The following nodes represent call sites where fuzz blockers occur.
Amount of callsites blocked | Calltree index | Parent function | Callsite | Largest blocked function |
---|---|---|---|---|
7 | 30 | websockets.http11.read_body | call site: 00030 | websockets.http11.parse_line |
3 | 42 | websockets.http11.read_body | call site: 00042 | websockets.streams.StreamReader.read_exact |
2 | 17 | websockets.datastructures.Headers.update | call site: 00017 |
|
2 | 39 | websockets.streams.StreamReader.read_exact | call site: 00039 | websockets.http11.parse_headers |
1 | 46 | websockets.http11.read_body | call site: 00046 |
|
...inspector.light.source_files.src.websockets.fuzzing.fuzz_http11_response_parser.test_one_input
[function]
[call site]
00000
websockets.streams.StreamReader.__init__
[function]
[call site]
00001
<builtin>.bytearray
[function]
[call site]
00002
websockets.streams.StreamReader.feed_data
[function]
[call site]
00003
websockets.streams.StreamReader.feed_eof
[function]
[call site]
00004
websockets.http11.Response.parse
[function]
[call site]
00005
websockets.http11.parse_line
[function]
[call site]
00006
websockets.streams.StreamReader.read_line
[function]
[call site]
00007
<builtin>.len
[function]
[call site]
00008
line.endswith
[function]
[call site]
00009
status_line.split
[function]
[call site]
00010
<builtin>.int
[function]
[call site]
00011
_value_re.fullmatch
[function]
[call site]
00012
raw_reason.decode
[function]
[call site]
00013
websockets.http11.parse_headers
[function]
[call site]
00014
websockets.datastructures.Headers.__init__
[function]
[call site]
00015
websockets.datastructures.Headers.update
[function]
[call site]
00016
<builtin>.tuple
[function]
[call site]
00017
<builtin>.isinstance
[function]
[call site]
00018
arg.raw_items
[function]
[call site]
00019
<builtin>.super
[function]
[call site]
00020
<builtin>.range
[function]
[call site]
00021
websockets.http11.parse_line
[function]
[call site]
00022
line.split
[function]
[call site]
00023
_token_re.fullmatch
[function]
[call site]
00024
raw_value.strip
[function]
[call site]
00025
_value_re.fullmatch
[function]
[call site]
00026
raw_name.decode
[function]
[call site]
00027
raw_value.decode
[function]
[call site]
00028
websockets.http11.read_body
[function]
[call site]
00029
headers.get
[function]
[call site]
00030
websockets.http11.parse_line
[function]
[call site]
00031
chunk_size_line.split
[function]
[call site]
00032
<builtin>.len
[function]
[call site]
00033
raw_chunk_size.decode
[function]
[call site]
00034
<builtin>.int
[function]
[call site]
00035
<builtin>.len
[function]
[call site]
00036
websockets.streams.StreamReader.read_exact
[function]
[call site]
00037
<builtin>.len
[function]
[call site]
00038
<builtin>.len
[function]
[call site]
00039
websockets.streams.StreamReader.read_exact
[function]
[call site]
00040
websockets.http11.parse_headers
[function]
[call site]
00041
headers.get
[function]
[call site]
00042
<builtin>.len
[function]
[call site]
00043
<builtin>.int
[function]
[call site]
00044
websockets.streams.StreamReader.read_exact
[function]
[call site]
00045
websockets.streams.StreamReader.read_to_eof
[function]
[call site]
00046
<builtin>.len
[function]
[call site]
00047
<builtin>.next
[function]
[call site]
00048
<builtin>.isinstance
[function]
[call site]
00049