Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: zip_write_encrypt_pkware_file_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 909 77.2%
gold [1:9] 0 0.0%
yellow [10:29] 1 0.08%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 266 22.6%
All colors 1176 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
222 267 zip_realloc call site: 00267 _zip_checkcons
58 152 _zip_buffer_get call site: 00152 _zip_read_eocd64
42 224 _zip_entry_finalize call site: 00224 _zip_cdir_free
41 522 zip_source_layered_create call site: 00522 window_read
33 835 zip_close call site: 00835 zip_source_zip_file_create
30 94 zip_source_open call site: 00094 _zip_open
25 126 zip_source_read call site: 00126 _zip_read_cdir
24 754 zip_file_extra_field_delete call site: 00754 _zip_read_local_ef
21 967 _zip_dirent_write call site: 00967 _zip_ef_new
17 676 zip_source_buffer_with_attributes_create call site: 00676 zip_discard
16 503 zip_discard call site: 00503 zip_check_torrentzip
15 1045 _zip_string_write call site: 01045 _zip_ef_write

Runtime coverage analysis

Covered functions
155
Functions that are reachable but not covered
115
Reachable functions
240
Percentage of reachable functions covered
52.08%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
ossfuzz/zip_write_encrypt_pkware_file_fuzzer.c 1
lib/zip_open.c 18
lib/zip_error.c 10
lib/zip_source_file_stdio_named.c 1
lib/zip_source_file_common.c 3
lib/zip_stat_init.c 2
lib/zip_source_get_file_attributes.c 2
lib/zip_source_supports.c 3
lib/zip_source_function.c 3
lib/zip_source_seek.c 2
lib/zip_source_stat.c 1
lib/zip_source_error.c 1
lib/zip_source_call.c 1
lib/zip_new.c 1
lib/zip_hash.c 10
lib/zip_source_open.c 1
lib/zip_source_close.c 1
lib/zip_source_accept_empty.c 1
lib/zip_source_tell.c 1
lib/zip_buffer.c 22
lib/zip_io_util.c 4
lib/zip_source_read.c 2
lib/zip_dirent.c 25
lib/zip_entry.c 2
lib/zip_unchange_data.c 1
lib/zip_source_free.c 1
lib/zip_source_rollback_write.c 1
lib/zip_source_window.c 6
lib/zip_string.c 8
lib/zip_extra_field.c 11
lib/zip_utf-8.c 4
lib/zip_realloc.c 1
lib/zip_memdup.c 1
lib/zip_discard.c 1
lib/zip_progress.c 7
lib/zip_source_layered.c 2
lib/zip_file_get_offset.c 2
lib/zip_source_pass_to_lower_layer.c 1
lib/zip_source_crc.c 2
lib/zip_source_buffer.c 12
lib/zip_strerror.c 1
lib/zip_error_strerror.c 1
lib/zip_file_add.c 1
lib/zip_file_replace.c 1
lib/zip_name_locate.c 1
lib/zip_get_name.c 2
lib/zip_add_entry.c 1
lib/zip_set_name.c 1
lib/zip_extra_field_api.c 2
lib/zip_file_set_encryption.c 1
lib/zip_get_encryption_implementation.c 1
lib/zip_close.c 8
lib/zip_source_remove.c 1
lib/zip_source_begin_write_cloning.c 1
lib/zip_source_begin_write.c 1
lib/zip_source_tell_write.c 1
lib/zip_source_zip_new.c 2
lib/zip_stat_index.c 1
lib/zip_source_compress.c 8
lib/zip_source_get_dostime.c 1
lib/zip_source_write.c 1
lib/zip_source_seek_write.c 1
lib/zip_source_commit_write.c 1

Fuzzer: zip_read_file_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 633 55.3%
gold [1:9] 13 1.13%
yellow [10:29] 10 0.87%
greenyellow [30:49] 6 0.52%
lawngreen 50+ 482 42.1%
All colors 1144 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
322 820 zip_close call site: 00820 add_data
21 472 _zip_find_central_dir call site: 00472 _zip_dirent_read
15 417 _zip_dirent_read call site: 00417 _zip_buffer_new_from_source
12 729 read_data call site: 00729 _zip_source_window_new
10 689 zip_source_buffer_fragment_with_attributes_create call site: 00689 buffer_grow_fragments
10 704 zip_source_buffer_fragment_with_attributes_create call site: 00704 buffer_clone
8 21 zip_source_file_create call site: 00021 zip_error_set
8 560 window_read call site: 00560 zip_source_seek
7 463 _zip_read_cdir call site: 00463 _zip_cdir_free
6 89 _zip_source_call call site: 00089 _zip_allocate_new
6 569 window_read call site: 00569 zip_source_pass_to_lower_layer
6 594 crc_read call site: 00594 zip_source_free

Runtime coverage analysis

Covered functions
176
Functions that are reachable but not covered
78
Reachable functions
239
Percentage of reachable functions covered
67.36%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
ossfuzz/zip_read_file_fuzzer.c 1
lib/zip_open.c 18
lib/zip_error.c 11
lib/zip_source_file_stdio_named.c 1
lib/zip_source_file_common.c 3
lib/zip_stat_init.c 2
lib/zip_source_get_file_attributes.c 2
lib/zip_source_supports.c 3
lib/zip_source_function.c 3
lib/zip_source_seek.c 2
lib/zip_source_stat.c 1
lib/zip_source_error.c 1
lib/zip_source_call.c 1
lib/zip_new.c 1
lib/zip_hash.c 8
lib/zip_source_open.c 1
lib/zip_source_close.c 1
lib/zip_source_accept_empty.c 1
lib/zip_source_tell.c 1
lib/zip_buffer.c 22
lib/zip_io_util.c 4
lib/zip_source_read.c 2
lib/zip_dirent.c 25
lib/zip_entry.c 2
lib/zip_unchange_data.c 1
lib/zip_source_free.c 1
lib/zip_source_rollback_write.c 1
lib/zip_source_window.c 6
lib/zip_string.c 8
lib/zip_extra_field.c 9
lib/zip_utf-8.c 4
lib/zip_realloc.c 1
lib/zip_memdup.c 1
lib/zip_discard.c 1
lib/zip_progress.c 7
lib/zip_source_layered.c 2
lib/zip_file_get_offset.c 2
lib/zip_source_pass_to_lower_layer.c 1
lib/zip_source_crc.c 2
ossfuzz/zip_read_fuzzer_common.h 1
lib/zip_error_strerror.c 1
lib/zip_set_default_password.c 1
lib/zip_get_num_entries.c 1
lib/zip_fopen_index.c 1
lib/zip_fopen_index_encrypted.c 2
lib/zip_source_zip_new.c 2
lib/zip_stat_index.c 1
lib/zip_get_name.c 2
lib/zip_source_buffer.c 11
lib/zip_get_encryption_implementation.c 1
lib/zip_source_compress.c 8
lib/zip_strerror.c 1
lib/zip_fread.c 1
lib/zip_fclose.c 1
lib/zip_close.c 8
lib/zip_source_remove.c 1
lib/zip_source_begin_write_cloning.c 1
lib/zip_source_begin_write.c 1
lib/zip_source_tell_write.c 1
lib/zip_source_get_dostime.c 1
lib/zip_source_write.c 1
lib/zip_source_seek_write.c 1
lib/zip_source_commit_write.c 1

Fuzzer: zip_write_encrypt_aes256_file_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 902 76.6%
gold [1:9] 0 0.0%
yellow [10:29] 1 0.08%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 274 23.2%
All colors 1177 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
151 338 _zip_ef_new call site: 00338 _zip_checkcons
70 267 zip_realloc call site: 00267 _zip_dirent_read
58 152 _zip_buffer_get call site: 00152 _zip_read_eocd64
42 224 _zip_entry_finalize call site: 00224 _zip_cdir_free
41 522 zip_source_layered_create call site: 00522 window_read
33 836 zip_close call site: 00836 zip_source_zip_file_create
30 94 zip_source_open call site: 00094 _zip_open
28 1092 add_data call site: 01092 _zip_dirent_write
25 126 zip_source_read call site: 00126 _zip_read_cdir
24 754 zip_file_extra_field_delete call site: 00754 _zip_read_local_ef
17 676 zip_source_buffer_with_attributes_create call site: 00676 zip_discard
17 968 _zip_dirent_write call site: 00968 _zip_ef_new

Runtime coverage analysis

Covered functions
166
Functions that are reachable but not covered
111
Reachable functions
240
Percentage of reachable functions covered
53.75%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
ossfuzz/zip_write_encrypt_aes256_file_fuzzer.c 1
lib/zip_open.c 18
lib/zip_error.c 10
lib/zip_source_file_stdio_named.c 1
lib/zip_source_file_common.c 3
lib/zip_stat_init.c 2
lib/zip_source_get_file_attributes.c 2
lib/zip_source_supports.c 3
lib/zip_source_function.c 3
lib/zip_source_seek.c 2
lib/zip_source_stat.c 1
lib/zip_source_error.c 1
lib/zip_source_call.c 1
lib/zip_new.c 1
lib/zip_hash.c 10
lib/zip_source_open.c 1
lib/zip_source_close.c 1
lib/zip_source_accept_empty.c 1
lib/zip_source_tell.c 1
lib/zip_buffer.c 22
lib/zip_io_util.c 4
lib/zip_source_read.c 2
lib/zip_dirent.c 25
lib/zip_entry.c 2
lib/zip_unchange_data.c 1
lib/zip_source_free.c 1
lib/zip_source_rollback_write.c 1
lib/zip_source_window.c 6
lib/zip_string.c 8
lib/zip_extra_field.c 11
lib/zip_utf-8.c 4
lib/zip_realloc.c 1
lib/zip_memdup.c 1
lib/zip_discard.c 1
lib/zip_progress.c 7
lib/zip_source_layered.c 2
lib/zip_file_get_offset.c 2
lib/zip_source_pass_to_lower_layer.c 1
lib/zip_source_crc.c 2
lib/zip_source_buffer.c 12
lib/zip_strerror.c 1
lib/zip_error_strerror.c 1
lib/zip_file_add.c 1
lib/zip_file_replace.c 1
lib/zip_name_locate.c 1
lib/zip_get_name.c 2
lib/zip_add_entry.c 1
lib/zip_set_name.c 1
lib/zip_extra_field_api.c 2
lib/zip_file_set_encryption.c 1
lib/zip_get_encryption_implementation.c 1
lib/zip_close.c 8
lib/zip_source_remove.c 1
lib/zip_source_begin_write_cloning.c 1
lib/zip_source_begin_write.c 1
lib/zip_source_tell_write.c 1
lib/zip_source_zip_new.c 2
lib/zip_stat_index.c 1
lib/zip_source_compress.c 8
lib/zip_source_get_dostime.c 1
lib/zip_source_write.c 1
lib/zip_source_seek_write.c 1
lib/zip_source_commit_write.c 1

Fuzzer: zip_read_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 593 54.6%
gold [1:9] 12 1.10%
yellow [10:29] 11 1.01%
greenyellow [30:49] 7 0.64%
lawngreen 50+ 463 42.6%
All colors 1086 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
264 820 zip_source_get_dos_time call site: 00820 write_cdir
57 762 zip_close call site: 00762 add_data
21 473 _zip_find_central_dir call site: 00473 _zip_dirent_read
15 419 _zip_dirent_read call site: 00419 _zip_buffer_new_from_source
10 61 read_data call site: 00061 buffer_write
9 31 zip_source_buffer_fragment_with_attributes_create call site: 00031 buffer_clone
8 14 buffer_grow_fragments call site: 00014 buffer_free
8 562 window_read call site: 00562 zip_source_seek
7 464 _zip_read_cdir call site: 00464 _zip_cdir_free
6 94 _zip_source_call call site: 00094 _zip_allocate_new
6 571 window_read call site: 00571 zip_source_pass_to_lower_layer
6 596 crc_read call site: 00596 zip_source_free

Runtime coverage analysis

Covered functions
190
Functions that are reachable but not covered
71
Reachable functions
228
Percentage of reachable functions covered
68.86%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
ossfuzz/zip_read_fuzzer.c 1
lib/zip_error.c 9
lib/zip_source_buffer.c 12
lib/zip_realloc.c 1
lib/zip_source_get_file_attributes.c 2
lib/zip_source_function.c 3
lib/zip_source_supports.c 3
lib/zip_source_seek.c 2
lib/zip_stat_init.c 2
lib/zip_open.c 16
lib/zip_source_stat.c 1
lib/zip_source_error.c 1
lib/zip_source_call.c 1
lib/zip_new.c 1
lib/zip_hash.c 8
lib/zip_source_open.c 1
lib/zip_source_close.c 1
lib/zip_source_accept_empty.c 1
lib/zip_source_tell.c 1
lib/zip_buffer.c 22
lib/zip_io_util.c 4
lib/zip_source_read.c 2
lib/zip_dirent.c 25
lib/zip_entry.c 2
lib/zip_unchange_data.c 1
lib/zip_source_free.c 1
lib/zip_source_rollback_write.c 1
lib/zip_source_window.c 6
lib/zip_string.c 8
lib/zip_extra_field.c 9
lib/zip_utf-8.c 4
lib/zip_memdup.c 1
lib/zip_discard.c 1
lib/zip_progress.c 7
lib/zip_source_layered.c 2
lib/zip_file_get_offset.c 2
lib/zip_source_pass_to_lower_layer.c 1
lib/zip_source_crc.c 2
ossfuzz/zip_read_fuzzer_common.h 1
lib/zip_error_strerror.c 1
lib/zip_set_default_password.c 1
lib/zip_get_num_entries.c 1
lib/zip_fopen_index.c 1
lib/zip_fopen_index_encrypted.c 2
lib/zip_source_zip_new.c 2
lib/zip_stat_index.c 1
lib/zip_get_name.c 2
lib/zip_get_encryption_implementation.c 1
lib/zip_source_compress.c 8
lib/zip_strerror.c 1
lib/zip_fread.c 1
lib/zip_fclose.c 1
lib/zip_close.c 8
lib/zip_source_remove.c 1
lib/zip_source_begin_write_cloning.c 1
lib/zip_source_begin_write.c 1
lib/zip_source_tell_write.c 1
lib/zip_source_get_dostime.c 1
lib/zip_source_write.c 1
lib/zip_source_seek_write.c 1
lib/zip_source_commit_write.c 1

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
zip_source_winzip_aes_encode /src/libzip/lib/zip_source_winzip_aes_encode.c 5 ['N/A', 'N/A', 'short', 'int', 'N/A'] 5 0 108 20 9 58 0 205 118
_zip_stdio_op_create_temp_output_cloning /src/libzip/lib/zip_source_file_stdio_named.c 2 ['N/A', 'size_t'] 4 0 222 21 10 23 0 69 51
zip_source_pkware_encode /src/libzip/lib/zip_source_pkware_encode.c 5 ['N/A', 'N/A', 'short', 'int', 'N/A'] 5 0 166 27 12 62 0 222 39
zip_source_winzip_aes_decode /src/libzip/lib/zip_source_winzip_aes_decode.c 5 ['N/A', 'N/A', 'short', 'int', 'N/A'] 6 0 193 32 14 54 0 199 39

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
82.0%
262 / 320
Cyclomatic complexity statically reachable by fuzzers
89.0%
2143 / 2408

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

ossfuzz/zip_write_encrypt_pkware_file_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['zip_realloc', '_zip_buffer_get', '_zip_entry_finalize', 'zip_source_layered_create', 'zip_close', 'zip_source_open', 'zip_source_read', 'zip_file_extra_field_delete', '_zip_dirent_write', 'zip_source_buffer_with_attributes_create']

ossfuzz/zip_read_file_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['zip_close', '_zip_find_central_dir', '_zip_dirent_read', 'read_data', 'zip_source_buffer_fragment_with_attributes_create', 'zip_source_file_create', 'window_read', '_zip_read_cdir', '_zip_source_call']

ossfuzz/zip_write_encrypt_aes256_file_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['_zip_ef_new', 'zip_realloc', '_zip_buffer_get', '_zip_entry_finalize', 'zip_source_layered_create', 'zip_close', 'zip_source_open', 'add_data', 'zip_source_read', 'zip_file_extra_field_delete']

ossfuzz/zip_read_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['zip_source_get_dos_time', 'zip_close', '_zip_find_central_dir', '_zip_dirent_read', 'read_data', 'zip_source_buffer_fragment_with_attributes_create', 'buffer_grow_fragments', 'window_read', '_zip_read_cdir', '_zip_source_call']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
zip_close 212 83 39.15% ['zip_read_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer']
add_data 253 126 49.80% ['zip_read_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer']
copy_source 43 17 39.53% ['zip_read_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer']
_zip_cdir_write 87 38 43.67% ['zip_read_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer']
_zip_dirent_write 223 109 48.87% ['zip_read_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer']
_zip_ef_delete_by_id 33 9 27.27% ['zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer']
_zip_read_local_ef 60 10 16.66% ['zip_read_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer']
zip_file_set_encryption 48 21 43.75% ['zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer']
_zip_name_locate 56 21 37.5% ['zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer']
_zip_set_name 103 41 39.80% ['zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer']
read_data 107 46 42.99% ['zip_read_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer']
zip_source_get_dos_time 31 16 51.61% ['zip_read_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer']
zip_source_pkware_encode 33 14 42.42% ['zip_write_encrypt_pkware_file_fuzzer']
window_read 153 71 46.40% ['zip_read_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer']
zip_stat_index 65 25 38.46% ['zip_read_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/libzip/lib/zip_algorithm_deflate.c [] []
/src/libzip/lib/zip_source_stat.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_get_num_entries.c ['zip_read_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_extra_field_api.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_source_rollback_write.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] []
/src/libzip/lib/zip_source_winzip_aes_decode.c [] []
/src/libzip/ossfuzz/zip_read_fuzzer.c ['zip_read_fuzzer'] ['zip_read_fuzzer']
/src/libzip/lib/zip_file_add.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_close.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_stat_index.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_random_unix.c [] []
/src/libzip/lib/zip_source_compress.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_buffer.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_open.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_fopen_index_encrypted.c ['zip_read_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_error.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_buffer.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_fread.c ['zip_read_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_file_set_encryption.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_string.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_get_name.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_error.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_free.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_error_strerror.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_file_stdio.c [] []
/src/libzip/lib/zip_source_supports.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_window.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_entry.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_pkware_decode.c [] []
/src/libzip/lib/zip_set_default_password.c ['zip_read_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_remove.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] []
/src/libzip/lib/zip_memdup.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_utf-8.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_pkware_encode.c [] []
/src/libzip/lib/zip_name_locate.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_file_replace.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_strerror.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_file_get_offset.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_io_util.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_add_entry.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_discard.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_hash.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_begin_write.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_progress.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_close.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_file_common.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_new.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_fopen_index.c ['zip_read_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_open.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/ossfuzz/zip_read_fuzzer_common.h ['zip_read_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_accept_empty.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] []
/src/libzip/lib/zip_source_tell_write.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_algorithm_zstd.c [] []
/src/libzip/lib/zip_pkware.c [] []
/src/libzip/lib/zip_source_get_dostime.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_winzip_aes.c [] []
/src/libzip/lib/zip_source_layered.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_pass_to_lower_layer.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] []
/src/libzip/lib/zip_crypto_openssl.c [] []
/src/libzip/ossfuzz/zip_write_encrypt_pkware_file_fuzzer.c ['zip_write_encrypt_pkware_file_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer']
/src/libzip/lib/zip_source_begin_write_cloning.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] []
/src/libzip/lib/zip_source_file_stdio_named.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_source_read.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_stat_init.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_call.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_seek_write.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_source_zip_new.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_function.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/ossfuzz/zip_write_encrypt_aes256_file_fuzzer.c ['zip_write_encrypt_aes256_file_fuzzer'] ['zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_source_write.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_dirent.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_seek.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/ossfuzz/zip_read_file_fuzzer.c ['zip_read_file_fuzzer'] ['zip_read_file_fuzzer']
/src/libzip/lib/zip_source_winzip_aes_encode.c [] []
/src/libzip/lib/zip_source_crc.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_unchange_data.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_get_encryption_implementation.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_extra_field.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_get_file_attributes.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_source_commit_write.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_source_tell.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_realloc.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_read_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer', 'zip_read_fuzzer']
/src/libzip/lib/zip_set_name.c ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer'] ['zip_write_encrypt_pkware_file_fuzzer', 'zip_write_encrypt_aes256_file_fuzzer']
/src/libzip/lib/zip_fclose.c ['zip_read_file_fuzzer', 'zip_read_fuzzer'] ['zip_read_file_fuzzer', 'zip_read_fuzzer']

Directories in report

Directory
/src/libzip/ossfuzz/
/src/libzip/lib/