The following nodes represent call sites where fuzz blockers occur.
Amount of callsites blocked | Calltree index | Parent function | Callsite | Largest blocked function |
---|---|---|---|---|
2 | 15 | websockets.datastructures.Headers.update | call site: {node_id} |
|
...websockets.fuzzing.fuzz_http11_request_parser.test_one_input
[function]
[call site]
00000
websockets.streams.StreamReader.__init__
[function]
[call site]
00001
.bytearray
[function]
[call site]
00002
websockets.streams.StreamReader.feed_data
[function]
[call site]
00003
websockets.streams.StreamReader.feed_eof
[function]
[call site]
00004
websockets.http11.Request.parse
[function]
[call site]
00005
websockets.http11.parse_line
[function]
[call site]
00006
websockets.streams.StreamReader.read_line
[function]
[call site]
00007
.len
[function]
[call site]
00008
line.endswith
[function]
[call site]
00009
request_line.split
[function]
[call site]
00010
raw_path.decode
[function]
[call site]
00011
websockets.http11.parse_headers
[function]
[call site]
00012
websockets.datastructures.Headers.__init__
[function]
[call site]
00013
websockets.datastructures.Headers.update
[function]
[call site]
00014
.tuple
[function]
[call site]
00015
.isinstance
[function]
[call site]
00016
arg.raw_items
[function]
[call site]
00017
.super
[function]
[call site]
00018
.range
[function]
[call site]
00019
websockets.http11.parse_line
[function]
[call site]
00020
line.split
[function]
[call site]
00021
_token_re.fullmatch
[function]
[call site]
00022
raw_value.strip
[function]
[call site]
00023
_value_re.fullmatch
[function]
[call site]
00024
raw_name.decode
[function]
[call site]
00025
raw_value.decode
[function]
[call site]
00026
.next
[function]
[call site]
00027
.isinstance
[function]
[call site]
00028