The following nodes represent call sites where fuzz blockers occur.
| Amount of callsites blocked | Calltree index | Parent function | Callsite | Largest blocked function |
|---|---|---|---|---|
| 2 | 1 | ...model-transparency.tests.fuzzing.fuzz_sign_then_mutate_verify_with_valid_key.TestOneInput | call site: 00001 | tempfile.TemporaryDirectory |
...model-transparency.tests.fuzzing.fuzz_sign_then_mutate_verify_with_valid_key.TestOneInput
[function]
[call site]
00000
atheris.FuzzedDataProvider
[function]
[call site]
00001
tempfile.TemporaryDirectory
[function]
[call site]
00002
tempfile.TemporaryDirectory
[function]
[call site]
00003
pathlib.Path
[function]
[call site]
00004
utils.create_fuzz_files
[function]
[call site]
00005
utils.any_files
[function]
[call site]
00006
<builtin>.str
[function]
[call site]
00007
os.path.join
[function]
[call site]
00008
...model-transparency.tests.fuzzing.fuzz_sign_then_mutate_verify_with_valid_key._pick_key_spec
[function]
[call site]
00009
<builtin>.len
[function]
[call site]
00010
fdp.ConsumeIntInRange
[function]
[call site]
00011
utils._build_hashing_config_from_fdp
[function]
[call site]
00012
scfg.set_hashing_config
[function]
[call site]
00013
scfg.use_elliptic_key_signer
[function]
[call site]
00014
signer.sign
[function]
[call site]
00015
pathlib.Path.rglob
[function]
[call site]
00016
p.is_file
[function]
[call site]
00017
<builtin>.len
[function]
[call site]
00018
fdp.ConsumeIntInRange
[function]
[call site]
00019
target.read_bytes
[function]
[call site]
00020
fdp.ConsumeIntInRange
[function]
[call site]
00021
fdp.ConsumeBytes
[function]
[call site]
00022
target.relative_to
[function]
[call site]
00023
utils.safe_write
[function]
[call site]
00024
model_signing.verifying.Config
[function]
[call site]
00025
vcfg.set_hashing_config
[function]
[call site]
00026
vcfg.use_elliptic_key_verifier
[function]
[call site]
00027
verifier.verify
[function]
[call site]
00028