The following nodes represent call sites where fuzz blockers occur.
Amount of callsites blocked | Calltree index | Parent function | Callsite | Largest blocked function |
---|---|---|---|---|
17 | 0 | EP | call site: 00000 | [net.lingala.zip4j.io.inputstream.ZipInputStream].getNextEntry() |
[Zip4jFuzzer].fuzzerTestOneInput(com.code_intelligence.jazzer.api.FuzzedDataProvider)
[function]
[call site]
00000
[com.code_intelligence.jazzer.api.FuzzedDataProvider].consumeRemainingAsBytes()
[function]
[call site]
00001
[java.io.ByteArrayInputStream].<init>(byte[])
[function]
[call site]
00002
[net.lingala.zip4j.io.inputstream.ZipInputStream].<init>(java.io.ByteArrayInputStream)
[function]
[call site]
00003
[net.lingala.zip4j.io.inputstream.ZipInputStream].getNextEntry()
[function]
[call site]
00004
[net.lingala.zip4j.io.inputstream.ZipInputStream].getNextEntry(null,boolean)
[function]
[call site]
00005
[net.lingala.zip4j.model.LocalFileHeader].isDirectory()
[function]
[call site]
00006
[net.lingala.zip4j.model.LocalFileHeader].isEncrypted()
[function]
[call site]
00007
[net.lingala.zip4j.model.LocalFileHeader].getAesExtraDataRecord()
[function]
[call site]
00008
[Zip4jFuzzer].getCompressionMethod()
[function]
[call site]
00009
[Zip4jFuzzer].getDataSize()
[function]
[call site]
00010
[net.lingala.zip4j.model.LocalFileHeader].getCompressionMethod()
[function]
[call site]
00011
[Zip4jFuzzer].getCode()
[function]
[call site]
00012
[net.lingala.zip4j.model.LocalFileHeader].getEncryptionMethod()
[function]
[call site]
00013
[net.lingala.zip4j.model.LocalFileHeader].getExtraDataRecords()
[function]
[call site]
00014
[net.lingala.zip4j.model.LocalFileHeader].getZip64ExtendedInfo()
[function]
[call site]
00015
[Zip4jFuzzer].getCompressedSize()
[function]
[call site]
00016
[Zip4jFuzzer].getUncompressedSize()
[function]
[call site]
00017