Fuzz introspector: fuzz_sign_with_valid_key_verify_with_invalid_key
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
6 1 ...model-transparency.tests.fuzzing.fuzz_sign_with_valid_key_verify_with_invalid_key.TestOneInput call site: 00001 fdp.ConsumeIntInRange
2 14 ...model-transparency.tests.fuzzing.fuzz_sign_with_valid_key_verify_with_invalid_key.TestOneInput call site: 00014 os.path.join
1 20 ...model-transparency.tests.fuzzing.fuzz_sign_with_valid_key_verify_with_invalid_key.TestOneInput call site: 00020 verifier.verify

Fuzzer calltree

0 ...model-transparency.tests.fuzzing.fuzz_sign_with_valid_key_verify_with_invalid_key.TestOneInput [function] [call site] 00000
1 atheris.FuzzedDataProvider [function] [call site] 00001
1 fdp.ConsumeIntInRange [function] [call site] 00002
1 fdp.ConsumeBytes [function] [call site] 00003
1 tempfile.TemporaryDirectory [function] [call site] 00004
1 tempfile.TemporaryDirectory [function] [call site] 00005
1 pathlib.Path [function] [call site] 00006
1 utils.create_fuzz_files [function] [call site] 00007
1 utils.any_files [function] [call site] 00008
1 <builtin>.str [function] [call site] 00009
1 os.path.join [function] [call site] 00010
1 utils._build_hashing_config_from_fdp [function] [call site] 00011
1 scfg.set_hashing_config [function] [call site] 00012
1 scfg.use_elliptic_key_signer [function] [call site] 00013
1 signer.sign [function] [call site] 00014
1 os.path.join [function] [call site] 00015
1 <builtin>.open [function] [call site] 00016
1 model_signing.verifying.Config [function] [call site] 00018
1 vcfg.set_hashing_config [function] [call site] 00019
1 vcfg.use_elliptic_key_verifier [function] [call site] 00020
1 verifier.verify [function] [call site] 00021