuzz/lzx_fuzzer.cc 24 20 5 6 599 250 lzx_fuzzer.cc
libfwsi_item_fuzzer libfwsi/ossfuzz/item_fuzzer.cc 78 57 5 33 2165 879 item_fuzzer.cc
libfwsi_item_list_fuzzer libfwsi/ossfuzz/item_list_fuzzer.cc 80 61 5 34 2241 914 item_list_fuzzer.cc
libvsapm_volume_fuzzer libvsapm/ossfuzz/volume_fuzzer.cc 88 250 11 14 1544 674 volume_fuzzer.cc
libvsmbr_volume_fuzzer libvsmbr/ossfuzz/volume_fuzzer.cc 96 246 11 16 1718 745 volume_fuzzer.cc
libvsbsdl_partition_fuzzer libvsbsdl/ossfuzz/partition_fuzzer.cc 141 199 11 25 2364 1038 partition_fuzzer.cc
libmdmp_file_fuzzer libmdmp/ossfuzz/file_fuzzer.cc 97 193 11 17 1699 744 file_fuzzer.cc
libvsmbr_partition_fuzzer libvsmbr/ossfuzz/partition_fuzzer.cc 142 200 11 26 2446 1067 partition_fuzzer.cc
libvsbsdl_volume_fuzzer libvsbsdl/ossfuzz/volume_fuzzer.cc 92 248 11 15 1597 698 volume_fuzzer.cc
libvsgpt_volume_fuzzer libvsgpt/ossfuzz/volume_fuzzer.cc 108 257 12 19 2012 870 volume_fuzzer.cc
libfplist_property_list_fuzzer libfplist/ossfuzz/property_list_fuzzer.cc 62 96 8 9 1040 430 property_list_fuzzer.cc
libvsapm_partition_fuzzer libvsapm/ossfuzz/partition_fuzzer.cc 135 203 11 24 2288 1003 partition_fuzzer.cc
libvshadow_volume_fuzzer libvshadow/ossfuzz/volume_fuzzer.cc 123 213 12 20 2456 1065 volume_fuzzer.cc
libfplist_property_fuzzer libfplist/ossfuzz/property_fuzzer.cc 67 91 8 10 1161 480 property_fuzzer.cc
libvsgpt_partition_fuzzer libvsgpt/ossfuzz/partition_fuzzer.cc 153 212 12 29 2736 1188 partition_fuzzer.cc
libfusn_record_fuzzer libfusn/ossfuzz/record_fuzzer.cc 10 183 4 3 139 65 record_fuzzer.cc
libftxf_record_fuzzer libftxf/ossfuzz/record_fuzzer.cc 15 182 4 4 253 112 record_fuzzer.cc
libfmapi_one_off_entry_identifier_fuzzer libfmapi/ossfuzz/one_off_entry_identifier_fuzzer.cc 10 185 4 3 253 108 one_off_entry_identifier_fuzzer.cc
libwrc_manifest_resource_fuzzer libwrc/ossfuzz/manifest_resource_fuzzer.cc 10 175 4 3 120 57 manifest_resource_fuzzer.cc
libwrc_message_table_resource_fuzzer libwrc/ossfuzz/message_table_resource_fuzzer.cc 18 194 4 5 348 149 message_table_resource_fuzzer.cc
libfwps_record_fuzzer libfwps/ossfuzz/record_fuzzer.cc 25 196 5 5 467 192 record_fuzzer.cc
libfwps_store_fuzzer libfwps/ossfuzz/store_fuzzer.cc 23 203 5 6 471 192 store_fuzzer.cc
libfwps_set_fuzzer libfwps/ossfuzz/set_fuzzer.cc 20 201 5 5 411 166 set_fuzzer.cc
libwrc_string_table_resource_fuzzer libwrc/ossfuzz/string_table_resource_fuzzer.cc 19 193 4 5 318 139 string_table_resource_fuzzer.cc
libwrc_mui_resource_fuzzer libwrc/ossfuzz/mui_resource_fuzzer.cc 11 188 4 3 252 114 mui_resource_fuzzer.cc
libodraw_handle_fuzzer libodraw/ossfuzz/handle_fuzzer.cc 130 247 10 19 2688 1099 handle_fuzzer.cc
libnk2_file_fuzzer libnk2/ossfuzz/file_fuzzer.cc 90 341 11 16 1632 705 file_fuzzer.cc
libexe_file_fuzzer libexe/ossfuzz/file_fuzzer.cc 132 364 12 24 2322 1014 file_fuzzer.cc
libolecf_file_fuzzer libolecf/ossfuzz/file_fuzzer.cc 114 354 11 19 2647 1126 file_fuzzer.cc
libolecf_item_fuzzer libolecf/ossfuzz/item_fuzzer.cc 121 347 11 20 2774 1182 item_fuzzer.cc
liblnk_file_fuzzer liblnk/ossfuzz/file_fuzzer.cc 109 400 11 21 2434 1035 file_fuzzer.cc
libvslvm_handle_fuzzer libvslvm/ossfuzz/handle_fuzzer.cc 167 365 12 26 4698 1987 handle_fuzzer.cc
libevt_record_fuzzer libevt/ossfuzz/record_fuzzer.cc 166 460 11 28 3202 1379 record_fuzzer.cc
libagdb_file_fuzzer libagdb/ossfuzz/file_fuzzer.cc 182 399 11 33 3894 1679 file_fuzzer.cc
libvslvm_logical_volume_fuzzer libvslvm/ossfuzz/logical_volume_fuzzer.cc 228 304 12 37 5649 2411 logical_volume_fuzzer.cc
libcreg_file_fuzzer libcreg/ossfuzz/file_fuzzer.cc 156 480 11 28 2785 1219 file_fuzzer.cc
libluksde_volume_fuzzer libluksde/ossfuzz/volume_fuzzer.cc 184 327 11 36 4831 1965 volume_fuzzer.cc
libevt_file_fuzzer libevt/ossfuzz/file_fuzzer.cc 154 472 11 27 2956 1270 file_fuzzer.cc
libvhdi_file_fuzzer libvhdi/ossfuzz/file_fuzzer.cc 206 395 12 43 4285 1830 file_fuzzer.cc
libqcow_file_fuzzer libqcow/ossfuzz/file_fuzzer.cc 141 406 11 27 2653 1146 file_fuzzer.cc
libcreg_key_fuzzer libcreg/ossfuzz/key_fuzzer.cc 181 455 11 31 3337 1462 key_fuzzer.cc
libfsext_extended_attribute_fuzzer libfsext/ossfuzz/extended_attribute_fuzzer.cc 219 474 12 46 4769 2037 extended_attribute_fuzzer.cc
libfsext_volume_fuzzer libfsext/ossfuzz/volume_fuzzer.cc 188 505 12 37 3819 1638 volume_fuzzer.cc
libfsfat_file_entry_fuzzer libfsfat/ossfuzz/file_entry_fuzzer.cc 152 438 11 30 3171 1353 file_entry_fuzzer.cc
libmodi_handle_fuzzer libmodi/ossfuzz/handle_fuzzer.cc 315 343 13 54 7516 3078 handle_fuzzer.cc
libcreg_value_fuzzer libcreg/ossfuzz/value_fuzzer.cc 190 446 11 32 3452 1515 value_fuzzer.cc
libfsxfs_file_entry_fuzzer libfsxfs/ossfuzz/file_entry_fuzzer.cc 234 403 11 43 4612 1989 file_entry_fuzzer.cc
libfsfat_volume_fuzzer libfsfat/ossfuzz/volume_fuzzer.cc 127 463 11 25 2719 1161 volume_fuzzer.cc
libfsxfs_volume_fuzzer libfsxfs/ossfuzz/volume_fuzzer.cc 110 527 11 19 2082 899 volume_fuzzer.cc
libfsxfs_extended_attribute_fuzzer libfsxfs/ossfuzz/extended_attribute_fuzzer.cc 218 419 11 50 4595 1960 extended_attribute_fuzzer.cc
libregf_value_fuzzer libregf/ossfuzz/value_fuzzer.cc 273 454 11 77 6632 2572 value_fuzzer.cc
libregf_key_fuzzer libregf/ossfuzz/key_fuzzer.cc 253 474 11 76 6287 2418 key_fuzzer.cc
libfsext_file_entry_fuzzer libfsext/ossfuzz/file_entry_fuzzer.cc 262 431 12 45 5385 2320 file_entry_fuzzer.cc
libregf_file_fuzzer libregf/ossfuzz/file_fuzzer.cc 149 578 11 28 2617 1141 file_fuzzer.cc
libbde_volume_fuzzer libbde/ossfuzz/volume_fuzzer.cc 174 444 11 38 4507 1902 volume_fuzzer.cc
libfvde_volume_fuzzer libfvde/ossfuzz/volume_fuzzer.cc 385 454 13 91 11534 4242 volume_fuzzer.cc
libphdi_handle_fuzzer libphdi/ossfuzz/handle_fuzzer.cc 184 636 11 39 3734 1564 handle_fuzzer.cc
libvmdk_handle_fuzzer libvmdk/ossfuzz/handle_fuzzer.cc 198 510 11 38 5340 2220 handle_fuzzer.cc
libsmraw_handle_fuzzer libsmraw/ossfuzz/handle_fuzzer.cc 207 592 8 32 3907 1708 handle_fuzzer.cc
libpff_file_fuzzer libpff/ossfuzz/file_fuzzer.cc 351 548 16 62 8874 3787 file_fuzzer.cc
libfsntfs_mft_metadata_file_fuzzer libfsntfs/ossfuzz/mft_metadata_file_fuzzer.cc 316 751 16 65 7245 3081 mft_metadata_file_fuzzer.cc
libfwevt_xml_document_fuzzer libfwevt/ossfuzz/xml_document_fuzzer.cc 416 224 17 23 17858 6221 xml_document_fuzzer.cc
libfsntfs_file_entry_fuzzer libfsntfs/ossfuzz/file_entry_fuzzer.cc 465 630 16 86 10483 4500 file_entry_fuzzer.cc
libpff_record_set_fuzzer libpff/ossfuzz/record_set_fuzzer.cc 362 537 16 63 9138 3902 record_set_fuzzer.cc
libpff_item_fuzzer libpff/ossfuzz/item_fuzzer.cc 359 540 16 63 9099 3884 item_fuzzer.cc
libfwevt_manifest_fuzzer libfwevt/ossfuzz/manifest_fuzzer.cc 56 667 5 14 1270 548 manifest_fuzzer.cc
libfshfs_volume_fuzzer libfshfs/ossfuzz/volume_fuzzer.cc 246 543 11 75 6509 2466 volume_fuzzer.cc
libfsntfs_volume_fuzzer libfsntfs/ossfuzz/volume_fuzzer.cc 365 730 16 72 8253 3532 volume_fuzzer.cc
libmsiecf_file_fuzzer libmsiecf/ossfuzz/file_fuzzer.cc 103 706 11 19 2041 883 file_fuzzer.cc
libscca_file_fuzzer libscca/ossfuzz/file_fuzzer.cc 525 430 11 35 19254 6910 file_fuzzer.cc
libfshfs_extended_attribute_fuzzer libfshfs/ossfuzz/extended_attribute_fuzzer.cc 279 510 11 83 8180 3096 extended_attribute_fuzzer.cc
libfshfs_file_entry_fuzzer libfshfs/ossfuzz/file_entry_fuzzer.cc 395 394 12 88 10181 4011 file_entry_fuzzer.cc
libmsiecf_item_fuzzer libmsiecf/ossfuzz/item_fuzzer.cc 462 347 11 39 18622 6568 item_fuzzer.cc
libwrc_stream_fuzzer libwrc/ossfuzz/stream_fuzzer.cc 102 799 12 15 1879 808 stream_fuzzer.cc
libevtx_file_fuzzer libevtx/ossfuzz/file_fuzzer.cc 555 532 21 48 20748 7464 file_fuzzer.cc
libesedb_file_fuzzer libesedb/ossfuzz/file_fuzzer.cc 196 1008 11 40 3944 1693 file_fuzzer.cc
libevtx_record_fuzzer libevtx/ossfuzz/record_fuzzer.cc 565 522 21 49 20944 7551 record_fuzzer.cc
libesedb_column_fuzzer libesedb/ossfuzz/column_fuzzer.cc 247 957 11 78 6344 2427 column_fuzzer.cc
libesedb_record_fuzzer libesedb/ossfuzz/record_fuzzer.cc 596 608 11 98 21746 7901 record_fuzzer.cc
libesedb_table_fuzzer libesedb/ossfuzz/table_fuzzer.cc 241 963 11 77 6240 2380 table_fuzzer.cc
libfsapfs_file_entry_fuzzer libfsapfs/ossfuzz/file_entry_fuzzer.cc 406 464 11 68 9643 4109 file_entry_fuzzer.cc
libfsapfs_container_fuzzer libfsapfs/ossfuzz/container_fuzzer.cc 170 700 11 36 3253 1407 container_fuzzer.cc
libfsapfs_extended_attribute_fuzzer libfsapfs/ossfuzz/extended_attribute_fuzzer.cc 303 567 11 65 8306 3424 extended_attribute_fuzzer.cc
libfsapfs_volume_fuzzer libfsapfs/ossfuzz/volume_fuzzer.cc 254 616 11 51 5332 2302 volume_fuzzer.cc
libewf_handle_fuzzer libewf/ossfuzz/handle_fuzzer.cc 912 739 16 138 33547 12788 handle_fuzzer.cc

Fuzzer details

Fuzzer: libfcrypto_crypt_rc4_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 21 77.7%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 5 18.5%
lawngreen 50+ 1 3.70%
All colors 27 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
16 16 5 :

['strlen', 'free', 'libcerror_error_initialize', 'realloc', 'libcerror_error_resize']

16 16 libcerror_error_set call site: 00002 /src/libfcrypto/libcerror/libcerror_error.c:328
0 32 2 :

['free', 'libcerror_error_set']

0 32 libfcrypto_rc4_context_initialize call site: 00011 /src/libfcrypto/libfcrypto/libfcrypto_rc4_context.c:77
0 32 1 :

['libcerror_error_set']

0 32 libfcrypto_rc4_context_free call site: 00025 /src/libfcrypto/libfcrypto/libfcrypto_rc4_context.c:131
0 32 1 :

['libcerror_error_set']

0 32 libfcrypto_rc4_context_set_key call site: 00015 /src/libfcrypto/libfcrypto/libfcrypto_rc4_context.c:192
0 0 None 0 32 libfcrypto_rc4_context_initialize call site: 00001 /src/libfcrypto/libfcrypto/libfcrypto_rc4_context.c:41
0 0 None 0 32 libfcrypto_rc4_context_initialize call site: 00002 /src/libfcrypto/libfcrypto/libfcrypto_rc4_context.c:52
0 0 None 0 32 libfcrypto_rc4_context_initialize call site: 00010 /src/libfcrypto/libfcrypto/libfcrypto_rc4_context.c:66
0 0 None 0 32 libfcrypto_rc4_context_free call site: 00024 /src/libfcrypto/libfcrypto/libfcrypto_rc4_context.c:115
0 0 None 0 32 libfcrypto_rc4_context_set_key call site: 00013 /src/libfcrypto/libfcrypto/libfcrypto_rc4_context.c:168
0 0 None 0 32 libfcrypto_rc4_context_set_key call site: 00014 /src/libfcrypto/libfcrypto/libfcrypto_rc4_context.c:181
0 0 None 0 32 libfcrypto_rc4_crypt call site: 00017 /src/libfcrypto/libfcrypto/libfcrypto_rc4_context.c:253
0 0 None 0 32 libfcrypto_rc4_crypt call site: 00018 /src/libfcrypto/libfcrypto/libfcrypto_rc4_context.c:266

Runtime coverage analysis

Covered functions
6
Functions that are reachable but not covered
5
Reachable functions
11
Percentage of reachable functions covered
54.55%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libfcrypto/ossfuzz/crypt_rc4_fuzzer.cc 1
libfcrypto/libfcrypto/libfcrypto_rc4_context.c 4
libfcrypto/libcerror/libcerror_error.c 3

Fuzzer: libfmos_adc_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 15 65.2%
gold [1:9] 0 0.0%
yellow [10:29] 4 17.3%
greenyellow [30:49] 1 4.34%
lawngreen 50+ 3 13.0%
All colors 23 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
16 16 5 :

['strlen', 'free', 'libcerror_error_initialize', 'realloc', 'libcerror_error_resize']

16 16 libcerror_error_set call site: 00002 /src/libfcrypto/libcerror/libcerror_error.c:328
0 0 None 0 32 libfmos_adc_decompress call site: 00001 /src/libfmos/libfmos/libfmos_adc.c:54
0 0 None 0 32 libfmos_adc_decompress call site: 00002 /src/libfmos/libfmos/libfmos_adc.c:65
0 0 None 0 32 libfmos_adc_decompress call site: 00010 /src/libfmos/libfmos/libfmos_adc.c:76
0 0 None 0 32 libfmos_adc_decompress call site: 00011 /src/libfmos/libfmos/libfmos_adc.c:87
0 0 None 0 32 libfmos_adc_decompress call site: 00012 /src/libfmos/libfmos/libfmos_adc.c:100
0 0 None 0 32 libfmos_adc_decompress call site: 00013 /src/libfmos/libfmos/libfmos_adc.c:117
0 0 None 0 32 libfmos_adc_decompress call site: 00016 /src/libfmos/libfmos/libfmos_adc.c:170
0 0 None 0 32 libfmos_adc_decompress call site: 00020 /src/libfmos/libfmos/libfmos_adc.c:237

Runtime coverage analysis

Covered functions
3
Functions that are reachable but not covered
5
Reachable functions
8
Percentage of reachable functions covered
37.5%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libfmos/ossfuzz/adc_fuzzer.cc 1
libfmos/libfmos/libfmos_adc.c 1
libfmos/libcerror/libcerror_error.c 3

Fuzzer: libfwnt_lznt1_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 20 58.8%
gold [1:9] 3 8.82%
yellow [10:29] 1 2.94%
greenyellow [30:49] 3 8.82%
lawngreen 50+ 7 20.5%
All colors 34 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
16 16 5 :

['strlen', 'free', 'libcerror_error_initialize', 'realloc', 'libcerror_error_resize']

16 16 libcerror_error_set call site: 00002 /src/libfcrypto/libcerror/libcerror_error.c:328
0 0 None 0 32 libfwnt_lznt1_decompress_chunk call site: 00014 /src/libfwnt/libfwnt/libfwnt_lznt1.c:57
0 0 None 0 32 libfwnt_lznt1_decompress_chunk call site: 00015 /src/libfwnt/libfwnt/libfwnt_lznt1.c:68
0 0 None 0 32 libfwnt_lznt1_decompress_chunk call site: 00016 /src/libfwnt/libfwnt/libfwnt_lznt1.c:79
0 0 None 0 32 libfwnt_lznt1_decompress_chunk call site: 00018 /src/libfwnt/libfwnt/libfwnt_lznt1.c:103
0 0 None 0 32 libfwnt_lznt1_decompress_chunk call site: 00020 /src/libfwnt/libfwnt/libfwnt_lznt1.c:125
0 0 None 0 32 libfwnt_lznt1_decompress_chunk call site: 00021 /src/libfwnt/libfwnt/libfwnt_lznt1.c:136
0 0 None 0 32 libfwnt_lznt1_decompress_chunk call site: 00024 /src/libfwnt/libfwnt/libfwnt_lznt1.c:267
0 0 None 0 32 libfwnt_lznt1_decompress_chunk call site: 00028 /src/libfwnt/libfwnt/libfwnt_lznt1.c:333
0 0 None 0 32 libfwnt_lznt1_decompress call site: 00001 /src/libfwnt/libfwnt/libfwnt_lznt1.c:374
0 0 None 0 32 libfwnt_lznt1_decompress call site: 00002 /src/libfwnt/libfwnt/libfwnt_lznt1.c:385
0 0 None 0 32 libfwnt_lznt1_decompress call site: 00010 /src/libfwnt/libfwnt/libfwnt_lznt1.c:396

Runtime coverage analysis

Covered functions
4
Functions that are reachable but not covered
5
Reachable functions
9
Percentage of reachable functions covered
44.44%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libfwnt/ossfuzz/lznt1_fuzzer.cc 1
libfwnt/libfwnt/libfwnt_lznt1.c 2
libfwnt/libcerror/libcerror_error.c 3

Fuzzer: libfcrypto_crypt_serpent_ecb_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 33 78.5%
gold [1:9] 1 2.38%
yellow [10:29] 0 0.0%
greenyellow [30:49] 1 2.38%
lawngreen 50+ 7 16.6%
All colors 42 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
42 42 1 :

['libfcrypto_internal_serpent_context_decrypt_block']

42 74 libfcrypto_serpent_crypt_ecb call site: 00022 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:2672
16 16 5 :

['strlen', 'free', 'libcerror_error_initialize', 'realloc', 'libcerror_error_resize']

16 16 libcerror_error_set call site: 00002 /src/libfcrypto/libcerror/libcerror_error.c:328
0 32 2 :

['free', 'libcerror_error_set']

0 32 libfcrypto_serpent_context_initialize call site: 00011 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:609
0 32 1 :

['libcerror_error_set']

0 32 libfcrypto_serpent_context_free call site: 00040 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:663
0 32 1 :

['libcerror_error_set']

0 32 libfcrypto_serpent_context_set_key call site: 00018 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:775
0 0 None 0 32 libfcrypto_serpent_context_initialize call site: 00001 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:573
0 0 None 0 32 libfcrypto_serpent_context_initialize call site: 00002 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:584
0 0 None 0 32 libfcrypto_serpent_context_initialize call site: 00010 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:598
0 0 None 0 32 libfcrypto_serpent_context_free call site: 00039 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:647
0 0 None 0 32 libfcrypto_serpent_context_set_key call site: 00013 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:706
0 0 None 0 32 libfcrypto_serpent_context_set_key call site: 00014 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:719
0 0 None 0 32 libfcrypto_serpent_context_set_key call site: 00015 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:730

Runtime coverage analysis

Covered functions
7
Functions that are reachable but not covered
6
Reachable functions
13
Percentage of reachable functions covered
53.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libfcrypto/ossfuzz/crypt_serpent_ecb_fuzzer.cc 1
libfcrypto/libfcrypto/libfcrypto_serpent_context.c 6
libfcrypto/libcerror/libcerror_error.c 3

Fuzzer: libfmapi_entry_identifier_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 16 76.1%
gold [1:9] 1 4.76%
yellow [10:29] 0 0.0%
greenyellow [30:49] 3 14.2%
lawngreen 50+ 1 4.76%
All colors 21 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
16 16 5 :

['strlen', 'free', 'libcerror_error_initialize', 'realloc', 'libcerror_error_resize']

16 16 libcerror_error_set call site: 00002 /src/libfcrypto/libcerror/libcerror_error.c:328
0 32 2 :

['free', 'libcerror_error_set']

0 32 libfmapi_entry_identifier_initialize call site: 00011 /src/libfmapi/libfmapi/libfmapi_entry_identifier.c:81
0 32 1 :

['libcerror_error_set']

0 32 libfmapi_entry_identifier_free call site: 00019 /src/libfmapi/libfmapi/libfmapi_entry_identifier.c:118
0 32 1 :

['libcerror_error_set']

0 32 libfmapi_entry_identifier_copy_from_byte_stream call site: 00017 /src/libfmapi/libfmapi/libfmapi_entry_identifier.c:221
0 0 None 0 32 libfmapi_entry_identifier_initialize call site: 00001 /src/libfmapi/libfmapi/libfmapi_entry_identifier.c:45
0 0 None 0 32 libfmapi_entry_identifier_initialize call site: 00002 /src/libfmapi/libfmapi/libfmapi_entry_identifier.c:56
0 0 None 0 32 libfmapi_entry_identifier_initialize call site: 00010 /src/libfmapi/libfmapi/libfmapi_entry_identifier.c:70
0 0 None 0 32 libfmapi_entry_identifier_copy_from_byte_stream call site: 00013 /src/libfmapi/libfmapi/libfmapi_entry_identifier.c:159
0 0 None 0 32 libfmapi_entry_identifier_copy_from_byte_stream call site: 00014 /src/libfmapi/libfmapi/libfmapi_entry_identifier.c:172
0 0 None 0 32 libfmapi_entry_identifier_copy_from_byte_stream call site: 00016 /src/libfmapi/libfmapi/libfmapi_entry_identifier.c:207

Runtime coverage analysis

Covered functions
5
Functions that are reachable but not covered
5
Reachable functions
10
Percentage of reachable functions covered
50.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libfmapi/ossfuzz/entry_identifier_fuzzer.cc 1
libfmapi/libfmapi/libfmapi_entry_identifier.c 3
libfmapi/libcerror/libcerror_error.c 3

Fuzzer: libfmos_lzvn_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 14 53.8%
gold [1:9] 4 15.3%
yellow [10:29] 4 15.3%
greenyellow [30:49] 1 3.84%
lawngreen 50+ 3 11.5%
All colors 26 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
16 16 5 :

['strlen', 'free', 'libcerror_error_initialize', 'realloc', 'libcerror_error_resize']

16 16 libcerror_error_set call site: 00002 /src/libfcrypto/libcerror/libcerror_error.c:328
0 0 None 0 32 libfmos_lzvn_decompress call site: 00001 /src/libfmos/libfmos/libfmos_lzvn.c:350
0 0 None 0 32 libfmos_lzvn_decompress call site: 00002 /src/libfmos/libfmos/libfmos_lzvn.c:361
0 0 None 0 32 libfmos_lzvn_decompress call site: 00010 /src/libfmos/libfmos/libfmos_lzvn.c:372
0 0 None 0 32 libfmos_lzvn_decompress call site: 00011 /src/libfmos/libfmos/libfmos_lzvn.c:383
0 0 None 0 32 libfmos_lzvn_decompress call site: 00012 /src/libfmos/libfmos/libfmos_lzvn.c:396
0 0 None 0 32 libfmos_lzvn_decompress call site: 00013 /src/libfmos/libfmos/libfmos_lzvn.c:413
0 0 None 0 32 libfmos_lzvn_decompress call site: 00022 /src/libfmos/libfmos/libfmos_lzvn.c:652

Runtime coverage analysis

Covered functions
3
Functions that are reachable but not covered
5
Reachable functions
8
Percentage of reachable functions covered
37.5%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libfmos/ossfuzz/lzvn_fuzzer.cc 1
libfmos/libfmos/libfmos_lzvn.c 1
libfmos/libcerror/libcerror_error.c 3

Fuzzer: libfmapi_lzfu_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 17 58.6%
gold [1:9] 2 6.89%
yellow [10:29] 4 13.7%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 6 20.6%
All colors 29 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
16 16 5 :

['strlen', 'free', 'libcerror_error_initialize', 'realloc', 'libcerror_error_resize']

16 16 libcerror_error_set call site: 00002 /src/libfcrypto/libcerror/libcerror_error.c:328
0 32 1 :

['libcerror_error_set']

0 32 libfmapi_checksum_calculate_weak_crc32 call site: 00020 /src/libfmapi/libfmapi/libfmapi_checksum.c:174
0 0 None 0 32 libfmapi_checksum_calculate_weak_crc32 call site: 00018 /src/libfmapi/libfmapi/libfmapi_checksum.c:152
0 0 None 0 32 libfmapi_checksum_calculate_weak_crc32 call site: 00019 /src/libfmapi/libfmapi/libfmapi_checksum.c:163
0 0 None 0 32 libfmapi_lzfu_decompress call site: 00001 /src/libfmapi/libfmapi/libfmapi_lzfu.c:288
0 0 None 0 32 libfmapi_lzfu_decompress call site: 00010 /src/libfmapi/libfmapi/libfmapi_lzfu.c:311
0 0 None 0 32 libfmapi_lzfu_decompress call site: 00011 /src/libfmapi/libfmapi/libfmapi_lzfu.c:322
0 0 None 0 32 libfmapi_lzfu_decompress call site: 00012 /src/libfmapi/libfmapi/libfmapi_lzfu.c:347
0 0 None 0 32 libfmapi_lzfu_decompress call site: 00013 /src/libfmapi/libfmapi/libfmapi_lzfu.c:363
0 0 None 0 32 libfmapi_lzfu_decompress call site: 00018 /src/libfmapi/libfmapi/libfmapi_lzfu.c:472
0 0 None 0 32 libfmapi_lzfu_decompress call site: 00024 /src/libfmapi/libfmapi/libfmapi_lzfu.c:519

Runtime coverage analysis

Covered functions
5
Functions that are reachable but not covered
5
Reachable functions
10
Percentage of reachable functions covered
50.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libfmapi/ossfuzz/lzfu_fuzzer.cc 1
libfmapi/libfmapi/libfmapi_lzfu.c 1
libfmapi/libcerror/libcerror_error.c 3
libfmapi/libfmapi/libfmapi_checksum.c 2

Fuzzer: libfwnt_security_identifier_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 18 69.2%
gold [1:9] 2 7.69%
yellow [10:29] 1 3.84%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 5 19.2%
All colors 26 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
16 16 5 :

['strlen', 'free', 'libcerror_error_initialize', 'realloc', 'libcerror_error_resize']

16 16 libcerror_error_set call site: 00002 /src/libfcrypto/libcerror/libcerror_error.c:328
0 32 2 :

['free', 'libcerror_error_set']

0 32 libfwnt_security_identifier_initialize call site: 00011 /src/libfwnt/libfwnt/libfwnt_security_identifier.c:79
0 32 1 :

['libcerror_error_set']

0 32 libfwnt_security_identifier_free call site: 00023 /src/libfwnt/libfwnt/libfwnt_security_identifier.c:134
0 32 1 :

['libcerror_error_set']

0 32 libfwnt_internal_security_identifier_free call site: 00023 /src/libfwnt/libfwnt/libfwnt_security_identifier.c:162
0 0 None 0 32 libfwnt_security_identifier_initialize call site: 00001 /src/libfwnt/libfwnt/libfwnt_security_identifier.c:43
0 0 None 0 32 libfwnt_security_identifier_initialize call site: 00002 /src/libfwnt/libfwnt/libfwnt_security_identifier.c:54
0 0 None 0 32 libfwnt_security_identifier_initialize call site: 00010 /src/libfwnt/libfwnt/libfwnt_security_identifier.c:68
0 0 None 0 32 libfwnt_security_identifier_free call site: 00021 /src/libfwnt/libfwnt/libfwnt_security_identifier.c:117
0 0 None 0 32 libfwnt_security_identifier_copy_from_byte_stream call site: 00013 /src/libfwnt/libfwnt/libfwnt_security_identifier.c:198
0 0 None 0 32 libfwnt_security_identifier_copy_from_byte_stream call site: 00014 /src/libfwnt/libfwnt/libfwnt_security_identifier.c:211
0 0 None 0 32 libfwnt_security_identifier_copy_from_byte_stream call site: 00016 /src/libfwnt/libfwnt/libfwnt_security_identifier.c:233
0 0 None 0 32 libfwnt_security_identifier_copy_from_byte_stream call site: 00017 /src/libfwnt/libfwnt/libfwnt_security_identifier.c:244

Runtime coverage analysis

Covered functions
6
Functions that are reachable but not covered
5
Reachable functions
11
Percentage of reachable functions covered
54.55%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libfwnt/ossfuzz/security_identifier_fuzzer.cc 1
libfwnt/libfwnt/libfwnt_security_identifier.c 4
libfwnt/libcerror/libcerror_error.c 3

Fuzzer: libhmac_sha224_context_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 42 84.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 8 16.0%
All colors 50 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
32 68 2 :

['libhmac_sha224_context_free', 'libcerror_error_set']

32 68 libhmac_sha224_calculate call site: 00046 /src/libhmac/libhmac/libhmac_sha224.c:196
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha224_context_transform call site: 00027 /src/libhmac/libhmac/libhmac_sha224_context.c:420
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha224_context_initialize call site: 00013 /src/libhmac/libhmac/libhmac_sha224_context.c:592
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha224_context_free call site: 00046 /src/libhmac/libhmac/libhmac_sha224_context.c:631
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha224_context_update call site: 00032 /src/libhmac/libhmac/libhmac_sha224_context.c:987
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha224_context_finalize call site: 00043 /src/libhmac/libhmac/libhmac_sha224_context.c:1340
0 0 None 192 274 libhmac_sha224_context_update call site: 00019 /src/libhmac/libhmac/libhmac_sha224_context.c:888
0 0 None 32 68 libhmac_sha224_calculate call site: 00002 /src/libhmac/libhmac/libhmac_sha224.c:153
0 0 None 32 68 libhmac_sha224_calculate call site: 00016 /src/libhmac/libhmac/libhmac_sha224.c:166
0 0 None 32 68 libhmac_sha224_calculate call site: 00035 /src/libhmac/libhmac/libhmac_sha224.c:181
0 0 None 32 32 libhmac_sha224_context_transform call site: 00022 /src/libhmac/libhmac/libhmac_sha224_context.c:248
0 0 None 32 32 libhmac_sha224_context_transform call site: 00023 /src/libhmac/libhmac/libhmac_sha224_context.c:259

Runtime coverage analysis

Covered functions
7
Functions that are reachable but not covered
6
Reachable functions
13
Percentage of reachable functions covered
53.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libhmac/ossfuzz/sha224_context_fuzzer.cc 1
libhmac/libhmac/libhmac_sha224.c 1
libhmac/libhmac/libhmac_sha224_context.c 5
libhmac/libcerror/libcerror_error.c 3

Fuzzer: libcaes_crypt_ecb_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 39 81.2%
gold [1:9] 2 4.16%
yellow [10:29] 0 0.0%
greenyellow [30:49] 1 2.08%
lawngreen 50+ 6 12.5%
All colors 48 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
85 85 1 :

['libcaes_internal_context_set_decryption_key']

85 117 libcaes_context_set_key call site: 00019 /src/libcaes/libcaes/libcaes_context.c:585
16 16 5 :

['strlen', 'free', 'libcerror_error_initialize', 'realloc', 'libcerror_error_resize']

16 16 libcerror_error_set call site: 00002 /src/libfcrypto/libcerror/libcerror_error.c:328
0 32 2 :

['free', 'libcerror_error_set']

0 32 libcaes_context_initialize call site: 00013 /src/libcaes/libcaes/libcaes_context.c:360
0 32 1 :

['libcerror_error_set']

0 32 libcaes_context_free call site: 00033 /src/libcaes/libcaes/libcaes_context.c:406
0 32 1 :

['libcerror_error_set']

0 32 libcaes_context_set_key call site: 00020 /src/libcaes/libcaes/libcaes_context.c:587
0 32 1 :

['libcerror_error_set']

0 32 libcaes_initialize_tables call site: 00013 /src/libcaes/libcaes/libcaes_context.c:644
0 32 1 :

['libcerror_error_set']

0 32 libcaes_internal_context_set_encryption_key call site: 00022 /src/libcaes/libcaes/libcaes_context.c:1064
0 0 None 0 64 libcaes_crypt_ecb call site: 00044 /src/libcaes/libcaes/libcaes_context.c:3019
0 0 None 0 64 libcaes_crypt_ecb call site: 00044 /src/libcaes/libcaes/libcaes_context.c:3107
0 0 None 0 64 libcaes_crypt_ecb call site: 00045 /src/libcaes/libcaes/libcaes_context.c:3121
0 0 None 0 32 libcaes_context_initialize call site: 00001 /src/libcaes/libcaes/libcaes_context.c:275
0 0 None 0 32 libcaes_context_initialize call site: 00002 /src/libcaes/libcaes/libcaes_context.c:286

Runtime coverage analysis

Covered functions
8
Functions that are reachable but not covered
6
Reachable functions
14
Percentage of reachable functions covered
57.14%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libcaes/ossfuzz/crypt_ecb_fuzzer.cc 1
libcaes/libcaes/libcaes_context.c 7
libcaes/libcerror/libcerror_error.c 3

Fuzzer: libwrc_version_information_resource_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 35 50.0%
gold [1:9] 8 11.4%
yellow [10:29] 5 7.14%
greenyellow [30:49] 1 1.42%
lawngreen 50+ 21 30.0%
All colors 70 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
16 16 5 :

['strlen', 'free', 'libcerror_error_initialize', 'realloc', 'libcerror_error_resize']

16 16 libcerror_error_set call site: 00002 /src/libfcrypto/libcerror/libcerror_error.c:328
0 32 2 :

['free', 'libcerror_error_set']

0 32 libwrc_version_information_resource_initialize call site: 00011 /src/libwrc/libwrc/libwrc_version_information_resource.c:87
0 32 1 :

['libcerror_error_set']

0 32 libwrc_version_information_resource_free call site: 00068 /src/libwrc/libwrc/libwrc_version_information_resource.c:124
0 32 1 :

['libcerror_error_set']

0 32 libwrc_internal_version_information_resource_read_string call site: 00044 /src/libwrc/libwrc/libwrc_version_information_resource.c:856
0 0 None 0 32 libwrc_version_information_resource_initialize call site: 00001 /src/libwrc/libwrc/libwrc_version_information_resource.c:51
0 0 None 0 32 libwrc_version_information_resource_initialize call site: 00002 /src/libwrc/libwrc/libwrc_version_information_resource.c:62
0 0 None 0 32 libwrc_version_information_resource_initialize call site: 00010 /src/libwrc/libwrc/libwrc_version_information_resource.c:76
0 0 None 0 32 libwrc_internal_version_information_resource_read_string_file_information call site: 00022 /src/libwrc/libwrc/libwrc_version_information_resource.c:168
0 0 None 0 32 libwrc_internal_version_information_resource_read_string_file_information call site: 00023 /src/libwrc/libwrc/libwrc_version_information_resource.c:179
0 0 None 0 32 libwrc_internal_version_information_resource_read_string_file_information call site: 00024 /src/libwrc/libwrc/libwrc_version_information_resource.c:190
0 0 None 0 32 libwrc_internal_version_information_resource_read_string_table call site: 00030 /src/libwrc/libwrc/libwrc_version_information_resource.c:408
0 0 None 0 32 libwrc_internal_version_information_resource_read_string_table call site: 00031 /src/libwrc/libwrc/libwrc_version_information_resource.c:419

Runtime coverage analysis

Covered functions
10
Functions that are reachable but not covered
6
Reachable functions
16
Percentage of reachable functions covered
62.5%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libwrc/ossfuzz/version_information_resource_fuzzer.cc 1
libwrc/libwrc/libwrc_version_information_resource.c 8
libwrc/libcerror/libcerror_error.c 3

Fuzzer: libhmac_sha512_context_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 42 84.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 8 16.0%
All colors 50 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
32 68 2 :

['libhmac_sha512_context_free', 'libcerror_error_set']

32 68 libhmac_sha512_calculate call site: 00046 /src/libhmac/libhmac/libhmac_sha512.c:196
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha512_context_transform call site: 00027 /src/libhmac/libhmac/libhmac_sha512_context.c:456
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha512_context_initialize call site: 00013 /src/libhmac/libhmac/libhmac_sha512_context.c:628
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha512_context_free call site: 00046 /src/libhmac/libhmac/libhmac_sha512_context.c:667
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha512_context_update call site: 00032 /src/libhmac/libhmac/libhmac_sha512_context.c:1023
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha512_context_finalize call site: 00043 /src/libhmac/libhmac/libhmac_sha512_context.c:1379
0 0 None 192 274 libhmac_sha512_context_update call site: 00019 /src/libhmac/libhmac/libhmac_sha512_context.c:924
0 0 None 32 68 libhmac_sha512_calculate call site: 00002 /src/libhmac/libhmac/libhmac_sha512.c:153
0 0 None 32 68 libhmac_sha512_calculate call site: 00016 /src/libhmac/libhmac/libhmac_sha512.c:166
0 0 None 32 68 libhmac_sha512_calculate call site: 00035 /src/libhmac/libhmac/libhmac_sha512.c:181
0 0 None 32 32 libhmac_sha512_context_transform call site: 00022 /src/libhmac/libhmac/libhmac_sha512_context.c:284
0 0 None 32 32 libhmac_sha512_context_transform call site: 00023 /src/libhmac/libhmac/libhmac_sha512_context.c:295

Runtime coverage analysis

Covered functions
7
Functions that are reachable but not covered
6
Reachable functions
13
Percentage of reachable functions covered
53.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libhmac/ossfuzz/sha512_context_fuzzer.cc 1
libhmac/libhmac/libhmac_sha512.c 1
libhmac/libhmac/libhmac_sha512_context.c 5
libhmac/libcerror/libcerror_error.c 3

Fuzzer: libfcrypto_crypt_serpent_cbc_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 46 83.6%
gold [1:9] 1 1.81%
yellow [10:29] 2 3.63%
greenyellow [30:49] 1 1.81%
lawngreen 50+ 5 9.09%
All colors 55 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
16 16 5 :

['strlen', 'free', 'libcerror_error_initialize', 'realloc', 'libcerror_error_resize']

16 16 libcerror_error_set call site: 00002 /src/libfcrypto/libcerror/libcerror_error.c:328
0 32 2 :

['free', 'libcerror_error_set']

0 32 libfcrypto_serpent_context_initialize call site: 00011 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:609
0 32 1 :

['libcerror_error_set']

0 32 libfcrypto_serpent_context_free call site: 00053 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:663
0 32 1 :

['libcerror_error_set']

0 32 libfcrypto_serpent_context_set_key call site: 00018 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:775
0 32 1 :

['libcerror_error_set']

0 32 libfcrypto_internal_serpent_context_encrypt_block call site: 00038 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:1553
0 32 1 :

['libcerror_error_set']

0 32 libfcrypto_serpent_crypt_cbc call site: 00050 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:2609
0 0 None 42 244 libfcrypto_serpent_crypt_cbc call site: 00032 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:2485
0 0 None 0 32 libfcrypto_serpent_context_initialize call site: 00001 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:573
0 0 None 0 32 libfcrypto_serpent_context_initialize call site: 00002 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:584
0 0 None 0 32 libfcrypto_serpent_context_initialize call site: 00010 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:598
0 0 None 0 32 libfcrypto_serpent_context_free call site: 00052 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:647
0 0 None 0 32 libfcrypto_serpent_context_set_key call site: 00013 /src/libfcrypto/libfcrypto/libfcrypto_serpent_context.c:706

Runtime coverage analysis

Covered functions
7
Functions that are reachable but not covered
6
Reachable functions
13
Percentage of reachable functions covered
53.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libfcrypto/ossfuzz/crypt_serpent_cbc_fuzzer.cc 1
libfcrypto/libfcrypto/libfcrypto_serpent_context.c 6
libfcrypto/libcerror/libcerror_error.c 3

Fuzzer: libhmac_sha1_context_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 42 84.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 8 16.0%
All colors 50 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
32 68 2 :

['libhmac_sha1_context_free', 'libcerror_error_set']

32 68 libhmac_sha1_calculate call site: 00046 /src/libhmac/libhmac/libhmac_sha1.c:196
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha1_context_transform call site: 00027 /src/libhmac/libhmac/libhmac_sha1_context.c:461
32 32 2 :

['free', 'libcerror_error_set']

32 32 libhmac_sha1_context_initialize call site: 00013 /src/libhmac/libhmac/libhmac_sha1_context.c:633
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha1_context_free call site: 00046 /src/libhmac/libhmac/libhmac_sha1_context.c:672
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha1_context_update call site: 00032 /src/libhmac/libhmac/libhmac_sha1_context.c:1028
32 32 1 :

['libcerror_error_set']

32 32 libhmac_sha1_context_finalize call site: 00043 /src/libhmac/libhmac/libhmac_sha1_context.c:1372
0 0 None 192 274 libhmac_sha1_context_update call site: 00019 /src/libhmac/libhmac/libhmac_sha1_context.c:929
0 0 None 32 68 libhmac_sha1_calculate call site: 00002 /src/libhmac/libhmac/libhmac_sha1.c:153
0 0 None 32 68 libhmac_sha1_calculate call site: 00016 /src/libhmac/libhmac/libhmac_sha1.c:166
0 0 None 32 68 libhmac_sha1_calculate call site: 00035 /src/libhmac/libhmac/libhmac_sha1.c:181
0 0 None 32 32 libhmac_sha1_context_transform call site: 00022 /src/libhmac/libhmac/libhmac_sha1_context.c:287
0 0 None 32 32 libhmac_sha1_context_transform call site: 00023 /src/libhmac/libhmac/libhmac_sha1_context.c:298

Runtime coverage analysis

Covered functions
7
Functions that are reachable but not covered
6
Reachable functions
13
Percentage of reachable functions covered
53.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libhmac/ossfuzz/sha1_context_fuzzer.cc 1
libhmac/libhmac/libhmac_sha1.c 1
libhmac/libhmac/libhmac_sha1_context.c 5
libhmac/libcerror/libcerror_error.c 3

Fuzzer: libcaes_crypt_ccm_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 54 83.0%
gold [1:9] 2 3.07%
yellow [10:29] 1 1.53%
greenyellow [30:49] 2 3.07%
lawngreen 50+ 6 9.23%
All colors 65 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
85 85 1 :

['libcaes_internal_context_set_decryption_key']

85 117 libcaes_context_set_key call site: 00019 /src/libcaes/libcaes/libcaes_context.c:585
16 16 5 :

['strlen', 'free', 'libcerror_error_initialize', 'realloc', 'libcerror_error_resize']

16 16 libcerror_error_set call site: 00002 /src/libfcrypto/libcerror/libcerror_error.c:328
0 32 2 :

['free', 'libcerror_error_set']

0 32 libcaes_context_initialize call site: 00013 /src/libcaes/libcaes/libcaes_context.c:360
0 32 1 :

['libcerror_error_set']

0 32 libcaes_context_free call site: 00033 /src/libcaes/libcaes/libcaes_context.c:406
0 32 1 :

['libcerror_error_set']

0 32 libcaes_context_set_key call site: 00020 /src/libcaes/libcaes/libcaes_context.c:587
0 32 1 :

['libcerror_error_set']

0 32 libcaes_initialize_tables call site: 00013 /src/libcaes/libcaes/libcaes_context.c:644
0 32 1 :

['libcerror_error_set']

0 32 libcaes_internal_context_set_encryption_key call site: 00022 /src/libcaes/libcaes/libcaes_context.c:1064
0 32 1 :

['libcerror_error_set']

0 32 libcaes_crypt_ccm call site: 00062 /src/libcaes/libcaes/libcaes_context.c:2249
0 0 None 0 64 libcaes_crypt_ecb call site: 00056 /src/libcaes/libcaes/libcaes_context.c:3019
0 0 None 0 64 libcaes_crypt_ecb call site: 00056 /src/libcaes/libcaes/libcaes_context.c:3107
0 0 None 0 64 libcaes_crypt_ecb call site: 00057 /src/libcaes/libcaes/libcaes_context.c:3121
0 0 None 0 32 libcaes_context_initialize call site: 00001 /src/libcaes/libcaes/libcaes_context.c:275

Runtime coverage analysis

Covered functions
9
Functions that are reachable but not covered
6
Reachable functions
15
Percentage of reachable functions covered
60.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
libcaes/ossfuzz/crypt_ccm_fuzzer.cc 1
libcaes/libcaes/libcaes_context.c 8
libcaes/libcerror/libcerror_error.c 3

Fuzzer: libhmac_md5_context_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 41 83.6%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 8 16.3%
All colors 49 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
32 68 2 :

['libhmac_md5_context_free', 'libcerror_error_set']

32 68 libhmac_md5_calculate call site: 00045 /src/libhmac/libhmac/libhmac_md5.c:196
32 32 1 :

['libcerror_error_set']

32 32 libhmac_md5_context_transform call site: 00027 /src/libhmac/libhmac/libhmac_md5_context.c:388
32 32 2 :

['free', 'libcerror_error_set']

32 32 libhmac_md5_context_initialize call site: 00013 /src/libhmac/libhmac/libhmac_md5_context.c:560
32 32 1 :

['libcerror_error_set']

32 32 libhmac_md5_context_free call site: 00045 /src/libhmac/libhmac/libhmac_md5_context.c:599
32 32 1 :

['libcerror_error_set']

32 32 libhmac_md5_context_update call site: 00032 /src/libhmac/libhmac/libhmac_md5_context.c:955
32 32 1 :

['libcerror_error_set']

32 32 libhmac_md5_context_finalize call site: 00042 /src/libhmac/libhmac/libhmac_md5_context.c:1284
0 0 None 192 274 libhmac_md5_context_update call site: 00019 /src/libhmac/libhmac/libhmac_md5_context.c:856
0 0 None 32 68 libhmac_md5_calculate call site: 00002 /src/libhmac/libhmac/libhmac_md5.c:153
0 0 None 32 68 libhmac_md5_calculate call site: 00016 /src/libhmac/libhmac/libhmac_md5.c:166
0 0 None 32 68 libhmac_md5_calculate call site: 00035