SYMBOL INDEX (6751 symbols across 1786 files) FILE: .clusterfuzzlite/coverage_atheris_fuzzer.py function TestOneInput (line 37) | def TestOneInput(data): function main (line 50) | def main(): FILE: infra/base-images/base-builder-go/gosigfuzz.c function fixSignalHandler (line 20) | static void fixSignalHandler(int signum) { function FixStackSignalHandler (line 31) | static void FixStackSignalHandler() { function LLVMFuzzerInitialize (line 44) | int LLVMFuzzerInitialize(int *argc, char ***argv) { FILE: infra/base-images/base-builder-go/ossfuzz_coverage_runner.go function TestFuzzCorpus (line 26) | func TestFuzzCorpus(t *testing.T) { FILE: infra/base-images/base-builder/bisect_clang.py function execute (line 27) | def execute(command, *args, expect_zero=True, **kwargs): function search_bisect_output (line 44) | def search_bisect_output(output): class GitRepo (line 53) | class GitRepo: method __init__ (line 56) | def __init__(self, repo_dir): method do_command (line 59) | def do_command(self, git_subcommand): method test_commit (line 64) | def test_commit(self, test_command): method bisect (line 77) | def bisect(self, good_commit, bad_commit, test_command): method bisect_start (line 86) | def bisect_start(self, good_commit, bad_commit, test_command): method do_bisect_command (line 93) | def do_bisect_command(self, subcommand): method test_start_commit (line 97) | def test_start_commit(self, commit, label, test_command): class BisectError (line 114) | class BisectError(Exception): function get_clang_build_env (line 118) | def get_clang_build_env(): function install_clang_build_deps (line 127) | def install_clang_build_deps(): function clone_with_retries (line 135) | def clone_with_retries(repo, local_path, num_retries=10): function get_clang_target_arch (line 150) | def get_clang_target_arch(): function prepare_build (line 160) | def prepare_build(llvm_project_path): function build_clang (line 178) | def build_clang(llvm_project_path): function find_culprit_commit (line 189) | def find_culprit_commit(test_command, good_commit, bad_commit): function main (line 202) | def main(): FILE: infra/base-images/base-builder/bisect_clang_test.py function get_git_command (line 27) | def get_git_command(*args): function patch_environ (line 32) | def patch_environ(testcase_obj): class BisectClangTestMixin (line 40) | class BisectClangTestMixin: # pylint: disable=too-few-public-methods method setUp (line 43) | def setUp(self): # pylint: disable=invalid-name class GetClangBuildEnvTest (line 50) | class GetClangBuildEnvTest(BisectClangTestMixin, unittest.TestCase): method test_cflags (line 53) | def test_cflags(self): method test_cxxflags (line 58) | def test_cxxflags(self): method test_other_variables (line 63) | def test_other_variables(self): function read_test_data (line 71) | def read_test_data(filename): class SearchBisectOutputTest (line 77) | class SearchBisectOutputTest(BisectClangTestMixin, unittest.TestCase): method test_search_bisect_output (line 80) | def test_search_bisect_output(self): method test_search_bisect_output_none (line 87) | def test_search_bisect_output_none(self): function create_mock_popen (line 93) | def create_mock_popen( function mock_prepare_build_impl (line 130) | def mock_prepare_build_impl(llvm_project_path): # pylint: disable=unuse... class BuildClangTest (line 135) | class BuildClangTest(BisectClangTestMixin, unittest.TestCase): method test_build_clang_test (line 138) | def test_build_clang_test(self): class GitRepoTest (line 148) | class GitRepoTest(BisectClangTestMixin, unittest.TestCase): method setUp (line 153) | def setUp(self): method test_do_command (line 160) | def test_do_command(self): method _test_test_start_commit_unexpected (line 169) | def _test_test_start_commit_unexpected(self, label, commit, returncode): method test_test_start_commit_bad_zero (line 183) | def test_test_start_commit_bad_zero(self): method test_test_start_commit_good_nonzero (line 188) | def test_test_start_commit_good_nonzero(self): method test_test_start_commit_good_zero (line 193) | def test_test_start_commit_good_zero(self): method _test_test_start_commit_expected (line 199) | def _test_test_start_commit_expected(self, label, commit, returncode, method test_test_start_commit_bad_nonzero (line 219) | def test_test_start_commit_bad_nonzero(self): method test_bisect_start (line 225) | def test_bisect_start(self, mock_test_start_commit): method test_do_bisect_command (line 237) | def test_do_bisect_command(self): method _test_test_commit (line 246) | def _test_test_commit(self, label, output, returncode, mock_build_clang): method test_test_commit_good (line 263) | def test_test_commit_good(self): method test_test_commit_bad (line 267) | def test_test_commit_bad(self): method test_test_commit_culprit (line 271) | def test_test_commit_culprit(self): class GetTargetArchToBuildTest (line 278) | class GetTargetArchToBuildTest(unittest.TestCase): method test_unrecognized (line 281) | def test_unrecognized(self): method test_recognized (line 288) | def test_recognized(self): FILE: infra/base-images/base-builder/detect_repo.py function main (line 36) | def main(): function get_dirs_to_search (line 74) | def get_dirs_to_search(src_dir, repo_name): function get_repo (line 93) | def get_repo(repo_path): function check_for_repo_name (line 110) | def check_for_repo_name(repo_path, expected_repo_name): function check_for_commit (line 131) | def check_for_commit(repo_path, commit): function execute (line 156) | def execute(command, location, check_result=False): FILE: infra/base-images/base-builder/detect_repo_test.py class TestCheckForRepoName (line 40) | class TestCheckForRepoName(unittest.TestCase): method test_go_get_style_url (line 46) | def test_go_get_style_url(self, _, __): method test_missing_git_and_slash_url (line 54) | def test_missing_git_and_slash_url(self, _, __): method test_normal_style_repo_url (line 62) | def test_normal_style_repo_url(self, _, __): class DetectRepoIntegrationTest (line 69) | class DetectRepoIntegrationTest(unittest.TestCase): method test_infer_main_repo_from_commit (line 72) | def test_infer_main_repo_from_commit(self): method test_infer_main_repo_from_name (line 84) | def test_infer_main_repo_from_name(self): method check_with_repo (line 92) | def check_with_repo(self, repo_origin, repo_name, tmp_dir, commit=None): FILE: infra/base-images/base-builder/indexer/clang_wrapper.py function _get_available_memory (line 80) | def _get_available_memory() -> int: function rewrite_argv0 (line 90) | def rewrite_argv0(argv: Sequence[str], clang_toolchain: str) -> list[str]: function execute (line 98) | def execute(argv: Sequence[str], clang_toolchain: str) -> None: function run (line 104) | def run(argv: Sequence[str], clang_toolchain: str) -> None: function sha256 (line 112) | def sha256(file: Path) -> str: function get_flag_value (line 122) | def get_flag_value(argv: Sequence[str], flag: str) -> str | None: function remove_flag_if_present (line 131) | def remove_flag_if_present(argv: Iterable[str], flag: str) -> list[str]: function remove_flag_and_value (line 135) | def remove_flag_and_value(argv: list[str], flag: str) -> list[str] | None: function parse_dependency_file (line 143) | def parse_dependency_file( function files_by_creation_time (line 176) | def files_by_creation_time(folder_path: Path) -> Sequence[Path]: function _wait_for_cdb_fragment (line 182) | def _wait_for_cdb_fragment(file: Path) -> Sequence[str]: function read_cdb_fragments (line 210) | def read_cdb_fragments(cdb_path: Path) -> Any: function _index_dir_path (line 229) | def _index_dir_path(output_file: Path) -> Path: function run_indexer (line 236) | def run_indexer( function check_fuzzing_engine_and_fix_argv (line 322) | def check_fuzzing_engine_and_fix_argv(argv: MutableSequence[str]) -> bool: function _has_disallowed_clang_flags (line 359) | def _has_disallowed_clang_flags(argv: Sequence[str]) -> bool: class FilteredCompileCommands (line 375) | class FilteredCompileCommands: function _filter_compile_commands (line 381) | def _filter_compile_commands( function _write_filter_log (line 425) | def _write_filter_log( function expand_rsp_file (line 445) | def expand_rsp_file(argv: Sequence[str]) -> list[str]: function force_optimization_flag (line 459) | def force_optimization_flag(argv: Sequence[str]) -> list[str]: function fix_coverage_flags (line 471) | def fix_coverage_flags( function _file_lock (line 494) | def _file_lock(lock_path: Path): function merge_incremental_cdb (line 506) | def merge_incremental_cdb(cdb_path: Path, merged_cdb_path: Path) -> None: function main (line 548) | def main(argv: list[str]) -> None: FILE: infra/base-images/base-builder/indexer/clang_wrapper_test.py class ClangWrapperTest (line 25) | class ClangWrapperTest(unittest.TestCase): method test_force_optimization_flag_no_optimization (line 27) | def test_force_optimization_flag_no_optimization(self): method test_force_optimization_flag (line 33) | def test_force_optimization_flag(self): method test_remove_invalid_coverage_flags (line 41) | def test_remove_invalid_coverage_flags(self): method test_merge_incremental_cdb (line 66) | def test_merge_incremental_cdb(self): method test_merge_incremental_cdb_duplicate_outputs (line 147) | def test_merge_incremental_cdb_duplicate_outputs(self): FILE: infra/base-images/base-builder/indexer/coverage.cc type CoverageData (line 30) | struct CoverageData { function IsStandardLibrary (line 40) | bool IsStandardLibrary(const char* file_path) { function WriteTrace (line 49) | void WriteTrace() { function pid_t (line 83) | pid_t GetTID() { return static_cast(syscall(SYS_gettid)); } function Init (line 85) | void Init() { function __sanitizer_cov_trace_pc_guard_init (line 98) | void __sanitizer_cov_trace_pc_guard_init(uint32_t* start, function __sanitizer_cov_trace_pc_guard (line 106) | void __sanitizer_cov_trace_pc_guard(uint32_t* guard) { FILE: infra/base-images/base-builder/indexer/dwarf_info.py class CompilationUnit (line 30) | class CompilationUnit: function get_all_compilation_units (line 50) | def get_all_compilation_units( function parse_clang_record_command_line_value (line 127) | def parse_clang_record_command_line_value(command: str) -> Sequence[str]: FILE: infra/base-images/base-builder/indexer/dwarf_info_diff.py function main (line 39) | def main(argv: Sequence[str]) -> None: FILE: infra/base-images/base-builder/indexer/fuzzing_engine.cc function LLVMFuzzerMutate (line 32) | size_t LLVMFuzzerMutate([[maybe_unused]] uint8_t* Data, function main (line 39) | int main(int argc, char* argv[]) { FILE: infra/base-images/base-builder/indexer/index_build.py class CompileSettings (line 85) | class CompileSettings: function read_compile_settings (line 91) | def read_compile_settings() -> CompileSettings: function write_compile_settings (line 99) | def write_compile_settings(compile_settings: CompileSettings) -> None: function set_env_vars (line 105) | def set_env_vars(coverage_flags: str): function set_up_wrapper_dir (line 127) | def set_up_wrapper_dir(): class BinaryMetadata (line 157) | class BinaryMetadata: function _get_build_id_from_elf_notes (line 164) | def _get_build_id_from_elf_notes(elf_file: Path, contents: bytes) -> str... function _get_clang_version (line 273) | def _get_clang_version(toolchain: Path) -> str: function get_build_id (line 282) | def get_build_id(elf_file: Path) -> str | None: function find_fuzzer_binaries (line 300) | def find_fuzzer_binaries(out_dir: Path, build_id: str) -> Sequence[Path]: function enumerate_build_targets (line 312) | def enumerate_build_targets( function copy_fuzzing_engine (line 384) | def copy_fuzzing_engine(fuzzing_engine: str) -> Path: function _get_latest_gcc_version (line 396) | def _get_latest_gcc_version() -> str: function build_project (line 416) | def build_project( function test_target (line 505) | def test_target( function set_interpreter (line 524) | def set_interpreter(target_path: Path, lib_mount_path: pathlib.PurePath): function set_target_rpath (line 536) | def set_target_rpath(binary_artifact: Path, lib_mount_path: pathlib.Pure... function copy_shared_libraries (line 549) | def copy_shared_libraries( function archive_target (line 614) | def archive_target(target: BinaryMetadata, file_extension: str) -> Path ... function test_and_archive (line 688) | def test_and_archive( function clear_out (line 720) | def clear_out(): function main (line 729) | def main(): FILE: infra/base-images/base-builder/indexer/index_build_test.py class IndexBuildTest (line 38) | class IndexBuildTest(unittest.TestCase): method _build_project (line 40) | def _build_project( method _check_archive (line 79) | def _check_archive(self, archive_path: pathlib.Path): method test_basic_build (line 125) | def test_basic_build(self): method test_build_with_target_allowlist (line 133) | def test_build_with_target_allowlist(self): FILE: infra/base-images/base-builder/indexer/manifest_types.py class RepositoryType (line 69) | class RepositoryType(enum.StrEnum): class SourceRef (line 78) | class SourceRef: method from_dict (line 92) | def from_dict(cls, data: dict[str, Any]) -> Self: class Reproducibility (line 100) | class Reproducibility: method from_dict (line 110) | def from_dict(cls, data: dict[str, Any]) -> Self: class BinaryConfigKind (line 118) | class BinaryConfigKind(enum.StrEnum): method validate_in (line 124) | def validate_in(self, options: list[Self]): class BinaryConfig (line 133) | class BinaryConfig: method uses_stdin (line 146) | def uses_stdin(self) -> bool: method from_dict (line 152) | def from_dict(cls, config_dict: Mapping[str, Any]) -> Self: method to_dict (line 171) | def to_dict(self) -> dict[str, Any]: class HarnessKind (line 176) | class HarnessKind(enum.StrEnum): class CommandLineBinaryConfig (line 186) | class CommandLineBinaryConfig(BinaryConfig): method uses_stdin (line 201) | def uses_stdin(self) -> bool: method from_dict (line 206) | def from_dict(cls, config_dict: Mapping[str, Any]) -> Self: function _get_sqlite_db_user_version (line 229) | def _get_sqlite_db_user_version(sqlite_db_path: pathlib.Path) -> int: class Manifest (line 250) | class Manifest: method from_dict (line 289) | def from_dict(cls, data: dict[str, Any]) -> Self: method to_dict (line 337) | def to_dict(self) -> dict[str, Any]: method validate (line 349) | def validate(self) -> None: method save_build (line 400) | def save_build( function report_missing_source_files (line 507) | def report_missing_source_files( function _get_comparable_path (line 530) | def _get_comparable_path(path: str) -> tuple[str, str]: function get_covered_files (line 534) | def get_covered_files(target: str) -> Sequence[str]: function _get_mapped (line 555) | def _get_mapped( function source_map_from_dict (line 565) | def source_map_from_dict(data: dict[str, Any]) -> dict[pathlib.Path, Sou... function source_map_to_dict (line 570) | def source_map_to_dict( function _add_string_to_tar (line 577) | def _add_string_to_tar(tar: tarfile.TarFile, name: str, data: str) -> None: function _is_elf (line 586) | def _is_elf(path: pathlib.PurePath) -> bool: function parse_env (line 596) | def parse_env(env_list: list[str]) -> dict[str, str]: FILE: infra/base-images/base-builder/indexer/utils.py class SharedLibrary (line 40) | class SharedLibrary: function _parse_ld_trace_output (line 47) | def _parse_ld_trace_output( class CommandRunner (line 80) | class CommandRunner(Protocol): method __call__ (line 83) | def __call__( function run_subprocess (line 91) | def run_subprocess( function get_shared_libraries (line 103) | def get_shared_libraries( function copy_shared_libraries (line 117) | def copy_shared_libraries( function patch_binary_rpath_and_interpreter (line 130) | def patch_binary_rpath_and_interpreter( function get_library_mount_path (line 158) | def get_library_mount_path(binary_id: str) -> pathlib.Path: function report_progress (line 162) | def report_progress(stage: str, is_done: bool = False) -> None: FILE: infra/base-images/base-builder/jcc/jcc.go function ExecBuildCommand (line 26) | func ExecBuildCommand(bin string, args []string) (int, string, string) { function Compile (line 37) | func Compile(bin string, args []string) (int, string, string) { function AppendStringToFile (line 42) | func AppendStringToFile(filepath, new_content string) error { function WriteStdErrOut (line 54) | func WriteStdErrOut(args []string, outstr string, errstr string) { function main (line 62) | func main() { FILE: infra/base-images/base-builder/jcc/jcc2.go function CopyFile (line 35) | func CopyFile(src string, dst string) { function TryFixCCompilation (line 46) | func TryFixCCompilation(cmdline []string) ([]string, int, string, string) { function ExtractMissingHeader (line 81) | func ExtractMissingHeader(compilerOutput string) (string, bool) { function ReplaceMissingHeaderInFile (line 90) | func ReplaceMissingHeaderInFile(srcFilename, curHeader, replacementHeade... function ReplaceMissingHeader (line 109) | func ReplaceMissingHeader(src, curHeader, replacementHeader string) stri... function GetHeaderCorrectedFilename (line 115) | func GetHeaderCorrectedFilename(compilerErr string) (string, string, boo... function GetHeaderCorrectedCmd (line 128) | func GetHeaderCorrectedCmd(cmd []string, compilerErr string) ([]string, ... function CorrectMissingHeaders (line 153) | func CorrectMissingHeaders(bin string, cmd []string) ([]string, bool, er... function ExecBuildCommand (line 172) | func ExecBuildCommand(bin string, args []string) (int, string, string) { function Compile (line 183) | func Compile(bin string, args []string) (int, string, string) { function TryCompileAndFixHeadersOnce (line 188) | func TryCompileAndFixHeadersOnce(bin string, cmd []string, filename stri... function FindMissingHeader (line 212) | func FindMissingHeader(missingHeader string) (string, bool) { function CppifyHeaderIncludesFromFile (line 242) | func CppifyHeaderIncludesFromFile(srcFile string) error { function CppifyHeaderIncludes (line 257) | func CppifyHeaderIncludes(contents string) (string, error) { function AppendStringToFile (line 285) | func AppendStringToFile(filepath, new_content string) error { function WriteStdErrOut (line 297) | func WriteStdErrOut(args []string, outstr string, errstr string) { function main (line 305) | func main() { type BuildCommand (line 341) | type BuildCommand struct function WriteTargetArgsAndCommitImage (line 346) | func WriteTargetArgsAndCommitImage(cmdline []string) { function IsCompilingTarget (line 369) | func IsCompilingTarget(cmdline []string) bool { function parseCommand (line 383) | func parseCommand(command string) (string, []string) { function unfreeze (line 390) | func unfreeze() { FILE: infra/base-images/base-builder/jcc/jcc_test.go function TestExtractMissingHeader (line 10) | func TestExtractMissingHeader(t *testing.T) { function TestGetHeaderCorrectedFilename (line 27) | func TestGetHeaderCorrectedFilename(t *testing.T) { function TestFindMissingHeader (line 43) | func TestFindMissingHeader(t *testing.T) { function TestCorrectMissingHeaders (line 54) | func TestCorrectMissingHeaders(t *testing.T) { function TestGetHeaderCorrectedCmd (line 66) | func TestGetHeaderCorrectedCmd(t *testing.T) { function TestCppifyHeaderIncludes (line 84) | func TestCppifyHeaderIncludes(t *testing.T) { function TestCppifyHeaderIncludesShouldnt (line 114) | func TestCppifyHeaderIncludesShouldnt(t *testing.T) { function TestCppifyHeaderIncludesAlready (line 129) | func TestCppifyHeaderIncludesAlready(t *testing.T) { function TestExtractMissingHeaderNonHeaderFailure (line 146) | func TestExtractMissingHeaderNonHeaderFailure(t *testing.T) { function TestReplaceMissingHeader (line 156) | func TestReplaceMissingHeader(t *testing.T) { FILE: infra/base-images/base-builder/jcc/testdata/cfile.c function main (line 16) | int main() { FILE: infra/base-images/base-builder/jcc/testdata/cpp.cc function main (line 16) | int main() { FILE: infra/base-images/base-builder/make_build_replayable.py function create_wrapper (line 36) | def create_wrapper(contents: str): function main (line 40) | def main(): FILE: infra/base-images/base-builder/ossfuzz_coverage_runner.go function TestFuzzCorpus (line 24) | func TestFuzzCorpus(t *testing.T) { FILE: infra/base-images/base-builder/python_coverage_helper.py function get_all_files_from_toc (line 25) | def get_all_files_from_toc(toc_file, file_path_set): function create_file_structure_from_tocs (line 73) | def create_file_structure_from_tocs(work_path, out_path): function main (line 106) | def main(): FILE: infra/base-images/base-builder/sanitizers/pysecsan/pysecsan/command_injection.py function get_all_substr_prefixes (line 22) | def get_all_substr_prefixes(main_str, sub_str): function check_code_injection_match (line 36) | def check_code_injection_match(elem, check_unquoted=False) -> Optional[s... function hook_pre_exec_subprocess_Popen (line 57) | def hook_pre_exec_subprocess_Popen(cmd, **kwargs): function hook_pre_exec_os_system (line 93) | def hook_pre_exec_os_system(cmd): function hook_pre_exec_eval (line 101) | def hook_pre_exec_eval(cmd, *args, **kwargs): FILE: infra/base-images/base-builder/sanitizers/pysecsan/pysecsan/redos.py function hook_post_exec_re_pattern_findall (line 47) | def hook_post_exec_re_pattern_findall(self, re_str): function hook_pre_exec_re_pattern_findall (line 62) | def hook_pre_exec_re_pattern_findall(self, string): function hook_post_exec_re_compile (line 69) | def hook_post_exec_re_compile(retval, pattern, flags=None): function hook_pre_exec_re_compile (line 80) | def hook_pre_exec_re_compile(pattern, flags=None): FILE: infra/base-images/base-builder/sanitizers/pysecsan/pysecsan/sanlib.py function sanitizer_log (line 39) | def sanitizer_log(msg, log_level, force=False, log_prefix=True): function sanitizer_log_always (line 49) | def sanitizer_log_always(msg, log_prefix=True): function is_module_present (line 54) | def is_module_present(mod_name): function _log_bug (line 60) | def _log_bug(bug_title): function abort_with_issue (line 65) | def abort_with_issue(msg, bug_title): function is_exact_taint (line 92) | def is_exact_taint(stream) -> bool: function create_object_wrapper (line 102) | def create_object_wrapper(**methods): function add_hook (line 162) | def add_hook(function: Callable[[Any], Any], function add_hooks (line 202) | def add_hooks(): FILE: infra/base-images/base-builder/sanitizers/pysecsan/pysecsan/yaml_deserialization.py function hook_pre_exec_pyyaml_load (line 27) | def hook_pre_exec_pyyaml_load(stream, loader): FILE: infra/base-images/base-builder/sanitizers/pysecsan/tests/eval_command_injection.py function list_files_perhaps (line 25) | def list_files_perhaps(param, magicval): function test_one_input (line 36) | def test_one_input(data): function main (line 43) | def main(): FILE: infra/base-images/base-builder/sanitizers/pysecsan/tests/os_command_injection.py function list_files_perhaps (line 23) | def list_files_perhaps(param, magicval): function test_one_input (line 35) | def test_one_input(data): function main (line 42) | def main(): FILE: infra/base-images/base-builder/sanitizers/pysecsan/tests/poe/ansible-runner-cve-2021-4041/fuzz_ansible_runner.py function test_one_input (line 27) | def test_one_input(data): function main (line 56) | def main(): FILE: infra/base-images/base-builder/sanitizers/pysecsan/tests/poe/libvcs-cve-2022-21187/fuzz_libvcs.py function test_one_input (line 25) | def test_one_input(data): function main (line 37) | def main(): FILE: infra/base-images/base-builder/sanitizers/pysecsan/tests/poe/python-ldap-GHSL-2021-117/fuzz_ldap.py function test_one_input (line 25) | def test_one_input(data): function main (line 34) | def main(): FILE: infra/base-images/base-builder/sanitizers/pysecsan/tests/poe/pytorch-lightning-1.5.10/fuzz_pytorch_lightning.py function prepare_fuzzing_input (line 37) | def prepare_fuzzing_input(data): function exploit_target (line 44) | def exploit_target(env_value, env_name): function TestOneInput (line 54) | def TestOneInput(data): # pylint: disable=invalid-name function main (line 60) | def main(): FILE: infra/base-images/base-builder/sanitizers/pysecsan/tests/subprocess_popen_injection.py function list_files_perhaps (line 23) | def list_files_perhaps(param): function test_one_input (line 31) | def test_one_input(data): function main (line 41) | def main(): FILE: infra/base-images/base-builder/sanitizers/pysecsan/tests/yaml_deserialization_general.py function serialize_with_tainted_data (line 23) | def serialize_with_tainted_data(param): function test_one_input (line 31) | def test_one_input(data): function main (line 37) | def main(): FILE: infra/base-images/base-builder/sanitizers/pysecsan/tests/yaml_deserialization_simple.py function serialize_with_tainted_data (line 23) | def serialize_with_tainted_data(param, magicval): function test_one_input (line 37) | def test_one_input(data): function main (line 44) | def main(): FILE: infra/base-images/base-builder/unshallow_repos.py function main (line 25) | def main(): function _normalize_repo (line 45) | def _normalize_repo(repo: str) -> str: function _is_shallow_repo (line 49) | def _is_shallow_repo(directory: pathlib.Path): FILE: infra/base-images/base-builder/write_labels.py function main (line 22) | def main(): FILE: infra/base-images/base-runner/generate_differential_cov_report.py class ProfData (line 28) | class ProfData: method __init__ (line 31) | def __init__(self, text): method to_string (line 38) | def to_string(self): method find_function (line 43) | def find_function(self, function, idx=None): method subtract (line 57) | def subtract(self, subtrahend): class FunctionProf (line 64) | class FunctionProf: method __init__ (line 70) | def __init__(self, text): method to_string (line 81) | def to_string(self): method subtract (line 93) | def subtract(self, subtrahend_prof): function get_profdata_files (line 105) | def get_profdata_files(directory): function convert_profdata_to_text (line 115) | def convert_profdata_to_text(profdata): function convert_text_profdata_to_bin (line 129) | def convert_text_profdata_to_bin(profdata_text): function get_difference (line 144) | def get_difference(minuend_filename, subtrahend_filename): function profdatas_to_objects (line 157) | def profdatas_to_objects(profdatas): function generate_differential_cov_reports (line 164) | def generate_differential_cov_reports(minuend_profdatas, subtrahend_prof... function generate_html_report (line 191) | def generate_html_report(profdata, objects, directory): function main (line 210) | def main(): FILE: infra/base-images/base-runner/gocoverage/gocovmerge/gocovmerge.go function mergeProfiles (line 16) | func mergeProfiles(p *cover.Profile, merge *cover.Profile) { function mergeProfileBlock (line 28) | func mergeProfileBlock(p *cover.Profile, pb cover.ProfileBlock, startInd... function addProfile (line 71) | func addProfile(profiles []*cover.Profile, p *cover.Profile) []*cover.Pr... function dumpProfiles (line 83) | func dumpProfiles(profiles []*cover.Profile, out io.Writer) { function main (line 95) | func main() { FILE: infra/base-images/base-runner/gocoverage/gocovsum/gocovsum.go type CoverageTotal (line 30) | type CoverageTotal struct type CoverageTotals (line 37) | type CoverageTotals struct type CoverageFile (line 45) | type CoverageFile struct type CoverageData (line 50) | type CoverageData struct type PositionInterval (line 55) | type PositionInterval struct type CoverageSummary (line 60) | type CoverageSummary struct function isFunctionCovered (line 66) | func isFunctionCovered(s token.Position, e token.Position, blocks []cove... function computePercent (line 77) | func computePercent(s *CoverageTotals) { function main (line 89) | func main() { FILE: infra/base-images/base-runner/gocoverage/pprof-merge/main.go function main (line 29) | func main() { FILE: infra/base-images/base-runner/jacoco_report_converter.py function convert (line 25) | def convert(xml): function list_src_files (line 75) | def list_src_files(): function is_fuzzer_class (line 90) | def is_fuzzer_class(class_element): function relative_to_src_path (line 99) | def relative_to_src_path(src_files, canonical_path): function make_element_summary (line 110) | def make_element_summary(element): function make_counter_summary (line 139) | def make_counter_summary(counter_element, covered_adjustment=0): function main (line 157) | def main(): FILE: infra/base-images/base-runner/nyc_report_converter.py function convert (line 23) | def convert(nyc_json_summary): function file_summary (line 43) | def file_summary(nyc_file_summary): function element_summary (line 52) | def element_summary(element): function main (line 63) | def main(): FILE: infra/base-images/base-runner/parse_options.py function parse_options (line 22) | def parse_options(options_file_path, options_section): function main (line 43) | def main(): FILE: infra/base-images/base-runner/profraw_update.py function relativize_address (line 34) | def relativize_address(data, offset, databegin, sect_prf_cnts, sect_prf_... function upgrade (line 49) | def upgrade(data, sect_prf_cnts, sect_prf_data): function main (line 133) | def main(): FILE: infra/base-images/base-runner/python_coverage_runner_help.py function should_exclude_file (line 28) | def should_exclude_file(filepath): function translate_lines (line 46) | def translate_lines(cov_data, new_cov_data, all_file_paths): function translate_coverage (line 69) | def translate_coverage(all_file_paths): function convert_coveragepy_cov_to_summary_json (line 83) | def convert_coveragepy_cov_to_summary_json(src, dst): function main (line 156) | def main(): FILE: infra/base-images/base-runner/test_all.py function move_directory_contents (line 40) | def move_directory_contents(src_directory, dst_directory): function is_elf (line 54) | def is_elf(filepath): function is_shell_script (line 62) | def is_shell_script(filepath): function find_fuzz_targets (line 70) | def find_fuzz_targets(directory): function do_bad_build_check (line 101) | def do_bad_build_check(fuzz_target): function get_broken_fuzz_targets (line 125) | def get_broken_fuzz_targets(bad_build_results, fuzz_targets): function has_ignored_targets (line 136) | def has_ignored_targets(out_dir): function use_different_out_dir (line 147) | def use_different_out_dir(): function test_all_outside_out (line 172) | def test_all_outside_out(allowed_broken_targets_percentage): function centipede_needs_auxiliaries (line 178) | def centipede_needs_auxiliaries(): function find_centipede_auxiliary (line 196) | def find_centipede_auxiliary(main_fuzz_target_path): function test_all (line 218) | def test_all(out, allowed_broken_targets_percentage): # pylint: disable... function get_allowed_broken_targets_percentage (line 278) | def get_allowed_broken_targets_percentage(): function main (line 285) | def main(): FILE: infra/base-images/base-runner/test_all_test.py class TestTestAll (line 23) | class TestTestAll(unittest.TestCase): method test_test_all_no_fuzz_targets (line 28) | def test_test_all_no_fuzz_targets(self, mock_print, _): FILE: infra/base-images/base-runner/test_one.py function test_one (line 24) | def test_one(fuzz_target): function main (line 35) | def main(): FILE: infra/bisector.py class BisectError (line 59) | class BisectError(Exception): method __init__ (line 62) | def __init__(self, message, repo_url): function main (line 67) | def main(): function _get_dedup_token (line 125) | def _get_dedup_token(output): function _check_for_crash (line 137) | def _check_for_crash(project_name, fuzz_target, testcase_path): function _bisect (line 177) | def _bisect(bisect_type, old_commit, new_commit, testcase_path, fuzz_tar... function bisect (line 287) | def bisect(bisect_type, old_commit, new_commit, testcase_path, fuzz_target, FILE: infra/bisector_test.py class BisectIntegrationTests (line 33) | class BisectIntegrationTests(unittest.TestCase): method test_bisect_invalid_repo (line 38) | def test_bisect_invalid_repo(self): method test_bisect (line 51) | def test_bisect(self): FILE: infra/build/build_status/fuzz_introspector_page_gen.py function refine_percentage_string (line 205) | def refine_percentage_string(percentage_string): function fetch_fuzz_introspector_summary (line 227) | def fetch_fuzz_introspector_summary(report_url): function get_fuzzer_introspector_project_summary (line 269) | def get_fuzzer_introspector_project_summary(report_url): function get_fuzz_introspector_row (line 282) | def get_fuzz_introspector_row(project, report_url): function create_introspector_overview_table (line 293) | def create_introspector_overview_table(fuzz_introspector_index): function get_fuzz_introspector_html_page (line 302) | def get_fuzz_introspector_html_page(fuzz_introspector_index): FILE: infra/build/build_status/update_build_status.py function get_storage_client (line 59) | def get_storage_client(): function is_build_successful (line 68) | def is_build_successful(build_obj): function upload_status (line 73) | def upload_status(data, status_filename): function sort_projects (line 81) | def sort_projects(projects): function update_last_successful_build (line 98) | def update_last_successful_build(project, build_tag): class BuildGetter (line 125) | class BuildGetter: # pylint: disable=too-few-public-methods method __init__ (line 131) | def __init__(self): method _swap_cloudbuild_order_once (line 146) | def _swap_cloudbuild_order_once(self): method get_build (line 155) | def get_build(self, build_id): function get_build_history (line 168) | def get_build_history(build_ids): function _get_main_repo (line 207) | def _get_main_repo(project_name): function update_build_status (line 219) | def update_build_status(build_tag, status_filename): function update_build_badges (line 250) | def update_build_badges(project, last_build_successful, function upload_log (line 279) | def upload_log(build_id): function load_status_from_gcs (line 298) | def load_status_from_gcs(filename): function update_badges (line 311) | def update_badges(): function upload_index (line 334) | def upload_index(json_index, html_string): function generate_introspector_index (line 348) | def generate_introspector_index(): function main (line 377) | def main(): FILE: infra/build/build_status/update_build_status_test.py class MockGetBuild (line 35) | class MockGetBuild: method __init__ (line 38) | def __init__(self, builds): method get_build (line 41) | def get_build(self, build_id): class TestGetBuildHistory (line 53) | class TestGetBuildHistory(unittest.TestCase): method test_get_build_history (line 56) | def test_get_build_history(self, mock_upload_log, mock_cloud_build, method test_get_build_history_no_last_success (line 79) | def test_get_build_history_no_last_success(self, mock_upload_log, class TestSortProjects (line 100) | class TestSortProjects(unittest.TestCase): method test_sort_projects (line 103) | def test_sort_projects(self): class TestUpdateLastSuccessfulBuild (line 124) | class TestUpdateLastSuccessfulBuild(unittest.TestCase): method setUpClass (line 128) | def setUpClass(cls): method setUp (line 134) | def setUp(self): method test_update_last_successful_build_new (line 137) | def test_update_last_successful_build_new(self): method test_update_last_successful_build_datastore (line 154) | def test_update_last_successful_build_datastore(self): method test_update_last_successful_build (line 174) | def test_update_last_successful_build(self): method tearDownClass (line 198) | def tearDownClass(cls): class TestUpdateBuildStatus (line 202) | class TestUpdateBuildStatus(unittest.TestCase): method setUpClass (line 206) | def setUpClass(cls): method setUp (line 212) | def setUp(self): method test_update_build_status (line 219) | def test_update_build_status(self, mock_upload_log, mock_cloud_build, method tearDownClass (line 303) | def tearDownClass(cls): FILE: infra/build/functions/base_images.py class ImageConfig (line 68) | class ImageConfig: method __init__ (line 76) | def __init__(self, method _get_default_path (line 87) | def _get_default_path(self) -> str: method _resolve_dockerfile (line 93) | def _resolve_dockerfile(self) -> str: method final_tag (line 110) | def final_tag(self) -> str: method full_image_name_with_tag (line 118) | def full_image_name_with_tag(self) -> str: function get_base_image_steps (line 172) | def get_base_image_steps(images: Sequence[ImageConfig]) -> list[dict]: function run_build (line 205) | def run_build(steps: list[dict], function get_images_architecture_manifest_steps (line 266) | def get_images_architecture_manifest_steps(target_tag: str) -> list[dict]: function get_image_push_architecture_manifest_steps (line 281) | def get_image_push_architecture_manifest_steps(image: str, function base_builder (line 335) | def base_builder(event, context, dry_run: bool = False, no_push: bool = ... FILE: infra/build/functions/build_and_push_test_images.py function push_image (line 45) | def push_image(tag): function build_and_push_image (line 53) | def build_and_push_image(image, test_image_tag, version='legacy'): function build_image (line 62) | def build_image(image, tags, cache_from_tag, version='latest'): function _run_cloudbuild (line 79) | def _run_cloudbuild(build_body): function wait_for_build_and_report_summary (line 97) | def wait_for_build_and_report_summary(build_id, cloud_project='oss-fuzz-... function get_image_tags (line 176) | def get_image_tags(image: str, function gcb_build_and_push_images (line 193) | def gcb_build_and_push_images(test_image_tag: str, version_tag: str = No... function build_and_push_images (line 282) | def build_and_push_images(test_image_tag, version_tag=None): function main (line 324) | def main(): FILE: infra/build/functions/build_and_run_coverage.py class Bucket (line 52) | class Bucket: # pylint: disable=too-few-public-methods method __init__ (line 56) | def __init__(self, project, date, platform, testing): method get_upload_url (line 68) | def get_upload_url(self, upload_type): class CoverageBucket (line 74) | class CoverageBucket(Bucket): # pylint: disable=too-few-public-methods class IntrospectorBucket (line 79) | class IntrospectorBucket(Bucket): # pylint: disable=too-few-public-methods function get_build_steps (line 84) | def get_build_steps( # pylint: disable=too-many-locals, too-many-arguments function get_fuzz_introspector_steps (line 269) | def get_fuzz_introspector_steps( # pylint: disable=too-many-locals, too... function main (line 339) | def main(): FILE: infra/build/functions/build_and_run_coverage_test.py class TestRequestCoverageBuilds (line 36) | class TestRequestCoverageBuilds(fake_filesystem_unittest.TestCase): method setUp (line 39) | def setUp(self): method test_get_coverage_build_steps (line 52) | def test_get_coverage_build_steps(self, mock_url, mock_corpora_steps, FILE: infra/build/functions/build_lib.py class SignedPolicyDocument (line 71) | class SignedPolicyDocument: function get_targets_list_filename (line 127) | def get_targets_list_filename(sanitizer): function get_targets_list_url (line 132) | def get_targets_list_url(bucket, project, sanitizer): function dockerify_run_step (line 139) | def dockerify_run_step(step, function get_upload_bucket (line 170) | def get_upload_bucket(engine, architecture, testing): function _get_targets_list (line 181) | def _get_targets_list(project_name): function _sign_client_id (line 201) | def _sign_client_id(): function _sign_blob (line 213) | def _sign_blob(blob): function get_signed_policy_document_upload_prefix (line 241) | def get_signed_policy_document_upload_prefix(bucket, path_prefix): function get_signed_url (line 282) | def get_signed_url(path, method='PUT', content_type=''): function _normalized_name (line 296) | def _normalized_name(name): function download_corpora_steps (line 303) | def download_corpora_steps(project_name, test_image_suffix): function download_coverage_data_steps (line 343) | def download_coverage_data_steps(project_name, function http_upload_step (line 378) | def http_upload_step(data, signed_url, content_type): function signed_policy_document_curl_args (line 396) | def signed_policy_document_curl_args(doc: SignedPolicyDocument): function upload_using_signed_policy_document (line 412) | def upload_using_signed_policy_document(file_path, upload_path, function gsutil_rm_rf_step (line 430) | def gsutil_rm_rf_step(url): function get_pull_test_images_steps (line 443) | def get_pull_test_images_steps(test_image_suffix): function get_srcmap_step_id (line 485) | def get_srcmap_step_id(): function get_git_clone_step (line 490) | def get_git_clone_step(repo_url='https://github.com/google/oss-fuzz.git', function _make_image_name_architecture_specific (line 504) | def _make_image_name_architecture_specific(image_name, architecture): function get_unique_build_step_image_id (line 509) | def get_unique_build_step_image_id(): function get_docker_build_step (line 513) | def get_docker_build_step(image_names, function has_arm_build (line 575) | def has_arm_build(architectures): function get_srcmap_steps (line 580) | def get_srcmap_steps(image, language, directory='/workspace'): function get_project_image_steps (line 596) | def get_project_image_steps( # pylint: disable=too-many-arguments function _get_unsafe_name (line 668) | def _get_unsafe_name(name): function get_logs_url (line 672) | def get_logs_url(build_id): function get_gcb_url (line 678) | def get_gcb_url(build_id, cloud_project='oss-fuzz'): function get_build_info_lines (line 685) | def get_build_info_lines(build_id, cloud_project='oss-fuzz'): function get_runner_image_name (line 696) | def get_runner_image_name(test_image_suffix=None, base_image_tag=None): function get_build_body (line 717) | def get_build_body( # pylint: disable=too-many-arguments function _tgz_local_build (line 755) | def _tgz_local_build(oss_fuzz_project, temp_tgz_path): function run_build (line 765) | def run_build( # pylint: disable=too-many-arguments, too-many-locals function wait_for_build (line 814) | def wait_for_build(build_id, credentials, cloud_project): function cancel_build (line 836) | def cancel_build(build_id, credentials, cloud_project): FILE: infra/build/functions/build_project.py class Config (line 73) | class Config: class Build (line 103) | class Build: # pylint: disable=too-few-public-methods method __init__ (line 106) | def __init__(self, fuzzing_engine, sanitizer, architecture): method is_arm (line 114) | def is_arm(self): method out (line 119) | def out(self): function get_project_data (line 126) | def get_project_data(project_name): function get_sanitizer_strings (line 144) | def get_sanitizer_strings(sanitizers): function set_default_sanitizer_for_centipede (line 157) | def set_default_sanitizer_for_centipede(project_yaml): class Project (line 165) | class Project: # pylint: disable=too-many-instance-attributes method __init__ (line 168) | def __init__(self, name, project_yaml, dockerfile): method sanitizers (line 200) | def sanitizers(self): method image (line 206) | def image(self): method cached_image (line 211) | def cached_image(self): function get_last_step_id (line 216) | def get_last_step_id(steps): function set_yaml_defaults (line 221) | def set_yaml_defaults(project_yaml): function is_supported_configuration (line 235) | def is_supported_configuration(build): function workdir_from_dockerfile (line 248) | def workdir_from_dockerfile(dockerfile): function get_datetime_now (line 261) | def get_datetime_now(): function get_env (line 266) | def get_env(fuzzing_language, build, project_name=None): function get_compile_step (line 286) | def get_compile_step(project, function maybe_add_parallel (line 336) | def maybe_add_parallel(step, wait_for_id, parallel): function get_id (line 344) | def get_id(step_type, build): function get_build_steps (line 351) | def get_build_steps( # pylint: disable=too-many-locals, too-many-statem... function get_build_steps_for_project (line 369) | def get_build_steps_for_project(project, function _indexer_built_image_name (line 510) | def _indexer_built_image_name(name: str): function _tracer_built_image_name (line 516) | def _tracer_built_image_name(name: str): function _create_indexed_build_steps (line 522) | def _create_indexed_build_steps(project, function get_indexer_build_steps (line 625) | def get_indexer_build_steps(project_name, function get_targets_list_upload_step (line 670) | def get_targets_list_upload_step(bucket, project, build, uploader_image): function get_uploader_image (line 684) | def get_uploader_image(): function get_upload_steps (line 689) | def get_upload_steps(project, build, timestamp, testing): function get_cleanup_step (line 744) | def get_cleanup_step(project, build): function run_build (line 757) | def run_build(oss_fuzz_project, function parse_args (line 790) | def parse_args(description, args): function create_config (line 833) | def create_config(args, build_type, base_image_tag=None): function build_script_main (line 848) | def build_script_main(script_description, function main (line 889) | def main(): FILE: infra/build/functions/build_project_test.py class TestRequestCoverageBuilds (line 35) | class TestRequestCoverageBuilds(fake_filesystem_unittest.TestCase): method setUp (line 38) | def setUp(self): method test_get_build_steps (line 47) | def test_get_build_steps(self, mock_url, mock_get_datetime_now, mock_g... method test_get_centipede_build_steps (line 83) | def test_get_centipede_build_steps(self, mock_url, mock_get_datetime_now, method test_get_build_steps_ubuntu_24_04 (line 120) | def test_get_build_steps_ubuntu_24_04(self, mock_url, mock_get_datetim... FILE: infra/build/functions/datastore_entities.py class Project (line 21) | class Project(ndb.Model): class GithubCreds (line 30) | class GithubCreds(ndb.Model): class BuildsHistory (line 37) | class BuildsHistory(ndb.Model): class LastSuccessfulBuild (line 44) | class LastSuccessfulBuild(ndb.Model): FILE: infra/build/functions/fuzzbench.py function get_engine_project_image_name (line 45) | def get_engine_project_image_name(fuzzing_engine, project): function get_ood_image_name (line 51) | def get_ood_image_name(fuzzing_engine, project): function get_gcs_public_corpus_url (line 58) | def get_gcs_public_corpus_url(project, fuzz_target_name): function get_latest_libfuzzer_build (line 66) | def get_latest_libfuzzer_build(project_name): function get_fuzz_target_name (line 80) | def get_fuzz_target_name(project_name): function get_env (line 98) | def get_env(project, build, fuzz_target_name): function get_fuzzbench_setup_steps (line 112) | def get_fuzzbench_setup_steps(): function get_build_fuzzers_steps (line 143) | def get_build_fuzzers_steps(fuzzing_engine, project, env): function get_gcs_corpus_steps (line 194) | def get_gcs_corpus_steps(fuzzing_engine, project, env_dict): function get_build_ood_image_steps (line 236) | def get_build_ood_image_steps(fuzzing_engine, project, env_dict): function get_push_and_run_ood_image_steps (line 295) | def get_push_and_run_ood_image_steps(fuzzing_engine, project, env_dict): function get_extract_crashes_steps (line 321) | def get_extract_crashes_steps(fuzzing_engine, project, env_dict): function get_upload_testcase_steps (line 356) | def get_upload_testcase_steps(project, env_dict): function get_upload_corpus_steps (line 388) | def get_upload_corpus_steps(fuzzing_engine, project, env_dict): function get_build_steps (line 410) | def get_build_steps( # pylint: disable=too-many-locals, too-many-arguments function main (line 444) | def main(): FILE: infra/build/functions/fuzzbench_local_run.py function run_step_locally (line 39) | def run_step_locally(temp_dir, local_fuzzbench_path, step, i, log_file): function remove_temp_dir_content (line 141) | def remove_temp_dir_content(temp_dir, i, log_file): function run_steps_locally (line 150) | def run_steps_locally(steps, function main (line 181) | def main(): FILE: infra/build/functions/fuzzbench_test.py class GetFuzzTargetName (line 36) | class GetFuzzTargetName(unittest.TestCase): method test_successful_retrieval (line 42) | def test_successful_retrieval(self, mock_logging_info, mock_randint, method test_api_error (line 73) | def test_api_error(self, mock_logging_info, mock_get): method test_no_fuzz_targets (line 91) | def test_no_fuzz_targets(self, mock_logging_info, mock_get): method test_empty_pairs (line 110) | def test_empty_pairs(self, mock_logging_info, mock_get): class FuzzbenchRunsTest (line 128) | class FuzzbenchRunsTest(unittest.TestCase): method setUp (line 131) | def setUp(self): method tearDown (line 135) | def tearDown(self): method _fuzzbench_test_setup (line 142) | def _fuzzbench_test_setup(self): method _assert_log_content (line 156) | def _assert_log_content(self, frequency): method _fuzzbench_setup_steps_test (line 163) | def _fuzzbench_setup_steps_test(self, fuzzing_engine, project, env): method _get_project_image_steps_test (line 172) | def _get_project_image_steps_test(self, fuzzing_engine, project, env_d... method _build_fuzzers_steps_test (line 187) | def _build_fuzzers_steps_test(self, fuzzing_engine, project, env): method _corpus_steps_test (line 196) | def _corpus_steps_test(self, fuzzing_engine, project, env_dict): method _build_ood_image_steps_test (line 205) | def _build_ood_image_steps_test(self, fuzzing_engine, project, env_dict): method _run_ood_image_step_test (line 220) | def _run_ood_image_step_test(self, fuzzing_engine, project, env_dict): method _extract_crashes_steps_test (line 234) | def _extract_crashes_steps_test(self, fuzzing_engine, project, env_dict): method test_fuzzbench_runs (line 247) | def test_fuzzbench_runs(self): FILE: infra/build/functions/gcb.py function get_comments (line 37) | def get_comments(pull_request_number): function get_latest_gcbrun_command (line 51) | def get_latest_gcbrun_command(comments): function exec_command_from_github (line 68) | def exec_command_from_github(args): function main (line 102) | def main(): FILE: infra/build/functions/gcb_test.py class GetLatestGCBrunCommandTest (line 23) | class GetLatestGCBrunCommandTest(unittest.TestCase): method test_command_parsing (line 26) | def test_command_parsing(self): method test_last_comment (line 39) | def test_last_comment(self): method test_oss_fuzz_on_demand_command_parsing (line 56) | def test_oss_fuzz_on_demand_command_parsing(self): class ExecCommandFromGithubTest (line 71) | class ExecCommandFromGithubTest(unittest.TestCase): method test_exec_command (line 79) | def test_exec_command(self): method test_build_script_main_args (line 157) | def test_build_script_main_args(self, mock_oss_fuzz_on_demand_main, FILE: infra/build/functions/indexer_build_test.py class TestIndexerBuildSteps (line 31) | class TestIndexerBuildSteps(fake_filesystem_unittest.TestCase): method setUp (line 34) | def setUp(self): method test_get_indexer_build_steps (line 41) | def test_get_indexer_build_steps(self, mock_get_project_image_steps, FILE: infra/build/functions/main.py function build_project (line 25) | def build_project(event, context): function sync (line 30) | def sync(event, context): function build_base_images (line 35) | def build_base_images(event, context): function coverage_build (line 40) | def coverage_build(event, context): function introspector_build (line 45) | def introspector_build(event, context): FILE: infra/build/functions/ood_upload_corpus.py function get_corpus_signed_policy_document (line 34) | def get_corpus_signed_policy_document(project_name, fuzz_target_name): function upload_corpus_file (line 43) | def upload_corpus_file(file_path, upload_path, doc): function get_files_path (line 69) | def get_files_path(directory_path, num_files): function upload_corpus (line 81) | def upload_corpus(doc_str, path_prefix, output_corpus_directory, num_upl... function get_args (line 93) | def get_args(): function main (line 114) | def main(): FILE: infra/build/functions/ood_upload_corpus_test.py class GetFilePathTest (line 29) | class GetFilePathTest(unittest.TestCase): method setUp (line 32) | def setUp(self): method tearDown (line 36) | def tearDown(self): method test_no_files (line 40) | def test_no_files(self): method test_single_file (line 44) | def test_single_file(self): method test_multiple_files (line 52) | def test_multiple_files(self): method test_with_subdirectory (line 67) | def test_with_subdirectory(self): class TestUploadCorpus (line 79) | class TestUploadCorpus(unittest.TestCase): method test_upload_multiple_files (line 85) | def test_upload_multiple_files(self, mock_get_files_path, FILE: infra/build/functions/ood_upload_testcase.py function get_access_token (line 36) | def get_access_token(access_token_path): function get_headers (line 43) | def get_headers(access_token_path): function upload_testcase (line 51) | def upload_testcase(upload_url, testcase_path, job, target, access_token... function get_crash_file_path (line 73) | def get_crash_file_path(dir_path): function main (line 84) | def main(): FILE: infra/build/functions/ood_upload_testcase_test.py class GetCrashFilePathTest (line 27) | class GetCrashFilePathTest(unittest.TestCase): method setUp (line 30) | def setUp(self): method tearDown (line 34) | def tearDown(self): method test_no_files (line 38) | def test_no_files(self): method test_single_file (line 42) | def test_single_file(self): method test_multiple_files (line 50) | def test_multiple_files(self): method test_with_subdirectory (line 61) | def test_with_subdirectory(self): method test_oom_file (line 72) | def test_oom_file(self): FILE: infra/build/functions/oss_fuzz_on_demand.py function oss_fuzz_on_demand_main (line 25) | def oss_fuzz_on_demand_main(args=None): function main (line 33) | def main(): FILE: infra/build/functions/project_experiment.py function run_experiment (line 28) | def run_experiment(project_name, command, output_path, experiment_name): function main (line 105) | def main(): FILE: infra/build/functions/project_sync.py class OssFuzzRepo (line 54) | class OssFuzzRepo: method __init__ (line 60) | def __init__(self, out_dir): method _repo_dir (line 70) | def _repo_dir(self): method get_contents (line 73) | def get_contents(self, path): class ProjectYamlError (line 96) | class ProjectYamlError(Exception): function create_scheduler (line 100) | def create_scheduler(cloud_scheduler_client, project_name, schedule, tag, function delete_scheduler (line 128) | def delete_scheduler(cloud_scheduler_client, project_name, tag): function delete_project (line 137) | def delete_project(cloud_scheduler_client, project): function sync_projects (line 157) | def sync_projects(cloud_scheduler_client, projects): function _has_docker_file (line 217) | def _has_docker_file(project_contents): function get_project_metadata (line 223) | def get_project_metadata(project_contents): function get_projects (line 249) | def get_projects(repo): function sync (line 272) | def sync(event, context): FILE: infra/build/functions/project_sync_test.py class Repository (line 36) | class Repository: method __init__ (line 39) | def __init__(self, name, file_type, path, contents=None): method get_contents (line 46) | def get_contents(self, path): method set_yaml_contents (line 57) | def set_yaml_contents(self, decoded_content): class CloudSchedulerClient (line 62) | class CloudSchedulerClient: method __init__ (line 65) | def __init__(self): method location_path (line 69) | def location_path(self, project_id, location_id): method create_job (line 73) | def create_job(self, parent, job): method get_job (line 78) | def get_job(self, name): method job_path (line 87) | def job_path(self, project_id, location_id, name): method delete_job (line 91) | def delete_job(self, name): method update_job (line 98) | def update_job(self, job, update_mask): class TestDataSync (line 105) | class TestDataSync(unittest.TestCase): method setUpClass (line 109) | def setUpClass(cls): method setUp (line 115) | def setUp(self): method test_sync_projects_update (line 118) | def test_sync_projects_update(self): method test_sync_projects_create (line 144) | def test_sync_projects_create(self): method test_sync_projects_delete (line 231) | def test_sync_projects_delete(self): method test_get_projects_yaml (line 253) | def test_get_projects_yaml(self): method test_get_projects_no_docker_file (line 279) | def test_get_projects_no_docker_file(self): method test_get_projects_invalid_project_name (line 297) | def test_get_projects_invalid_project_name(self): method test_get_projects_non_directory_type_project (line 318) | def test_get_projects_non_directory_type_project(self): method test_invalid_yaml_format (line 336) | def test_invalid_yaml_format(self): method test_yaml_out_of_range (line 350) | def test_yaml_out_of_range(self): method tearDownClass (line 364) | def tearDownClass(cls): FILE: infra/build/functions/report_generator.py function _print_box (line 31) | def _print_box(title, lines): function generate_final_summary (line 48) | def generate_final_summary(all_results): function generate_comparison_table (line 79) | def generate_comparison_table(all_results): function main (line 118) | def main(): FILE: infra/build/functions/request_build.py function update_build_history (line 31) | def update_build_history(project_name, build_id, build_tag): function get_project_data (line 51) | def get_project_data(project_name): function get_empty_config (line 64) | def get_empty_config(): function get_build_steps (line 69) | def get_build_steps(project_name, timestamp=None): function get_indexer_build_steps (line 83) | def get_indexer_build_steps(project_name, timestamp=None): function run_build (line 95) | def run_build(oss_fuzz_project, function request_build (line 110) | def request_build(event, context): FILE: infra/build/functions/request_build_test.py class TestRequestBuilds (line 37) | class TestRequestBuilds(unittest.TestCase): method setUpClass (line 41) | def setUpClass(cls): method setUp (line 47) | def setUp(self): method tearDown (line 59) | def tearDown(self): method test_get_build_steps_no_project (line 62) | def test_get_build_steps_no_project(self): method test_get_build_steps_with_base_os_version (line 69) | def test_get_build_steps_with_base_os_version(self, mock_run_build): method test_build_history (line 136) | def test_build_history(self): method test_build_history_no_existing_project (line 150) | def test_build_history_no_existing_project(self): method test_get_project_data (line 159) | def test_get_project_data(self): method tearDownClass (line 166) | def tearDownClass(cls): FILE: infra/build/functions/request_coverage_build.py function get_build_steps (line 29) | def get_build_steps(project_name): function request_coverage_build (line 39) | def request_coverage_build(event, context): FILE: infra/build/functions/request_coverage_build_test.py class TestRequestCoverageBuild (line 35) | class TestRequestCoverageBuild(unittest.TestCase): method setUpClass (line 39) | def setUpClass(cls): method setUp (line 45) | def setUp(self): method test_get_build_steps_with_base_os_version (line 52) | def test_get_build_steps_with_base_os_version(self, mock_get_signed_url, method tearDownClass (line 97) | def tearDownClass(cls): FILE: infra/build/functions/request_introspector_build.py function get_build_steps (line 30) | def get_build_steps(project_name, image_project, base_images_project): function request_introspector_build (line 42) | def request_introspector_build(event, context): FILE: infra/build/functions/request_introspector_build_test.py class TestRequestIntrospectorBuild (line 35) | class TestRequestIntrospectorBuild(unittest.TestCase): method setUpClass (line 39) | def setUpClass(cls): method setUp (line 45) | def setUp(self): method test_get_build_steps_with_base_os_version (line 50) | def test_get_build_steps_with_base_os_version(self, mock_run_build): method tearDownClass (line 95) | def tearDownClass(cls): FILE: infra/build/functions/target_experiment.py function run_experiment (line 32) | def run_experiment(project_name, function main (line 287) | def main(): FILE: infra/build/functions/test_utils.py function create_project_data (line 37) | def create_project_data(project, function start_datastore_emulator (line 52) | def start_datastore_emulator(): function wait_for_emulator_ready (line 69) | def wait_for_emulator_ready(proc, function reset_ds_emulator (line 100) | def reset_ds_emulator(): function cleanup_emulator (line 106) | def cleanup_emulator(ds_emulator): function set_gcp_environment (line 112) | def set_gcp_environment(): function get_test_data_file_path (line 122) | def get_test_data_file_path(filename): FILE: infra/build/functions/trial_build.py function _get_production_build_statuses (line 74) | def _get_production_build_statuses(build_type): function get_all_projects (line 100) | def get_all_projects(): function get_project_languages (line 111) | def get_project_languages(): function handle_special_projects (line 127) | def handle_special_projects(args): function get_args (line 142) | def get_args(args=None): function handle_phase1_failure (line 185) | def handle_phase1_failure(version_tag): function get_projects_to_build (line 204) | def get_projects_to_build(specified_projects, build_type, force_build): function trial_build_main (line 215) | def trial_build_main(args=None, local_base_build=True): function _do_test_builds (line 287) | def _do_test_builds(args, test_image_suffix, end_time, version_tag): function _do_build_type_builds (line 404) | def _do_build_type_builds(args, config, credentials, build_type, projects): function _print_summary_box (line 472) | def _print_summary_box(title, lines): function get_build_status_from_gcb (line 490) | def get_build_status_from_gcb(cloudbuild_api, cloud_project, build_id): function check_finished (line 497) | def check_finished(build_id, cloudbuild_api, cloud_project, retries_map): function wait_on_builds (line 512) | def wait_on_builds(args, build_ids, credentials, cloud_project, end_time, FILE: infra/build/functions/trial_build_test.py class GetProjectsToBuild (line 25) | class GetProjectsToBuild(unittest.TestCase): method test_force_build (line 35) | def test_force_build(self, mock_get_production_build_statuses): method test_get_projects_to_build (line 47) | def test_get_projects_to_build(self, mock_get_production_build_statuses): class TrialBuildMainTest (line 55) | class TrialBuildMainTest(unittest.TestCase): method test_build_steps_correct (line 65) | def test_build_steps_correct(self, mock_gcb_build_and_push_images, FILE: infra/build_specified_commit.py class BaseBuilderRepo (line 43) | class BaseBuilderRepo: method __init__ (line 46) | def __init__(self): method add_digest (line 50) | def add_digest(self, timestamp, digest): method find_digest (line 55) | def find_digest(self, timestamp): function _replace_gitdir (line 65) | def _replace_gitdir(src_dir, file_path): function _make_gitdirs_relative (line 93) | def _make_gitdirs_relative(src_dir): function _replace_base_builder_digest (line 104) | def _replace_base_builder_digest(dockerfile_path, digest): function copy_src_from_docker (line 120) | def copy_src_from_docker(project_name, host_dir): function _build_image_with_retries (line 147) | def _build_image_with_retries(project_name): function get_required_post_checkout_steps (line 152) | def get_required_post_checkout_steps(dockerfile_path): function build_fuzzers_from_commit (line 180) | def build_fuzzers_from_commit(commit, function detect_main_repo (line 291) | def detect_main_repo(project_name, repo_name=None, commit=None): function load_base_builder_repo (line 336) | def load_base_builder_repo(): function main (line 364) | def main(): FILE: infra/build_specified_commit_test.py class BuildImageIntegrationTest (line 35) | class BuildImageIntegrationTest(unittest.TestCase): method test_build_fuzzers_from_commit (line 39) | def test_build_fuzzers_from_commit(self): method test_detect_main_repo_from_commit (line 81) | def test_detect_main_repo_from_commit(self): method test_detect_main_repo_from_name (line 101) | def test_detect_main_repo_from_name(self): FILE: infra/chronos/coverage_test_collection.py function collect_coverage_profraw_files (line 26) | def collect_coverage_profraw_files(): function find_all_executables (line 38) | def find_all_executables(): function run_llvm_html_generation (line 81) | def run_llvm_html_generation(objects, out_dir, workdir=COV_WORKDIR): function reset_cov_workdir (line 116) | def reset_cov_workdir(): function main (line 123) | def main(): FILE: infra/chronos/integrity_validator_check_replay.py function normal_compile (line 26) | def normal_compile(): function source_code_white_noise (line 30) | def source_code_white_noise(): function source_code_compile_error (line 51) | def source_code_compile_error(): function macro_compile_error (line 69) | def macro_compile_error(): function missing_header_error (line 87) | def missing_header_error(): function duplicate_symbol_error (line 124) | def duplicate_symbol_error(): function function_linker_error (line 178) | def function_linker_error(): function main (line 245) | def main(): FILE: infra/chronos/integrity_validator_run_tests.py function _add_payload_random_functions (line 36) | def _add_payload_random_functions(exts: list[str], payload: str) -> str: function normal_patch (line 93) | def normal_patch(): function signal_abort_crash (line 98) | def signal_abort_crash(): function builtin_trap_crash (line 104) | def builtin_trap_crash(): function null_write_crash (line 110) | def null_write_crash(): function wrong_return_value (line 116) | def wrong_return_value(): class LogicErrorPatch (line 185) | class LogicErrorPatch: function _capture_source_control (line 221) | def _capture_source_control(): function diff_patch_analysis (line 259) | def diff_patch_analysis(stage: str) -> int: function main (line 332) | def main(): FILE: infra/chronos/manager.py function _get_oss_fuzz_root (line 33) | def _get_oss_fuzz_root(): function _get_project_cached_named (line 39) | def _get_project_cached_named(project: common_utils.Project, function _get_project_cached_named_local (line 46) | def _get_project_cached_named_local(project: common_utils.Project, function build_cached_project (line 51) | def build_cached_project(project: common_utils.Project, function check_cached_replay (line 108) | def check_cached_replay(project: common_utils.Project, function check_tests (line 193) | def check_tests(project: common_utils.Project, function extract_test_coverage (line 386) | def extract_test_coverage(project): function cmd_dispatcher_check_tests (line 422) | def cmd_dispatcher_check_tests(args): function cmd_dispatcher_check_replay (line 430) | def cmd_dispatcher_check_replay(args): function cmd_dispatcher_build_cached_image (line 437) | def cmd_dispatcher_build_cached_image(args): function cmd_dispatcher_extract_coverage (line 442) | def cmd_dispatcher_extract_coverage(args): function parse_args (line 447) | def parse_args(): function main (line 532) | def main(): FILE: infra/ci/build.py function get_changed_files_output (line 40) | def get_changed_files_output(): function get_modified_buildable_projects (line 49) | def get_modified_buildable_projects(): function get_oss_fuzz_root (line 69) | def get_oss_fuzz_root(): function execute_helper_command (line 76) | def execute_helper_command(helper_command): function build_fuzzers (line 85) | def build_fuzzers(project, engine, sanitizer, architecture): function check_build (line 94) | def check_build(project, engine, sanitizer, architecture): function should_build_coverage (line 103) | def should_build_coverage(project_yaml): function flatten_options (line 127) | def flatten_options(option_list): function should_build (line 143) | def should_build(project_yaml): function build_project (line 161) | def build_project(project): class BuildModifiedProjectsResult (line 192) | class BuildModifiedProjectsResult(enum.Enum): function build_modified_projects (line 199) | def build_modified_projects(): function is_infra_changed (line 222) | def is_infra_changed(): function build_base_images (line 229) | def build_base_images(): function build_canary_project (line 256) | def build_canary_project(): function main (line 269) | def main(): FILE: infra/ci/build_test.py function patch_environ (line 30) | def patch_environ(testcase_obj): function _set_coverage_build (line 38) | def _set_coverage_build(): class TestShouldBuild (line 45) | class TestShouldBuild(unittest.TestCase): method setUp (line 48) | def setUp(self): method test_none_engine_coverage_build (line 51) | def test_none_engine_coverage_build(self): method test_unspecified_engines_coverage_build (line 62) | def test_unspecified_engines_coverage_build(self): method test_libfuzzer_coverage_build (line 69) | def test_libfuzzer_coverage_build(self): method test_go_coverage_build (line 80) | def test_go_coverage_build(self): method test_engine_project_none_build (line 87) | def test_engine_project_none_build(self): method test_centipede_none_build (line 100) | def test_centipede_none_build(self): method test_centipede_address_build (line 113) | def test_centipede_address_build(self): FILE: infra/ci/check_base_os.py function main (line 43) | def main(): FILE: infra/cifuzz/affected_fuzz_targets.py function remove_unaffected_fuzz_targets (line 25) | def remove_unaffected_fuzz_targets(clusterfuzz_deployment, out_dir, function is_fuzz_target_affected (line 78) | def is_fuzz_target_affected(coverage, fuzz_target_path, files_changed): function get_affected_fuzz_targets (line 106) | def get_affected_fuzz_targets(coverage, fuzz_target_paths, files_changed): FILE: infra/cifuzz/affected_fuzz_targets_test.py class RemoveUnaffectedFuzzTargetsTest (line 41) | class RemoveUnaffectedFuzzTargetsTest(unittest.TestCase): method test_remove_unaffected_fuzz_targets (line 62) | def test_remove_unaffected_fuzz_targets(self, side_effect, expected_di... class IsFuzzTargetAffectedTest (line 88) | class IsFuzzTargetAffectedTest(unittest.TestCase): method setUp (line 91) | def setUp(self): method test_relative_paths (line 94) | def test_relative_paths(self): FILE: infra/cifuzz/base_runner_utils.py function get_env (line 21) | def get_env(config, workspace): FILE: infra/cifuzz/build_fuzzers.py function check_project_src_path (line 37) | def check_project_src_path(project_src_path): class Builder (line 50) | class Builder: # pylint: disable=too-many-instance-attributes method __init__ (line 53) | def __init__(self, config, ci_system): method build_image_and_checkout_src (line 66) | def build_image_and_checkout_src(self): method build_fuzzers (line 80) | def build_fuzzers(self): method upload_build (line 115) | def upload_build(self): method check_fuzzer_build (line 123) | def check_fuzzer_build(self): method build (line 131) | def build(self): method remove_unaffected_fuzz_targets (line 146) | def remove_unaffected_fuzz_targets(self): function build_fuzzers (line 161) | def build_fuzzers(config): function check_fuzzer_build (line 182) | def check_fuzzer_build(config): function _get_docker_build_fuzzers_args_not_container (line 213) | def _get_docker_build_fuzzers_args_not_container(host_repo_path): FILE: infra/cifuzz/build_fuzzers_entrypoint.py function build_fuzzers_entrypoint (line 28) | def build_fuzzers_entrypoint(): function main (line 54) | def main(): FILE: infra/cifuzz/build_fuzzers_test.py function docker_command_has_env_var_arg (line 59) | def docker_command_has_env_var_arg(command, env_var_arg): class BuildFuzzersTest (line 71) | class BuildFuzzersTest(unittest.TestCase): method test_cifuzz_env_var (line 79) | def test_cifuzz_env_var(self, mock_docker_run, _, __, ___): method test_extra_env_var (line 100) | def test_extra_env_var(self, mock_docker_run, _, __, ___): class InternalGithubBuildTest (line 118) | class InternalGithubBuildTest(unittest.TestCase): method _create_builder (line 125) | def _create_builder(self, tmp_dir, oss_fuzz_project_name='myproject'): method test_correct_host_repo_path (line 143) | def test_correct_host_repo_path(self, _, __): method test_upload_build_disabled (line 160) | def test_upload_build_disabled(self, mock_upload_build): method test_upload_build (line 172) | def test_upload_build(self, mock_upload_build, mock_get_current_commit): class BuildFuzzersIntegrationTest (line 184) | class BuildFuzzersIntegrationTest(unittest.TestCase): method setUp (line 187) | def setUp(self): method tearDown (line 196) | def tearDown(self): method test_external_github_project (line 199) | def test_external_github_project(self): method test_external_generic_project (line 216) | def test_external_generic_project(self): method test_valid_commit (line 238) | def test_valid_commit(self): method test_valid_pull_request (line 251) | def test_valid_pull_request(self): method test_invalid_pull_request (line 264) | def test_invalid_pull_request(self): method test_invalid_oss_fuzz_project_name (line 275) | def test_invalid_oss_fuzz_project_name(self): method test_invalid_repo_name (line 284) | def test_invalid_repo_name(self): method test_invalid_git_sha (line 293) | def test_invalid_git_sha(self): method test_invalid_workspace (line 304) | def test_invalid_workspace(self): class CheckFuzzerBuildTest (line 314) | class CheckFuzzerBuildTest(unittest.TestCase): method setUp (line 320) | def setUp(self): method tearDown (line 333) | def tearDown(self): method test_correct_fuzzer_build (line 336) | def test_correct_fuzzer_build(self): method test_not_a_valid_path (line 340) | def test_not_a_valid_path(self): method test_no_valid_fuzzers (line 345) | def test_no_valid_fuzzers(self): method test_allow_broken_fuzz_targets_percentage (line 353) | def test_allow_broken_fuzz_targets_percentage(self, mock_execute): class BuildSantizerIntegrationTest (line 365) | class BuildSantizerIntegrationTest(unittest.TestCase): method _create_config (line 372) | def _create_config(cls, tmp_dir, sanitizer): method test_valid_project_curl (line 381) | def test_valid_project_curl(self, sanitizer): class GetDockerBuildFuzzersArgsNotContainerTest (line 388) | class GetDockerBuildFuzzersArgsNotContainerTest(unittest.TestCase): method test_get_docker_build_fuzzers_args_no_container (line 392) | def test_get_docker_build_fuzzers_args_no_container(self): FILE: infra/cifuzz/cifuzz_combined_entrypoint.py function main (line 22) | def main(): FILE: infra/cifuzz/cifuzz_end_to_end_test.py class EndToEndTest (line 32) | class EndToEndTest(unittest.TestCase): method setUp (line 35) | def setUp(self): method test_simple (line 38) | def test_simple(self): FILE: infra/cifuzz/clusterfuzz_deployment.py class BaseClusterFuzzDeployment (line 33) | class BaseClusterFuzzDeployment: method __init__ (line 36) | def __init__(self, config, workspace): method download_latest_build (line 41) | def download_latest_build(self): method upload_build (line 49) | def upload_build(self, commit): method download_corpus (line 53) | def download_corpus(self, target_name, corpus_dir): method upload_crashes (line 61) | def upload_crashes(self): method upload_corpus (line 65) | def upload_corpus(self, target_name, corpus_dir, replace=False): # py... method upload_coverage (line 69) | def upload_coverage(self): method get_coverage (line 73) | def get_coverage(self, repo_path): function _make_empty_dir_if_nonexistent (line 78) | def _make_empty_dir_if_nonexistent(path): class ClusterFuzzLite (line 83) | class ClusterFuzzLite(BaseClusterFuzzDeployment): method __init__ (line 89) | def __init__(self, config, workspace): method download_latest_build (line 93) | def download_latest_build(self): method download_corpus (line 142) | def download_corpus(self, target_name, corpus_dir): method _get_build_name (line 155) | def _get_build_name(self, name): method _get_corpus_name (line 158) | def _get_corpus_name(self, target_name): # pylint: disable=no-self-use method upload_corpus (line 162) | def upload_corpus(self, target_name, corpus_dir, replace=False): method upload_build (line 173) | def upload_build(self, commit): method upload_crashes (line 185) | def upload_crashes(self): method upload_coverage (line 206) | def upload_coverage(self): method get_coverage (line 211) | def get_coverage(self, repo_path): class OSSFuzz (line 226) | class OSSFuzz(BaseClusterFuzzDeployment): method get_latest_build_name (line 235) | def get_latest_build_name(self): method download_latest_build (line 255) | def download_latest_build(self): method upload_build (line 284) | def upload_build(self, commit): # pylint: disable=no-self-use method upload_corpus (line 288) | def upload_corpus(self, target_name, corpus_dir, replace=False): # py... method upload_crashes (line 292) | def upload_crashes(self): # pylint: disable=no-self-use method download_corpus (line 296) | def download_corpus(self, target_name, corpus_dir): method upload_coverage (line 318) | def upload_coverage(self): method get_coverage (line 322) | def get_coverage(self, repo_path): class NoClusterFuzzDeployment (line 331) | class NoClusterFuzzDeployment(BaseClusterFuzzDeployment): method upload_build (line 335) | def upload_build(self, commit): # pylint: disable=no-self-use method upload_corpus (line 340) | def upload_corpus(self, target_name, corpus_dir, replace=False): # py... method upload_crashes (line 344) | def upload_crashes(self): # pylint: disable=no-self-use method download_corpus (line 348) | def download_corpus(self, target_name, corpus_dir): method download_latest_build (line 353) | def download_latest_build(self): # pylint: disable=no-self-use method upload_coverage (line 358) | def upload_coverage(self): method get_coverage (line 363) | def get_coverage(self, repo_path): function get_clusterfuzz_deployment (line 377) | def get_clusterfuzz_deployment(config, workspace): FILE: infra/cifuzz/clusterfuzz_deployment_test.py function _create_config (line 41) | def _create_config(**kwargs): function _create_deployment (line 57) | def _create_deployment(**kwargs): class OSSFuzzTest (line 63) | class OSSFuzzTest(fake_filesystem_unittest.TestCase): method setUp (line 66) | def setUp(self): method test_download_corpus (line 73) | def test_download_corpus(self, mock_download_and_unpack_zip): method test_download_corpus_fail (line 84) | def test_download_corpus_fail(self, _): method test_get_latest_build_name (line 90) | def test_get_latest_build_name(self): method test_noop_methods (line 103) | def test_noop_methods(self, method, method_args, expected_message): method test_download_latest_build (line 111) | def test_download_latest_build(self, mock_download_and_unpack_zip): method test_download_latest_build_fail (line 124) | def test_download_latest_build_fail(self, _): class ClusterFuzzLiteTest (line 130) | class ClusterFuzzLiteTest(fake_filesystem_unittest.TestCase): method setUp (line 133) | def setUp(self): method test_download_corpus (line 143) | def test_download_corpus(self, mock_download_corpus): method test_download_corpus_fail (line 152) | def test_download_corpus_fail(self, _): method test_download_latest_build (line 164) | def test_download_latest_build(self, mock_repo_dir, mock_get_commit_list, method test_download_latest_build_fail (line 180) | def test_download_latest_build_fail(self, mock_repo_dir, mock_get_comm... method test_upload_build (line 187) | def test_upload_build(self, mock_upload_build): class NoClusterFuzzDeploymentTest (line 194) | class NoClusterFuzzDeploymentTest(fake_filesystem_unittest.TestCase): method setUp (line 197) | def setUp(self): method test_download_corpus (line 210) | def test_download_corpus(self, mock_info): method test_noop_methods (line 228) | def test_noop_methods(self, method, method_args, expected_message): class GetClusterFuzzDeploymentTest (line 236) | class GetClusterFuzzDeploymentTest(unittest.TestCase): method setUp (line 239) | def setUp(self): method test_get_clusterfuzz_deployment (line 253) | def test_get_clusterfuzz_deployment(self, platform, expected_deploymen... FILE: infra/cifuzz/config_utils.py function _get_sanitizer (line 46) | def _get_sanitizer(): function _get_architecture (line 50) | def _get_architecture(): function _is_dry_run (line 54) | def _is_dry_run(): function _get_language (line 59) | def _get_language(): function _get_extra_environment_variables (line 69) | def _get_extra_environment_variables(): class ConfigError (line 78) | class ConfigError(Exception): class BaseConfig (line 82) | class BaseConfig: class Platform (line 85) | class Platform(enum.Enum): method is_github (line 93) | def is_github(self): method __init__ (line 97) | def __init__(self): method validate (line 144) | def validate(self): method is_internal (line 180) | def is_internal(self): method platform (line 185) | def platform(self): method is_coverage (line 197) | def is_coverage(self): method base_os_version (line 203) | def base_os_version(self): function pivot_to_ubuntu_24_04 (line 241) | def pivot_to_ubuntu_24_04(image_suffix, script_path, check_result=True): function _get_platform_config (line 281) | def _get_platform_config(cfl_platform): class RunFuzzersConfig (line 291) | class RunFuzzersConfig(BaseConfig): method __init__ (line 296) | def __init__(self): method _run_config_validate (line 320) | def _run_config_validate(self): class BuildFuzzersConfig (line 332) | class BuildFuzzersConfig(BaseConfig): method __init__ (line 335) | def __init__(self): FILE: infra/cifuzz/config_utils_test.py class BaseConfigTest (line 26) | class BaseConfigTest(unittest.TestCase): method setUp (line 29) | def setUp(self): method _create_config (line 33) | def _create_config(self): method test_language_default (line 36) | def test_language_default(self): method test_language (line 41) | def test_language(self): method test_is_coverage (line 48) | def test_is_coverage(self): method test_validate_no_workspace (line 61) | def test_validate_no_workspace(self, mock_error): method test_validate_invalid_language (line 69) | def test_validate_invalid_language(self, mock_error): method test_validate_invalid_sanitizer (line 80) | def test_validate_invalid_sanitizer(self, mock_error): method test_validate (line 91) | def test_validate(self): method test_base_os_version_external (line 99) | def test_base_os_version_external(self): method test_base_os_version_external_quoted (line 115) | def test_base_os_version_external_quoted(self): method test_base_os_version_default (line 127) | def test_base_os_version_default(self): class BuildFuzzersConfigTest (line 135) | class BuildFuzzersConfigTest(unittest.TestCase): method setUp (line 138) | def setUp(self): method _create_config (line 142) | def _create_config(self): method test_github_base_ref (line 146) | def test_github_base_ref(self, _): method test_base_ref (line 155) | def test_base_ref(self): method test_keep_unaffected_defaults_to_true (line 162) | def test_keep_unaffected_defaults_to_true(self): method test_keep_unaffected_defaults_to_false_when_pr (line 167) | def test_keep_unaffected_defaults_to_false_when_pr(self): class RunFuzzersConfigTest (line 175) | class RunFuzzersConfigTest(unittest.TestCase): method setUp (line 178) | def setUp(self): method _create_config (line 182) | def _create_config(self): method test_coverage (line 185) | def test_coverage(self): method test_run_config_validate (line 200) | def test_run_config_validate(self): method test_run_config_invalid_mode (line 205) | def test_run_config_invalid_mode(self, mock_error): class GetSanitizerTest (line 215) | class GetSanitizerTest(unittest.TestCase): method setUp (line 218) | def setUp(self): method test_default_value (line 222) | def test_default_value(self): method test_normal_case (line 226) | def test_normal_case(self): method test_capitalization (line 231) | def test_capitalization(self): FILE: infra/cifuzz/continuous_integration.py function fix_git_repo_for_diff (line 40) | def fix_git_repo_for_diff(repo_manager_obj): class BaseCi (line 50) | class BaseCi: method __init__ (line 53) | def __init__(self, config): method repo_dir (line 59) | def repo_dir(self): method prepare_for_fuzzer_build (line 64) | def prepare_for_fuzzer_build(self): method get_diff_base (line 69) | def get_diff_base(self): method get_changed_code_under_test (line 83) | def get_changed_code_under_test(self, repo_manager_obj): method get_build_command (line 94) | def get_build_command(self, host_repo_path, image_repo_path): method _build_external_project_docker_image (line 99) | def _build_external_project_docker_image(self, manager): method _make_repo_storage_dir (line 113) | def _make_repo_storage_dir(self): method _clone_repo_and_checkout (line 116) | def _clone_repo_and_checkout(self, repo_url, repo_name): method _checkout_specified_commit (line 131) | def _checkout_specified_commit(self, manager): method _detect_main_repo (line 134) | def _detect_main_repo(self): method _create_repo_manager_for_project_src_path (line 144) | def _create_repo_manager_for_project_src_path(self): function get_build_command (line 149) | def get_build_command(): function get_replace_repo_and_build_command (line 155) | def get_replace_repo_and_build_command(host_repo_path, image_repo_path): function get_ci (line 167) | def get_ci(config): function checkout_specified_commit (line 190) | def checkout_specified_commit(repo_manager_obj, pr_ref, git_sha): class GithubCiMixin (line 204) | class GithubCiMixin: method __init__ (line 207) | def __init__(self, config): method repo_dir (line 214) | def repo_dir(self): class InternalGithub (line 233) | class InternalGithub(GithubCiMixin, BaseCi): method _copy_repo_from_image (line 236) | def _copy_repo_from_image(self, image_repo_path): method prepare_for_fuzzer_build (line 252) | def prepare_for_fuzzer_build(self): method get_build_command (line 269) | def get_build_command(self, host_repo_path, image_repo_path): # pylin... function get_build_preparation_failure (line 276) | def get_build_preparation_failure(): class InternalGeneric (line 283) | class InternalGeneric(BaseCi): method __init__ (line 287) | def __init__(self, config): method repo_dir (line 292) | def repo_dir(self): method prepare_for_fuzzer_build (line 297) | def prepare_for_fuzzer_build(self): method get_build_command (line 314) | def get_build_command(self, host_repo_path, image_repo_path): # pylin... function build_external_project_docker_image (line 322) | def build_external_project_docker_image(project_src, build_integration_p... class ExternalGeneric (line 332) | class ExternalGeneric(BaseCi): method __init__ (line 335) | def __init__(self, config): method repo_dir (line 340) | def repo_dir(self): method prepare_for_fuzzer_build (line 345) | def prepare_for_fuzzer_build(self): method get_build_command (line 350) | def get_build_command(self, host_repo_path, image_repo_path): # pylin... class ExternalGithub (line 356) | class ExternalGithub(GithubCiMixin, BaseCi): method prepare_for_fuzzer_build (line 359) | def prepare_for_fuzzer_build(self): method get_build_command (line 372) | def get_build_command(self, host_repo_path, image_repo_path): # pylin... FILE: infra/cifuzz/continuous_integration_test.py class FixGitRepoForDiffTest (line 31) | class FixGitRepoForDiffTest(unittest.TestCase): method test_fix_git_repo_for_diff (line 35) | def test_fix_git_repo_for_diff(self, mock_execute): class GetBuildCommand (line 48) | class GetBuildCommand(unittest.TestCase): method test_build_command (line 51) | def test_build_command(self): class GetReplaceRepoAndBuildCommand (line 56) | class GetReplaceRepoAndBuildCommand(unittest.TestCase): method test_get_replace_repo_and_build_command (line 59) | def test_get_replace_repo_and_build_command(self): class BuildExternalProjetDockerImage (line 71) | class BuildExternalProjetDockerImage(unittest.TestCase): method test_build_external_project_docker_image (line 75) | def test_build_external_project_docker_image(self, mock_docker_build): FILE: infra/cifuzz/docker.py function get_docker_env_vars (line 48) | def get_docker_env_vars(env_mapping): function get_project_image_name (line 57) | def get_project_image_name(project): function delete_images (line 69) | def delete_images(images): function get_base_docker_run_args (line 76) | def get_base_docker_run_args(workspace, function get_base_docker_run_command (line 103) | def get_base_docker_run_command(workspace, function _get_args_mapping_host_path_to_container (line 120) | def _get_args_mapping_host_path_to_container(host_path, container_path=N... FILE: infra/cifuzz/docker_test.py class GetProjectImageTest (line 31) | class GetProjectImageTest(unittest.TestCase): method test_get_project_image (line 34) | def test_get_project_image(self): class GetDeleteImagesTest (line 41) | class GetDeleteImagesTest(unittest.TestCase): method test_delete_images (line 45) | def test_delete_images(self, mock_execute): # pylint: disable=no-self... class GetBaseDockerRunArgsTest (line 57) | class GetBaseDockerRunArgsTest(unittest.TestCase): method test_get_base_docker_run_args_container (line 61) | def test_get_base_docker_run_args_container(self, _): method test_get_base_docker_run_args_no_container (line 87) | def test_get_base_docker_run_args_no_container(self, _): class GetBaseDockerRunCommandTest (line 102) | class GetBaseDockerRunCommandTest(unittest.TestCase): method test_get_base_docker_run_command_no_container (line 106) | def test_get_base_docker_run_command_no_container(self, _): FILE: infra/cifuzz/environment.py function _eval_value (line 20) | def _eval_value(value_string): function get (line 29) | def get(env_var, default_value=None): function get_bool (line 38) | def get_bool(env_var, default_value=None): FILE: infra/cifuzz/filestore/__init__.py class FilestoreError (line 17) | class FilestoreError(Exception): class BaseFilestore (line 22) | class BaseFilestore: method __init__ (line 25) | def __init__(self, config): method upload_crashes (line 28) | def upload_crashes(self, name, directory): method upload_corpus (line 32) | def upload_corpus(self, name, directory, replace=False): method upload_build (line 36) | def upload_build(self, name, directory): method upload_coverage (line 40) | def upload_coverage(self, name, directory): method download_corpus (line 44) | def download_corpus(self, name, dst_directory): method download_build (line 48) | def download_build(self, name, dst_directory): method download_coverage (line 52) | def download_coverage(self, name, dst_directory): FILE: infra/cifuzz/filestore/filesystem/__init__.py function recursive_list_dir (line 30) | def recursive_list_dir(directory): class FilesystemFilestore (line 40) | class FilesystemFilestore(filestore.BaseFilestore): method __init__ (line 47) | def __init__(self, config): method _get_filestore_path (line 51) | def _get_filestore_path(self, name, prefix_dir): method _upload_directory (line 56) | def _upload_directory(self, name, directory, prefix, delete=False): method _download_directory (line 74) | def _download_directory(self, name, dst_directory, prefix): method upload_crashes (line 78) | def upload_crashes(self, name, directory): method upload_corpus (line 82) | def upload_corpus(self, name, directory, replace=False): method upload_build (line 89) | def upload_build(self, name, directory): method upload_coverage (line 93) | def upload_coverage(self, name, directory): method download_corpus (line 97) | def download_corpus(self, name, dst_directory): method download_build (line 101) | def download_build(self, name, dst_directory): method download_coverage (line 105) | def download_coverage(self, name, dst_directory): FILE: infra/cifuzz/filestore/git/__init__.py function git_runner (line 43) | def git_runner(repo_path): class GitFilestore (line 53) | class GitFilestore(filestore.BaseFilestore): method __init__ (line 58) | def __init__(self, config, ci_filestore): method __del__ (line 66) | def __del__(self): method _clone (line 70) | def _clone(self, repo_url): method _reset_git (line 76) | def _reset_git(self, branch): method _upload_to_git (line 89) | def _upload_to_git(self, method upload_crashes (line 113) | def upload_crashes(self, name, directory): method upload_corpus (line 117) | def upload_corpus(self, name, directory, replace=False): method upload_build (line 125) | def upload_build(self, name, directory): method upload_coverage (line 129) | def upload_coverage(self, name, directory): method download_corpus (line 137) | def download_corpus(self, name, dst_directory): method download_build (line 148) | def download_build(self, name, dst_directory): method download_coverage (line 152) | def download_coverage(self, name, dst_directory): FILE: infra/cifuzz/filestore/git/git_test.py class GitFilestoreTest (line 35) | class GitFilestoreTest(unittest.TestCase): method setUp (line 38) | def setUp(self): method assert_dirs_same (line 67) | def assert_dirs_same(self, first, second): method get_repo_filelist (line 78) | def get_repo_filelist(self, branch): method test_upload_download_corpus (line 84) | def test_upload_download_corpus(self): method test_upload_download_coverage (line 95) | def test_upload_download_coverage(self): method test_upload_crashes (line 106) | def test_upload_crashes(self): method test_upload_build (line 112) | def test_upload_build(self): method test_download_build (line 118) | def test_download_build(self): FILE: infra/cifuzz/filestore/github_actions/__init__.py function tar_directory (line 37) | def tar_directory(directory, archive_path): class GithubActionsFilestore (line 51) | class GithubActionsFilestore(filestore.BaseFilestore): method __init__ (line 65) | def __init__(self, config): method _get_artifact_name (line 69) | def _get_artifact_name(self, name): method _upload_directory (line 76) | def _upload_directory(self, name, directory): # pylint: disable=no-se... method upload_crashes (line 84) | def upload_crashes(self, name, directory): method upload_corpus (line 88) | def upload_corpus(self, name, directory, replace=False): method upload_build (line 95) | def upload_build(self, name, directory): method upload_coverage (line 99) | def upload_coverage(self, name, directory): method download_corpus (line 103) | def download_corpus(self, name, dst_directory): # pylint: disable=unu... method _find_artifact (line 107) | def _find_artifact(self, name): method _download_artifact (line 115) | def _download_artifact(self, name, dst_directory): method _raw_download_artifact (line 136) | def _raw_download_artifact(self, name, dst_directory): method _list_artifacts (line 147) | def _list_artifacts(self): method download_build (line 153) | def download_build(self, name, dst_directory): method download_coverage (line 157) | def download_coverage(self, name, dst_directory): function _upload_artifact_with_upload_js (line 162) | def _upload_artifact_with_upload_js(name, artifact_paths, directory): function _raw_upload_directory (line 170) | def _raw_upload_directory(name, directory): FILE: infra/cifuzz/filestore/github_actions/github_actions_test.py class GithubActionsFilestoreTest (line 34) | class GithubActionsFilestoreTest(unittest.TestCase): method setUp (line 38) | def setUp(self, _): # pylint: disable=arguments-differ method tearDown (line 51) | def tearDown(self): method _get_expected_http_headers (line 54) | def _get_expected_http_headers(self): method test_list_artifacts (line 61) | def test_list_artifacts(self, mock_list_artifacts): method test_download_build_no_artifact (line 73) | def test_download_build_no_artifact(self, _, __, mock_warning): method test_download_corpus_no_artifact (line 88) | def test_download_corpus_no_artifact(self, _, __, mock_warning): method test_upload_corpus (line 100) | def test_upload_corpus(self, mock_upload_artifact, mock_tar_directory): method test_upload_crashes (line 116) | def test_upload_crashes(self, mock_upload_artifact): method test_upload_build (line 129) | def test_upload_build(self, mock_upload_artifact, mock_tar_directory): method test_upload_coverage (line 146) | def test_upload_coverage(self, mock_upload_artifact, mock_tar_directory): method assert_upload (line 161) | def assert_upload(self, mock_upload_artifact, mock_tar_directory, method _create_local_dir (line 181) | def _create_local_dir(self): method test_download_artifact (line 188) | def test_download_artifact(self, mock_download_and_unpack_zip, method test_find_artifact (line 230) | def test_find_artifact(self, mock_list_artifacts): class TarDirectoryTest (line 265) | class TarDirectoryTest(unittest.TestCase): method test_tar_directory (line 268) | def test_tar_directory(self): FILE: infra/cifuzz/filestore/github_actions/github_api.py function get_http_auth_headers (line 38) | def get_http_auth_headers(config): function _get_artifacts_list_api_url (line 47) | def _get_artifacts_list_api_url(repo_owner, repo_name): function _do_get_request (line 55) | def _do_get_request(*args, **kwargs): function _get_items (line 60) | def _get_items(url, headers): function find_artifact (line 96) | def find_artifact(artifact_name, artifacts): function list_artifacts (line 105) | def list_artifacts(owner, repo, headers): FILE: infra/cifuzz/filestore/github_actions/github_api_test.py class GetHttpAuthHeaders (line 29) | class GetHttpAuthHeaders(unittest.TestCase): method test_get_http_auth_headers (line 32) | def test_get_http_auth_headers(self): FILE: infra/cifuzz/filestore/github_actions/upload.js function uploadArtifact (line 29) | async function uploadArtifact() { FILE: infra/cifuzz/filestore/gitlab/__init__.py class GitlabFilestore (line 28) | class GitlabFilestore(filestore.BaseFilestore): method __init__ (line 39) | def __init__(self, config): method upload_crashes (line 48) | def upload_crashes(self, name, directory): method upload_corpus (line 58) | def upload_corpus(self, name, directory, replace=False): method upload_build (line 72) | def upload_build(self, name, directory): method upload_coverage (line 80) | def upload_coverage(self, name, directory): method _copy_from_cache (line 99) | def _copy_from_cache(self, src_dir_cache, dst_directory): method download_corpus (line 107) | def download_corpus(self, name, dst_directory): method download_build (line 118) | def download_build(self, name, dst_directory): method download_coverage (line 125) | def download_coverage(self, name, dst_directory): FILE: infra/cifuzz/filestore/gsutil/__init__.py function _gsutil_execute (line 29) | def _gsutil_execute(*args, parallel=True): function _rsync (line 40) | def _rsync(src, dst, recursive=True, delete=False): class GSUtilFilestore (line 51) | class GSUtilFilestore(filestore.BaseFilestore): method __init__ (line 58) | def __init__(self, config): method _get_gsutil_url (line 62) | def _get_gsutil_url(self, name, prefix_dir): method _upload_directory (line 68) | def _upload_directory(self, name, directory, prefix, delete=False): method _download_directory (line 72) | def _download_directory(self, name, dst_directory, prefix): method upload_crashes (line 76) | def upload_crashes(self, name, directory): method upload_corpus (line 84) | def upload_corpus(self, name, directory, replace=False): method upload_build (line 91) | def upload_build(self, name, directory): method upload_coverage (line 95) | def upload_coverage(self, name, directory): method download_corpus (line 99) | def download_corpus(self, name, dst_directory): method download_build (line 103) | def download_build(self, name, dst_directory): method download_coverage (line 107) | def download_coverage(self, name, dst_directory): FILE: infra/cifuzz/filestore/no_filestore/__init__.py class NoFilestore (line 22) | class NoFilestore(filestore.BaseFilestore): method upload_crashes (line 25) | def upload_crashes(self, name, directory): method upload_corpus (line 29) | def upload_corpus(self, name, directory, replace=False): method upload_build (line 33) | def upload_build(self, name, directory): method upload_coverage (line 37) | def upload_coverage(self, name, directory): method download_corpus (line 41) | def download_corpus(self, name, dst_directory): method download_build (line 45) | def download_build(self, name, dst_directory): method download_coverage (line 49) | def download_coverage(self, name, dst_directory): FILE: infra/cifuzz/filestore_utils.py function get_filestore (line 34) | def get_filestore(config): FILE: infra/cifuzz/filestore_utils_test.py class GetFilestoreTest (line 27) | class GetFilestoreTest(unittest.TestCase): method test_get_filestore (line 35) | def test_get_filestore(self, config_kwargs, filestore_cls): method test_get_filestore_unsupported_platform (line 45) | def test_get_filestore_unsupported_platform(self, _, __): FILE: infra/cifuzz/fuzz_target.py function get_libfuzzer_parallel_options (line 60) | def get_libfuzzer_parallel_options(option): class ReproduceError (line 70) | class ReproduceError(Exception): function get_fuzz_target_corpus_dir (line 74) | def get_fuzz_target_corpus_dir(workspace, target_name): function get_fuzz_target_pruned_corpus_dir (line 79) | def get_fuzz_target_pruned_corpus_dir(workspace, target_name): class FuzzTarget (line 85) | class FuzzTarget: # pylint: disable=too-many-instance-attributes method __init__ (line 96) | def __init__(self, target_path, duration, workspace, clusterfuzz_deplo... method _download_corpus (line 121) | def _download_corpus(self): method _target_artifact_path (line 129) | def _target_artifact_path(self): method _save_crash (line 136) | def _save_crash(self, crash): method prune (line 151) | def prune(self): method fuzz (line 167) | def fuzz(self, batch=False) -> Optional[FuzzResult]: method minimize_testcase (line 248) | def minimize_testcase(self, testcase_path): method free_disk_if_needed (line 260) | def free_disk_if_needed(self, delete_fuzz_target=True): method is_reproducible (line 284) | def is_reproducible(self, testcase, target_path, reproduce_args): method is_crash_reportable (line 333) | def is_crash_reportable(self, testcase, reproduce_args, batch=False): method is_crash_type_reportable (line 376) | def is_crash_type_reportable(self, testcase): method is_crash_novel (line 387) | def is_crash_novel(self, testcase, reproduce_args): FILE: infra/cifuzz/fuzz_target_test.py function _create_config (line 49) | def _create_config(**kwargs): function _create_deployment (line 65) | def _create_deployment(**kwargs): class IsReproducibleTest (line 72) | class IsReproducibleTest(fake_filesystem_unittest.TestCase): method setUp (line 75) | def setUp(self): method test_repro_timed_out (line 104) | def test_repro_timed_out(self, mock_chmod, mock_get_container_name): method test_reproducible (line 117) | def test_reproducible(self, _): method test_flaky (line 134) | def test_flaky(self, _): method test_nonexistent_fuzzer (line 146) | def test_nonexistent_fuzzer(self, _): method test_unreproducible (line 152) | def test_unreproducible(self, _): class IsCrashReportableTest (line 163) | class IsCrashReportableTest(fake_filesystem_unittest.TestCase): method setUp (line 166) | def setUp(self): method test_new_reproducible_crash (line 188) | def test_new_reproducible_crash(self, mock_info, _): method test_invalid_crash (line 210) | def test_invalid_crash(self, is_reproducible_retvals): method test_reproducible_no_oss_fuzz_target (line 221) | def test_reproducible_no_oss_fuzz_target(self, _, mock_info): class FuzzTest (line 248) | class FuzzTest(fake_filesystem_unittest.TestCase): method setUp (line 251) | def setUp(self): method test_get_fuzz_target_artifact (line 260) | def test_get_fuzz_target_artifact(self): class TimeoutIntegrationTest (line 268) | class TimeoutIntegrationTest(unittest.TestCase): method test_timeout_reported (line 274) | def test_timeout_reported(self, report_timeouts, expect_crash): FILE: infra/cifuzz/generate_coverage_report.py function run_coverage_command (line 22) | def run_coverage_command(config, workspace): function download_corpora (line 33) | def download_corpora(fuzz_target_paths, clusterfuzz_deployment): function generate_coverage_report (line 43) | def generate_coverage_report(fuzz_target_paths, workspace, FILE: infra/cifuzz/generate_coverage_report_test.py class TestRunCoverageCommand (line 27) | class TestRunCoverageCommand(unittest.TestCase): method setUp (line 30) | def setUp(self): method test_run_coverage_command (line 34) | def test_run_coverage_command(self, mock_execute): # pylint: disable=... class DownloadCorporaTest (line 57) | class DownloadCorporaTest(unittest.TestCase): method test_download_corpora (line 60) | def test_download_corpora(self): # pylint: disable=no-self-use FILE: infra/cifuzz/get_coverage.py class CoverageError (line 31) | class CoverageError(Exception): class BaseCoverage (line 35) | class BaseCoverage: method __init__ (line 38) | def __init__(self, repo_path): method get_files_covered_by_target (line 41) | def get_files_covered_by_target(self, target): method get_target_coverage (line 78) | def get_target_coverage(self, target): class OSSFuzzCoverage (line 90) | class OSSFuzzCoverage(BaseCoverage): method __init__ (line 93) | def __init__(self, repo_path, oss_fuzz_project_name): method get_target_coverage (line 102) | def get_target_coverage(self, target): function _get_oss_fuzz_latest_cov_report_info (line 118) | def _get_oss_fuzz_latest_cov_report_info(oss_fuzz_project_name): function _get_oss_fuzz_fuzzer_stats_dir_url (line 132) | def _get_oss_fuzz_fuzzer_stats_dir_url(oss_fuzz_project_name): class FilesystemCoverage (line 156) | class FilesystemCoverage(BaseCoverage): method __init__ (line 159) | def __init__(self, repo_path, project_coverage_dir): method get_target_coverage (line 163) | def get_target_coverage(self, target): function is_file_covered (line 188) | def is_file_covered(file_cov): function get_coverage_per_file (line 193) | def get_coverage_per_file(target_cov): function _normalize_repo_path (line 202) | def _normalize_repo_path(repo_path): FILE: infra/cifuzz/get_coverage_test.py class GetOssFuzzFuzzerStatsDirUrlTest (line 43) | class GetOssFuzzFuzzerStatsDirUrlTest(unittest.TestCase): method test_get_valid_project (line 51) | def test_get_valid_project(self, mock_get_json_from_url): method test_get_invalid_project (line 68) | def test_get_invalid_project(self): class OSSFuzzCoverageGetTargetCoverageTest (line 74) | class OSSFuzzCoverageGetTargetCoverageTest(unittest.TestCase): method setUp (line 77) | def setUp(self): method test_valid_target (line 84) | def test_valid_target(self, mock_get_json_from_url): method test_invalid_target (line 92) | def test_invalid_target(self): method test_invalid_project_json (line 99) | def test_invalid_project_json(self, _): # pylint: disable=no-self-use function _get_expected_curl_covered_file_list (line 105) | def _get_expected_curl_covered_file_list(): function _get_example_curl_coverage (line 114) | def _get_example_curl_coverage(): class OSSFuzzCoverageGetFilesCoveredByTargetTest (line 122) | class OSSFuzzCoverageGetFilesCoveredByTargetTest(unittest.TestCase): method setUp (line 125) | def setUp(self): method test_malformed_cov_data (line 138) | def test_malformed_cov_data(self, coverage_data): method test_valid_target (line 144) | def test_valid_target(self): method test_invalid_target (line 155) | def test_invalid_target(self): class FilesystemCoverageGetFilesCoveredByTargetTest (line 161) | class FilesystemCoverageGetFilesCoveredByTargetTest( method setUp (line 165) | def setUp(self): method test_valid_target (line 176) | def test_valid_target(self): method test_invalid_target (line 182) | def test_invalid_target(self): class IsFileCoveredTest (line 188) | class IsFileCoveredTest(unittest.TestCase): method test_is_file_covered_covered (line 191) | def test_is_file_covered_covered(self): method test_is_file_covered_not_covered (line 206) | def test_is_file_covered_not_covered(self): class GetOssFuzzLatestCovReportInfo (line 222) | class GetOssFuzzLatestCovReportInfo(unittest.TestCase): method test_get_oss_fuzz_latest_cov_report_info (line 232) | def test_get_oss_fuzz_latest_cov_report_info(self, mock_get_json_from_... method test_get_oss_fuzz_latest_cov_report_info_fail (line 242) | def test_get_oss_fuzz_latest_cov_report_info_fail(self, _, mock_error): FILE: infra/cifuzz/http_utils.py function download_and_unpack_zip (line 33) | def download_and_unpack_zip(url, extract_directory, headers=None): function download_url (line 67) | def download_url(*args, **kwargs): function get_json_from_url (line 76) | def get_json_from_url(url): function _download_url (line 94) | def _download_url(url, filename, headers=None): FILE: infra/cifuzz/http_utils_test.py class DownloadUrlTest (line 26) | class DownloadUrlTest(unittest.TestCase): method test_download_url_no_error (line 33) | def test_download_url_no_error(self, mock_urlretrieve, _): method test_download_url_http_error (line 42) | def test_download_url_http_error(self, mock_get, mock_error, _): method test_download_url_connection_error (line 52) | def test_download_url_connection_error(self, mock_get, mock_sleep): class DownloadAndUnpackZipTest (line 59) | class DownloadAndUnpackZipTest(fake_filesystem_unittest.TestCase): method setUp (line 62) | def setUp(self): method test_bad_zip_download (line 66) | def test_bad_zip_download(self, _): FILE: infra/cifuzz/logs.py function init (line 20) | def init(): FILE: infra/cifuzz/platform_config/__init__.py class BasePlatformConfig (line 21) | class BasePlatformConfig: method project_src_path (line 25) | def project_src_path(self): method workspace (line 37) | def workspace(self): method git_sha (line 44) | def git_sha(self): method base_commit (line 58) | def base_commit(self): method base_ref (line 64) | def base_ref(self): method pr_ref (line 70) | def pr_ref(self): method project_repo_owner (line 84) | def project_repo_owner(self): method project_repo_name (line 89) | def project_repo_name(self): method actor (line 94) | def actor(self): method token (line 99) | def token(self): method docker_in_docker (line 104) | def docker_in_docker(self): method filestore (line 109) | def filestore(self): method git_url (line 114) | def git_url(self): FILE: infra/cifuzz/platform_config/gcb.py class PlatformConfig (line 21) | class PlatformConfig(platform_config.BasePlatformConfig): method project_src_path (line 25) | def project_src_path(self): method workspace (line 33) | def workspace(self): method filestore (line 38) | def filestore(self): FILE: infra/cifuzz/platform_config/github.py function _get_github_event_path (line 22) | def _get_github_event_path(): function _get_event_data (line 26) | def _get_event_data(): class PlatformConfig (line 33) | class PlatformConfig(platform_config.BasePlatformConfig): method __init__ (line 36) | def __init__(self): method workspace (line 41) | def workspace(self): method git_sha (line 46) | def git_sha(self): method actor (line 60) | def actor(self): method token (line 65) | def token(self): method project_src_path (line 70) | def project_src_path(self): method _project_repo_owner_and_name (line 82) | def _project_repo_owner_and_name(self): method project_repo_owner (line 91) | def project_repo_owner(self): method project_repo_name (line 96) | def project_repo_name(self): method git_url (line 101) | def git_url(self): method base_commit (line 117) | def base_commit(self): method pr_ref (line 126) | def pr_ref(self): method base_ref (line 144) | def base_ref(self): FILE: infra/cifuzz/platform_config/github_test.py class GetProjectRepoOwnerAndNameTest (line 25) | class GetProjectRepoOwnerAndNameTest(unittest.TestCase): method setUp (line 29) | def setUp(self, _): method test_github_repository_owner (line 36) | def test_github_repository_owner(self): method test_github_repository_name (line 41) | def test_github_repository_name(self): class ProjectSrcPathTest (line 48) | class ProjectSrcPathTest(unittest.TestCase): method setUp (line 51) | def setUp(self): method test_github_unset (line 58) | def test_github_unset(self, _): method test_github (line 65) | def test_github(self, _): class GetGitUrlTest (line 74) | class GetGitUrlTest(unittest.TestCase): method setUp (line 78) | def setUp(self, _): method test_repository (line 82) | def test_repository(self): FILE: infra/cifuzz/platform_config/gitlab.py class PlatformConfig (line 22) | class PlatformConfig(platform_config.BasePlatformConfig): method workspace (line 26) | def workspace(self): method git_sha (line 31) | def git_sha(self): method project_src_path (line 36) | def project_src_path(self): method token (line 41) | def token(self): method project_repo_name (line 46) | def project_repo_name(self): method base_commit (line 51) | def base_commit(self): method base_ref (line 60) | def base_ref(self): method filestore (line 66) | def filestore(self): method artifacts_dir (line 71) | def artifacts_dir(self): method cache_dir (line 76) | def cache_dir(self): FILE: infra/cifuzz/platform_config/platform_config_test.py class GetProjectRepoOwnerAndNameTest (line 22) | class GetProjectRepoOwnerAndNameTest(unittest.TestCase): method setUp (line 25) | def setUp(self): method test_unset_repository (line 31) | def test_unset_repository(self): method test_owner (line 35) | def test_owner(self): method test_empty_repository (line 39) | def test_empty_repository(self): method test_repository (line 45) | def test_repository(self): class ProjectSrcPathTest (line 52) | class ProjectSrcPathTest(unittest.TestCase): method setUp (line 55) | def setUp(self): method test_not_github (line 58) | def test_not_github(self): class GetGitUrlTest (line 67) | class GetGitUrlTest(unittest.TestCase): method setUp (line 70) | def setUp(self): method test_unset_repository (line 74) | def test_unset_repository(self): method test_repository (line 78) | def test_repository(self): FILE: infra/cifuzz/platform_config/prow.py class PlatformConfig (line 23) | class PlatformConfig(platform_config.BasePlatformConfig): method project_src_path (line 27) | def project_src_path(self): method workspace (line 36) | def workspace(self): method base_ref (line 42) | def base_ref(self): method project_repo_name (line 47) | def project_repo_name(self): method base_commit (line 52) | def base_commit(self): method docker_in_docker (line 57) | def docker_in_docker(self): method filestore (line 62) | def filestore(self): FILE: infra/cifuzz/platform_config/standalone.py class PlatformConfig (line 22) | class PlatformConfig(platform_config.BasePlatformConfig): method filestore (line 26) | def filestore(self): method filestore_root_dir (line 31) | def filestore_root_dir(self): FILE: infra/cifuzz/run_cifuzz.py function set_default_env_var_if_unset (line 27) | def set_default_env_var_if_unset(env_var, default_value): function docker_run (line 34) | def docker_run(name, workspace, project_src_path): function docker_build (line 52) | def docker_build(image): function main (line 61) | def main(): FILE: infra/cifuzz/run_fuzzers.py class RunFuzzersResult (line 33) | class RunFuzzersResult(enum.Enum): class BaseFuzzTargetRunner (line 40) | class BaseFuzzTargetRunner: method __init__ (line 43) | def __init__(self, config): method get_fuzz_targets (line 53) | def get_fuzz_targets(self): method initialize (line 57) | def initialize(self): method cleanup_after_fuzz_target_run (line 94) | def cleanup_after_fuzz_target_run(self, fuzz_target_obj): # pylint: d... method run_fuzz_target (line 98) | def run_fuzz_target(self, fuzz_target_obj): # pylint: disable=no-self... method quit_on_bug_found (line 103) | def quit_on_bug_found(self): method create_fuzz_target_obj (line 108) | def create_fuzz_target_obj(self, target_path, run_seconds): method run_fuzz_targets (line 113) | def run_fuzz_targets(self): function write_fuzz_result_to_sarif (line 159) | def write_fuzz_result_to_sarif(fuzz_result, target_path, workspace): class PruneTargetRunner (line 166) | class PruneTargetRunner(BaseFuzzTargetRunner): method quit_on_bug_found (line 170) | def quit_on_bug_found(self): method run_fuzz_target (line 173) | def run_fuzz_target(self, fuzz_target_obj): method cleanup_after_fuzz_target_run (line 182) | def cleanup_after_fuzz_target_run(self, fuzz_target_obj): # pylint: d... function is_coverage_fuzz_target (line 195) | def is_coverage_fuzz_target(file_path): function get_coverage_fuzz_targets (line 206) | def get_coverage_fuzz_targets(out): class CoverageTargetRunner (line 219) | class CoverageTargetRunner(BaseFuzzTargetRunner): method quit_on_bug_found (line 223) | def quit_on_bug_found(self): method get_fuzz_targets (line 226) | def get_fuzz_targets(self): method run_fuzz_targets (line 230) | def run_fuzz_targets(self): method run_fuzz_target (line 238) | def run_fuzz_target(self, fuzz_target_obj): # pylint: disable=no-self... method cleanup_after_fuzz_target_run (line 242) | def cleanup_after_fuzz_target_run(self, fuzz_target_obj): # pylint: d... class CiFuzzTargetRunner (line 247) | class CiFuzzTargetRunner(BaseFuzzTargetRunner): method quit_on_bug_found (line 251) | def quit_on_bug_found(self): method cleanup_after_fuzz_target_run (line 254) | def cleanup_after_fuzz_target_run(self, fuzz_target_obj): # pylint: d... method run_fuzz_target (line 258) | def run_fuzz_target(self, fuzz_target_obj): # pylint: disable=no-self... class BatchFuzzTargetRunner (line 262) | class BatchFuzzTargetRunner(BaseFuzzTargetRunner): method quit_on_bug_found (line 266) | def quit_on_bug_found(self): method run_fuzz_target (line 269) | def run_fuzz_target(self, fuzz_target_obj): method cleanup_after_fuzz_target_run (line 277) | def cleanup_after_fuzz_target_run(self, fuzz_target_obj): function get_fuzz_target_runner (line 293) | def get_fuzz_target_runner(config): function run_fuzzers (line 301) | def run_fuzzers(config): # pylint: disable=too-many-locals FILE: infra/cifuzz/run_fuzzers_entrypoint.py function delete_unneeded_docker_images (line 29) | def delete_unneeded_docker_images(config): function run_fuzzers_entrypoint (line 50) | def run_fuzzers_entrypoint(): function main (line 85) | def main(): FILE: infra/cifuzz/run_fuzzers_test.py class RunFuzzerIntegrationTestMixin (line 55) | class RunFuzzerIntegrationTestMixin: # pylint: disable=too-few-public-m... method setUp (line 62) | def setUp(self): method _test_run_with_sanitizer (line 66) | def _test_run_with_sanitizer(self, fuzzer_dir, sanitizer): class RunMemoryFuzzerIntegrationTest (line 80) | class RunMemoryFuzzerIntegrationTest(RunFuzzerIntegrationTestMixin, method test_run_with_memory_sanitizer (line 86) | def test_run_with_memory_sanitizer(self): class RunUndefinedFuzzerIntegrationTest (line 93) | class RunUndefinedFuzzerIntegrationTest(RunFuzzerIntegrationTestMixin, method test_run_with_undefined_sanitizer (line 99) | def test_run_with_undefined_sanitizer(self): class BaseFuzzTargetRunnerTest (line 104) | class BaseFuzzTargetRunnerTest(unittest.TestCase): method _create_runner (line 107) | def _create_runner(self, **kwargs): # pylint: disable=no-self-use method _test_initialize_fail (line 119) | def _test_initialize_fail(self, expected_error_args, **create_runner_k... method test_initialize_invalid_fuzz_seconds (line 126) | def test_initialize_invalid_fuzz_seconds(self, fuzz_seconds): method test_initialize_no_out_dir (line 141) | def test_initialize_no_out_dir(self): method test_initialize_nonempty_artifacts (line 148) | def test_initialize_nonempty_artifacts(self): method test_initialize_bad_artifacts (line 162) | def test_initialize_bad_artifacts(self): method test_initialize_empty_artifacts (line 179) | def test_initialize_empty_artifacts(self, mock_log_error, method test_initialize_no_artifacts (line 195) | def test_initialize_no_artifacts(self, mock_log_error, mock_get_fuzz_t... method test_initialize_no_fuzz_targets (line 206) | def test_initialize_no_fuzz_targets(self): class CiFuzzTargetRunnerTest (line 216) | class CiFuzzTargetRunnerTest(fake_filesystem_unittest.TestCase): method setUp (line 219) | def setUp(self): method test_run_fuzz_targets_quits (line 226) | def test_run_fuzz_targets_quits(self, mock_create_fuzz_target_obj, class BatchFuzzTargetRunnerTest (line 256) | class BatchFuzzTargetRunnerTest(fake_filesystem_unittest.TestCase): method setUp (line 262) | def setUp(self): method test_run_fuzz_targets_quits (line 278) | def test_run_fuzz_targets_quits(self, mock_create_fuzz_target_obj, class GetCoverageTargetsTest (line 307) | class GetCoverageTargetsTest(unittest.TestCase): method test_get_fuzz_targets (line 310) | def test_get_fuzz_targets(self): class CoverageReportIntegrationTest (line 335) | class CoverageReportIntegrationTest(unittest.TestCase): method setUp (line 339) | def setUp(self): method test_coverage_report (line 343) | def test_coverage_report(self, _): class RunAddressFuzzersIntegrationTest (line 403) | class RunAddressFuzzersIntegrationTest(RunFuzzerIntegrationTestMixin, method test_new_bug_found (line 409) | def test_new_bug_found(self): method test_old_bug_found (line 428) | def test_old_bug_found(self, _): method test_invalid_build (line 440) | def test_invalid_build(self): class GetFuzzTargetRunnerTest (line 453) | class GetFuzzTargetRunnerTest(unittest.TestCase): method test_get_fuzz_target_runner (line 461) | def test_get_fuzz_target_runner(self, mode, fuzz_target_runner_cls): FILE: infra/cifuzz/sarif_utils.py function redact_src_path (line 150) | def redact_src_path(src_path): function get_error_frame (line 160) | def get_error_frame(crash_info): function get_error_source_info (line 178) | def get_error_source_info(crash_info): function get_rule_index (line 189) | def get_rule_index(crash_type): function get_sarif_data (line 202) | def get_sarif_data(stacktrace, target_path): function write_stacktrace_to_sarif (line 245) | def write_stacktrace_to_sarif(stacktrace, target_path, workspace): FILE: infra/cifuzz/sarif_utils_test.py class GetSarifDataTest (line 26) | class GetSarifDataTest(unittest.TestCase): method setUp (line 29) | def setUp(self): method test_get_sarif_data_none (line 32) | def test_get_sarif_data_none(self): method test_ordinary_case (line 37) | def test_ordinary_case(self): method test_llvmfuzzertestoneinput_case (line 67) | def test_llvmfuzzertestoneinput_case(self): method test_msan (line 76) | def test_msan(self): class RedactSrcPathTest (line 85) | class RedactSrcPathTest(unittest.TestCase): method test_redact_src_path (line 88) | def test_redact_src_path(self): function _get_mock_crash_info (line 94) | def _get_mock_crash_info(): class GetErrorSourceInfoTest (line 108) | class GetErrorSourceInfoTest(unittest.TestCase): method test_redact_src_path (line 111) | def test_redact_src_path(self): class GetRuleIndexTest (line 119) | class GetRuleIndexTest(unittest.TestCase): method test_get_rule_index (line 123) | def test_get_rule_index(self): FILE: infra/cifuzz/test_data/TimeoutFuzzer.cpp function LLVMFuzzerTestOneInput (line 32) | int LLVMFuzzerTestOneInput(uint8_t* data, size_t size) { FILE: infra/cifuzz/test_data/external-project/do_stuff_fuzzer.cpp function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: infra/cifuzz/test_data/external-project/my_api.cpp function DoStuff (line 22) | size_t DoStuff(const std::string &str) { FILE: infra/cifuzz/test_data/external-project/standalone_fuzz_target_runner.cpp function main (line 31) | int main(int argc, char **argv) { FILE: infra/cifuzz/test_helpers.py function _create_config (line 39) | def _create_config(config_cls, _, __, ___, **kwargs): function create_build_config (line 52) | def create_build_config(**kwargs): function create_run_config (line 57) | def create_run_config(**kwargs): function create_workspace (line 62) | def create_workspace(workspace_path='/workspace'): function patch_environ (line 69) | def patch_environ(testcase_obj, env=None, empty=False, runner=False): function temp_dir_copy (line 98) | def temp_dir_copy(directory): function docker_temp_dir (line 107) | def docker_temp_dir(): FILE: infra/cifuzz/workspace_utils.py class Workspace (line 20) | class Workspace: method __init__ (line 23) | def __init__(self, config): method initialize_dir (line 26) | def initialize_dir(self, directory): # pylint: disable=no-self-use method repo_storage (line 31) | def repo_storage(self): method out (line 36) | def out(self): method work (line 43) | def work(self): method artifacts (line 48) | def artifacts(self): method clusterfuzz_build (line 54) | def clusterfuzz_build(self): method clusterfuzz_coverage (line 59) | def clusterfuzz_coverage(self): method coverage_report (line 64) | def coverage_report(self): method corpora (line 69) | def corpora(self): method pruned_corpora (line 74) | def pruned_corpora(self): method sarif (line 79) | def sarif(self): method make_repo_for_sarif (line 83) | def make_repo_for_sarif(self, repo_manager): FILE: infra/common_utils.py function get_project_build_subdir (line 53) | def get_project_build_subdir(project, subdir_name): function get_out_dir (line 62) | def get_out_dir(project=''): class Project (line 68) | class Project: method __init__ (line 72) | def __init__( method dockerfile_path (line 89) | def dockerfile_path(self): method language (line 94) | def language(self): method base_os_version (line 113) | def base_os_version(self): method coverage_extra_args (line 130) | def coverage_extra_args(self): method out (line 159) | def out(self): method work (line 164) | def work(self): method corpus (line 169) | def corpus(self): function is_base_image (line 174) | def is_base_image(image_name): function check_project_exists (line 179) | def check_project_exists(project): function get_command_string (line 193) | def get_command_string(command): function docker_build (line 198) | def docker_build(build_args): function docker_pull (line 213) | def docker_pull(image): function pull_images (line 227) | def pull_images(language=None): function build_image_impl (line 240) | def build_image_impl(project, cache=True, pull=False, architecture='x86_... FILE: infra/experimental/SystemSan/PoEs/node-shell-quote-v1.7.3/target.js function fuzz (line 25) | function fuzz(buf) { FILE: infra/experimental/SystemSan/PoEs/pytorch-lightning-1.5.10/fuzz_pytorch_lightning.py function prepare_fuzzing_input (line 35) | def prepare_fuzzing_input(data): function exploit_target (line 42) | def exploit_target(env_value, env_name): function TestOneInput (line 52) | def TestOneInput(data): # pylint: disable=invalid-name function main (line 58) | def main(): FILE: infra/experimental/SystemSan/SystemSan.cpp type Tracee (line 137) | struct Tracee { method Tracee (line 141) | Tracee(pid_t pid) : pid(pid) {} function pid_t (line 144) | pid_t run_child(char **argv) { function read_string (line 159) | std::string read_string(pid_t pid, unsigned long reg, unsigned long leng... function inspect_for_injection (line 170) | void inspect_for_injection(pid_t pid, const user_regs_struct ®s) { function get_pathname (line 182) | std::string get_pathname(pid_t pid, const user_regs_struct ®s) { function identify_sh (line 192) | std::string identify_sh(std::string path) { function match_shell (line 210) | std::string match_shell(std::string binary_pathname) { function get_shell (line 237) | std::string get_shell(pid_t pid, const user_regs_struct ®s) { function match_error_pattern (line 243) | void match_error_pattern(std::string buffer, std::string shell, pid_t pi... function inspect_for_corruption (line 263) | void inspect_for_corruption(pid_t pid, const user_regs_struct ®s) { function log_file_open (line 270) | void log_file_open(std::string path, int flags, pid_t pid) { function has_unprintable (line 289) | bool has_unprintable(const std::string &value) { function inspect_for_arbitrary_file_open (line 298) | void inspect_for_arbitrary_file_open(pid_t pid, const user_regs_struct &... function trace (line 323) | int trace(std::map pids) { function main (line 459) | int main(int argc, char **argv) { FILE: infra/experimental/SystemSan/inspect_dns.cpp function inspect_for_arbitrary_dns_connect (line 40) | void inspect_for_arbitrary_dns_connect(pid_t pid, const user_regs_struct... type DnsHeader (line 51) | struct DnsHeader { function parse_dns_header (line 60) | struct DnsHeader parse_dns_header(std::vector data) { function dns_flags_standard_query (line 71) | bool dns_flags_standard_query(uint16_t flags) { type DnsRequest (line 88) | struct DnsRequest { function parse_dns_request (line 103) | struct DnsRequest parse_dns_request(std::vector data, size_t ... function log_dns_request (line 128) | void log_dns_request(struct DnsRequest r, std::vector data) { function inspect_for_arbitrary_dns_pkt (line 146) | void inspect_for_arbitrary_dns_pkt(std::vector data, pid_t pi... function inspect_for_arbitrary_dns_fdbuffer (line 170) | void inspect_for_arbitrary_dns_fdbuffer(pid_t pid, const user_regs_struc... function inspect_for_arbitrary_dns_iov (line 179) | void inspect_for_arbitrary_dns_iov(pid_t pid, unsigned long iov) { function inspect_for_arbitrary_dns_sendmsg (line 190) | void inspect_for_arbitrary_dns_sendmsg(pid_t pid, const user_regs_struct... function inspect_for_arbitrary_dns_sendmmsg (line 202) | void inspect_for_arbitrary_dns_sendmmsg(pid_t pid, const user_regs_struc... function inspect_dns_syscalls (line 214) | void inspect_dns_syscalls(pid_t pid, const user_regs_struct ®s) { FILE: infra/experimental/SystemSan/inspect_utils.cpp function read_memory (line 37) | std::vector read_memory(pid_t pid, unsigned long long address, function report_bug (line 54) | void report_bug(std::string bug_type, pid_t tid) { FILE: infra/experimental/SystemSan/target.cpp function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(char* data, size_t size) { FILE: infra/experimental/SystemSan/target_dns.cpp function LLVMFuzzerTestOneInput (line 27) | int LLVMFuzzerTestOneInput(char* data, size_t size) { FILE: infra/experimental/SystemSan/target_file.cpp function LLVMFuzzerTestOneInput (line 24) | int LLVMFuzzerTestOneInput(char* data, size_t size) { FILE: infra/experimental/contrib/arvo/arvo_data.py function update_resource_info (line 16) | def update_resource_info(item_name: str, item_url: str, function dockerfile_cleaner (line 38) | def dockerfile_cleaner(dockerfile_path: str | Path) -> None: function fix_dockerfile (line 51) | def fix_dockerfile(dockerfile_path: str | Path, function fix_build_script (line 92) | def fix_build_script(file_path: Path, project_name: str) -> bool: function extra_scripts (line 115) | def extra_scripts(project_name: str, source_dir: Path) -> bool: function special_component (line 135) | def special_component(project_name: str, item_key: str, item: Dict[str, ... function skip_component (line 168) | def skip_component(project_name: str, item_name: str) -> bool: FILE: infra/experimental/contrib/arvo/arvo_reproducer.py class BuildData (line 51) | class BuildData: function parse_oss_fuzz_report (line 58) | def parse_oss_fuzz_report(report_text: bytes, function fetch_issue (line 134) | def fetch_issue(local_id: int | str) -> dict[str, Any] | bool: function parse_job_type (line 192) | def parse_job_type(job_type: str) -> dict[str, Any]: function download_build_artifacts (line 230) | def download_build_artifacts(metadata: dict[str, Any], url: str, function get_project_name (line 335) | def get_project_name(issue: dict[str, Any], srcmap: str | Path) -> str |... function get_language (line 366) | def get_language(project_dir: Path) -> str | bool: function get_sanitizer (line 390) | def get_sanitizer(fuzzer_sanitizer: str) -> str | bool: function download_poc (line 404) | def download_poc(issue: dict[str, Any], path: Path, name: str) -> Path |... function prepare_ossfuzz (line 432) | def prepare_ossfuzz(project_name: str, function rebase_dockerfile (line 495) | def rebase_dockerfile(dockerfile_path: str | Path, commit_date: str) -> ... function update_revision_info (line 575) | def update_revision_info(dockerfile: str | Path, src_path: str, function build_fuzzers_impl (line 668) | def build_fuzzers_impl(local_id: int | str, function build_fuzzer_with_source (line 768) | def build_fuzzer_with_source(local_id: int | str, project_name: str, function build_from_srcmap (line 969) | def build_from_srcmap(srcmap: Path, issue: dict[str, Any], tag: str) -> ... function arvo_reproducer (line 1006) | def arvo_reproducer(local_id: int | str, tag: str) -> bool: function main (line 1065) | def main() -> None: FILE: infra/experimental/contrib/arvo/arvo_reproducer_test.py class ArvoReproducingTest (line 30) | class ArvoReproducingTest(unittest.TestCase): method test_reproduce (line 33) | def test_reproduce(self) -> None: class ArvoUnitTests (line 60) | class ArvoUnitTests(unittest.TestCase): method test_fetch_issue (line 63) | def test_fetch_issue(self) -> None: method test_download_poc (line 97) | def test_download_poc(self) -> None: method test_rebase_dockerfile (line 107) | def test_rebase_dockerfile(self) -> None: FILE: infra/experimental/contrib/arvo/arvo_utils.py function load_repo_map (line 27) | def load_repo_map(file_name: str) -> Dict[str, Any]: class CommandResult (line 72) | class CommandResult: function execute (line 78) | def execute(cmd: List[str], function check_call (line 111) | def check_call(cmd: List[str], function _git_pull (line 137) | def _git_pull(cwd: Path) -> bool: function _hg_pull (line 150) | def _hg_pull(cwd: Path) -> bool: function _svn_pull (line 163) | def _svn_pull(cwd: Path) -> bool: function clone (line 176) | def clone(url: str, function svn_clone (line 251) | def svn_clone(url: str, function hg_clone (line 291) | def hg_clone(url: str, class DockerfileModifier (line 333) | class DockerfileModifier: method __init__ (line 336) | def __init__(self, path: str | Path) -> None: method flush (line 360) | def flush(self) -> bool: method str_replace (line 373) | def str_replace(self, old: str, new: str) -> None: method str_replace_all (line 382) | def str_replace_all(self, pairs: Dict[str, str]) -> None: method replace_line_at (line 391) | def replace_line_at(self, pos: int, line: str) -> None: method replace (line 403) | def replace(self, old: str, new: str, flags: int = 0) -> None: method replace_once (line 413) | def replace_once(self, old: str, new: str) -> None: method insert_line_before (line 422) | def insert_line_before(self, target: str, newline: str) -> bool | None: method insert_line_after (line 438) | def insert_line_after(self, target: str, newline: str) -> bool | None: method insert_line_at (line 454) | def insert_line_at(self, pos: int, line: str) -> None: method remove_range (line 465) | def remove_range(self, starts: int, ends: int) -> None: method clean_comments (line 479) | def clean_comments(self) -> None: method locate_str (line 486) | def locate_str(self, keyword: str) -> int | bool: method get_line (line 501) | def get_line(self, keyword: str) -> Tuple[List[str], int]: class VersionControlTool (line 535) | class VersionControlTool: method __init__ (line 538) | def __init__(self, method pull (line 571) | def pull(self) -> bool: method clone (line 584) | def clone(self, url: str, revision: str | None = None) -> Path | bool: method commit_date (line 612) | def commit_date(self, commit: str) -> str | bool: method reset (line 647) | def reset(self, commit: str) -> bool: function docker_build (line 670) | def docker_build(args: List[str], log_file: Path | None = None) -> bool: function docker_run (line 693) | def docker_run(args: List[str], function clean_dir (line 723) | def clean_dir(directory: Path) -> bool: function leave_ret (line 743) | def leave_ret(return_val: Any, tmp_dirs: Path | list[Path]) -> Any: FILE: infra/experimental/contrib/arvo/hacks/__init__.py class ProjectHack (line 20) | class ProjectHack(ABC): method __init__ (line 23) | def __init__(self): method set_commit_date (line 26) | def set_commit_date(self, commit_date): method apply_dockerfile_fixes (line 31) | def apply_dockerfile_fixes(self, dft: DockerfileModifier) -> bool: method apply_build_script_fixes (line 42) | def apply_build_script_fixes(self, dft: DockerfileModifier) -> bool: method apply_extra_fixes (line 54) | def apply_extra_fixes(self, source_dir: Path) -> bool: function get_project_hack (line 67) | def get_project_hack(project_name: str) -> ProjectHack | None: function x265_fix (line 89) | def x265_fix(dft: DockerfileModifier) -> None: FILE: infra/experimental/contrib/arvo/hacks/cryptofuzz.py class CryptofuzzHack (line 6) | class CryptofuzzHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/dlplibs.py class DLPLibsHack (line 6) | class DLPLibsHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/duckdb.py class DuckDBHack (line 6) | class DuckDBHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: method apply_build_script_fixes (line 13) | def apply_build_script_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/ffmpeg.py class FFmpegHack (line 6) | class FFmpegHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/ghostscript.py class GhostscriptHack (line 6) | class GhostscriptHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: method apply_build_script_fixes (line 13) | def apply_build_script_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/gnutls.py class GnuTLSHack (line 6) | class GnuTLSHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/graphicsmagick.py class GraphicsMagickHack (line 6) | class GraphicsMagickHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/imagemagick.py class ImageMagickHack (line 7) | class ImageMagickHack(ProjectHack): method apply_dockerfile_fixes (line 10) | def apply_dockerfile_fixes(self, dft) -> bool: method apply_extra_fixes (line 17) | def apply_extra_fixes(self, source_dir: Path) -> bool: FILE: infra/experimental/contrib/arvo/hacks/jbig2dec.py class JBIG2DECHack (line 6) | class JBIG2DECHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: method apply_build_script_fixes (line 14) | def apply_build_script_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/lcms.py class LCMSHack (line 6) | class LCMSHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/libheif.py class LibHeifHack (line 6) | class LibHeifHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/libredwg.py class LibreDWGHack (line 6) | class LibreDWGHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: method apply_build_script_fixes (line 13) | def apply_build_script_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/libreoffice.py class LibreOfficeHack (line 6) | class LibreOfficeHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: method apply_build_script_fixes (line 26) | def apply_build_script_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/libyang.py class LibYangHack (line 6) | class LibYangHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/lwan.py class LwanHack (line 6) | class LwanHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/openh264.py class OpenH264Hack (line 6) | class OpenH264Hack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: method apply_build_script_fixes (line 13) | def apply_build_script_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/quickjs.py class QuickJSHack (line 6) | class QuickJSHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/radare2.py class Radare2Hack (line 6) | class Radare2Hack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/skia.py class SkiaHack (line 6) | class SkiaHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/uwebsockets.py class UWebSocketsHack (line 6) | class UWebSocketsHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: method apply_build_script_fixes (line 13) | def apply_build_script_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/wireshark.py class WiresharkHack (line 6) | class WiresharkHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/wolfssl.py class WolfSSLHack (line 6) | class WolfSSLHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/contrib/arvo/hacks/yara.py class YARAHack (line 6) | class YARAHack(ProjectHack): method apply_dockerfile_fixes (line 9) | def apply_dockerfile_fixes(self, dft) -> bool: FILE: infra/experimental/mcp/client.py function run_agent_loop (line 179) | async def run_agent_loop(prompt: str) -> list: function initialize_oss_fuzz (line 213) | def initialize_oss_fuzz() -> None: function _get_oss_fuzz_filetree (line 226) | def _get_oss_fuzz_filetree(project_name: str) -> str: function _get_upstream_repo (line 241) | def _get_upstream_repo(project_name: str) -> str: function _detect_language (line 258) | def _detect_language(project_name: str) -> str: function prepare_oss_fuzz_project (line 294) | def prepare_oss_fuzz_project(project_name: str) -> bool: function does_project_build (line 334) | async def does_project_build(project: str) -> bool: function fix_project_build (line 367) | async def fix_project_build(project: str, max_tries: int = 3): function _get_all_broken_oss_fuzz_projects (line 422) | def _get_all_broken_oss_fuzz_projects(language: str = '') -> list[str]: function add_run_tests_command (line 475) | async def add_run_tests_command(project_name: str): function expand_existing_project (line 531) | async def expand_existing_project(project_name: str): function _log_nodes (line 566) | def _log_nodes(logfile, nodes, header_text=''): function fix_oss_fuzz_projects (line 577) | async def fix_oss_fuzz_projects(projects_to_fix=None, function initiate_project_creation (line 615) | async def initiate_project_creation(project: str, project_repo: str, function prepare_new_oss_fuzz_project (line 780) | def prepare_new_oss_fuzz_project(project_name: str, project_url: str) ->... function create_oss_fuzz_integration_for_project (line 803) | async def create_oss_fuzz_integration_for_project(project_url: str, function parse_arguments (line 880) | def parse_arguments(): function main (line 946) | async def main(): FILE: infra/experimental/mcp/oss_fuzz_server.py function _internal_delay (line 52) | def _internal_delay(): function clone_oss_fuzz_if_it_does_not_exist (line 57) | def clone_oss_fuzz_if_it_does_not_exist(): function _prepare_target_project (line 77) | def _prepare_target_project(): function check_if_oss_fuzz_project_builds (line 98) | async def check_if_oss_fuzz_project_builds() -> bool: function shorten_logs_if_needed (line 128) | def shorten_logs_if_needed(log_string: str) -> str: function build_and_get_build_logs_from_oss_fuzz (line 145) | async def build_and_get_build_logs_from_oss_fuzz() -> str: function get_sample_artifacts_from_oss_fuzz_project (line 186) | async def get_sample_artifacts_from_oss_fuzz_project( function check_run_tests (line 232) | async def check_run_tests( function check_oss_fuzz_fuzzers (line 286) | async def check_oss_fuzz_fuzzers() -> str: function list_files (line 352) | async def list_files(path: str = "") -> str: function get_file_size (line 383) | async def get_file_size(file_path) -> str: function read_file (line 409) | async def read_file(file_path: str, start_idx: int, end_idx: int) -> str: function write_file (line 456) | async def write_file(file_path: str, content: str) -> str: function delete_file (line 483) | async def delete_file(file_path: str) -> str: function search_project_filename (line 511) | async def search_project_filename(project_name: str, filename: str) -> str: function search_project_file_content (line 544) | async def search_project_file_content(project_name: str, function get_coverage_of_oss_fuzz_project (line 580) | async def get_coverage_of_oss_fuzz_project(project_name): function start_mcp_server (line 670) | def start_mcp_server(): FILE: infra/helper.py function _get_base_runner_image (line 50) | def _get_base_runner_image(args, debug=False): function main (line 116) | def main(): # pylint: disable=too-many-branches,too-many-return-statements function bool_to_retcode (line 186) | def bool_to_retcode(boolean): function parse_args (line 193) | def parse_args(parser, args=None): function _add_external_project_args (line 210) | def _add_external_project_args(parser): function get_parser (line 219) | def get_parser(): # pylint: disable=too-many-statements,too-many-locals function _check_fuzzer_exists (line 546) | def _check_fuzzer_exists(project, fuzzer_name, args, architecture='x86_6... function _normalized_name (line 565) | def _normalized_name(name): function _get_absolute_path (line 572) | def _get_absolute_path(path): function _add_architecture_args (line 577) | def _add_architecture_args(parser, choices=None): function _add_engine_args (line 586) | def _add_engine_args(parser, choices=None): function _add_sanitizer_args (line 595) | def _add_sanitizer_args(parser, choices=None): function _add_environment_args (line 605) | def _add_environment_args(parser): function _add_base_image_tag_args (line 612) | def _add_base_image_tag_args(parser): function _env_to_docker_args (line 618) | def _env_to_docker_args(env_list): function workdir_from_lines (line 623) | def workdir_from_lines(lines, default='/src'): function _workdir_from_dockerfile (line 639) | def _workdir_from_dockerfile(project): function prepare_aarch64_emulation (line 647) | def prepare_aarch64_emulation(): function docker_run (line 655) | def docker_run(run_args, *, print_output=True, architecture='x86_64'): function build_image (line 686) | def build_image(args): function build_fuzzers_impl (line 715) | def build_fuzzers_impl( # pylint: disable=too-many-arguments,too-many-l... function run_clusterfuzzlite (line 800) | def run_clusterfuzzlite(args): function build_fuzzers (line 867) | def build_fuzzers(args): function fuzzbench_build_fuzzers (line 893) | def fuzzbench_build_fuzzers(args): function _add_oss_fuzz_ci_if_needed (line 932) | def _add_oss_fuzz_ci_if_needed(env): function check_build (line 939) | def check_build(args): function _get_fuzz_targets (line 980) | def _get_fuzz_targets(project): function _get_latest_corpus (line 1002) | def _get_latest_corpus(project, fuzz_target, base_corpus_dir): function _get_latest_public_corpus (line 1044) | def _get_latest_public_corpus(args, fuzzer): function download_corpora (line 1086) | def download_corpora(args): function coverage (line 1140) | def coverage(args): # pylint: disable=too-many-branches function _introspector_prepare_corpus (line 1215) | def _introspector_prepare_corpus(args): function introspector (line 1250) | def introspector(args): function run_fuzzer (line 1322) | def run_fuzzer(args): function fuzzbench_run_fuzzer (line 1366) | def fuzzbench_run_fuzzer(args): function fuzzbench_measure (line 1421) | def fuzzbench_measure(args): function reproduce (line 1446) | def reproduce(args): function reproduce_impl (line 1453) | def reproduce_impl( # pylint: disable=too-many-arguments function _validate_project_name (line 1500) | def _validate_project_name(project_name): function _validate_language (line 1515) | def _validate_language(language): function _create_build_integration_directory (line 1523) | def _create_build_integration_directory(directory): function _template_project_file (line 1536) | def _template_project_file(filename, template, template_args, directory): function generate (line 1548) | def generate(args): function _get_current_datetime (line 1553) | def _get_current_datetime(): function _base_builder_from_language (line 1558) | def _base_builder_from_language(language): function _generate_impl (line 1563) | def _generate_impl(project, language): function index (line 1594) | def index(args): function shell (line 1660) | def shell(args): FILE: infra/helper_test.py class ShellTest (line 32) | class ShellTest(unittest.TestCase): method test_base_runner_debug (line 37) | def test_base_runner_debug(self, _, __): class BuildImageImplTest (line 48) | class BuildImageImplTest(unittest.TestCase): method test_no_cache (line 52) | def test_no_cache(self, mock_docker_build): method test_pull (line 60) | def test_pull(self, mock_pull_images, _): method test_base_image (line 68) | def test_base_image(self, mock_docker_build): method test_oss_fuzz_project (line 81) | def test_oss_fuzz_project(self, mock_docker_build): method test_external_project (line 95) | def test_external_project(self, mock_docker_build): class GenerateImplTest (line 114) | class GenerateImplTest(fake_filesystem_unittest.TestCase): method setUp (line 119) | def setUp(self): method _verify_templated_files (line 124) | def _verify_templated_files(self, template_dict, directory, language): method test_generate_oss_fuzz_project (line 139) | def test_generate_oss_fuzz_project(self, _): method test_generate_external_project (line 148) | def test_generate_external_project(self): method test_generate_swift_project (line 161) | def test_generate_swift_project(self, _): class ProjectTest (line 170) | class ProjectTest(fake_filesystem_unittest.TestCase): method setUp (line 173) | def setUp(self): method test_init_external_project (line 181) | def test_init_external_project(self): method test_init_internal_project (line 190) | def test_init_internal_project(self): method test_dockerfile_path_internal_project (line 197) | def test_dockerfile_path_internal_project(self): method test_dockerfile_path_external_project (line 204) | def test_dockerfile_path_external_project(self): method test_out (line 212) | def test_out(self): method test_work (line 220) | def test_work(self): method test_corpus (line 228) | def test_corpus(self): method test_language_internal_project (line 236) | def test_language_internal_project(self): method test_language_external_project (line 242) | def test_language_external_project(self): FILE: infra/indexer/frontend/ast_visitor.cc type oss_fuzz (line 58) | namespace oss_fuzz { type indexer (line 59) | namespace indexer { function IsADefinition (line 76) | bool IsADefinition(const clang::Decl* decl) { function IsParentADefinition (line 99) | bool IsParentADefinition(const clang::Decl* decl) { function IsIncompleteFunction (line 242) | bool IsIncompleteFunction(const clang::FunctionDecl* function_decl) { function FormatTemplateParameters (line 331) | std::string FormatTemplateParameters( function FormatTemplateArguments (line 358) | std::string FormatTemplateArguments(const clang::TemplateParameterLi... function GetTemplateParameterSuffix (line 368) | std::string GetTemplateParameterSuffix(const clang::TemplateDecl* de... function GetTemplateParameterSuffix (line 372) | std::string GetTemplateParameterSuffix( function GetTemplateParameterSuffix (line 386) | std::string GetTemplateParameterSuffix( function GetTemplateParameterSuffix (line 405) | std::string GetTemplateParameterSuffix( function GetTemplateParameterSuffix (line 411) | std::string GetTemplateParameterSuffix( function GetName (line 426) | std::string GetName(const clang::Decl* decl) { function GetNameSuffix (line 465) | std::string GetNameSuffix(const clang::Decl* decl, function GetNamePrefixForDeclContext (line 548) | std::string GetNamePrefixForDeclContext(const clang::DeclContext* de... function GetNamePrefix (line 603) | std::string GetNamePrefix(const clang::Decl* decl, function IsIgnoredImplicitDecl (line 642) | bool IsIgnoredImplicitDecl(const clang::Decl* decl) { function IsNotInherited (line 649) | bool IsNotInherited(const clang::Decl* decl) { function CollectPotentialMemberNamesFromAncestors (line 666) | void CollectPotentialMemberNamesFromAncestors( function IsCompleteClass (line 701) | bool IsCompleteClass(const clang::CXXRecordDecl* class_decl) { function ForAllInheritedMembers (line 708) | void ForAllInheritedMembers(clang::Sema& sema, function ReportTranslationUnit (line 748) | void ReportTranslationUnit(llvm::raw_string_ostream& stream, function GetEnumValue (line 760) | std::string GetEnumValue(const clang::EnumConstantDecl* decl) { function AddVirtualMethodLinksImpl (line 775) | void AddVirtualMethodLinksImpl( function LocationId (line 1042) | LocationId AstVisitor::GetLocationId(clang::SourceLocation start, function LocationId (line 1048) | LocationId AstVisitor::GetLocationId(const clang::Decl* decl) { function EntityId (line 1209) | EntityId AstVisitor::GetEntityIdForDecl(const clang::Decl* decl, FILE: infra/indexer/frontend/ast_visitor.h function namespace (line 34) | namespace oss_fuzz { FILE: infra/indexer/frontend/common.cc type oss_fuzz (line 29) | namespace oss_fuzz { type indexer (line 30) | namespace indexer { function ToNormalizedAbsolutePath (line 32) | std::string ToNormalizedAbsolutePath( function LocationId (line 48) | LocationId GetLocationId(InMemoryIndex& index, FILE: infra/indexer/frontend/common.h function namespace (line 26) | namespace oss_fuzz { FILE: infra/indexer/frontend/frontend.cc type oss_fuzz (line 37) | namespace oss_fuzz { type indexer (line 38) | namespace indexer { type frontend_internal (line 39) | namespace frontend_internal { function ParseCommandLine (line 40) | std::vector ParseCommandLine(absl::string_view comman... function RemoveClangArgumentsAdjuster (line 88) | clang::tooling::CommandLineArguments RemoveClangArgumentsAdjuster( function ExtraArgumentsAdjuster (line 107) | clang::tooling::CommandLineArguments ExtraArgumentsAdjuster( function GetIndexActions (line 119) | std::vector GetSnippetIndex( function FlatIndex (line 143) | FlatIndex IndexSnippet(std::string code, function KindToString (line 148) | std::string KindToString(Entity::Kind kind) { function PrintRequiredEntityParameters (line 168) | void PrintRequiredEntityParameters(const FlatIndex& index, function PrintOptionalEntityParameters (line 179) | void PrintOptionalEntityParameters(const FlatIndex& index, function PrintAllEntityParameters (line 254) | void PrintAllEntityParameters(const FlatIndex& index, const Entity& ... function PrintValidExpectations (line 263) | void PrintValidExpectations( function PrintEntity (line 310) | void PrintEntity(std::ostream& stream, const FlatIndex& index, function DebugPrintIndex (line 355) | std::string DebugPrintIndex(const FlatIndex& index) { function DumpIndex (line 390) | void DumpIndex(const FlatIndex& index) { std::cerr << DebugPrintInde... function DumpAll (line 392) | [[maybe_unused]] void DumpAll(const FlatIndex& index) { function GetSubstituteRelationship (line 397) | std::optional GetSubstituteRelationship( function FindEntity (line 425) | std::optional FindEntity( function IndexHasEntity (line 472) | bool IndexHasEntity( function IndexHasReference (line 491) | bool IndexHasReference( function IndexHasVirtualMethodLink (line 560) | bool IndexHasVirtualMethodLink(const FlatIndex& index, function RequiredEntityId (line 575) | std::optional RequiredEntityId(const FlatIndex& index, function TEST (line 603) | TEST(FrontendTest, MacroDefinition) { function TEST (line 609) | TEST(FrontendTest, MultilineMacroDefinition) { function TEST (line 618) | TEST(FrontendTest, MacroArgsDefinition) { function TEST (line 624) | TEST(FrontendTest, MacroVarargsDefinition) { function TEST (line 630) | TEST(FrontendTest, MacroExpansion) { function TEST (line 638) | TEST(FrontendTest, MacroArgsExpansion) { function TEST (line 646) | TEST(FrontendTest, MacroVarargsExpansion) { function TEST (line 654) | TEST(FrontendTest, NestedMacroExpansion) { function TEST (line 665) | TEST(FrontendTest, MultipleMacroExpansion) { function TEST (line 686) | TEST(FrontendTest, EnumDeclaration) { function TEST (line 742) | TEST(FrontendTest, EnumClassDeclaration) { function TEST (line 775) | TEST(FrontendTest, NamespacedEnumDeclaration) { function TEST (line 819) | TEST(FrontendTest, NamespacedEnumClassDeclaration) { function TEST (line 865) | TEST(FrontendTest, VariableDeclaration) { function TEST (line 881) | TEST(FrontendTest, ArrayDeclaration) { function TEST (line 901) | TEST(FrontendTest, AnonymousStructDeclaration) { function TEST (line 914) | TEST(FrontendTest, ConstructorReference) { function TEST (line 953) | TEST(FrontendTest, NamespacedVariableDeclaration) { function TEST (line 971) | TEST(FrontendTest, FunctionDeclaration) { function TEST (line 983) | TEST(FrontendTest, FunctionDefinition) { function TEST (line 1010) | TEST(FrontendTest, MacroWrappedFunctionDefinition1) { function TEST (line 1026) | TEST(FrontendTest, MacroWrappedFunctionDefinition2) { function TEST (line 1038) | TEST(FrontendTest, VariadicFunctionDefinition) { function TEST (line 1048) | TEST(FrontendTest, CapturingLambdaDefinition) { function TEST (line 1075) | TEST(FrontendTest, NonCapturingLambdaDefinition) { function TEST (line 1098) | TEST(FrontendTest, ClassDefinition) { function TEST (line 1122) | TEST(FrontendTest, LocalClassDefinition) { function TEST (line 1148) | TEST(FrontendTest, Typedef) { function TEST (line 1168) | TEST(FrontendTest, Using) { function TEST (line 1187) | TEST(FrontendTest, TypeTemplateClass) { function TEST (line 1226) | TEST(FrontendTest, UsingTypeTemplateClass) { function TEST (line 1274) | TEST(FrontendTest, ValueTemplateClass) { function TEST (line 1332) | TEST(FrontendTest, TypeTemplateClassFullSpecialisation) { function TEST (line 1351) | TEST(FrontendTest, ValueTemplateClassFullSpecialisation) { function TEST (line 1370) | TEST(FrontendTest, TypeTemplateClassPartialSpecialisation) { function TEST (line 1400) | TEST(FrontendTest, ValueTemplateClassPartialSpecialisation) { function TEST (line 1426) | TEST(FrontendTest, TypeTemplateFunction) { function TEST (line 1458) | TEST(FrontendTest, ValueTemplateFunction) { function TEST (line 1492) | TEST(FrontendTest, TemplateTemplateFunction) { function TEST (line 1545) | TEST(FrontendTest, TemplateParameterPackFunction) { function TEST (line 1585) | TEST(FrontendTest, FunctionScopedClassDefinition) { function TEST (line 1598) | TEST(FrontendTest, OperatorOverloads) { function TEST (line 1645) | TEST(FrontendTest, NoIdentifierOperator) { function TEST (line 1676) | TEST(FrontendTest, PointerToStruct) { function TEST (line 1707) | TEST(FrontendTest, PointerToType) { function TEST (line 1735) | TEST(FrontendTest, ReferenceToStruct) { function TEST (line 1769) | TEST(FrontendTest, ReferenceToReturnType) { function TEST (line 1787) | TEST(FrontendTest, ReferenceToSizeof) { function TEST (line 1812) | TEST(FrontendTest, DeletedConstructor) { function TEST (line 1832) | TEST(FrontendTest, PureVirtualMethod) { function TEST (line 1849) | TEST(FrontendTest, OverriddenMethod) { function TEST (line 1940) | TEST(FrontendTest, CursedInheritance) { function TEST (line 2012) | TEST(FrontendTest, MoreCursedInheritance) { function TEST (line 2306) | TEST(FrontendTest, Devirtualization) { function TEST (line 2328) | TEST(FrontendTest, InheritanceThroughTemplateInstantiation) { function TEST (line 2383) | TEST(FrontendTest, Builtin) { function TEST (line 2401) | TEST(FrontendTest, RecursiveTemplateInstantiation) { function TEST (line 2477) | TEST(FrontendTest, IncompleteTemplate) { function TEST (line 2520) | TEST(FrontendTest, ConstrainedSpecialization) { function TEST (line 2542) | TEST(FrontendTest, MoreTemplateSpecialization) { function TEST (line 2615) | TEST(FrontendTest, FormatTemplateArgumentsOne) { function TEST (line 2641) | TEST(FrontendTest, FormatTemplateArgumentsTwo) { function TEST (line 2693) | TEST(FrontendTest, FormatTemplateArgumentsThree) { function TEST (line 2735) | TEST(FrontendTest, EvenMoreTemplates) { function TEST (line 2818) | TEST(FrontendTest, QualifiedTypeSpecialization) { function TEST (line 2875) | TEST(FrontendTest, QualifiedTypeSpecializationTwo) { function TEST (line 2953) | TEST(FrontendTest, QualifiedTypeSpecializationThree) { function TEST (line 2983) | TEST(FrontendTest, UsingSpecialization) { function TEST (line 3007) | TEST(FrontendTest, UsingSpecializationTwo) { function TEST (line 3025) | TEST(FrontendTest, BooleanParameter) { function TEST (line 3033) | TEST(FrontendTest, BooleanTemplate) { function TEST (line 3041) | TEST(FrontendTest, InheritanceReference) { function TEST (line 3053) | TEST(FrontendTest, MemberTemplateInstantiation) { function TEST (line 3116) | TEST(FrontendTest, ClassTemplateMemberReference) { function TEST (line 3179) | TEST(FrontendTest, AnonymousStructMemberCollision) { function TEST (line 3222) | TEST(FrontendTest, ImplicitThisOverload) { function TEST (line 3254) | TEST(FrontendTest, TemplatedConstructor) { function TEST (line 3276) | TEST(FrontendTest, UnknownPragmas) { function TEST (line 3325) | TEST(FrontendTest, TemplatedXRef) { function TEST (line 3347) | TEST(FrontendTest, TemplateMemberFn) { function TEST (line 3576) | TEST(FrontendTest, ImplicitCode) { function TEST (line 3716) | TEST(FrontendTest, ReferencedImplicitCode) { function TEST (line 3733) | TEST(FrontendTest, ImplicitComparisonInstantiation) { function TEST (line 3782) | TEST(FrontendTest, VarAndTypeAliasTemplates) { function TEST (line 3836) | TEST(FrontendTest, AbbreviatedFunctionTemplate) { function TEST (line 3843) | TEST(FrontendTest, CommandLineMacro) { function TEST (line 3860) | TEST(FrontendTest, AliasedSymbol) { function TEST (line 3871) | TEST(FrontendTest, GhostFileLocations) { FILE: infra/indexer/frontend/index_action.cc type oss_fuzz (line 43) | namespace oss_fuzz { type indexer (line 44) | namespace indexer { class AstConsumer (line 45) | class AstConsumer : public clang::ASTConsumer { method AstConsumer (line 47) | explicit AstConsumer(InMemoryIndex& index, clang::CompilerInstance... method HandleTranslationUnit (line 51) | void HandleTranslationUnit(clang::ASTContext& context) override { FILE: infra/indexer/frontend/index_action.h function namespace (line 29) | namespace oss_fuzz { FILE: infra/indexer/frontend/pp_callbacks.cc type oss_fuzz (line 25) | namespace oss_fuzz { type indexer (line 26) | namespace indexer { function LocationId (line 27) | LocationId PpCallbacks::GetLocationId(clang::SourceLocation start, function EntityId (line 33) | EntityId PpCallbacks::GetEntityIdForMacro(llvm::StringRef name, FILE: infra/indexer/frontend/pp_callbacks.h function namespace (line 25) | namespace oss_fuzz { FILE: infra/indexer/index/file_copier.cc type oss_fuzz (line 29) | namespace oss_fuzz { type indexer (line 30) | namespace indexer { function PreparePath (line 33) | void PreparePath(std::string& path) { FILE: infra/indexer/index/file_copier.h function namespace (line 27) | namespace oss_fuzz { FILE: infra/indexer/index/file_copier_unittest.cc type oss_fuzz (line 25) | namespace oss_fuzz { type indexer (line 26) | namespace indexer { function CreateFile (line 28) | void CreateFile(const std::filesystem::path& path) { function GetFileContents (line 35) | std::optional GetFileContents(const std::filesystem::pa... function TEST (line 46) | TEST(FileCopierTest, AbsoluteToIndexPath) { function TEST (line 60) | TEST(FileCopierTest, AbsoluteToIndexPathOutside) { function TEST (line 69) | TEST(FileCopierTest, FileCopying) { FILE: infra/indexer/index/in_memory_index.cc type oss_fuzz (line 36) | namespace oss_fuzz { type indexer (line 37) | namespace indexer { function HasTheSameIdentity (line 45) | bool HasTheSameIdentity(const Entity& lhs, const Entity& rhs) { function MaybePrintLinkerMessage (line 50) | void MaybePrintLinkerMessage(absl::Span entities, type ComparePairFirst (line 103) | struct ComparePairFirst { function LocationId (line 195) | LocationId InMemoryIndex::GetLocationId(Location location) { function LocationId (line 203) | LocationId InMemoryIndex::GetIdForLocationWithIndexPath( function EntityId (line 216) | EntityId InMemoryIndex::GetEntityId(const Entity& entity) { function EntityId (line 241) | EntityId InMemoryIndex::GetExistingEntityId(const Entity& entity) co... function Entity (line 249) | const Entity& InMemoryIndex::GetEntityById(EntityId entity_id) const { function ReferenceId (line 255) | ReferenceId InMemoryIndex::GetReferenceId(const Reference& reference) { function VirtualMethodLinkId (line 263) | VirtualMethodLinkId InMemoryIndex::GetVirtualMethodLinkId( function FlatIndex (line 273) | FlatIndex InMemoryIndex::Export() && { FILE: infra/indexer/index/in_memory_index.h function namespace (line 26) | namespace oss_fuzz { FILE: infra/indexer/index/in_memory_index_unittest.cc type oss_fuzz (line 32) | namespace oss_fuzz { type indexer (line 33) | namespace indexer { function PopulateLocationFiles (line 35) | void PopulateLocationFiles(absl::Span locations, function EnsureSorted (line 50) | std::vector EnsureSorted(std::vector items) { function GetTestLocations (line 57) | std::vector GetTestLocations() { function GetTestEntities (line 73) | std::vector GetTestEntities() { function GetTestReferences (line 87) | std::vector GetTestReferences() { function GetSecondTestLocations (line 96) | std::vector GetSecondTestLocations() { function EnsureSubstituteReferenceOrdering (line 110) | std::vector EnsureSubstituteReferenceOrdering( function GetSecondTestEntities (line 121) | std::vector GetSecondTestEntities() { function GetThirdTestEntities (line 140) | std::vector GetThirdTestEntities() { function TEST (line 161) | TEST(InMemoryIndexTest, Locations) { function TEST (line 175) | TEST(InMemoryIndexTest, LocationsBasePath) { function TEST (line 199) | TEST(InMemoryIndexTest, Entities) { function TEST (line 220) | TEST(InMemoryIndexTest, SubstituteEntities) { function TEST (line 247) | TEST(InMemoryIndexTest, References) { function TEST (line 269) | TEST(InMemoryIndexTest, Merge) { function TEST (line 323) | TEST(InMemoryIndexTest, MergeWithSubstituteEntities) { FILE: infra/indexer/index/sqlite.cc type oss_fuzz (line 29) | namespace oss_fuzz { type indexer (line 30) | namespace indexer { function InsertLocations (line 137) | bool InsertLocations(sqlite3* db, absl::Span locatio... function InsertEntities (line 184) | bool InsertEntities(sqlite3* db, absl::Span entities) { function InsertReferences (line 272) | bool InsertReferences(sqlite3* db, absl::Span refer... function InsertVirtualMethodLinks (line 311) | bool InsertVirtualMethodLinks(sqlite3* db, function SaveAsSqlite (line 347) | bool SaveAsSqlite(const FlatIndex& index, const std::string& path, FILE: infra/indexer/index/sqlite.h function namespace (line 22) | namespace oss_fuzz { FILE: infra/indexer/index/types.cc type oss_fuzz (line 27) | namespace oss_fuzz { type indexer (line 28) | namespace indexer { function IsPositiveDecimalInteger (line 32) | bool IsPositiveDecimalInteger(const char* str) noexcept { function IsDecimalInteger (line 45) | bool IsDecimalInteger(const char* str) { FILE: infra/indexer/index/types.h function namespace (line 32) | namespace oss_fuzz { FILE: infra/indexer/index/types_unittest.cc type oss_fuzz (line 23) | namespace oss_fuzz { type indexer (line 24) | namespace indexer { function GetTestLocations (line 26) | std::vector GetTestLocations() { function GetTestEntities (line 36) | std::vector GetTestEntities() { function GetTestReferences (line 51) | std::vector GetTestReferences() { function TEST (line 61) | TEST(LocationTest, TestEquality) { function TEST (line 74) | TEST(LocationTest, TestStrictComparison) { function TEST (line 92) | TEST(LocationTest, TestComparison) { function TEST (line 110) | TEST(LocationTest, TestHash) { function TEST (line 114) | TEST(EntityTest, TestEquality) { function TEST (line 127) | TEST(EntityTest, TestStrictComparison) { function TEST (line 145) | TEST(EntityTest, TestComparison) { function TEST (line 163) | TEST(EntityTest, TestHash) { function TEST (line 167) | TEST(ReferenceTest, TestEquality) { function TEST (line 180) | TEST(ReferenceTest, TestStrictComparison) { function TEST (line 198) | TEST(ReferenceTest, TestComparison) { function TEST (line 216) | TEST(ReferenceTest, TestHash) { FILE: infra/indexer/init.h function InitGoogle (line 24) | void InitGoogle(absl::string_view usage, int* argc, char*** argv, function InitGoogleExceptChangeRootAndUser (line 31) | void InitGoogleExceptChangeRootAndUser(absl::string_view usage, int* argc, FILE: infra/indexer/main.cc function ABSL_FLAG (line 47) | ABSL_FLAG(int, index_threads, 4, "Number of parallel indexing threads"); FILE: infra/indexer/merge_queue.cc type oss_fuzz (line 31) | namespace oss_fuzz { type indexer (line 32) | namespace indexer { class SingleThreadMergeQueue (line 37) | class SingleThreadMergeQueue : public MergeQueue { class ParallelMergeQueue (line 167) | class ParallelMergeQueue : public MergeQueue { FILE: infra/indexer/merge_queue.h function namespace (line 22) | namespace oss_fuzz { FILE: infra/indexer/queue_state.cc type oss_fuzz (line 24) | namespace oss_fuzz { type indexer (line 25) | namespace indexer { FILE: infra/indexer/queue_state.h function namespace (line 21) | namespace oss_fuzz { FILE: infra/manifest.py function push_manifest (line 24) | def push_manifest(image): function main (line 46) | def main(): FILE: infra/pr_helper.py function get_criticality_score (line 37) | def get_criticality_score(repo_url): function is_known_contributor (line 58) | def is_known_contributor(content, email): function save_env (line 65) | def save_env(message, is_ready_for_merge, is_internal=False): function main (line 73) | def main(): class GithubHandler (line 150) | class GithubHandler: method __init__ (line 153) | def __init__(self): method get_pr_author (line 164) | def get_pr_author(self): method get_projects_path (line 168) | def get_projects_path(self): method get_author_email (line 183) | def get_author_email(self): method get_project_yaml (line 200) | def get_project_yaml(self, project_path): method get_yaml_file_content (line 205) | def get_yaml_file_content(self, contents_url): method get_integrated_project_info (line 213) | def get_integrated_project_info(self): method get_pull_request_number (line 225) | def get_pull_request_number(self, commit): method get_past_contributors (line 233) | def get_past_contributors(self, project_path): method get_maintainers (line 266) | def get_maintainers(self): method is_author_internal_member (line 282) | def is_author_internal_member(self): method has_author_modified_project (line 286) | def has_author_modified_project(self, project_path): FILE: infra/presubmit.py function _is_project_file (line 34) | def _is_project_file(actual_path, expected_filename): function _check_one_lib_fuzzing_engine (line 50) | def _check_one_lib_fuzzing_engine(build_sh_file): function check_lib_fuzzing_engine (line 68) | def check_lib_fuzzing_engine(paths): class ProjectYamlChecker (line 74) | class ProjectYamlChecker: method __init__ (line 113) | def __init__(self, filename): method do_checks (line 120) | def do_checks(self): method is_disabled (line 137) | def is_disabled(self): method error (line 141) | def error(self, message): method check_valid_project_name (line 146) | def check_valid_project_name(self): method check_project_yaml_constants (line 156) | def check_project_yaml_constants(self): method check_valid_section_names (line 178) | def check_valid_section_names(self): method check_required_sections (line 185) | def check_required_sections(self): method check_valid_emails (line 191) | def check_valid_emails(self): method check_valid_language (line 207) | def check_valid_language(self): function _check_one_project_yaml (line 217) | def _check_one_project_yaml(project_yaml_filename): function check_project_yaml (line 230) | def check_project_yaml(paths): function _check_one_seed_corpus (line 236) | def _check_one_seed_corpus(path): function check_seed_corpus (line 249) | def check_seed_corpus(paths): function _check_one_apt_update (line 255) | def _check_one_apt_update(path): function check_apt_update (line 274) | def check_apt_update(paths): function do_checks (line 279) | def do_checks(changed_files): function check_license (line 321) | def check_license(paths): function bool_to_returncode (line 345) | def bool_to_returncode(success): function is_nonfuzzer_python (line 355) | def is_nonfuzzer_python(path): function lint (line 360) | def lint(_=None): function yapf (line 369) | def yapf(paths, validate=True): function get_changed_files (line 385) | def get_changed_files(): function run_build_tests (line 408) | def run_build_tests(): function run_nonbuild_tests (line 420) | def run_nonbuild_tests(parallel): function run_tests (line 455) | def run_tests(_=None, parallel=False, build_tests=True, nonbuild_tests=T... function run_systemsan_tests (line 472) | def run_systemsan_tests(_=None): function get_all_files (line 480) | def get_all_files(): function main (line 487) | def main(): FILE: infra/repo_manager.py class RepoManager (line 34) | class RepoManager: method __init__ (line 37) | def __init__(self, repo_dir): method _is_git_repo (line 40) | def _is_git_repo(self): method git (line 49) | def git(self, cmd, check_result=False): method commit_exists (line 63) | def commit_exists(self, commit): method commit_date (line 78) | def commit_date(self, commit): method get_git_diff (line 91) | def get_git_diff(self, base='origin...'): method get_current_commit (line 109) | def get_current_commit(self): method get_parent (line 118) | def get_parent(self, commit, count): method fetch_all_remotes (line 132) | def fetch_all_remotes(self): method get_commit_list (line 140) | def get_commit_list(self, newest_commit, oldest_commit=None, limit=None): method fetch_branch (line 183) | def fetch_branch(self, branch): method fetch_unshallow (line 188) | def fetch_unshallow(self): method checkout_pr (line 196) | def checkout_pr(self, pr_ref): method checkout_commit (line 208) | def checkout_commit(self, commit, clean=True): method remove_repo (line 229) | def remove_repo(self): function clone_repo_and_get_manager (line 235) | def clone_repo_and_get_manager(repo_url, function _clone (line 258) | def _clone(repo_url, base_dir, repo_name, username=None, password=None): FILE: infra/repo_manager_test.py function get_oss_fuzz_repo (line 31) | def get_oss_fuzz_repo(): class CloneTest (line 40) | class CloneTest(unittest.TestCase): method test_clone_valid_repo_integration (line 45) | def test_clone_valid_repo_integration(self): method test_clone_invalid_repo (line 51) | def test_clone_invalid_repo(self): method test_clone_with_username (line 59) | def test_clone_with_username(self, mock_execute): # pylint: disable=n... class RepoManagerCheckoutTest (line 76) | class RepoManagerCheckoutTest(unittest.TestCase): method test_checkout_valid_commit (line 79) | def test_checkout_valid_commit(self): method test_checkout_invalid_commit (line 87) | def test_checkout_invalid_commit(self): class RepoManagerGetCommitListTest (line 101) | class RepoManagerGetCommitListTest(unittest.TestCase): method test_get_valid_commit_list (line 104) | def test_get_valid_commit_list(self): method test_get_invalid_commit_list (line 119) | def test_get_invalid_commit_list(self): class GitDiffTest (line 136) | class GitDiffTest(unittest.TestCase): method test_diff_exists (line 139) | def test_diff_exists(self): method test_diff_empty (line 149) | def test_diff_empty(self): method test_error_on_command (line 157) | def test_error_on_command(self): method test_diff_no_change (line 167) | def test_diff_no_change(self): class CheckoutPrIntegrationTest (line 177) | class CheckoutPrIntegrationTest(unittest.TestCase): method test_pull_request_exists (line 180) | def test_pull_request_exists(self): method test_checkout_invalid_pull_request (line 188) | def test_checkout_invalid_pull_request(self): FILE: infra/retry.py function sleep (line 25) | def sleep(seconds): function get_delay (line 31) | def get_delay(num_try, delay, backoff): function wrap (line 36) | def wrap(retries, FILE: infra/tools/hold_back_images.py function get_latest_docker_image_digest (line 34) | def get_latest_docker_image_digest(image): function get_args (line 48) | def get_args(): function get_hold_image_digest (line 75) | def get_hold_image_digest(line, hold_image_digest, update_held): function hold_image (line 89) | def hold_image(project, hold_image_digest, update_held, issue_number): function main (line 119) | def main(): FILE: infra/tools/wycheproof/generate_job.py function main (line 21) | def main(): FILE: infra/tools/wycheproof/launcher.py function main (line 24) | def main(): FILE: infra/tools/wycheproof/run.py function get_args (line 24) | def get_args(): function main (line 38) | def main(): FILE: infra/utils.py function chdir_to_root (line 36) | def chdir_to_root(): function command_to_string (line 43) | def command_to_string(command): function execute (line 51) | def execute(command, function get_fuzz_targets (line 97) | def get_fuzz_targets(path): function get_container_name (line 118) | def get_container_name(): function is_executable (line 133) | def is_executable(file_path): function is_fuzz_target_local (line 138) | def is_fuzz_target_local(file_path): function binary_print (line 171) | def binary_print(string): function url_join (line 181) | def url_join(*url_parts): function gs_url_to_https (line 193) | def gs_url_to_https(url): function remove_prefix (line 198) | def remove_prefix(string, prefix): FILE: infra/utils_test.py class IsFuzzTargetLocalTest (line 30) | class IsFuzzTargetLocalTest(unittest.TestCase): method test_invalid_filepath (line 33) | def test_invalid_filepath(self): method test_valid_filepath (line 42) | def test_valid_filepath(self): class GetFuzzTargetsTest (line 52) | class GetFuzzTargetsTest(unittest.TestCase): method test_valid_filepath (line 55) | def test_valid_filepath(self): method test_invalid_filepath (line 68) | def test_invalid_filepath(self): class ExecuteTest (line 74) | class ExecuteTest(unittest.TestCase): method test_valid_command (line 77) | def test_valid_command(self): method test_error_command (line 99) | def test_error_command(self): class BinaryPrintTest (line 114) | class BinaryPrintTest(unittest.TestCase): method test_string (line 118) | def test_string(self): # pylint: disable=no-self-use method test_binary_string (line 126) | def test_binary_string(self): # pylint: disable=no-self-use class CommandToStringTest (line 134) | class CommandToStringTest(unittest.TestCase): method test_string (line 137) | def test_string(self): method test_list (line 143) | def test_list(self): FILE: projects/abseil-cpp/string_escape_fuzzer.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/abseil-cpp/string_utilities_fuzzer.cc function LLVMFuzzerTestOneInput (line 28) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/abseil-py/fuzz_argparse.py class FuzzEnum (line 24) | class FuzzEnum(enum.Enum): function TestOneInput (line 29) | def TestOneInput(data): function main (line 68) | def main(): FILE: projects/adal/fuzz_util.py function TestInput (line 22) | def TestInput(data): function main (line 65) | def main(): FILE: projects/adal/fuzz_xmlutil.py function generate_sample_xml (line 48) | def generate_sample_xml(fdp): function TestInput (line 65) | def TestInput(data): function main (line 86) | def main(): FILE: projects/aiohttp/fuzz_http_parser.py function TestOneInput (line 35) | def TestOneInput(data): function main (line 45) | def main(): FILE: projects/aiohttp/fuzz_http_payload_parser.py function TestOneInput (line 34) | def TestOneInput(data): function main (line 44) | def main(): FILE: projects/aiohttp/fuzz_multipart.py class FuzzStream (line 28) | class FuzzStream: method __init__ (line 29) | def __init__(self, content): method read (line 32) | async def read(self, size = None): method at_eof (line 35) | def at_eof(self): method readline (line 38) | async def readline(self): method unread_data (line 41) | def unread_data(self, data): function fuzz_bodypart_reader (line 46) | async def fuzz_bodypart_reader(data): function TestOneInput (line 59) | def TestOneInput(data): function main (line 65) | def main(): FILE: projects/aiohttp/fuzz_payload_url.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 38) | def main(): FILE: projects/aiohttp/fuzz_web_request.py function fuzz_run_one_async (line 29) | async def fuzz_run_one_async(data): function TestOneInput (line 46) | def TestOneInput(data): function main (line 49) | def main(): FILE: projects/airflow/dag_fuzz.py function py_func (line 37) | def py_func(): function TestInput (line 40) | def TestInput(input_bytes): function main (line 63) | def main(): FILE: projects/alembic/alembic_dump_info_fuzzer.cc function dumpAttributes (line 64) | void dumpAttributes(T const &schema) { function dumpPolyMesh (line 91) | void dumpPolyMesh(const IObject &node) { function dumpSubD (line 100) | void dumpSubD(const IObject &node) { function dumpFaceSet (line 112) | void dumpFaceSet(const IObject &node) { function dumpCurves (line 119) | void dumpCurves(const IObject &node) { function dumpXform (line 127) | void dumpXform(const IObject &node) { function dumpMaterial (line 136) | void dumpMaterial(const IObject &node) { function dumpNodes (line 157) | void dumpNodes(const IObject &node) { function dumpInfo (line 188) | void dumpInfo(const char *file) { function LLVMFuzzerTestOneInput (line 199) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/alembic/fuzzer_temp_file.h function fuzzer_release_tmpfile (line 57) | static void fuzzer_release_tmpfile(char *filename) { function class (line 67) | class FuzzerTemporaryFile { FILE: projects/angle/fuzz_sha1.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) FILE: projects/angular/compiler/fuzz_tests/fuzz_parser.js function createParser (line 21) | function createParser() { function parseAction (line 24) | function parseAction(text, location = null, offset = 0) { function parseBinding (line 28) | function parseBinding(text, location = null, offset = 0) { function parseInterpolation (line 32) | function parseInterpolation(text, location = null, offset = 0) { function splitInterpolation (line 36) | function splitInterpolation(text, location = null) { function parseSimpleBinding (line 40) | function parseSimpleBinding(text, location = null, offset = 0) { FILE: projects/angus-mail/ASCIIUtilityFuzzer.java class ASCIIUtilityFuzzer (line 24) | public class ASCIIUtilityFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/angus-mail/BASE64EncoderStreamFuzzer.java class BASE64EncoderStreamFuzzer (line 26) | public class BASE64EncoderStreamFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/aniso8601/fuzz_aniso8601.py function fuzz_date (line 26) | def fuzz_date(data): function fuzz_decimal_fraction (line 38) | def fuzz_decimal_fraction(data): function fuzz_duration (line 43) | def fuzz_duration(data): function fuzz_interval (line 55) | def fuzz_interval(data): function fuzz_time (line 67) | def fuzz_time(data): function TestOneInput (line 79) | def TestOneInput(data): function main (line 87) | def main(): FILE: projects/ansible/fuzz_encrypt.py function TestInput (line 28) | def TestInput(input_bytes): function main (line 44) | def main(): FILE: projects/ansible/fuzz_parse.py function TestInput (line 27) | def TestInput(input_bytes): function main (line 42) | def main(): FILE: projects/ansible/fuzz_task.py function TestInput (line 29) | def TestInput(input_bytes): function main (line 57) | def main(): FILE: projects/antlr3-java/GrammarFuzzer.java class GrammarFuzzer (line 22) | public class GrammarFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/antlr4-java/GrammarFuzzer.java class GrammarFuzzer (line 27) | public class GrammarFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-axis2/axis-axis2-java-core-fuzzer/src/main/java/org/apache/axis2/HttpInterfaceFuzzer.java class HttpInterfaceFuzzer (line 31) | public class HttpInterfaceFuzzer extends SimpleAxis2Server { method HttpInterfaceFuzzer (line 35) | public HttpInterfaceFuzzer(FuzzedDataProvider fuzzedDataProvider) thro... method test (line 42) | void test() { method fuzzerTestOneInput (line 72) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... method getPort (line 80) | private int getPort() { FILE: projects/apache-axis2/axis-axis2-java-core-fuzzer/src/main/java/samples/quickstart/service/pojo/StockQuoteService.java class StockQuoteService (line 27) | public class StockQuoteService { method printMap (line 30) | void printMap(HashMap map) { method getPrice (line 38) | public double getPrice(String symbol) { method update (line 46) | public void update(String symbol, double price) { FILE: projects/apache-commons-bcel/src/main/java/ossfuzz/BcelFuzzer.java class BcelFuzzer (line 26) | public class BcelFuzzer { method BcelFuzzer (line 28) | BcelFuzzer(FuzzedDataProvider fuzzedDataProvider) { method test (line 32) | void test(FuzzedDataProvider fuzzedDataProvider) throws Exception { method fuzzerTestOneInput (line 44) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/apache-commons-beanutils/src/main/java/ossfuzz/BeanutilsFuzzer.java class BeanutilsFuzzer (line 30) | public class BeanutilsFuzzer { method BeanutilsFuzzer (line 43) | BeanutilsFuzzer(int integer, String string, int[] intArray, boolean bo... method BeanutilsFuzzer (line 58) | BeanutilsFuzzer(FuzzedDataProvider fuzzedDataProvider) { method createDynaClass (line 73) | protected DynaClass createDynaClass() { method fuzzedIntArray (line 96) | int[] fuzzedIntArray(FuzzedDataProvider fuzzedDataProvider) { method fuzzedStringArray (line 105) | String[] fuzzedStringArray(FuzzedDataProvider fuzzedDataProvider) { method fuzzedMap (line 114) | Map fuzzedMap(FuzzedDataProvider fuzzedDataProvider) { method test (line 148) | void test() throws Exception { method fuzzerTestOneInput (line 201) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/apache-commons-cli/ParserFuzzer.java class ParserFuzzer (line 24) | public class ParserFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-codec/BinaryEncodingFuzzer.java class BinaryEncodingFuzzer (line 33) | public class BinaryEncodingFuzzer { method fuzzerTestOneInput (line 34) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-codec/ChecksumFuzzer.java class ChecksumFuzzer (line 26) | public class ChecksumFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-codec/CryptFuzzer.java class CryptFuzzer (line 20) | public class CryptFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-codec/DigestUtilsFuzzer.java class DigestUtilsFuzzer (line 25) | public class DigestUtilsFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-codec/HmacUtilsFuzzer.java class HmacUtilsFuzzer (line 25) | public class HmacUtilsFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-codec/LanguageStringEncoderFuzzer.java class LanguageStringEncoderFuzzer (line 35) | public class LanguageStringEncoderFuzzer { method fuzzerTestOneInput (line 36) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-codec/MurmurHashFuzzer.java class MurmurHashFuzzer (line 26) | public class MurmurHashFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-codec/NetCodecFuzzer.java class NetCodecFuzzer (line 34) | public class NetCodecFuzzer { method fuzzerTestOneInput (line 35) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-codec/PhoneticEngineFuzzer.java class PhoneticEngineFuzzer (line 23) | public class PhoneticEngineFuzzer { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-collections/CollectionsBidiMapFuzzer.java class CollectionsBidiMapFuzzer (line 21) | public class CollectionsBidiMapFuzzer { method runTest (line 23) | void runTest(FuzzedDataProvider data) { method fuzzerTestOneInput (line 63) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-compress/ArchiverArFuzzer.java class ArchiverArFuzzer (line 22) | public class ArchiverArFuzzer extends BaseTests { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/ArchiverArjFuzzer.java class ArchiverArjFuzzer (line 22) | public class ArchiverArjFuzzer extends BaseTests { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/ArchiverCpioFuzzer.java class ArchiverCpioFuzzer (line 22) | public class ArchiverCpioFuzzer extends BaseTests { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/ArchiverDumpFuzzer.java class ArchiverDumpFuzzer (line 22) | public class ArchiverDumpFuzzer extends BaseTests { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/ArchiverTarStreamFuzzer.java class ArchiverTarStreamFuzzer (line 22) | public class ArchiverTarStreamFuzzer extends BaseTests { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/ArchiverZipStreamFuzzer.java class ArchiverZipStreamFuzzer (line 22) | public class ArchiverZipStreamFuzzer extends BaseTests { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/BaseTests.java class BaseTests (line 25) | public class BaseTests { method fuzzerInitialize (line 26) | public static void fuzzerInitialize() { method fuzzArchiveInputStream (line 31) | public static void fuzzArchiveInputStream(ArchiveInputStream is) throw... method fuzzCompressorInputStream (line 40) | public static void fuzzCompressorInputStream(CompressorInputStream is)... FILE: projects/apache-commons-compress/CompressSevenZFuzzer.java class CompressSevenZFuzzer (line 27) | public class CompressSevenZFuzzer extends BaseTests { method fuzzerTestOneInput (line 32) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/CompressTarFuzzer.java class CompressTarFuzzer (line 25) | public class CompressTarFuzzer extends BaseTests { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/CompressZipFuzzer.java class CompressZipFuzzer (line 27) | public class CompressZipFuzzer extends BaseTests { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/CompressorBZip2Fuzzer.java class CompressorBZip2Fuzzer (line 22) | public class CompressorBZip2Fuzzer extends BaseTests { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/CompressorDeflate64Fuzzer.java class CompressorDeflate64Fuzzer (line 22) | public class CompressorDeflate64Fuzzer extends BaseTests { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/CompressorGzipFuzzer.java class CompressorGzipFuzzer (line 22) | public class CompressorGzipFuzzer extends BaseTests { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/CompressorLZ4Fuzzer.java class CompressorLZ4Fuzzer (line 23) | public class CompressorLZ4Fuzzer extends BaseTests { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/CompressorPack200Fuzzer.java class CompressorPack200Fuzzer (line 22) | public class CompressorPack200Fuzzer extends BaseTests { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/CompressorSnappyFuzzer.java class CompressorSnappyFuzzer (line 23) | public class CompressorSnappyFuzzer extends BaseTests { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-compress/CompressorZFuzzer.java class CompressorZFuzzer (line 22) | public class CompressorZFuzzer extends BaseTests { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/apache-commons-configuration/INIConfigurationReadFuzzer.java class INIConfigurationReadFuzzer (line 27) | public class INIConfigurationReadFuzzer extends INIConfiguration { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-configuration/INIConfigurationWriteFuzzer.java class INIConfigurationWriteFuzzer (line 28) | public class INIConfigurationWriteFuzzer extends INIConfiguration { method fuzzerTestOneInput (line 29) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-configuration/JSONConfigurationReadFuzzer.java class JSONConfigurationReadFuzzer (line 26) | public class JSONConfigurationReadFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-configuration/JSONConfigurationWriteFuzzer.java class JSONConfigurationWriteFuzzer (line 28) | public class JSONConfigurationWriteFuzzer { method fuzzerTestOneInput (line 29) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-configuration/XMLConfigurationLoadFuzzer.java class XMLConfigurationLoadFuzzer (line 27) | public class XMLConfigurationLoadFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-configuration/XMLConfigurationWriteFuzzer.java class XMLConfigurationWriteFuzzer (line 28) | public class XMLConfigurationWriteFuzzer { method fuzzerTestOneInput (line 29) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-configuration/YAMLConfigurationReadFuzzer.java class YAMLConfigurationReadFuzzer (line 27) | public class YAMLConfigurationReadFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method createLoaderOptions (line 49) | private static LoaderOptions createLoaderOptions(FuzzedDataProvider da... FILE: projects/apache-commons-configuration/YAMLConfigurationWriteFuzzer.java class YAMLConfigurationWriteFuzzer (line 28) | public class YAMLConfigurationWriteFuzzer { method fuzzerTestOneInput (line 29) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method createLoaderOptions (line 52) | private static LoaderOptions createLoaderOptions(FuzzedDataProvider da... FILE: projects/apache-commons-csv/CSVParserFuzzer.java class CSVParserFuzzer (line 28) | public class CSVParserFuzzer { method fuzzerTestOneInput (line 29) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-fileupload/project-parent/fuzz-targets/src/test/java/com/example/Constants.java class Constants (line 24) | public final class Constants { method Constants (line 31) | private Constants() { } FILE: projects/apache-commons-fileupload/project-parent/fuzz-targets/src/test/java/com/example/FileUploadFuzzer.java class FileUploadFuzzer (line 34) | public class FileUploadFuzzer { method myFuzzTest (line 35) | @FuzzTest FILE: projects/apache-commons-fileupload/project-parent/fuzz-targets/src/test/java/com/example/MockHttpServletRequest.java class MockHttpServletRequest (line 32) | public class MockHttpServletRequest implements HttpServletRequest { method MockHttpServletRequest (line 48) | public MockHttpServletRequest( method MockHttpServletRequest (line 59) | public MockHttpServletRequest( method getAuthType (line 72) | @Override method getCookies (line 80) | @Override method getDateHeader (line 88) | @Override method getHeader (line 96) | @Override method getHeaders (line 104) | @Override method getHeaderNames (line 113) | @Override method getIntHeader (line 122) | @Override method getMethod (line 130) | @Override method getPathInfo (line 138) | @Override method getPathTranslated (line 146) | @Override method getContextPath (line 154) | @Override method getQueryString (line 162) | @Override method getRemoteUser (line 170) | @Override method isUserInRole (line 178) | @Override method getUserPrincipal (line 186) | @Override method getRequestedSessionId (line 194) | @Override method getRequestURI (line 202) | @Override method getRequestURL (line 210) | @Override method getServletPath (line 218) | @Override method getSession (line 226) | @Override method getSession (line 234) | @Override method isRequestedSessionIdValid (line 242) | @Override method isRequestedSessionIdFromCookie (line 250) | @Override method isRequestedSessionIdFromURL (line 258) | @Override method isRequestedSessionIdFromUrl (line 267) | @Override method getAttribute (line 276) | @Override method getAttributeNames (line 284) | @Override method getCharacterEncoding (line 292) | @Override method setCharacterEncoding (line 300) | @Override method getContentLength (line 308) | @Override method setContentLength (line 326) | public void setContentLength(final long length) { method getContentType (line 333) | @Override method getInputStream (line 341) | @Override method setReadLimit (line 351) | public void setReadLimit(final int readLimit) { method getParameter (line 358) | @Override method getParameterNames (line 366) | @Override method getParameterValues (line 374) | @Override method getParameterMap (line 382) | @Override method getProtocol (line 390) | @Override method getScheme (line 398) | @Override method getServerName (line 406) | @Override method getLocalName (line 414) | @Override method getServerPort (line 423) | @Override method getLocalPort (line 431) | @Override method getRemotePort (line 440) | @Override method getReader (line 449) | @Override method getRemoteAddr (line 457) | @Override method getLocalAddr (line 465) | @Override method getRemoteHost (line 474) | @Override method setAttribute (line 482) | @Override method removeAttribute (line 489) | @Override method getLocale (line 496) | @Override method getLocales (line 504) | @Override method isSecure (line 512) | @Override method getRequestDispatcher (line 520) | @Override method getRealPath (line 529) | @Override class MyServletInputStream (line 535) | private static class MyServletInputStream method MyServletInputStream (line 545) | public MyServletInputStream(final InputStream pStream, final int rea... method read (line 550) | @Override method read (line 555) | @Override FILE: projects/apache-commons-fileupload/project-parent/fuzz-targets/src/test/java/com/example/Util.java class Util (line 37) | public class Util { method parseUpload (line 39) | public static List parseUpload(final AbstractFileUpload uplo... method parseUpload (line 43) | public static List parseUpload(final AbstractFileUpload uplo... method parseUpload (line 49) | public static List parseUpload(final AbstractFileUpload uplo... method fileUploadImplementations (line 59) | public static List fileUploadImplementations() { FILE: projects/apache-commons-geometry/GeometryObjFuzzer.java class GeometryObjFuzzer (line 25) | public class GeometryObjFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(final byte[] data) { FILE: projects/apache-commons-geometry/GeometryStlBinaryFuzzer.java class GeometryStlBinaryFuzzer (line 25) | public class GeometryStlBinaryFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(final byte[] data) { FILE: projects/apache-commons-geometry/GeometryStlTextFuzzer.java class GeometryStlTextFuzzer (line 27) | public class GeometryStlTextFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(final byte[] data) { method join (line 48) | private static byte[] join(final byte[] a, final byte[] b) { FILE: projects/apache-commons-geometry/GeometryTextFuzzer.java class GeometryTextFuzzer (line 25) | public class GeometryTextFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(final byte[] data) { FILE: projects/apache-commons-imaging/ImagingBmpFuzzer.java class ImagingBmpFuzzer (line 21) | public class ImagingBmpFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/apache-commons-imaging/ImagingGifFuzzer.java class ImagingGifFuzzer (line 21) | public class ImagingGifFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/apache-commons-imaging/ImagingJpegFuzzer.java class ImagingJpegFuzzer (line 21) | public class ImagingJpegFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/apache-commons-imaging/ImagingPngFuzzer.java class ImagingPngFuzzer (line 21) | public class ImagingPngFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/apache-commons-imaging/ImagingTiffFuzzer.java class ImagingTiffFuzzer (line 21) | public class ImagingTiffFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/apache-commons-io/FileComparatorFuzzer.java class FileComparatorFuzzer (line 33) | public class FileComparatorFuzzer { method fuzzerInitialize (line 37) | public static void fuzzerInitialize() { method fuzzerTearDown (line 46) | public static void fuzzerTearDown() { method fuzzerTestOneInput (line 51) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-io/FileFilterFuzzer.java class FileFilterFuzzer (line 35) | public class FileFilterFuzzer { method fuzzerInitialize (line 38) | public static void fuzzerInitialize() { method fuzzerTearDown (line 46) | public static void fuzzerTearDown() { method fuzzerTestOneInput (line 50) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-io/FileUtilsFuzzer.java class FileUtilsFuzzer (line 25) | public class FileUtilsFuzzer { method fuzzerInitialize (line 32) | public static void fuzzerInitialize() { method fuzzerTearDown (line 43) | public static void fuzzerTearDown() { method fuzzerTestOneInput (line 54) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-io/GeneralUtilsFuzzer.java class GeneralUtilsFuzzer (line 31) | public class GeneralUtilsFuzzer { method fuzzerTestOneInput (line 32) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-io/InputStreamFuzzer.java class InputStreamFuzzer (line 58) | public class InputStreamFuzzer { method fuzzerTestOneInput (line 59) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-io/InputXmlFuzzer.java class InputXmlFuzzer (line 23) | public class InputXmlFuzzer { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-io/OutputStreamFuzzer.java class OutputStreamFuzzer (line 43) | public class OutputStreamFuzzer { method fuzzerTestOneInput (line 44) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-io/PathUtilsFuzzer.java class PathUtilsFuzzer (line 24) | public class PathUtilsFuzzer { method fuzzerInitialize (line 29) | public static void fuzzerInitialize() { method fuzzerTearDown (line 39) | public static void fuzzerTearDown() { method fuzzerTestOneInput (line 49) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-io/ReaderFuzzer.java class ReaderFuzzer (line 44) | public class ReaderFuzzer { method fuzzerTestOneInput (line 45) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-io/WriterFuzzer.java class WriterFuzzer (line 44) | public class WriterFuzzer { method fuzzerInitialize (line 47) | public static void fuzzerInitialize() { method fuzzerTearDown (line 55) | public static void fuzzerTearDown() { method fuzzerTestOneInput (line 59) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-jxpath/JXPathFuzzer.java class JXPathFuzzer (line 34) | public class JXPathFuzzer { method fuzzerTestOneInput (line 35) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-lang/AnnotationUtilsFuzzer.java class AnnotationUtilsFuzzer (line 25) | public class AnnotationUtilsFuzzer extends ClassFuzzerBase { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method initializeAnnotationSet (line 56) | private static void initializeAnnotationSet() { FILE: projects/apache-commons-lang/ArrayUtilsFuzzer.java class ArrayUtilsFuzzer (line 22) | public class ArrayUtilsFuzzer { method fuzzerInitialize (line 33) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 45) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method cleanLargeArray (line 487) | private static void cleanLargeArray() { method sortArray (line 527) | private static void sortArray() { FILE: projects/apache-commons-lang/BuilderFuzzer.java class BuilderFuzzer (line 27) | public class BuilderFuzzer { method fuzzerTestOneInput (line 41) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method initializeBuilder (line 98) | private static void initializeBuilder(Object obj1, Object obj2, ToStri... method getRandomObject (line 107) | private static Object getRandomObject(FuzzedDataProvider data) { FILE: projects/apache-commons-lang/CharUtilsFuzzer.java class CharUtilsFuzzer (line 22) | public class CharUtilsFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-lang/ClassFuzzerBase.java class ClassFuzzerBase (line 26) | public abstract class ClassFuzzerBase { method fuzzerInitialize (line 30) | public static void fuzzerInitialize() throws IOException { method fuzzerTearDown (line 51) | public static void fuzzerTearDown() { method getAllClasses (line 56) | public static Set getAllClasses() throws IOException { FILE: projects/apache-commons-lang/ConversionFuzzer.java class ConversionFuzzer (line 20) | public class ConversionFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-lang/DateUtilsFuzzer.java class DateUtilsFuzzer (line 26) | public class DateUtilsFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-lang/EscapeHtmlFuzzer.java class EscapeHtmlFuzzer (line 6) | public class EscapeHtmlFuzzer { method fuzzerTestOneInput (line 7) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-lang/FractionFuzzer.java class FractionFuzzer (line 20) | public class FractionFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-lang/LocaleUtilsFuzzer.java class LocaleUtilsFuzzer (line 20) | public class LocaleUtilsFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-lang/MathUtilsFuzzer.java class MathUtilsFuzzer (line 21) | public class MathUtilsFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-lang/ReflectUtilsFuzzer.java class ReflectUtilsFuzzer (line 24) | public class ReflectUtilsFuzzer extends ClassFuzzerBase { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method isExpectedNullPointerException (line 145) | private static Boolean isExpectedNullPointerException(NullPointerExcep... FILE: projects/apache-commons-lang/SerializationUtilsFuzzer.java class SerializationUtilsFuzzer (line 21) | public class SerializationUtilsFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-lang/StringEscapeUtilsFuzzer.java class StringEscapeUtilsFuzzer (line 6) | public class StringEscapeUtilsFuzzer { method fuzzerTestOneInput (line 7) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-lang/StringUtilsFuzzer.java class StringUtilsFuzzer (line 21) | public class StringUtilsFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-logging/LoggingBasicFuzzer.java class LoggingBasicFuzzer (line 22) | public class LoggingBasicFuzzer { method LoggingBasicFuzzer (line 23) | public LoggingBasicFuzzer(FuzzedDataProvider data) { method runTest (line 26) | void runTest(FuzzedDataProvider data) { method fuzzerTestOneInput (line 47) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-logging/Package/MyAppender.java class MyAppender (line 18) | @Plugin( method MyAppender (line 23) | public MyAppender(String name, Filter filter) { method createAppender (line 27) | @PluginFactory method append (line 34) | @Override FILE: projects/apache-commons-math/MathClusteringFuzzer.java class MathClusteringFuzzer (line 31) | public class MathClusteringFuzzer { method MathClusteringFuzzer (line 41) | public MathClusteringFuzzer(FuzzedDataProvider fuzzedDataProvider) { method runDBSCAN (line 65) | void runDBSCAN() { method runElkanKMeansPlusPlus (line 74) | void runElkanKMeansPlusPlus() { method runKMeansPlusPlus (line 86) | void runKMeansPlusPlus() { method runFuzzyKMeans (line 98) | void runFuzzyKMeans() { method runMultiKMeans (line 110) | void runMultiKMeans() { method fuzzerTestOneInput (line 127) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-math/MathDistanceMeasureFuzzer.java class MathDistanceMeasureFuzzer (line 10) | public class MathDistanceMeasureFuzzer { method MathDistanceMeasureFuzzer (line 14) | public MathDistanceMeasureFuzzer(FuzzedDataProvider fuzzedDataProvider) { method computeDistances (line 25) | void computeDistances() { method fuzzerTestOneInput (line 37) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-math/MathSimplexSolverFuzzer.java class MathSimplexSolverFuzzer (line 34) | public class MathSimplexSolverFuzzer { method coefficients (line 42) | double[] coefficients(FuzzedDataProvider fuzzedDataProvider) { method rightHandSide (line 46) | double rightHandSide(FuzzedDataProvider fuzzedDataProvider) { method relation (line 50) | Relationship relation(FuzzedDataProvider fuzzedDataProvider) { method goalType (line 55) | GoalType goalType(FuzzedDataProvider fuzzedDataProvider) { method pivotSelectionRule (line 60) | PivotSelectionRule pivotSelectionRule(FuzzedDataProvider fuzzedDataPro... method MathSimplexSolverFuzzer (line 65) | public MathSimplexSolverFuzzer(FuzzedDataProvider fuzzedDataProvider) { method solve (line 78) | void solve() { method fuzzerTestOneInput (line 98) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-net/Base64Fuzzer.java class Base64Fuzzer (line 20) | public class Base64Fuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-net/MLSxEntryParserFuzzer.java class MLSxEntryParserFuzzer (line 21) | public class MLSxEntryParserFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-net/NTFTPEntryParserFuzzer.java class NTFTPEntryParserFuzzer (line 22) | public class NTFTPEntryParserFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-net/OS400FTPEntryParserFuzzer.java class OS400FTPEntryParserFuzzer (line 21) | public class OS400FTPEntryParserFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-net/TelnetOptionFuzzer.java class TelnetOptionFuzzer (line 20) | public class TelnetOptionFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-text/project-parent/fuzz-targets/src/test/java/com/example/StringSubstitutorFuzzer.java class StringSubstitutorFuzzer (line 24) | public class StringSubstitutorFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-text/project-parent/fuzz-targets/src/test/java/com/example/StringSubstitutorInterpolatorFuzzer.java class StringSubstitutorInterpolatorFuzzer (line 24) | public class StringSubstitutorInterpolatorFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-validator/CreditCardValidatorFuzzer.java class CreditCardValidatorFuzzer (line 20) | public class CreditCardValidatorFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-validator/IBANValidatorFuzzer.java class IBANValidatorFuzzer (line 20) | public class IBANValidatorFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-validator/UrlValidator2Fuzzer.java class UrlValidator2Fuzzer (line 20) | public class UrlValidator2Fuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-commons-validator/UrlValidatorFuzzer.java class UrlValidatorFuzzer (line 20) | public class UrlValidatorFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-cxf/project-parent/fuzz-targets/src/test/java/com/example/AttachmentDeserializerFuzzer.java class AttachmentDeserializerFuzzer (line 41) | public class AttachmentDeserializerFuzzer { method myFuzzTest (line 44) | @FuzzTest FILE: projects/apache-cxf/project-parent/fuzz-targets/src/test/java/com/example/AttachmentSerializerDeserializerFuzzer.java class AttachmentSerializerDeserializerFuzzer (line 43) | public class AttachmentSerializerDeserializerFuzzer { method myFuzzTest (line 45) | @FuzzTest FILE: projects/apache-cxf/project-parent/fuzz-targets/src/test/java/com/example/JsonMapObjectReaderWriterFuzzer.java class JsonMapObjectReaderWriterFuzzer (line 31) | public class JsonMapObjectReaderWriterFuzzer { method myFuzzTest (line 35) | @FuzzTest method getDummyClass (line 60) | public static DummyClass getDummyClass (FuzzedDataProvider data, int d... class DummyClass (line 210) | public static class DummyClass implements Serializable { FILE: projects/apache-cxf/project-parent/fuzz-targets/src/test/java/com/example/XMLStreamReadersFuzzer.java class XMLStreamReadersFuzzer (line 36) | public class XMLStreamReadersFuzzer { method myFuzzTest (line 38) | @FuzzTest FILE: projects/apache-felix-dev/JSONParserFuzzer.java class JSONParserFuzzer (line 27) | public class JSONParserFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/apache-httpd/fuzz_addr_parse.c function LLVMFuzzerTestOneInput (line 18) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/apache-httpd/fuzz_parse.c function LLVMFuzzerTestOneInput (line 36) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/apache-httpd/fuzz_preq.c function apr_status_t (line 39) | apr_status_t hookfunc(apreq_hook_t *hook, apreq_param_t *param, function LLVMFuzzerTestOneInput (line 44) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/apache-httpd/fuzz_request.c function LLVMFuzzerInitialize (line 57) | int LLVMFuzzerInitialize(int *argc, char ***argv) { function LLVMFuzzerTestOneInput (line 64) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/apache-httpd/fuzz_tokenize.c function LLVMFuzzerTestOneInput (line 18) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/apache-httpd/fuzz_uri.c function LLVMFuzzerTestOneInput (line 40) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/apache-httpd/fuzz_utils.c function LLVMFuzzerTestOneInput (line 42) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/AudioVideoParsersFuzzer.java class AudioVideoParsersFuzzer (line 40) | class AudioVideoParsersFuzzer { method fuzzerTestOneInput (line 42) | public static void fuzzerTestOneInput(byte[] bytes) throws Throwable { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/AutoDetectParserFuzzer.java class AutoDetectParserFuzzer (line 35) | class AutoDetectParserFuzzer { method fuzzerTestOneInput (line 38) | public static void fuzzerTestOneInput(byte[] bytes) throws Throwable { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/CompressorParserFuzzer.java class CompressorParserFuzzer (line 33) | class CompressorParserFuzzer { method fuzzerTestOneInput (line 35) | public static void fuzzerTestOneInput(byte[] bytes) throws Throwable { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/HtmlParserFuzzer.java class HtmlParserFuzzer (line 27) | final class HtmlParserFuzzer { method fuzzerTestOneInput (line 29) | public static void fuzzerTestOneInput(final byte[] bytes) throws Throw... FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/ImageParsersFuzzer.java class ImageParsersFuzzer (line 42) | class ImageParsersFuzzer { method fuzzerTestOneInput (line 44) | public static void fuzzerTestOneInput(byte[] bytes) throws Throwable { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/JackcessParserFuzzer.java class JackcessParserFuzzer (line 33) | class JackcessParserFuzzer { method fuzzerTestOneInput (line 35) | public static void fuzzerTestOneInput(byte[] bytes) throws Throwable { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/OOXMLParserFuzzer.java class OOXMLParserFuzzer (line 37) | class OOXMLParserFuzzer { method fuzzerTestOneInput (line 39) | public static void fuzzerTestOneInput(byte[] bytes) throws Throwable { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/OfficeParserFuzzer.java class OfficeParserFuzzer (line 37) | class OfficeParserFuzzer { method fuzzerTestOneInput (line 39) | public static void fuzzerTestOneInput(byte[] bytes) throws Throwable { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/OneNoteParserFuzzer.java class OneNoteParserFuzzer (line 32) | class OneNoteParserFuzzer { method fuzzerTestOneInput (line 34) | public static void fuzzerTestOneInput(byte[] bytes) throws Throwable { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/PDFParserFuzzer.java class PDFParserFuzzer (line 34) | class PDFParserFuzzer { method fuzzerTestOneInput (line 36) | public static void fuzzerTestOneInput(byte[] bytes) throws Throwable { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/PackageParserFuzzer.java class PackageParserFuzzer (line 33) | class PackageParserFuzzer { method fuzzerTestOneInput (line 35) | public static void fuzzerTestOneInput(byte[] bytes) throws Throwable { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/ParserFuzzer.java class ParserFuzzer (line 33) | class ParserFuzzer { method parseOne (line 35) | public static void parseOne(Parser parser, byte[] bytes, ParseContext ... method parseOne (line 41) | public static void parseOne(Parser parser, byte[] bytes) throws Throwa... method parseRMetaFile (line 46) | public static void parseRMetaFile(Parser parser, byte[] bytes) throws ... method parseBytes (line 56) | public static void parseBytes(Parser parser, byte[] bytes, ParseContex... method parseFile (line 66) | public static void parseFile(Parser parser, byte[] bytes, ParseContext... FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/RFC822ParserFuzzer.java class RFC822ParserFuzzer (line 32) | class RFC822ParserFuzzer { method fuzzerTestOneInput (line 34) | public static void fuzzerTestOneInput(byte[] bytes) throws Throwable { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/RTFParserFuzzer.java class RTFParserFuzzer (line 36) | class RTFParserFuzzer { method fuzzerTestOneInput (line 38) | public static void fuzzerTestOneInput(byte[] bytes) throws Throwable { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/TextAndCSVParserFuzzer.java class TextAndCSVParserFuzzer (line 36) | class TextAndCSVParserFuzzer { method fuzzerTestOneInput (line 38) | public static void fuzzerTestOneInput(byte[] bytes) throws Throwable { FILE: projects/apache-tika/project-parent/fuzz-targets/src/main/java/com/example/XMLReaderUtilsFuzzer.java class XMLReaderUtilsFuzzer (line 44) | class XMLReaderUtilsFuzzer { method fuzzerTestOneInput (line 46) | public static void fuzzerTestOneInput(byte[] bytes) throws Exception { method parseOne (line 57) | private static void parseOne(byte[] bytes) throws TikaException, IOExc... FILE: projects/archaius-core/DynamicPropertyFuzzer.java class DynamicPropertyFuzzer (line 7) | public class DynamicPropertyFuzzer { method fuzzerTestOneInput (line 8) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/argcomplete/fuzz_shlex.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 29) | def main(): FILE: projects/args4j/CmdLineParserFuzzer.java class CmdLineParserFuzzer (line 23) | public class CmdLineParserFuzzer { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class DummyClass (line 44) | static class DummyClass { type DrinkName (line 63) | public enum DrinkName { FILE: projects/arrow-java/FuzzIpcFile.java class FuzzIpcFile (line 28) | public class FuzzIpcFile { method fuzzerTestOneInput (line 30) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/arrow-java/FuzzIpcStream.java class FuzzIpcStream (line 25) | public class FuzzIpcStream { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/arrow-py/fuzz_datetime.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 40) | def main(): FILE: projects/arrow-py/fuzz_tzinfo.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 36) | def main(): FILE: projects/asn1crypto/fuzz_parse.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 30) | def main(): FILE: projects/aspectj/src/main/java/ossfuzz/ASTFuzzer.java class ASTFuzzer (line 27) | public class ASTFuzzer { method fuzzerTestOneInput (line 48) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/asteval/fuzz_eval.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 36) | def main(): FILE: projects/astroid/fuzz_parse.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 41) | def main(): FILE: projects/asttokens/fuzz_asttokens.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 35) | def main(): FILE: projects/async-http-client/project-parent/fuzz-targets/src/test/java/com/example/AsyncHttpClientFuzzer.java class AsyncHttpClientFuzzer (line 40) | class AsyncHttpClientFuzzer { method setUp (line 56) | @BeforeAll method cleanUp (line 68) | @AfterAll method myFuzzTest (line 78) | @FuzzTest method addHttpConnector (line 121) | public static ServerConnector addHttpConnector(Server server) { FILE: projects/atomic/fuzz_test.go function FuzzTest (line 22) | func FuzzTest(f *testing.F) { FILE: projects/attrs/fuzz_attrs.py function consumeIdentifier (line 24) | def consumeIdentifier(fdp): function TestOneInput (line 28) | def TestOneInput(data): function main (line 56) | def main(): FILE: projects/augeas/augeas_api_fuzzer.cc function LLVMFuzzerTestOneInput (line 37) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/augeas/augeas_escape_name_fuzzer.cc function escape_match (line 23) | int escape_match(const uint8_t *data, size_t size){ function LLVMFuzzerTestOneInput (line 40) | int LLVMFuzzerTestOneInput(const uint8_t* Data, size_t Size) { FILE: projects/augeas/augeas_fa_fuzzer.cc function LLVMFuzzerTestOneInput (line 37) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size){ FILE: projects/autoflake/fuzz_fix_code.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 31) | def main(): FILE: projects/autopep8/fuzz_fix_file.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 32) | def main(): FILE: projects/avro/project-parent/fuzz-targets/src/test/java/com/example/AvroSerializationFuzzer.java class AvroSerializationFuzzer (line 42) | class AvroSerializationFuzzer { method setUp (line 46) | @BeforeAll method myFuzzTest (line 54) | @FuzzTest FILE: projects/azure-sdk-for-python/fuzz_mgmt_serialization.py function TestOneInput (line 27) | def TestOneInput(data): function main (line 60) | def main(): FILE: projects/babel/fuzz_lexer.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 36) | def main(): FILE: projects/babel/fuzz_profile.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 35) | def main(): FILE: projects/bad_example/bad_example_fuzzer.cc function bad_term_handler (line 29) | void bad_term_handler(int signum) { function LLVMFuzzerTestOneInput (line 35) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/bc-java/CMSEnvelopedDataParserFuzzer.java class CMSEnvelopedDataParserFuzzer (line 37) | public class CMSEnvelopedDataParserFuzzer { method fuzzerTestOneInput (line 38) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/bc-java/EncodingFuzzer.java class EncodingFuzzer (line 25) | public class EncodingFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method encodeHexString (line 50) | private static String encodeHexString(byte[] byteArray) { method byteToHex (line 58) | private static String byteToHex(byte num) { FILE: projects/bc-java/PEMParserFuzzer.java class PEMParserFuzzer (line 27) | public class PEMParserFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/bc-java/X509CertPairParserFuzzer.java class X509CertPairParserFuzzer (line 23) | public class X509CertPairParserFuzzer { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/binutils/fuzz_addr2line.c function LLVMFuzzerTestOneInput (line 21) | int FILE: projects/binutils/fuzz_as.c function xatexit (line 27) | int function LLVMFuzzerTestOneInput (line 34) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/binutils/fuzz_bfd.c function bufferToFile (line 23) | static int bufferToFile(char * name, const uint8_t *Data, size_t Size) { function LLVMFuzzerTestOneInput (line 41) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/binutils/fuzz_bfd_ext.c function bufferToFile (line 29) | static int bufferToFile(char *name, const uint8_t *Data, size_t Size) { function LLVMFuzzerTestOneInput (line 44) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/binutils/fuzz_disas_ext.c type SFILE (line 31) | typedef struct function fuzz_disasm_null_styled_printf (line 37) | static int function objdump_sprintf (line 46) | static int objdump_sprintf (void *vf, const char *format, ...) function disassemble_architecture (line 68) | void function LLVMFuzzerTestOneInput (line 115) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/binutils/fuzz_disassemble.c type SFILE (line 25) | typedef struct function fuzz_disasm_null_styled_printf (line 31) | static int function objdump_sprintf (line 39) | static int objdump_sprintf (void *vf, const char *format, ...) function LLVMFuzzerTestOneInput (line 60) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/binutils/fuzz_dlltool.c function init_dlltool_global_state (line 20) | void function callIntoDlltool (line 46) | void function LLVMFuzzerTestOneInput (line 60) | int FILE: projects/binutils/fuzz_dwarf.c function LLVMFuzzerTestOneInput (line 20) | int FILE: projects/binutils/fuzz_nm.c function LLVMFuzzerTestOneInput (line 21) | int FILE: projects/binutils/fuzz_objcopy.c function init_objcopy_global_state (line 23) | void function LLVMFuzzerTestOneInput (line 94) | int FILE: projects/binutils/fuzz_objdump.c function objdump_reset (line 20) | void objdump_reset() { function LLVMFuzzerTestOneInput (line 39) | int FILE: projects/binutils/fuzz_ranlib_simulation.c function LLVMFuzzerTestOneInput (line 31) | int FILE: projects/binutils/fuzz_readelf.c function check_architecture (line 26) | int check_architecture(char *tmpfilename, char *arch_string) { function LLVMFuzzerTestOneInput (line 65) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/binutils/fuzz_strings.c function LLVMFuzzerTestOneInput (line 21) | int FILE: projects/binutils/fuzz_windres.c function fuzz_format_check_from_mem (line 31) | static enum res_format function fuzz_check_coff_rsrc (line 47) | int function LLVMFuzzerTestOneInput (line 88) | int FILE: projects/black/fuzz_format_filecontents.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 37) | def main(): FILE: projects/black/fuzz_lib2to3_parse.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 33) | def main(): FILE: projects/black/fuzz_raw_format_filecontents.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 38) | def main(): FILE: projects/blackfriday/render_fuzzer.go function Fuzz (line 18) | func Fuzz(data []byte) int { FILE: projects/bleach/linkify_fuzzer.py function TestOneInput (line 23) | def TestOneInput(input_bytes): function main (line 30) | def main(): FILE: projects/bleach/sanitize_fuzzer.py function TestOneInput (line 23) | def TestOneInput(input_bytes): function main (line 30) | def main(): FILE: projects/bluez/fuzz_gobex.c function LLVMFuzzerTestOneInput (line 22) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/bluez/fuzz_hci.c function LLVMFuzzerTestOneInput (line 25) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/bluez/fuzz_sdp.c function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/bluez/fuzz_textfile.c function LLVMFuzzerTestOneInput (line 40) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/bluez/fuzz_xml.c function empty_func (line 24) | void empty_func(void *d, const char *s) { function LLVMFuzzerTestOneInput (line 28) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/bmcweb/content_type_fuzzer.cpp function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) FILE: projects/bmcweb/filter_expr_fuzzer.cpp function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) FILE: projects/bmcweb/json_html_serializer_fuzzer.cpp function LLVMFuzzerTestOneInput (line 25) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) FILE: projects/bmcweb/json_parser_fuzzer.cpp function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) FILE: projects/bmcweb/multipart_parser_fuzzer.cpp function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) FILE: projects/boost/boost_datetime_fuzzer.cc function LLVMFuzzerTestOneInput (line 19) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) FILE: projects/boost/boost_filesystem_fuzzer.cc function LLVMFuzzerTestOneInput (line 18) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) FILE: projects/boost/boost_graph_graphml_fuzzer.cc function LLVMFuzzerTestOneInput (line 31) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) FILE: projects/boost/boost_graph_graphviz_fuzzer.cc type DotVertex (line 24) | struct DotVertex { type DotEdge (line 30) | struct DotEdge { function LLVMFuzzerTestOneInput (line 39) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) FILE: projects/boost/boost_programoptions_fuzzer.cc function set_options (line 21) | po::options_description set_options() function LLVMFuzzerTestOneInput (line 64) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) FILE: projects/boost/boost_ptree_inforead_fuzzer.cc function readInfo (line 21) | int function LLVMFuzzerTestOneInput (line 41) | int FILE: projects/boost/boost_ptree_iniread_fuzzer.cc function readIni (line 21) | int function LLVMFuzzerTestOneInput (line 41) | int FILE: projects/boost/boost_ptree_jsonread_fuzzer.cc function readJson (line 21) | int function LLVMFuzzerTestOneInput (line 41) | int FILE: projects/boost/boost_ptree_xmlread_fuzzer.cc function readXml (line 21) | int function LLVMFuzzerTestOneInput (line 59) | int FILE: projects/boost/boost_regex_fuzzer.cc function assertPostConditions (line 23) | void assertPostConditions(boost::match_resultsH' if be else 'I' if be else ' bytes: function el_explicit (line 33) | def el_explicit(g,e,vr,val,be=False): function el_implicit (line 44) | def el_implicit(g,e,val,be=False): function item_defined (line 50) | def item_defined(payload, be=False): function item_undef (line 53) | def item_undef(payload, be=False): function seq_defined_explicit (line 57) | def seq_defined_explicit(g,e,items, be=False): function seq_undef_explicit (line 61) | def seq_undef_explicit(g,e,items, be=False): function seq_defined_implicit (line 66) | def seq_defined_implicit(g,e,items, be=False): function seq_undef_implicit (line 70) | def seq_undef_implicit(g,e,items, be=False): function meta_group (line 74) | def meta_group(ts_uid: str, with_gl=True): function part10 (line 88) | def part10(path, ts_uid: str, dataset: bytes, with_gl=True): function seed_explicit_le_basic (line 94) | def seed_explicit_le_basic(path): function seed_implicit_le_basic (line 106) | def seed_implicit_le_basic(path): function seed_explicit_be (line 115) | def seed_explicit_be(path): function seed_sq_undef_explicit (line 123) | def seed_sq_undef_explicit(path): function seed_pixel_ob_small (line 132) | def seed_pixel_ob_small(path): function seed_private_tags (line 141) | def seed_private_tags(path): function seed_charset_latin1 (line 149) | def seed_charset_latin1(path): function seed_zero_len_and_odd_pad (line 158) | def seed_zero_len_and_odd_pad(path): function seed_un_bytes (line 166) | def seed_un_bytes(path): function seed_ul_us_extremes (line 175) | def seed_ul_us_extremes(path): function seed_meta_without_group_length (line 184) | def seed_meta_without_group_length(path): FILE: projects/decorator/fuzz_decorator.py function TestInput (line 22) | def TestInput(data): function main (line 57) | def main(): FILE: projects/decorator/fuzz_funcmarker.py function base_func (line 22) | def base_func(*args, **kw): function TestInput (line 25) | def TestInput(data): function main (line 39) | def main(): FILE: projects/defusedxml/fuzz_etree_parse.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 33) | def main(): FILE: projects/defusedxml/fuzz_parse_string.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 35) | def main(): FILE: projects/demangle/fuzz_test.go function FuzzTest (line 22) | func FuzzTest(f *testing.F) { FILE: projects/dgraph/fuzz_parser_test.go function FuzzParserTest (line 21) | func FuzzParserTest(f *testing.F) { FILE: projects/digest/fuzz_digest.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 38) | def main(): FILE: projects/dill/fuzz_dumps.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 33) | def main(): FILE: projects/distlib/fuzz_marker.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 29) | def main(): FILE: projects/distlib/fuzz_metadata.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 47) | def main(): FILE: projects/dng_sdk/dng_camera_profile_fuzzer.cpp function LLVMFuzzerTestOneInput (line 41) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/dng_sdk/dng_fixed_validate_fuzzer.cpp function LLVMFuzzerTestOneInput (line 16) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/dng_sdk/dng_stage_fuzzer.cpp function runFuzzerWithVariableHost (line 42) | void runFuzzerWithVariableHost(char *filename, uint32_t dng_version, function LLVMFuzzerTestOneInput (line 165) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/dng_sdk/dng_validate_fuzzer.cpp function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/dnsmasq/fuzz_auth.c function FuzzAuth (line 18) | void FuzzAuth(const uint8_t **data2, size_t *size2) { function LLVMFuzzerTestOneInput (line 42) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/dnsmasq/fuzz_dhcp.c function FuzzDhcp (line 18) | void FuzzDhcp(const uint8_t **data2, size_t *size2) { function LLVMFuzzerTestOneInput (line 52) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/dnsmasq/fuzz_dhcp6.c function FuzzDhcp (line 19) | void FuzzDhcp(const uint8_t **data2, size_t *size2) { function LLVMFuzzerTestOneInput (line 53) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/dnsmasq/fuzz_header.h function gb_init (line 25) | void gb_init() { function gb_cleanup (line 33) | void gb_cleanup() { function get_short (line 102) | short get_short(const uint8_t **data, size_t *size) { function get_int (line 110) | int get_int(const uint8_t **data, size_t *size) { function fuzz_ioctl (line 124) | int fuzz_ioctl(int fd, unsigned long request, void *arg) { function fuzz_recvmsg (line 180) | ssize_t fuzz_recvmsg(int sockfd, struct msghdr *msg, int flags) { function init_daemon (line 232) | int init_daemon(const uint8_t **data2, size_t *size2) { FILE: projects/dnsmasq/fuzz_rfc1035.c function FuzzExtractTheAddress (line 18) | void FuzzExtractTheAddress(const uint8_t **data2, size_t *size2) { function FuzzAnswerTheRequest (line 46) | void FuzzAnswerTheRequest(const uint8_t **data2, size_t *size2) { function FuzzIgnoredAddress (line 72) | void FuzzIgnoredAddress(const uint8_t **data2, size_t *size2) { function FuzzCheckLocalDomain (line 90) | void FuzzCheckLocalDomain(const uint8_t **data2, size_t *size2) { function FuzzExtractRequest (line 108) | void FuzzExtractRequest(const uint8_t **data2, size_t *size2) { function FuzzArpaName2Addr (line 136) | void FuzzArpaName2Addr(const uint8_t **data2, size_t *size2) { function FuzzResizePacket (line 152) | void FuzzResizePacket(const uint8_t **data2, size_t *size2) { function FuzzSetupReply (line 170) | void FuzzSetupReply(const uint8_t **data2, size_t *size2) { function FuzzCheckForBogusWildcard (line 186) | void FuzzCheckForBogusWildcard(const uint8_t **data2, size_t *size2) { function LLVMFuzzerTestOneInput (line 213) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/dnsmasq/fuzz_util.cc function init_daemon (line 25) | static int init_daemon(FuzzedDataProvider &provider, function LLVMFuzzerTestOneInput (line 224) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/dnspython/fuzz_message.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 30) | def main(): FILE: projects/dnspython/fuzz_token.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 31) | def main(): FILE: projects/docker-client/RegistryAuthFuzzer.java class RegistryAuthFuzzer (line 32) | public class RegistryAuthFuzzer { method fuzzerInitialize (line 35) | public static void fuzzerInitialize() { method fuzzerTearDown (line 45) | public static void fuzzerTearDown() { method fuzzerTestOneInput (line 50) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/docutils/fuzz_rst.py function TestOneInput (line 33) | def TestOneInput(data): function main (line 71) | def main(): FILE: projects/docutils/fuzz_rst_parse.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 36) | def main(): FILE: projects/docutils/fuzz_table.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 39) | def main(): FILE: projects/dom4j/DOMReaderFuzzer.java class DOMReaderFuzzer (line 31) | public class DOMReaderFuzzer { method fuzzerTestOneInput (line 32) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/double-conversion/string_to_double_fuzzer.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/dropwizard/DefaultServerFactoryFuzzer.java class DefaultServerFactoryFuzzer (line 32) | public class DefaultServerFactoryFuzzer { method fuzzerTestOneInput (line 33) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/e2fsprogs/fuzz/ext2fs_check_directory_fuzzer.cc function LLVMFuzzerTestOneInput (line 22) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/e2fsprogs/fuzz/ext2fs_image_read_write_fuzzer.cc function LLVMFuzzerTestOneInput (line 25) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/e2fsprogs/fuzz/ext2fs_read_bitmap_fuzzer.cc function LLVMFuzzerTestOneInput (line 25) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/easywsclient/easyws_fuzzer.cpp function LLVMFuzzerTestOneInput (line 22) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/ecdsa-python/fuzz_private_key.py function TestOneInput (line 24) | def TestOneInput(input_bytes): function main (line 45) | def main(): FILE: projects/eclipse-equinox/equinox-fuzzer/src/main/java/org/eclipse/osgi/ConditionInfoFuzzer.java class ConditionInfoFuzzer (line 24) | public class ConditionInfoFuzzer { method ConditionInfoFuzzer (line 28) | public ConditionInfoFuzzer(FuzzedDataProvider fuzzedDataProvider) thro... method test (line 32) | void test() { method fuzzerTestOneInput (line 41) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/eigen/basicstuff_fuzzer.cc function T (line 25) | T ConsumeValue(FuzzedDataProvider* stream) { function ConsumeValue (line 30) | float ConsumeValue(FuzzedDataProvider* stream) { function ConsumeValue (line 35) | double ConsumeValue(FuzzedDataProvider* stream) { function ConsumeValue (line 40) | long double ConsumeValue(FuzzedDataProvider* stream) { function ConsumeValue (line 45) | std::complex ConsumeValue(FuzzedDataProvider* stream) { function ConsumeValue (line 51) | std::complex ConsumeValue(FuzzedDataProvider* stream) { function MatrixType (line 57) | MatrixType GenerateTestMatrix(size_t rows, size_t cols, function basicStuff (line 68) | void basicStuff(const MatrixType& m, FuzzedDataProvider* stream) { function basicStuffComplex (line 143) | void basicStuffComplex(const MatrixType& m, FuzzedDataProvider* stream) { function LLVMFuzzerTestOneInput (line 167) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/eigen/solver_fuzzer.cc function ConsumeNextInt (line 27) | int ConsumeNextInt(const uint8_t** data, size_t* size) { function LLVMFuzzerTestOneInput (line 38) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/elfutils/fuzz-dwfl-core.c function LLVMFuzzerTestOneInput (line 29) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/elfutils/fuzz-libdwfl.c function LLVMFuzzerTestOneInput (line 36) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/elfutils/fuzz-libelf.c function fuzz_logic_one (line 27) | void fuzz_logic_one(char *filename, int compression_type) { function fuzz_logic_twice (line 62) | void fuzz_logic_twice(char *filename, int open_flags, Elf_Cmd cmd) { function LLVMFuzzerTestOneInput (line 74) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/et-xmlfile/fuzz_write.py function recursive_write (line 28) | def recursive_write(xf, fdp, level): function TestOneInput (line 36) | def TestOneInput(data): function main (line 44) | def main(): FILE: projects/evo-inflector/EnglishFuzzer.java class EnglishFuzzer (line 25) | public class EnglishFuzzer { method fuzzerTestOneInput (line 29) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/example/my-api-repo/do_stuff_fuzzer.cpp function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/example/my-api-repo/do_stuff_unittest.cpp function TestDoStuff (line 12) | void TestDoStuff(const std::string &str, size_t Expected) { function main (line 18) | int main(int argc, char **argv) { FILE: projects/example/my-api-repo/my_api.cpp function DoStuff (line 11) | size_t DoStuff(const std::string &str) { FILE: projects/example/my-api-repo/standalone_fuzz_target_runner.cpp function main (line 20) | int main(int argc, char **argv) { FILE: projects/exp4j/ExpressionBuilderFuzzer.java class ExpressionBuilderFuzzer (line 24) | public class ExpressionBuilderFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/exprtk/exprtk_fuzzer.cpp type timeout_rtc_handler (line 27) | struct timeout_rtc_handler : public exprtk::loop_runtime_check method timeout_rtc_handler (line 29) | timeout_rtc_handler() class timeout_exception (line 33) | class timeout_exception : public std::runtime_error method timeout_exception (line 36) | timeout_exception(const std::string& what = "") method set_timeout_time (line 45) | void set_timeout_time(const time_point_t& timeout_tp) method check (line 50) | bool check() override method handle_runtime_violation (line 65) | void handle_runtime_violation(const violation_context& /*context*/) ov... type compilation_timeout_check (line 74) | struct compilation_timeout_check final : public exprtk::compilation_check method continue_compilation (line 78) | bool continue_compilation(compilation_context& context) override method set_timeout_time (line 96) | void set_timeout_time(const time_point_t& timeout_tp) type vector_access_rtc (line 105) | struct vector_access_rtc final : public exprtk::vector_access_runtime_check method handle_runtime_violation (line 107) | bool handle_runtime_violation(violation_context& /*context*/) override type assert_handler (line 114) | struct assert_handler final : public exprtk::assert_check method handle_assert (line 116) | void handle_assert(const assert_context& /*context*/) override function run (line 123) | void run(const std::string& expression_string) function LLVMFuzzerTestOneInput (line 188) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) FILE: projects/fabric/ccprovider_fuzzer.go function FuzzExtractFileEntries (line 21) | func FuzzExtractFileEntries(data []byte) int { FILE: projects/fabric/fabenc_fuzzer.go function FuzzParseFormat (line 17) | func FuzzParseFormat(data []byte) int { FILE: projects/fabric/msp_fuzzer.go function FuzzDeserializeIdentity (line 17) | func FuzzDeserializeIdentity(data []byte) int { FILE: projects/fabric/persistence_fuzzer.go function FuzzPersistence (line 26) | func FuzzPersistence(data []byte) int { function FuzzChaincodePackageStreamerMetadatabytes (line 35) | func FuzzChaincodePackageStreamerMetadatabytes(data []byte) int { function FuzzParseChaincodePackage (line 46) | func FuzzParseChaincodePackage(data []byte) int { FILE: projects/fabric/policydsl_fuzzer.go function FuzzFromString (line 17) | func FuzzFromString(data []byte) int { FILE: projects/face/fuzz_command.py function empty (line 21) | def empty(): function TestOneInput (line 25) | def TestOneInput(data): function main (line 51) | def main(): FILE: projects/face/fuzz_parse.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 35) | def main(): FILE: projects/fast-xml-parser/fuzz.js function ignoredError (line 39) | function ignoredError(error) { FILE: projects/fastcsv/CsvReaderFuzzer.java class CsvReaderFuzzer (line 24) | public class CsvReaderFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/fastjson2/JsonFuzzer.java class JsonFuzzer (line 21) | public class JsonFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/feign/BodyTemplateFuzzer.java class BodyTemplateFuzzer (line 23) | public class BodyTemplateFuzzer { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/feign/UriUtilsFuzzer.java class UriUtilsFuzzer (line 23) | public class UriUtilsFuzzer { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/ffmpeg/group_seed_corpus.py function get_fuzzer_tags (line 30) | def get_fuzzer_tags(fuzzer_name): function parse_corpus (line 59) | def parse_corpus(corpus_directory): function parse_fuzzers (line 75) | def parse_fuzzers(fuzzers_directory): function zip_relevant_corpus (line 90) | def zip_relevant_corpus(corpus_files, fuzzers): function main (line 124) | def main(): FILE: projects/ffmpeg/name_mappings.py class IDType (line 374) | class IDType(StrEnum): function binary_name (line 382) | def binary_name(type: IDType, id: str) -> str: function build_target_name (line 411) | def build_target_name(binary_name: str) -> str: function main (line 426) | def main(): FILE: projects/ffms2/ffms2_fuzzer.cc function atexit (line 21) | int atexit(void (*function)(void)) { function LLVMFuzzerTestOneInput (line 25) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/fftw3/fftw3_fuzzer.cc function LLVMFuzzerTestOneInput (line 15) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/file/fuzzer_temp_file.h function fuzzer_release_tmpfile (line 57) | static void fuzzer_release_tmpfile(char* filename) { function class (line 67) | class FuzzerTemporaryFile { FILE: projects/file/magic_fuzzer.cc type Environment (line 24) | struct Environment { method Environment (line 25) | Environment(std::string data_dir) { function LLVMFuzzerInitialize (line 39) | int LLVMFuzzerInitialize(int* argc, char*** argv) { function LLVMFuzzerTestOneInput (line 49) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/file/magic_fuzzer_fd.cc type Environment (line 27) | struct Environment { method Environment (line 28) | Environment(std::string data_dir) { function LLVMFuzzerInitialize (line 42) | int LLVMFuzzerInitialize(int* argc, char*** argv) { function LLVMFuzzerTestOneInput (line 52) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/file/magic_fuzzer_loaddb.cc function LLVMFuzzerTestOneInput (line 25) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/filelock/fuzz_filelock.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 40) | def main(): FILE: projects/filesystem_spec/fuzz_http.py function TestOneInput (line 31) | def TestOneInput(data): function main (line 80) | def main(): FILE: projects/firefox/target.c function main (line 13) | int main(int argc, char* argv[]) { FILE: projects/flac/fuzzer_exo.cpp function FLAC__StreamDecoderReadStatus (line 46) | FLAC__StreamDecoderReadStatus FLACParser::read_callback( function FLAC__StreamDecoderSeekStatus (line 53) | FLAC__StreamDecoderSeekStatus FLACParser::seek_callback( function FLAC__StreamDecoderTellStatus (line 60) | FLAC__StreamDecoderTellStatus FLACParser::tell_callback( function FLAC__StreamDecoderLengthStatus (line 67) | FLAC__StreamDecoderLengthStatus FLACParser::length_callback( function FLAC__bool (line 74) | FLAC__bool FLACParser::eof_callback(const FLAC__StreamDecoder * /* decod... function FLAC__StreamDecoderWriteStatus (line 79) | FLAC__StreamDecoderWriteStatus FLACParser::write_callback( function FLAC__StreamDecoderReadStatus (line 100) | FLAC__StreamDecoderReadStatus FLACParser::readCallback(FLAC__byte buffer[], function FLAC__StreamDecoderSeekStatus (line 119) | FLAC__StreamDecoderSeekStatus FLACParser::seekCallback( function FLAC__StreamDecoderTellStatus (line 126) | FLAC__StreamDecoderTellStatus FLACParser::tellCallback( function FLAC__StreamDecoderLengthStatus (line 132) | FLAC__StreamDecoderLengthStatus FLACParser::lengthCallback( function FLAC__bool (line 137) | FLAC__bool FLACParser::eofCallback() { return mEOF; } function FLAC__StreamDecoderWriteStatus (line 139) | FLAC__StreamDecoderWriteStatus FLACParser::writeCallback( function copyToByteArrayBigEndian (line 215) | static void copyToByteArrayBigEndian(int8_t *dst, const int *const *src, function copyToByteArrayLittleEndian (line 231) | static void copyToByteArrayLittleEndian(int8_t *dst, const int *const *src, function copyTrespass (line 245) | static void copyTrespass(int8_t * /* dst */, const int *const * /* src */, class FuzzDataSource (line 432) | class FuzzDataSource : public DataSource { method FuzzDataSource (line 437) | FuzzDataSource(const uint8_t *data, size_t size) { method readAt (line 442) | ssize_t readAt(off64_t offset, void *const data, size_t size) { function LLVMFuzzerTestOneInput (line 457) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/flask-jwt-extended/fuzz_jwt.py function get_app (line 29) | def get_app(key): function test_encodings (line 44) | def test_encodings(data): function test_get (line 52) | def test_get(data): function TestOneInput (line 84) | def TestOneInput(data): function main (line 92) | def main(): FILE: projects/flask-restx/fuzz_reqparse.py function TestOneInput (line 26) | def TestOneInput(data): function main (line 51) | def main(): FILE: projects/flask-wtf/fuzz_flask_wtf.py function get_app (line 24) | def get_app(fdp): function fuzz_i18n (line 34) | def fuzz_i18n(data): function fuzz_csrf (line 41) | def fuzz_csrf(data): function TestOneInput (line 53) | def TestOneInput(data): function main (line 58) | def main(): FILE: projects/flask/cors_fuzz_flask.py function internal_error (line 33) | def internal_error(error): function fuzz_echo (line 41) | def fuzz_echo(): function shutdown_server (line 45) | def shutdown_server(): function shutdown (line 54) | def shutdown(): class ServerThread (line 58) | class ServerThread(threading.Thread): method __init__ (line 59) | def __init__(self): method run (line 62) | def run(self): function TestOneInput (line 66) | def TestOneInput(data): function get_run_count_if_there (line 96) | def get_run_count_if_there(): function main (line 107) | def main(): FILE: projects/flask/fuzz_json.py class FuzzFlask (line 25) | class FuzzFlask(_Flask): function TestOneInput (line 29) | def TestOneInput(data): function main (line 62) | def main(): FILE: projects/flask/fuzz_werkzeug_formparser.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 39) | def main(): FILE: projects/flask/fuzz_werkzeug_http.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 41) | def main(): FILE: projects/flask/fuzz_werkzeug_url.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/flex/fuzz-main.c function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/flex/fuzz-scanopt.c function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/flyway/LocationFuzzer.java class LocationFuzzer (line 27) | public class LocationFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/freeimage/load_from_memory_fuzzer.cc function SafeToLoadFromMemory (line 10) | bool SafeToLoadFromMemory(FREE_IMAGE_FORMAT fif) { function LLVMFuzzerTestOneInput (line 18) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/fsnotify/fuzz_test.go function FuzzInotify (line 28) | func FuzzInotify(f *testing.F) { function getSanitizedName (line 152) | func getSanitizedName(data []byte) (string, error) { function fuzzTouch (line 167) | func fuzzTouch(t *testing.T, path ...string) error { FILE: projects/ftfy/fuzz_fix.py function TestInput (line 21) | def TestInput(data): function main (line 44) | def main(): FILE: projects/ftfy/fuzz_format.py function TestInput (line 22) | def TestInput(data): function main (line 40) | def main(): FILE: projects/fuzzywuzzy/DiffUtilsFuzzer.java class DiffUtilsFuzzer (line 25) | public class DiffUtilsFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/fuzzywuzzy/FuzzySearchFuzzer.java class FuzzySearchFuzzer (line 25) | public class FuzzySearchFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/g-api-auth-httplib2/fuzz_http.py class FuzzMockHttp (line 30) | class FuzzMockHttp(object): method __init__ (line 31) | def __init__(self, responses, headers=None): method request (line 37) | def request( class FuzzMockResponse (line 54) | class FuzzMockResponse(object): method __init__ (line 55) | def __init__(self, status=http_client.OK, data=b""): method __iter__ (line 59) | def __iter__(self): class FuzzMockCredentials (line 64) | class FuzzMockCredentials(object): method __init__ (line 65) | def __init__(self, token="token"): method apply (line 68) | def apply(self, headers): method before_request (line 71) | def before_request(self, request, method, url, headers): method refresh (line 74) | def refresh(self, request): function TestOneInput (line 78) | def TestOneInput(data): function main (line 116) | def main(): FILE: projects/g-api-auth-library-python/fuzz_jwt.py function test_token_decode (line 33) | def test_token_decode(data): function TestOneInput (line 41) | def TestOneInput(data): function main (line 45) | def main(): FILE: projects/g-api-auth-library-python/fuzz_jwt_roundtrip.py function test_roundtrip_unverified (line 41) | def test_roundtrip_unverified(data): function TestOneInput (line 64) | def TestOneInput(data): function main (line 68) | def main(): FILE: projects/g-api-pubsub/fuzz_msg.py function fuzz_exactly_once_delivery_enabled_func (line 33) | def fuzz_exactly_once_delivery_enabled_func(): function TestOneInput (line 38) | def TestOneInput(data): function main (line 66) | def main(): FILE: projects/g-api-py-api-common-protos/fuzz_api.py function protobuf_roundtrip (line 28) | def protobuf_roundtrip(proto_target, input_bytes): function TestOneInput (line 41) | def TestOneInput(input_bytes): function main (line 50) | def main(): FILE: projects/g-api-py-oauthlib/fuzz_config.py function TestOneInput (line 27) | def TestOneInput(data): function main (line 55) | def main(): FILE: projects/g-api-python-bigquery-storage/fuzz_avroparser.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 39) | def main(): FILE: projects/g-api-python-client/fuzz_mimeparser.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 30) | def main(): FILE: projects/g-api-python-cloud-core/fuzz_helpers.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 67) | def main(): FILE: projects/g-api-python-firestore/fuzz_test.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 44) | def main(): FILE: projects/g-api-python-tasks/fuzz_cloudtask_client.py function get_request_queue (line 27) | def get_request_queue(fdp, client): function update_queue (line 35) | def update_queue(fdp, client): function delete_queue (line 45) | def delete_queue(fdp, client): function TestOneInput (line 53) | def TestOneInput(data): function main (line 70) | def main(): FILE: projects/g-api-resource-manager/fuzz_tag_values_client.py function test_get_tag_value (line 35) | def test_get_tag_value(fdp, client): function test_create_tag_value (line 54) | def test_create_tag_value(fdp, client): function test_update_tag_value (line 64) | def test_update_tag_value(fdp, client): function test_delete_tag_value (line 75) | def test_delete_tag_value(fdp, client): function test_get_iam_policy (line 85) | def test_get_iam_policy(fdp, client): function test_set_iam_policy (line 98) | def test_set_iam_policy(fdp, client): function TestOneInput (line 111) | def TestOneInput(data): function main (line 134) | def main(): FILE: projects/g-api-resumable-media-python/fuzz_uploader.py function test_simple (line 23) | def test_simple(data): function test_multipart (line 27) | def test_multipart(data): function _upload_in_flight (line 44) | def _upload_in_flight(data, headers=None, checksum=None): function test_checksum (line 58) | def test_checksum(data): function TestOneInput (line 72) | def TestOneInput(data): function main (line 77) | def main(): FILE: projects/g-api-secret-manager/fuzz_client.py function test_add_secret_version (line 30) | def test_add_secret_version(client, fdp): function TestOneInput (line 69) | def TestOneInput(data): function main (line 81) | def main(): FILE: projects/g-api-secret-manager/fuzz_parser.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/g-apis-py-api-core/fuzz_path_template.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 55) | def main(): FILE: projects/g-auth-library-java/project-parent/fuzz-targets/src/test/java/com/example/CredentialsFuzzer.java class CredentialsFuzzer (line 31) | class CredentialsFuzzer { method myFuzzTest (line 32) | @FuzzTest class MockHttpTransportFactory (line 57) | static class MockHttpTransportFactory implements HttpTransportFactory { method create (line 60) | @Override FILE: projects/g-auth-library-java/project-parent/fuzz-targets/src/test/java/com/example/TokenVerifierFuzzer.java class TokenVerifierFuzzer (line 27) | class TokenVerifierFuzzer { method myFuzzTest (line 28) | @FuzzTest FILE: projects/g-cloud-logging-py/fuzz_entries.py function create_dummy_log_entry (line 23) | def create_dummy_log_entry(fdp): function TestInput (line 49) | def TestInput(data): function main (line 74) | def main(): FILE: projects/g-cloud-logging-py/fuzz_handlers.py function TestInput (line 23) | def TestInput(data): function main (line 49) | def main(): FILE: projects/g-cloud-logging-py/fuzz_helpers.py function TestInput (line 23) | def TestInput(data): function main (line 36) | def main(): FILE: projects/g-cloud-logging-py/fuzz_resources.py function mock_retrieve_metadata_server (line 25) | def mock_retrieve_metadata_server(endpoint): function TestInput (line 33) | def TestInput(data): function main (line 48) | def main(): FILE: projects/g-http-java-client/project-parent/fuzz-targets/src/test/java/com/example/JsonObjectParserFuzzer.java class JsonObjectParserFuzzer (line 33) | class JsonObjectParserFuzzer { method myFuzzTest (line 36) | @FuzzTest FILE: projects/g-oauth-java-client/OauthSignerFuzzer.java class OauthSignerFuzzer (line 30) | public class OauthSignerFuzzer { method fuzzerTestOneInput (line 31) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/g-py-bigquery/fuzz_parser.py function TestOneInput (line 26) | def TestOneInput(data): function main (line 55) | def main(): FILE: projects/g-py-crc32c/fuzz_checksum.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 28) | def main(): FILE: projects/gc-iam/fuzz_credentials.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 73) | def main(): FILE: projects/gcloud-error-py/fuzz_util.py class SampleRequest (line 22) | class SampleRequest(object): method __init__ (line 23) | def __init__(self, url, method, user_agent, referrer, remote_addr): function TestInput (line 30) | def TestInput(data): function main (line 42) | def main(): FILE: projects/gcp-python-cloud-storage/fuzz_fileio.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 49) | def main(): FILE: projects/gdk-pixbuf/targets/animation_fuzzer.c function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/gdk-pixbuf/targets/fuzzer_temp_file.h function fuzzer_release_tmpfile (line 57) | static void fuzzer_release_tmpfile(char *filename) { function class (line 67) | class FuzzerTemporaryFile { FILE: projects/gdk-pixbuf/targets/pixbuf_cons_fuzzer.c function LLVMFuzzerTestOneInput (line 22) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/gdk-pixbuf/targets/pixbuf_file_fuzzer.c function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/gdk-pixbuf/targets/pixbuf_scale_fuzzer.c function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/gdk-pixbuf/targets/stream_fuzzer.c function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/genshi/fuzz_html.py function TestOneInput (line 29) | def TestOneInput(data): function main (line 43) | def main(): FILE: projects/ghostscript/gs_device_bmpmono_fuzzer.cc function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gs_device_eps2write_fuzzer.cc function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gs_device_faxg3_fuzzer.cc function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gs_device_pdfwrite_fuzzer.cc function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gs_device_pdfwrite_opts_fuzzer.cc function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gs_device_pgmraw_fuzzer.cc function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gs_device_png16m_fuzzer.cc function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gs_device_ps2write_fuzzer.cc function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gs_device_psdcmyk_fuzzer.cc function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gs_device_pxlcolor_fuzzer.cc function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gs_device_pxlmono_fuzzer.cc function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gs_device_tiffsep1_fuzzer.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gs_device_xpswrite_fuzzer.cc function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gs_fuzzlib.h function gs_stdin (line 41) | static int gs_stdin(void *inst, char *buf, int len) function gs_stdnull (line 54) | static int gs_stdnull(void *inst, const char *buf, int len) function gs_to_raster_fuzz (line 60) | int gs_to_raster_fuzz( function fuzz_gs_device (line 69) | int fuzz_gs_device( FILE: projects/ghostscript/gstoraster_fuzzer.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gstoraster_fuzzer_all_colors.cc function LLVMFuzzerTestOneInput (line 15) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gstoraster_pdf_fuzzer.cc function quick_check_pdf (line 16) | static int quick_check_pdf(const uint8_t *data, size_t size) { function LLVMFuzzerTestOneInput (line 29) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ghostscript/gstoraster_ps_fuzzer.cc function is_pdf (line 15) | static int is_pdf(const uint8_t *data, size_t size) { function LLVMFuzzerTestOneInput (line 29) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/giflib/ProtoToGif.cpp function string (line 10) | string ProtoConverter::gifProtoToString(GifProto const &proto) FILE: projects/giflib/ProtoToGif.h function namespace (line 7) | namespace gifProtoFuzzer FILE: projects/giflib/dgif_fuzz_common.cc function stub_input_reader (line 8) | int stub_input_reader(GifFileType *gifFileType, GifByteType *gifByteType... function fuzz_dgif (line 20) | int fuzz_dgif(const uint8_t *Data, size_t Size) function fuzz_dgif_extended (line 38) | int fuzz_dgif_extended(const uint8_t *Data, size_t Size) function Color8888 (line 73) | static Color8888 gifColorToColor8888(const GifColorType &color) function willBeCleared (line 78) | static bool willBeCleared(const GraphicsControlBlock &gcb) function getDelayMs (line 83) | static long getDelayMs(GraphicsControlBlock &gcb) function fuzz_dgif_ala_android (line 88) | int fuzz_dgif_ala_android(const uint8_t *Data, size_t Size) FILE: projects/giflib/dgif_fuzz_common.h type Color8888 (line 9) | typedef uint32_t Color8888; type gifUserData (line 11) | struct gifUserData FILE: projects/giflib/dgif_protobuf_target.cc function DEFINE_PROTO_FUZZER (line 14) | DEFINE_PROTO_FUZZER(const GifProto &gif_proto) FILE: projects/giflib/dgif_target.cc function LLVMFuzzerTestOneInput (line 6) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) FILE: projects/giflib/egif_fuzz_common.cc function stub_output_writer (line 8) | int stub_output_writer(GifFileType *gifFileType, const uint8_t *buf, int... function rgb_to_gif (line 30) | static bool rgb_to_gif(const uint8_t *data, size_t size) function fuzz_egif (line 191) | int fuzz_egif(const uint8_t *Data, size_t Size) FILE: projects/giflib/egif_fuzz_common.h type gifUserData (line 7) | struct gifUserData FILE: projects/giflib/egif_target.cc function LLVMFuzzerTestOneInput (line 6) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) FILE: projects/gitdb/fuzz_gitdb.py function fuzz_decompression_map_reader (line 37) | def fuzz_decompression_map_reader(data): function fuzz_loose_obj_db (line 50) | def fuzz_loose_obj_db(data): function fuzz_pack_file (line 68) | def fuzz_pack_file(data): function TestOneInput (line 92) | def TestOneInput(data): function main (line 98) | def main(): FILE: projects/github_scarecrow/fakelib.py function do_something (line 19) | def do_something(data): FILE: projects/github_scarecrow/shell_injection_poc_fuzzer.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 38) | def main(): FILE: projects/glom/fuzz_core.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 63) | def main(): FILE: projects/glom/fuzz_glom.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 49) | def main(): FILE: projects/glom/fuzz_matching.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 44) | def main(): FILE: projects/glom/fuzz_mutation.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 50) | def main(): FILE: projects/glom/fuzz_reduction.py function test_flatten (line 23) | def test_flatten(data): function test_merge (line 33) | def test_merge(data): function TestOneInput (line 56) | def TestOneInput(data): function main (line 61) | def main(): FILE: projects/glslang/compile_fuzzer.cc function LLVMFuzzerTestOneInput (line 16) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/gnupg/fuzz_decrypt.c function g10_exit (line 49) | void function gpg_deinit_default_ctrl (line 59) | static void function my_gcry_logger (line 70) | static void function unlink_cb (line 76) | static int unlink_cb(const char *fpath, const struct stat *sb, int typef... function rmrfdir (line 84) | static void rmrfdir(char *path) function LLVMFuzzerTestOneInput (line 95) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/gnupg/fuzz_import.c function g10_exit (line 53) | void function gpg_deinit_default_ctrl (line 63) | static void function my_gcry_logger (line 74) | static void function unlink_cb (line 80) | static int unlink_cb(const char *fpath, const struct stat *sb, int typef... function rmrfdir (line 88) | static void rmrfdir(char *path) function LLVMFuzzerTestOneInput (line 96) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/gnupg/fuzz_list.c function g10_exit (line 49) | void function gpg_deinit_default_ctrl (line 59) | static void function my_gcry_logger (line 70) | static void function unlink_cb (line 76) | static int unlink_cb(const char *fpath, const struct stat *sb, int typef... function rmrfdir (line 84) | static void rmrfdir(char *path) function LLVMFuzzerTestOneInput (line 95) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/gnupg/fuzz_verify.c function g10_exit (line 49) | void function gpg_deinit_default_ctrl (line 59) | static void function my_gcry_logger (line 70) | static void function unlink_cb (line 76) | static int unlink_cb(const char *fpath, const struct stat *sb, int typef... function rmrfdir (line 84) | static void rmrfdir(char *path) function LLVMFuzzerTestOneInput (line 92) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/go-cmp/fuzz_test.go function FuzzDiff (line 22) | func FuzzDiff(f *testing.F) { FILE: projects/go-containerregistry/fuzz.go function FuzzParseReference (line 17) | func FuzzParseReference(data []byte) int { FILE: projects/go-humanize/fuzz_test.go function FuzzParseBytes (line 22) | func FuzzParseBytes(f *testing.F) { FILE: projects/go-json-iterator/fuzz_json.go function Fuzz (line 13) | func Fuzz(data []byte) int { type S (line 55) | type S struct type S1 (line 77) | type S1 struct type Marshaller (line 82) | type Marshaller struct method MarshalJSON (line 86) | func (m *Marshaller) MarshalJSON() ([]byte, error) { method UnmarshalJSON (line 90) | func (m *Marshaller) UnmarshalJSON(data []byte) error { FILE: projects/go-ole/fuzz_test.go function FuzzGUID (line 22) | func FuzzGUID(f *testing.F) { FILE: projects/go-pprof/fuzz_test.go function FuzzParseData (line 22) | func FuzzParseData(f *testing.F) { FILE: projects/go-readline/fuzz_test.go function FuzzReadline (line 22) | func FuzzReadline(f *testing.F) { FILE: projects/go-shlex/fuzz_test.go function FuzzLexer (line 24) | func FuzzLexer(f *testing.F) { FILE: projects/go-snappy/fuzz.go function FuzzRoundTrip (line 9) | func FuzzRoundTrip(data []byte) int { function FuzzDecode (line 24) | func FuzzDecode(data []byte) int { FILE: projects/go-yaml/fuzz_test.go type FuzzType (line 23) | type FuzzType struct function FuzzDecode (line 30) | func FuzzDecode(f *testing.F) { FILE: projects/gogo-protobuf/fuzz_test.go function FuzzProtoUnmarshal (line 24) | func FuzzProtoUnmarshal(f *testing.F) { FILE: projects/golang-appengine/fuzz_test.go function FuzzParseUpload (line 26) | func FuzzParseUpload(f *testing.F) { FILE: projects/golang/aes_fuzzer.go function catchPanics (line 24) | func catchPanics() { function FuzzAesCipherDecrypt (line 45) | func FuzzAesCipherDecrypt(data []byte) int { function FuzzAesCipherEncrypt (line 72) | func FuzzAesCipherEncrypt(data []byte) int { FILE: projects/golang/dsa_fuzzer.go function FuzzDsaVerify (line 25) | func FuzzDsaVerify(f *testing.F) { function FuzzDsaSign (line 52) | func FuzzDsaSign(f *testing.F) { FILE: projects/golang/ecdsa_fuzzer.go function FuzzEcdsaSign (line 25) | func FuzzEcdsaSign(data []byte) int { function FuzzEcdsaVerify (line 50) | func FuzzEcdsaVerify(f *testing.F) { FILE: projects/golang/elf_fuzzer.go function FuzzElfOpen (line 22) | func FuzzElfOpen(data []byte) int { FILE: projects/golang/encoding_fuzzer.go function FuzzEncoding (line 13) | func FuzzEncoding(data []byte) int { FILE: projects/golang/filepath_fuzzer.go function FuzzFpGlob (line 22) | func FuzzFpGlob(data []byte) int { FILE: projects/golang/fuzz_tar_reader.go function FuzzTarReader (line 23) | func FuzzTarReader(data []byte) int { FILE: projects/golang/h2c_fuzzer.go type FakeHttpWriter (line 33) | type FakeHttpWriter struct method Header (line 38) | func (f *FakeHttpWriter) Header() http.Header { method Write (line 42) | func (f *FakeHttpWriter) Write(body []byte) (int, error) { method WriteHeader (line 47) | func (f *FakeHttpWriter) WriteHeader(status int) { method Hijack (line 51) | func (f *FakeHttpWriter) Hijack() (net.Conn, *bufio.ReadWriter, error) { function catchPanics (line 60) | func catchPanics() { function FuzzH2c (line 80) | func FuzzH2c(data []byte) int { FILE: projects/golang/language_fuzzer.go function FuzzMultipleParsers (line 24) | func FuzzMultipleParsers(data []byte) int { FILE: projects/golang/math_big_fuzzer.go function FuzzBigIntCmp1 (line 27) | func FuzzBigIntCmp1(data []byte) int { function FuzzBigIntCmp2 (line 46) | func FuzzBigIntCmp2(data []byte) int { function FuzzRatSetString (line 62) | func FuzzRatSetString(data []byte) int { function FuzzFloatSetString (line 67) | func FuzzFloatSetString(data []byte) int { function FuzzBigGobdecode (line 85) | func FuzzBigGobdecode(data []byte) int { function isDivisibleBy (line 121) | func isDivisibleBy(n int, divisibleby int) bool { function FuzzFloat64SpecialCases (line 125) | func FuzzFloat64SpecialCases(data []byte) int { function checkNonLossyRoundtrip64Fuzz (line 178) | func checkNonLossyRoundtrip64Fuzz(f float64) { function isFiniteFuzz (line 193) | func isFiniteFuzz(f float64) bool { function checkIsBestApprox64Fuzz (line 197) | func checkIsBestApprox64Fuzz(f float64, r *big.Rat) bool { function deltaFuzz (line 227) | func deltaFuzz(r *big.Rat, f float64) *big.Rat { function isEven64Fuzz (line 232) | func isEven64Fuzz(f float64) bool { return math.Float64bits(f)&1 == 0 } FILE: projects/golang/multipart_fuzzer.go type Part (line 18) | type Part struct function Fuzz (line 23) | func Fuzz(data []byte) int { FILE: projects/golang/openpgp_fuzzer.go function FuzzOpenpgpRead (line 22) | func FuzzOpenpgpRead(data []byte) int { FILE: projects/golang/regexp_fuzzer.go function FuzzCompile (line 18) | func FuzzCompile(data []byte) int { function FuzzCompilePOSIX (line 23) | func FuzzCompilePOSIX(data []byte) int { function FuzzReplaceAll (line 28) | func FuzzReplaceAll(data []byte) int { function FuzzFindMatchApis (line 52) | func FuzzFindMatchApis(data []byte) int { FILE: projects/golang/strings_fuzzer.go function FuzzStringsSplit (line 23) | func FuzzStringsSplit(data []byte) int { FILE: projects/golang/text_fuzzer.go function FuzzAcceptLanguage (line 23) | func FuzzAcceptLanguage(data []byte) int { function FuzzCurrency (line 28) | func FuzzCurrency(data []byte) int { FILE: projects/golang/tiff_fuzzer.go function FuzzTiffDecode (line 23) | func FuzzTiffDecode(data []byte) int { FILE: projects/golang/unicode_fuzzer.go function FuzzUnicodeTransform (line 32) | func FuzzUnicodeTransform(data []byte) int { FILE: projects/golang/webp_fuzzer.go function FuzzWebpDecode (line 22) | func FuzzWebpDecode(data []byte) int { FILE: projects/golang/x509_fuzzer.go function FuzzParseCert (line 23) | func FuzzParseCert(data []byte) int { function FuzzPemDecrypt (line 37) | func FuzzPemDecrypt(data []byte) int { FILE: projects/gopsutil/fuzz_test.go function init (line 25) | func init() { function FuzzTest (line 29) | func FuzzTest(f *testing.F) { FILE: projects/gprof2dot/fuzz_profile.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 41) | def main(): FILE: projects/graphql-java/GraphqlFuzzer.java class GraphqlFuzzer (line 25) | public class GraphqlFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/greenmail/UserManagerFuzzer.java class UserManagerFuzzer (line 27) | public class UserManagerFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/groovy/DurationFuzzer.java class DurationFuzzer (line 21) | public class DurationFuzzer { method DurationFuzzer (line 31) | public DurationFuzzer(FuzzedDataProvider data) { method runTest (line 41) | void runTest(BaseDuration duration1, BaseDuration duration2) { method runTest (line 57) | void runTest(Duration duration1, Duration duration2) { method runTest (line 62) | void runTest(TimeDuration duration1, TimeDuration duration2) { method runTest (line 67) | void runTest(DatumDependentDuration duration1, DatumDependentDuration ... method runTest (line 72) | void runTest(DatumDependentDuration duration1, TimeDatumDependentDurat... method runTest (line 77) | void runTest(FuzzedDataProvider data) { method fuzzerTestOneInput (line 86) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/groovy/TestFuzzer.java class MyObject (line 26) | class MyObject { method MyObject (line 29) | MyObject(boolean a, boolean b) { method equals (line 34) | public boolean equals(Object anotherObject) { class MyClosure (line 46) | class MyClosure extends Closure { method MyClosure (line 49) | MyClosure(FuzzedDataProvider data) { method doCall (line 54) | public Object doCall(Object args) { class TestFuzzer (line 63) | public class TestFuzzer extends GroovyTestCase { method TestFuzzer (line 65) | public TestFuzzer(FuzzedDataProvider data) { method getObject (line 68) | MyObject getObject(FuzzedDataProvider data) { method getClosure (line 72) | MyClosure getClosure(FuzzedDataProvider data) { method printPos (line 76) | void printPos() { method assertLengthArrayTest (line 84) | void assertLengthArrayTest(FuzzedDataProvider data) { method assertLengthArrayTestTwo (line 100) | void assertLengthArrayTestTwo(FuzzedDataProvider data) { method assertLengthCharTest (line 116) | void assertLengthCharTest(FuzzedDataProvider data) { method assertLengthObjectTest (line 132) | void assertLengthObjectTest(FuzzedDataProvider data) { method assertEqualsStringTest (line 148) | void assertEqualsStringTest(FuzzedDataProvider data) { method assertEqualsObjectWithMessageTest (line 164) | void assertEqualsObjectWithMessageTest(FuzzedDataProvider data) { method assertEqualsObjectTest (line 181) | void assertEqualsObjectTest(FuzzedDataProvider data) { method assertObjectEqualsTest (line 197) | void assertObjectEqualsTest(FuzzedDataProvider data) { method assertObjectArrayEqualsTest (line 213) | void assertObjectArrayEqualsTest(FuzzedDataProvider data) { method assertInspectTest (line 229) | void assertInspectTest(FuzzedDataProvider data) { method shouldFailTest (line 245) | void shouldFailTest(FuzzedDataProvider data) { method shouldFailClassCLosureTest (line 259) | void shouldFailClassCLosureTest(FuzzedDataProvider data) { method shouldFailWithCauseTest (line 273) | void shouldFailWithCauseTest(FuzzedDataProvider data) { method shouldFailStringTest (line 287) | void shouldFailStringTest(FuzzedDataProvider data) { method assertToStringTest (line 294) | void assertToStringTest(FuzzedDataProvider data) { method runFuzzerTest (line 310) | void runFuzzerTest(FuzzedDataProvider data) { method fuzzerTestOneInput (line 391) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/grpc-go/fuzz_hello.go type server (line 15) | type server struct method SayHello (line 20) | func (s *server) SayHello(ctx context.Context, in *pb.HelloRequest) (*... function FuzzHelloServer (line 25) | func FuzzHelloServer(data []byte) int { function FuzzHelloClient (line 60) | func FuzzHelloClient(data []byte) int { FILE: projects/grpc-py/fuzz_server.py class FuzzGreeter (line 48) | class FuzzGreeter(helloworld_pb2_grpc.GreeterServicer): method SayHello (line 49) | def SayHello(self, request, context): function serve (line 54) | def serve() -> None: function TestInput (line 65) | def TestInput(input_bytes): function get_run_count_if_there (line 99) | def get_run_count_if_there(): function main (line 111) | def main(): FILE: projects/gson/FuzzParse.java class FuzzParse (line 21) | public class FuzzParse { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/gson/FuzzReader.java class FuzzReader (line 23) | public class FuzzReader { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/gson/FuzzStreamParser.java class FuzzStreamParser (line 21) | public class FuzzStreamParser { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/gss-ntlmssp/fuzzing/fuzz-accept-sec-context.c function LLVMFuzzerTestOneInput (line 18) | extern int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) FILE: projects/guava/HashingFuzzer.java class HashingFuzzer (line 24) | public class HashingFuzzer { class HashInputData (line 26) | public static class HashInputData { method HashInputData (line 28) | public HashInputData(FuzzedDataProvider fuzzedDataProvider) { method getBoolean (line 40) | public boolean getBoolean() { method getByte (line 44) | public byte getByte() { method getBytes (line 48) | public byte[] getBytes() { method getChar (line 52) | public char getChar() { method getDouble (line 56) | public double getDouble() { method getFloat (line 60) | public float getFloat() { method getInt (line 64) | public int getInt() { method getLong (line 68) | public long getLong() { method getShort (line 72) | public short getShort() { method getString (line 76) | public String getString() { method testHashCode (line 91) | private static void testHashCode(HashCode hc) { method testHash (line 125) | private static void testHash(HashFunction hash, HashInputData hashInpu... method fuzzerTestOneInput (line 165) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/guava/HostAndPortFuzzer.java class HostAndPortFuzzer (line 21) | public class HostAndPortFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/guava/HostSpecifierFuzzer.java class HostSpecifierFuzzer (line 21) | public class HostSpecifierFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/guava/InetAddressesFuzzer.java class InetAddressesFuzzer (line 25) | public class InetAddressesFuzzer { method testInet6ApiSpecificMethods (line 27) | private static void testInet6ApiSpecificMethods(InetAddress inaddr) { method fuzzerTestOneInput (line 62) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/guava/InternetDomainNameFuzzer.java class InternetDomainNameFuzzer (line 22) | public class InternetDomainNameFuzzer { method testAccessorMethods (line 23) | private static void testAccessorMethods(InternetDomainName idn) { method testChild (line 54) | public static void testChild(InternetDomainName idn, String leftParts) { method fuzzerTestOneInput (line 64) | public static void fuzzerTestOneInput(FuzzedDataProvider dataProvider) { FILE: projects/guava/MediaTypeFuzzer.java class MediaTypeFuzzer (line 21) | public class MediaTypeFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/guava/UrlEscapersFuzzer.java class UrlEscapersFuzzer (line 26) | public class UrlEscapersFuzzer { method containsUnsafeCharacters (line 38) | private static boolean containsUnsafeCharacters(String string, String ... method testUrlEscaper (line 56) | public static void testUrlEscaper(Escaper escaper, String additionalSa... method testPercentEncoderConstructor (line 72) | private static void testPercentEncoderConstructor(String safe, boolean... method fuzzerTestOneInput (line 80) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/guice/InjectorFuzzer.java class InjectorFuzzer (line 17) | public class InjectorFuzzer { type Bar (line 31) | public enum Bar { method fuzzerTestOneInput (line 37) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class DummyClass (line 57) | public static class DummyClass { FILE: projects/gunicorn/fuzz_util.py function TestInput (line 22) | def TestInput(data): function main (line 75) | def main(): FILE: projects/gwt/project-parent/fuzz-targets/src/test/java/com/example/JsParserFuzzer.java class JsParserFuzzer (line 34) | class JsParserFuzzer { method myFuzzTest (line 35) | @FuzzTest FILE: projects/gwt/project-parent/fuzz-targets/src/test/java/com/example/JsonFuzzer.java class JsonFuzzer (line 30) | class JsonFuzzer { method myFuzzTest (line 31) | @FuzzTest FILE: projects/h11/fuzz_h11.py function fuzz_headers (line 21) | def fuzz_headers(data): function fuzz_receivebuffer (line 42) | def fuzz_receivebuffer(data): function fuzz_connection (line 52) | def fuzz_connection(data): function TestOneInput (line 84) | def TestOneInput(data): function main (line 90) | def main(): FILE: projects/h2database/CsvReadBackFuzzer.java class CsvReadBackFuzzer (line 15) | public class CsvReadBackFuzzer { class TableContent (line 17) | static class TableContent method contains (line 19) | private static boolean contains(String haystack[], String needle, in... method TableContent (line 30) | public TableContent(FuzzedDataProvider fuzzedDataProvider) { method simpleResultSet (line 51) | public SimpleResultSet simpleResultSet() { method columnHeader (line 67) | public String columnHeader(int column) { method getColumnCount (line 71) | public int getColumnCount() { method getRowCount (line 75) | public int getRowCount() { method getRow (line 79) | public Object[] getRow(int row) { method getCell (line 83) | public String getCell(int row, int column) { method fuzzerTestOneInput (line 94) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/h2database/CsvReadFuzzer.java class CsvReadFuzzer (line 12) | public class CsvReadFuzzer { method fuzzerTestOneInput (line 14) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/h2database/ServerLoginFuzzer.java class ServerLoginFuzzer (line 11) | public class ServerLoginFuzzer extends TestServer { method ServerLoginFuzzer (line 13) | ServerLoginFuzzer(String password, boolean verbose) throws SQLException { method getTestName (line 17) | public String getTestName() { method testOneInput (line 21) | static void testOneInput(String fuzzyString, boolean verbose) { method fuzzerTestOneInput (line 47) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/h2database/ShellFuzzer.java class ShellFuzzer (line 13) | public class ShellFuzzer extends TestServer { method ShellFuzzer (line 15) | ShellFuzzer(boolean verbose) throws SQLException { method getTestName (line 19) | public String getTestName() { method testOneInput (line 23) | static void testOneInput(String fuzzyString, boolean verbose) { method fuzzerTestOneInput (line 54) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/h2database/SqlPreparedStatementFuzzer.java class SqlPreparedStatementFuzzer (line 11) | public class SqlPreparedStatementFuzzer extends TestServer { method SqlPreparedStatementFuzzer (line 13) | SqlPreparedStatementFuzzer(boolean verbose) throws SQLException { method getTestName (line 17) | public String getTestName() { method testOneInput (line 21) | static void testOneInput(String fuzzyString, boolean verbose) { method fuzzerTestOneInput (line 54) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/h2database/SqlStatementFuzzer.java class SqlStatementFuzzer (line 11) | public class SqlStatementFuzzer extends TestServer { method SqlStatementFuzzer (line 13) | SqlStatementFuzzer(boolean verbose) throws SQLException { method getTestName (line 17) | public String getTestName() { method testOneInput (line 21) | static void testOneInput(String fuzzyString, boolean verbose) { method fuzzerTestOneInput (line 51) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/h2database/TestServer.java class TestServer (line 11) | public class TestServer { method getDatabasePassword (line 18) | String getDatabasePassword() { method diagnostic (line 22) | void diagnostic(String message) { method diagnostic (line 28) | void diagnostic(Exception ex) { method TestServer (line 34) | TestServer(String password, boolean verbose) throws SQLException { method getConnectionURL (line 50) | String getConnectionURL() { method getConnection (line 54) | Connection getConnection() throws SQLException { method getConnection (line 58) | Connection getConnection(String options) throws SQLException { method setPassword (line 67) | void setPassword(String oldPassword, String newPassword) throws SQLExc... method isRunning (line 75) | boolean isRunning() { method stop (line 79) | void stop() throws SQLException { method getTestName (line 85) | public String getTestName() { FILE: projects/h5py/fuzz_h5f.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 40) | def main(): FILE: projects/hadoop/project-parent/fuzz-targets/src/test/java/com/example/FileUtilFuzzer.java class FileUtilFuzzer (line 28) | class FileUtilFuzzer { method myFuzzTest (line 31) | @FuzzTest FILE: projects/hadoop/project-parent/fuzz-targets/src/test/java/com/example/JavaSerializationFuzzer.java class JavaSerializationFuzzer (line 29) | class JavaSerializationFuzzer { method myFuzzTest (line 30) | @FuzzTest FILE: projects/hamcrest/HamcrestFuzzer.java class HamcrestFuzzer (line 37) | public class HamcrestFuzzer { method HamcrestFuzzer (line 42) | public HamcrestFuzzer(FuzzedDataProvider data) { method runTest (line 45) | public void runTest(FuzzedDataProvider data) { method fuzzerTestOneInput (line 290) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/haproxy/fuzz_cfg_parser.c function LLVMFuzzerTestOneInput (line 26) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/haproxy/fuzz_hpack_decode.c type buffer (line 41) | struct buffer function debug_hexdump (line 44) | void debug_hexdump(FILE *out, const char *pfx, const char *buf, function LLVMFuzzerTestOneInput (line 54) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size){ FILE: projects/hdf5/h5_extended_fuzzer.c function LLVMFuzzerTestOneInput (line 17) | extern int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) FILE: projects/hdf5/h5_read_fuzzer.c function LLVMFuzzerTestOneInput (line 17) | extern int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) FILE: projects/hdrhistogram/LogReaderWriterFuzzer.java class LogReaderWriterFuzzer (line 27) | public class LogReaderWriterFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/hermes/preprocess-corpus.py function get_js_files (line 35) | def get_js_files(path: str) -> Set[PosixPath]: FILE: projects/hibernate-orm/PersistentClass.java class PersistentClass (line 6) | public class PersistentClass { method PersistentClass (line 20) | public PersistentClass() { method getId (line 23) | public int getId() { method setId (line 27) | public void setId(int id) { method getIntegerMember (line 31) | public int getIntegerMember() { method setIntegerMember (line 35) | public void setIntegerMember(int value) { method getStringMember (line 39) | public String getStringMember() { method setStringMember (line 43) | public void setStringMember(String value) { method getBigDecimalMember (line 47) | public BigDecimal getBigDecimalMember() { method setBigDecimalMember (line 51) | public void setBigDecimalMember(BigDecimal bigDecimal) { method getLongMember (line 55) | public long getLongMember() { method setLongMember (line 59) | public void setLongMember(long value) { method getShortMember (line 63) | public short getShortMember() { method setShortMember (line 67) | public void setShortMember(short value) { method getBooleanMember (line 71) | public boolean getBooleanMember() { method setBooleanMember (line 75) | public void setBooleanMember(boolean value) { method getByteMember (line 79) | public byte getByteMember() { method setByteMember (line 83) | public void setByteMember(byte value) { method getDateMember (line 87) | public Date getDateMember() { method setDateMember (line 91) | public void setDateMember(Date value) { method getTimeMember (line 95) | public Time getTimeMember() { method setTimeMember (line 99) | public void setTimeMember(Time value) { method getTimestampMember (line 103) | public Timestamp getTimestampMember() { method setTimestampMember (line 107) | public void setTimestampMember(Timestamp value) { method getSerializableClassMember (line 111) | public SerializableClass getSerializableClassMember() { method setSerializableClassMember (line 115) | public void setSerializableClassMember(SerializableClass value) { FILE: projects/hibernate-orm/PersistentClassFuzzer.java class PersistentClassFuzzer (line 21) | public class PersistentClassFuzzer extends TestServer { method PersistentClassFuzzer (line 28) | PersistentClassFuzzer(FuzzedDataProvider fuzzedDataProvider, boolean v... method persist (line 57) | boolean persist() { method restore (line 79) | void restore() method testOneInput (line 135) | void testOneInput() { method fuzzerTestOneInput (line 141) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/hibernate-orm/SerializableClass.java class SerializableClass (line 3) | public class SerializableClass implements Serializable { method SerializableClass (line 7) | public SerializableClass() { method SerializableClass (line 10) | public SerializableClass(int intMember, String stringMember) { method setIntMember (line 15) | void setIntMember(int value) { method getIntMember (line 19) | int getIntMember() { method setStringMember (line 23) | void setStringMember(String value) { method getStringMember (line 27) | String getStringMember() { method equals (line 31) | public boolean equals(Object other) { FILE: projects/hibernate-orm/SessionFactoryBuilder.java class SessionFactoryBuilder (line 5) | public class SessionFactoryBuilder { method sessionFactory (line 6) | public static SessionFactory sessionFactory() { FILE: projects/hibernate-orm/TestServer.java class TestServer (line 14) | public abstract class TestServer extends Server implements AutoCloseable { method TestServer (line 19) | TestServer(boolean verbose) { method dropTable (line 29) | void dropTable(String table) throws SQLException { method close (line 35) | public void close() throws Exception { method setVerbose (line 39) | protected void setVerbose(boolean verbose) { method stop (line 51) | public int stop() { method getConnection (line 63) | Connection getConnection(String options) throws SQLException { method getConnection (line 67) | Connection getConnection() throws SQLException { method getTestName (line 71) | String getTestName() { FILE: projects/hibernate-validator/MappingParserFuzzer.java class MappingParserFuzzer (line 47) | public class MappingParserFuzzer { method getDummyConstraintCreationContext (line 48) | public static ConstraintCreationContext getDummyConstraintCreationCont... method getConstraintValidatorInitializationContext (line 63) | public static HibernateConstraintValidatorInitializationContext getCon... method fuzzerTestOneInput (line 84) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/hikaricp/ClockFuzzer.java class ClockFuzzer (line 20) | public class ClockFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/hikaricp/DriverDataSourceFuzzer.java class DriverDataSourceFuzzer (line 21) | public class DriverDataSourceFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/hikaricp/PropertyElfFuzzer.java class PropertyElfFuzzer (line 21) | public class PropertyElfFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/hikaricp/TestObject.java class TestObject (line 17) | public class TestObject method setTestObject (line 24) | public void setTestObject(TestObject testObject) method setString (line 29) | public void setString(String string) method getTestObject (line 34) | public TestObject getTestObject() method getString (line 39) | public String getString() method getShortRaw (line 44) | public short getShortRaw() { method setShortRaw (line 48) | public void setShortRaw(short shortRaw) { method setCharArray (line 52) | public void setCharArray(char[] charArray) method getCharArray (line 57) | public char[] getCharArray() FILE: projects/hikaricp/UtilityElfFuzzer.java class UtilityElfFuzzer (line 20) | public class UtilityElfFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/hiredis-py/fuzz_reader.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 31) | def main(): FILE: projects/hive/project-parent/fuzz-targets/src/test/java/com/example/DeserializeFuzzer.java class DeserializeFuzzer (line 35) | class DeserializeFuzzer { method myFuzzTest (line 37) | @FuzzTest FILE: projects/hsqldb/ConnectionOptionsFuzzer.java class ConnectionOptionsFuzzer (line 10) | public class ConnectionOptionsFuzzer extends TestServer { method ConnectionOptionsFuzzer (line 12) | ConnectionOptionsFuzzer(boolean verbose) { method testOneInput (line 16) | void testOneInput(String fuzzyString) { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/hsqldb/SqlPreparedStatementFuzzer.java class SqlPreparedStatementFuzzer (line 10) | public class SqlPreparedStatementFuzzer extends TestServer { method SqlPreparedStatementFuzzer (line 12) | SqlPreparedStatementFuzzer(boolean verbose) { method testOneInput (line 16) | void testOneInput(String fuzzyString) { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/hsqldb/SqlStatementFuzzer.java class SqlStatementFuzzer (line 10) | public class SqlStatementFuzzer extends TestServer { method SqlStatementFuzzer (line 12) | SqlStatementFuzzer(boolean verbose) { method testOneInput (line 16) | void testOneInput(String fuzzyString) { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/hsqldb/TestServer.java class TestServer (line 14) | public abstract class TestServer extends Server implements AutoCloseable { method TestServer (line 19) | TestServer(boolean verbose) { method createTestTable (line 34) | void createTestTable() throws SQLException { method close (line 43) | public void close() throws Exception { method setVerbose (line 47) | protected void setVerbose(boolean verbose) { method stop (line 59) | public int stop() { method getConnection (line 72) | Connection getConnection(String options) throws SQLException { method getConnection (line 76) | Connection getConnection() throws SQLException { method getTestName (line 80) | String getTestName() { method testOneInput (line 84) | abstract void testOneInput(String fuzzyString); FILE: projects/html2text/fuzz_html2text.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 30) | def main(): FILE: projects/html5lib-python/fuzz_parse.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 25) | def main(): FILE: projects/htmlunit/htmlunit-fuzzer/src/main/java/ossfuzz/HtmlParserFuzzer.java class HtmlParserFuzzer (line 30) | public class HtmlParserFuzzer { method HtmlParserFuzzer (line 34) | public HtmlParserFuzzer(FuzzedDataProvider fuzzedDataProvider) { method getBrowserVersion (line 38) | BrowserVersion getBrowserVersion() { method test (line 47) | void test() { method fuzzerTestOneInput (line 63) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/httpcomponents-client/ByteArrayBodyWriteToFuzzer.java class ByteArrayBodyWriteToFuzzer (line 25) | public class ByteArrayBodyWriteToFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/httpcomponents-client/FileBodyWriteToFuzzer.java class FileBodyWriteToFuzzer (line 27) | public class FileBodyWriteToFuzzer { method fuzzerTestOneInput (line 30) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/httpcomponents-client/FormBodyPartBuilderBuildFuzzer.java class FormBodyPartBuilderBuildFuzzer (line 33) | public class FormBodyPartBuilderBuildFuzzer { type BodyType (line 39) | private enum BodyType { ByteArray, File, InputStream, String } method fuzzerTestOneInput (line 41) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method generateContentBody (line 64) | private static ContentBody generateContentBody(FuzzedDataProvider data... FILE: projects/httpcomponents-client/HttpFuzzer.java class HttpFuzzer (line 36) | public class HttpFuzzer { method fuzzerTestOneInput (line 37) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/httpcomponents-client/InputStreamBodyWriteToFuzzer.java class InputStreamBodyWriteToFuzzer (line 27) | public class InputStreamBodyWriteToFuzzer { method fuzzerTestOneInput (line 30) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/httpcomponents-client/StringBodyWriteToFuzzer.java class StringBodyWriteToFuzzer (line 25) | public class StringBodyWriteToFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/httpcomponents-core/ClassicHttpRequestFuzzer.java class ClassicHttpRequestFuzzer (line 24) | public class ClassicHttpRequestFuzzer { method fuzzerTestOneInput (line 45) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method setRequestEntity (line 87) | public static void setRequestEntity(BasicClassicHttpRequest request, S... FILE: projects/httpcore/fuzz_http11.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 36) | def main(): FILE: projects/httpretty/fuzz_httpretty_e2e.py function test_one (line 22) | def test_one(input_data): FILE: projects/httpx/fuzz_api.py function SetFuzzedInput (line 26) | def SetFuzzedInput(input_bytes): class ServerThread (line 30) | class ServerThread(threading.Thread): method __init__ (line 31) | def __init__(self): method run (line 39) | def run(self): function TestOneInput (line 51) | def TestOneInput(data): function main (line 63) | def main(): FILE: projects/httpx/fuzz_decoders.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/httpx/fuzz_url.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 28) | def main(): FILE: projects/hugo/fuzz_pageparser.go function FuzzParseFrontMatterAndContent (line 19) | func FuzzParseFrontMatterAndContent(data []byte) int { FILE: projects/hwloc/hwloc_fuzzer.c function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ibmswtpm2/fuzzer.cc function LLVMFuzzerTestOneInput (line 26) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/idna/fuzz_encode_decode.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 37) | def main(): FILE: projects/ijson/fuzz_all.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 41) | def main(): FILE: projects/ijson/fuzz_native_parser.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 37) | def main(): FILE: projects/ijson/fuzz_parser.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 35) | def main(): FILE: projects/importlib_metadata/fuzz_importlib.py function TestOneInput (line 28) | def TestOneInput(data): function main (line 39) | def main(): FILE: projects/inchi/inchi_input_fuzzer.c function LLVMFuzzerTestOneInput (line 27) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/iniconfig/fuzz_parse.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/inih/inihfuzz.c function dumper (line 28) | int dumper(void* user, const char* section, const char* name, function LLVMFuzzerTestOneInput (line 39) | extern int FILE: projects/ion-java/project-parent/fuzz-targets/src/test/java/com/example/IonReaderFuzzer.java class IonReaderFuzzer (line 28) | class IonReaderFuzzer { method myFuzzTest (line 29) | @FuzzTest method read (line 43) | void read(IonReader reader) { FILE: projects/ion-java/project-parent/fuzz-targets/src/test/java/com/example/IonWriterFuzzer.java class IonWriterFuzzer (line 36) | class IonWriterFuzzer { method myFuzzTest (line 37) | @FuzzTest method rewrite (line 112) | void rewrite(String textIon, IonWriter writer) throws IOException { FILE: projects/ipaddress/fuzz_ip_address.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 33) | def main(): FILE: projects/ipaddress/fuzz_ip_interface.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/ipaddress/fuzz_ip_network.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 33) | def main(): FILE: projects/iperf/auth_fuzzer.c function LLVMFuzzerTestOneInput (line 26) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/iperf/cjson_fuzzer.c function LLVMFuzzerTestOneInput (line 22) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ipykernel/fuzz_serialization_roundtrip.py function ConsumeRandomLengthBufferList (line 21) | def ConsumeRandomLengthBufferList(fdp): function TestOneInput (line 30) | def TestOneInput(data): function main (line 42) | def main(): FILE: projects/ipykernel/fuzz_unpack_roundtrip.py function ConsumeRandomLengthBufferList (line 21) | def ConsumeRandomLengthBufferList(fdp): function TestOneInput (line 30) | def TestOneInput(data): function main (line 45) | def main(): FILE: projects/ipython/fuzz_inputsplitter.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 30) | def main(): FILE: projects/isodate/fuzz_parse.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/itext7/project-parent/fuzz-targets/src/test/java/com/example/PdfFuzzer.java class PdfFuzzer (line 28) | public class PdfFuzzer { method myFuzzTest (line 29) | @FuzzTest FILE: projects/itsdangerous/fuzz_itsdangerous.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 37) | def main(): FILE: projects/jackson-core/DataInputFuzzer.java class DataInputFuzzer (line 29) | public class DataInputFuzzer { class MockFuzzDataInput (line 30) | public static class MockFuzzDataInput implements DataInput method MockFuzzDataInput (line 34) | public MockFuzzDataInput(byte[] data) { method MockFuzzDataInput (line 38) | public MockFuzzDataInput(String utf8Data) throws IOException { method MockFuzzDataInput (line 42) | public MockFuzzDataInput(InputStream in) { method readFully (line 46) | @Override method readFully (line 51) | @Override method skipBytes (line 56) | @Override method readBoolean (line 61) | @Override method readByte (line 66) | @Override method readUnsignedByte (line 75) | @Override method readShort (line 80) | @Override method readUnsignedShort (line 85) | @Override method readChar (line 90) | @Override method readInt (line 95) | @Override method readLong (line 100) | @Override method readFloat (line 105) | @Override method readDouble (line 110) | @Override method readLine (line 115) | @Override method readUTF (line 120) | @Override method fuzzerTestOneInput (line 127) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-core/JsonFuzzer.java class JsonFuzzer (line 26) | public class JsonFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-core/ParseNextTokenFuzzer.java class ParseNextTokenFuzzer (line 32) | public class ParseNextTokenFuzzer { method fuzzerTestOneInput (line 33) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-core/UTF8GeneratorFuzzer.java class UTF8GeneratorFuzzer (line 35) | public class UTF8GeneratorFuzzer { method fuzzerTestOneInput (line 36) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-core/WriterBasedJsonGeneratorFuzzer.java class WriterBasedJsonGeneratorFuzzer (line 31) | public class WriterBasedJsonGeneratorFuzzer { method fuzzerTestOneInput (line 32) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-databind/AdaLObjectReader3Fuzzer.java class AdaLObjectReader3Fuzzer (line 57) | public class AdaLObjectReader3Fuzzer { method fuzzerTestOneInput (line 58) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method _readValues (line 361) | public static void _readValues(FuzzedDataProvider data, ObjectMapper m... method _createParser (line 412) | public static JsonParser _createParser(FuzzedDataProvider data, Object... class DummyClass (line 445) | public static class DummyClass { class NoCheckSubTypeValidator (line 477) | public static final class NoCheckSubTypeValidator method validateBaseType (line 493) | @Override method validateSubClassName (line 498) | @Override method validateSubType (line 507) | @Override class MockFuzzDataInput (line 519) | public static class MockFuzzDataInput implements DataInput method MockFuzzDataInput (line 523) | public MockFuzzDataInput(byte[] data) { method MockFuzzDataInput (line 527) | public MockFuzzDataInput(String utf8Data) throws IOException { method MockFuzzDataInput (line 531) | public MockFuzzDataInput(InputStream in) { method readFully (line 535) | @Override method readFully (line 540) | @Override method skipBytes (line 545) | @Override method readBoolean (line 550) | @Override method readByte (line 555) | @Override method readUnsignedByte (line 564) | @Override method readShort (line 569) | @Override method readUnsignedShort (line 574) | @Override method readChar (line 579) | @Override method readInt (line 584) | @Override method readLong (line 589) | @Override method readFloat (line 594) | @Override method readDouble (line 599) | @Override method readLine (line 604) | @Override method readUTF (line 609) | @Override FILE: projects/jackson-databind/ConvertValueFuzzer.java class ConvertValueFuzzer (line 24) | public class ConvertValueFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class DummyClass (line 41) | public static class DummyClass { FILE: projects/jackson-databind/ObjectReader2Fuzzer.java class ObjectReader2Fuzzer (line 38) | public class ObjectReader2Fuzzer { method fuzzerTestOneInput (line 39) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method _createParser (line 203) | public static JsonParser _createParser(FuzzedDataProvider data, Object... class DummyClass (line 235) | public static class DummyClass { FILE: projects/jackson-databind/ObjectReaderFuzzer.java class ObjectReaderFuzzer (line 24) | public class ObjectReaderFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class DummyClass (line 37) | public static class DummyClass { FILE: projects/jackson-databind/ObjectWriterFuzzer.java class ObjectWriterFuzzer (line 27) | public class ObjectWriterFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class DummyClass (line 100) | public static class DummyClass { FILE: projects/jackson-databind/ReadTreeFuzzer.java class ReadTreeFuzzer (line 31) | public class ReadTreeFuzzer { method fuzzerTestOneInput (line 32) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class DummyClass (line 213) | public static class DummyClass { FILE: projects/jackson-dataformat-xml/FromXmlParserFuzzer.java class FromXmlParserFuzzer (line 24) | public class FromXmlParserFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-dataformat-xml/ToXmlGeneratorFuzzer.java class ToXmlGeneratorFuzzer (line 29) | public class ToXmlGeneratorFuzzer { method fuzzerTestOneInput (line 30) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-dataformat-xml/XmlDeserializerFuzzer.java class XmlDeserializerFuzzer (line 34) | public class XmlDeserializerFuzzer { method fuzzerInitialize (line 38) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 44) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method initializeClassChoice (line 55) | private static void initializeClassChoice() { class ByteArrayContainer (line 87) | private static class ByteArrayContainer { method ByteArrayContainer (line 90) | public ByteArrayContainer(byte[] value) { class ModelContainer (line 95) | @JsonRootName("Model") method ModelContainer (line 100) | @JsonCreator class DelegateContainer (line 106) | private static class DelegateContainer { method DelegateContainer (line 109) | @JsonCreator(mode = JsonCreator.Mode.DELEGATING) class RawContainer (line 115) | @JsonPropertyOrder({"id", "raw"}) class MapContainer (line 120) | private static class MapContainer { method setMap (line 123) | public void setMap(Map map) { class ListContainer (line 128) | private static class ListContainer { method setList (line 131) | public void setList(List list) { class ArrayContainer (line 136) | private static class ArrayContainer { method getArray (line 139) | public String[] getArray() { method setArray (line 143) | public void setArray(String[] array) { type EnumFuzz (line 148) | private static enum EnumFuzz { class EnumContainer (line 156) | private static class EnumContainer { method EnumContainer (line 159) | public EnumContainer(EnumFuzz enumFuzz) { FILE: projects/jackson-dataformat-xml/XmlFuzzer.java class XmlFuzzer (line 20) | public class XmlFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/jackson-dataformat-xml/XmlSerializerFuzzer.java class XmlSerializerFuzzer (line 40) | public class XmlSerializerFuzzer { method fuzzerInitialize (line 43) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 48) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class ByteArrayContainer (line 145) | private static class ByteArrayContainer { method ByteArrayContainer (line 148) | public ByteArrayContainer(byte[] value) { class IteratorContainer (line 153) | private static class IteratorContainer { method getIterator (line 156) | @JacksonXmlElementWrapper(localName = "elements") method IteratorContainer (line 162) | public IteratorContainer(Iterator iterator) { class ItemContainer (line 167) | private static class ItemContainer { method items (line 168) | @JsonProperty("item") class ModelContainer (line 187) | @JsonRootName("Model") method ModelContainer (line 192) | public ModelContainer(String string) { class RawContainer (line 197) | @JsonPropertyOrder({"id", "raw"}) method RawContainer (line 202) | public RawContainer(String string) { class ByteBufferContainer (line 208) | private static class ByteBufferContainer { method ByteBufferContainer (line 211) | public ByteBufferContainer(byte[] byteArray) { class MapContainer (line 217) | private static class MapContainer { method MapContainer (line 220) | public MapContainer(String string) { class ListContainer (line 226) | private static class ListContainer { method ListContainer (line 229) | public ListContainer(String string) { FILE: projects/jackson-dataformats-binary/AvroGeneratorFuzzer.java class AvroGeneratorFuzzer (line 33) | public class AvroGeneratorFuzzer { method fuzzerTestOneInput (line 34) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class RootType (line 164) | private static class RootType { FILE: projects/jackson-dataformats-binary/AvroParserFuzzer.java class AvroParserFuzzer (line 29) | public class AvroParserFuzzer { method fuzzerTestOneInput (line 30) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class RootType (line 135) | private static class RootType { FILE: projects/jackson-dataformats-binary/CborFuzzer.java class CborFuzzer (line 21) | public class CborFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/jackson-dataformats-binary/CborGeneratorFuzzer.java class CborGeneratorFuzzer (line 30) | public class CborGeneratorFuzzer { method fuzzerTestOneInput (line 31) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-dataformats-binary/CborParserFuzzer.java class CborParserFuzzer (line 24) | public class CborParserFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-dataformats-binary/DeserializerFuzzer.java class DeserializerFuzzer (line 56) | public class DeserializerFuzzer { method fuzzerInitialize (line 60) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 65) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method initializeClassChoice (line 160) | private static void initializeClassChoice() { class ByteArrayContainer (line 196) | private static class ByteArrayContainer { method ByteArrayContainer (line 199) | public ByteArrayContainer(byte[] value) { class ModelContainer (line 204) | @JsonRootName("Model") method ModelContainer (line 208) | @JsonCreator class DelegateContainer (line 214) | private static class DelegateContainer { method DelegateContainer (line 217) | @JsonCreator(mode = JsonCreator.Mode.DELEGATING) class RawContainer (line 223) | @JsonPropertyOrder({"id", "raw"}) class MapContainer (line 228) | private static class MapContainer { method setMap (line 231) | public void setMap(Map map) { class ListContainer (line 236) | private static class ListContainer { method setList (line 239) | public void setList(List list) { class ArrayContainer (line 244) | private static class ArrayContainer { method getArray (line 247) | public String[] getArray() { method setArray (line 251) | public void setArray(String[] array) { class UUIDContainer (line 256) | private static class UUIDContainer { method UUIDContainer (line 259) | public UUIDContainer(UUID uuid) { type EnumFuzz (line 264) | private static enum EnumFuzz { class EnumContainer (line 272) | private static class EnumContainer { method EnumContainer (line 275) | public EnumContainer(EnumFuzz enumFuzz) { FILE: projects/jackson-dataformats-binary/IonGeneratorFuzzer.java class IonGeneratorFuzzer (line 34) | public class IonGeneratorFuzzer { method fuzzerTestOneInput (line 35) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-dataformats-binary/IonParserFuzzer.java class IonParserFuzzer (line 27) | public class IonParserFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-dataformats-binary/ProtobufParserFuzzer.java class ProtobufParserFuzzer (line 22) | public class ProtobufParserFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-dataformats-binary/SerializerFuzzer.java class SerializerFuzzer (line 59) | public class SerializerFuzzer { method fuzzerTestOneInput (line 60) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class ByteArrayContainer (line 274) | @JsonRootName("ByteArray") method ByteArrayContainer (line 278) | public ByteArrayContainer(byte[] value) { class RawContainer (line 283) | @JsonPropertyOrder({"id", "raw"}) method RawContainer (line 288) | public RawContainer(String string) { class ByteBufferContainer (line 294) | private static class ByteBufferContainer { method ByteBufferContainer (line 297) | public ByteBufferContainer(byte[] byteArray) { class MapContainer (line 303) | private static class MapContainer { method MapContainer (line 306) | public MapContainer(String string) { class ListContainer (line 312) | private static class ListContainer { method ListContainer (line 315) | public ListContainer(String string) { class ArrayContainer (line 321) | private static class ArrayContainer { method ArrayContainer (line 324) | public ArrayContainer(String string) { method setArray (line 328) | public void setArray(char[] array) { class UUIDContainer (line 333) | private static class UUIDContainer { method UUIDContainer (line 336) | public UUIDContainer(long a, long b) { FILE: projects/jackson-dataformats-binary/SmileFuzzer.java class SmileFuzzer (line 21) | public class SmileFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/jackson-dataformats-binary/SmileGeneratorFuzzer.java class SmileGeneratorFuzzer (line 30) | public class SmileGeneratorFuzzer { method fuzzerTestOneInput (line 31) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-dataformats-binary/SmileParserFuzzer.java class SmileParserFuzzer (line 25) | public class SmileParserFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-dataformats-text/CSVFuzzer.java class CSVFuzzer (line 21) | public class CSVFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/jackson-dataformats-text/DeserializerFuzzer.java class DeserializerFuzzer (line 46) | public class DeserializerFuzzer { method fuzzerInitialize (line 50) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 55) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method initializeClassChoice (line 111) | private static void initializeClassChoice() { class ByteArrayContainer (line 142) | private static class ByteArrayContainer { method ByteArrayContainer (line 145) | @JsonCreator class ModelContainer (line 151) | @JsonRootName("Model") method ModelContainer (line 155) | @JsonCreator class DelegateContainer (line 161) | private static class DelegateContainer { method DelegateContainer (line 164) | @JsonCreator(mode = JsonCreator.Mode.DELEGATING) class RawContainer (line 170) | @JsonPropertyOrder({"id", "raw"}) class MapContainer (line 175) | private static class MapContainer { method setMap (line 178) | public void setMap(Map map) { class ListContainer (line 183) | private static class ListContainer { method setList (line 186) | public void setList(List list) { class ArrayContainer (line 191) | private static class ArrayContainer { method getArray (line 194) | public String[] getArray() { method setArray (line 198) | public void setArray(String[] array) { type EnumFuzz (line 203) | private static enum EnumFuzz { class EnumContainer (line 211) | private static class EnumContainer { method EnumContainer (line 214) | public EnumContainer(EnumFuzz enumFuzz) { FILE: projects/jackson-dataformats-text/PropertiesFuzzer.java class PropertiesFuzzer (line 20) | public class PropertiesFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/jackson-dataformats-text/SerializerFuzzer.java class SerializerFuzzer (line 53) | public class SerializerFuzzer { method fuzzerTestOneInput (line 54) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class ByteArrayContainer (line 234) | @JsonRootName("ByteArray") method ByteArrayContainer (line 238) | public ByteArrayContainer(byte[] value) { class RawContainer (line 243) | @JsonPropertyOrder({"id", "raw"}) method RawContainer (line 248) | public RawContainer(String string) { class ByteBufferContainer (line 254) | private static class ByteBufferContainer { method ByteBufferContainer (line 257) | public ByteBufferContainer(byte[] byteArray) { class MapContainer (line 263) | private static class MapContainer { method MapContainer (line 266) | public MapContainer(String string) { class ListContainer (line 272) | private static class ListContainer { method ListContainer (line 275) | public ListContainer(String string) { FILE: projects/jackson-dataformats-text/TOMLFuzzer.java class TOMLFuzzer (line 20) | public class TOMLFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/jackson-dataformats-text/YAMLFuzzer.java class YAMLFuzzer (line 20) | public class YAMLFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/jackson-datatype-joda/JodaDeserializerFuzzer.java class JodaDeserializerFuzzer (line 45) | public class JodaDeserializerFuzzer { method fuzzerInitialize (line 51) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 60) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method initializeClassChoice (line 74) | private static void initializeClassChoice() { class ReadableDateTimeContainer (line 102) | private static class ReadableDateTimeContainer { class DateTimeContainer (line 107) | private static class DateTimeContainer { method getDateTime (line 111) | public DateTime getDateTime() { class DateTimeZoneContainer (line 116) | private static class DateTimeZoneContainer { method DateTimeZoneContainer (line 123) | public DateTimeZoneContainer(DateTimeZone dateTimeZone) { class AnnotationClass (line 128) | private static class AnnotationClass { method setDateTime (line 132) | public void setDateTime(DateTime dateTime) { FILE: projects/jackson-datatype-joda/JodaMapperFuzzer.java class JodaMapperFuzzer (line 27) | public class JodaMapperFuzzer { method fuzzerTestOneInput (line 38) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class DummyClass (line 59) | public static class DummyClass { FILE: projects/jackson-datatype-joda/JodaSerializerFuzzer.java class JodaSerializerFuzzer (line 32) | public class JodaSerializerFuzzer { method fuzzerInitialize (line 36) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 46) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class AnnotationClass (line 99) | private static class AnnotationClass { method AnnotationClass (line 103) | public AnnotationClass(DateTime dateTime) { method getDateTime (line 107) | public DateTime getDateTime() { FILE: projects/jackson-datatypes-collections/EclipseCollectionsDeserializerFuzzer.java class EclipseCollectionsDeserializerFuzzer (line 25) | public class EclipseCollectionsDeserializerFuzzer { method fuzzerInitialize (line 29) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 37) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method initializeClassChoice (line 48) | private static void initializeClassChoice() { method addClass (line 68) | private static void addClass(String name) { FILE: projects/jackson-datatypes-collections/EclipseCollectionsSerializerFuzzer.java class EclipseCollectionsSerializerFuzzer (line 40) | public class EclipseCollectionsSerializerFuzzer { method fuzzerInitialize (line 43) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 50) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class PrimitiveIterativeObject (line 172) | private static class PrimitiveIterativeObject { method PrimitiveIterativeObject (line 176) | public PrimitiveIterativeObject(Object object) { FILE: projects/jackson-datatypes-collections/GuavaDeserializerFuzzer.java class GuavaDeserializerFuzzer (line 52) | public class GuavaDeserializerFuzzer { method fuzzerInitialize (line 56) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 66) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method initializeClassChoice (line 77) | private static void initializeClassChoice() { class ImmutableListContainer (line 112) | public static class ImmutableListContainer { class ImmutableMapContainer (line 116) | private static class ImmutableMapContainer { class ArrayListMultimapContainer (line 120) | private static class ArrayListMultimapContainer { FILE: projects/jackson-datatypes-collections/GuavaSerializerFuzzer.java class GuavaSerializerFuzzer (line 43) | public class GuavaSerializerFuzzer { method fuzzerInitialize (line 46) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 55) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class ArrayListMultimapContainer (line 142) | private static class ArrayListMultimapContainer { method ArrayListMultimapContainer (line 146) | public ArrayListMultimapContainer(Object object) { FILE: projects/jackson-datatypes-collections/HppcDeserializerFuzzer.java class HppcDeserializerFuzzer (line 31) | public class HppcDeserializerFuzzer { method fuzzerInitialize (line 35) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 43) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method initializeClassChoice (line 54) | private static void initializeClassChoice() { FILE: projects/jackson-datatypes-collections/HppcSerializerFuzzer.java class HppcSerializerFuzzer (line 35) | public class HppcSerializerFuzzer { method fuzzerInitialize (line 38) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 45) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jackson-datatypes-collections/PCollectionsFuzzer.java class PCollectionsFuzzer (line 39) | public class PCollectionsFuzzer { method fuzzerInitialize (line 43) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 51) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method initializeClassChoice (line 62) | private static void initializeClassChoice() { FILE: projects/jackson-modules-java8/DatatypeFuzzer.java class DatatypeFuzzer (line 15) | public class DatatypeFuzzer { method fuzzerTestOneInput (line 16) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class Dummy (line 35) | public static class Dummy { method debug (line 46) | public String debug() { FILE: projects/jakarta-mail-api/HeaderTokenizerFuzzer.java class HeaderTokenizerFuzzer (line 23) | public class HeaderTokenizerFuzzer{ method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/janino/ExpressionEvaluatorFuzzer.java class ExpressionEvaluatorFuzzer (line 27) | public class ExpressionEvaluatorFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jansi/JansiFuzzer.java class JansiFuzzer (line 21) | public class JansiFuzzer { method fuzzerInitialize (line 22) | public static void fuzzerInitialize() { method fuzzerTearDown (line 26) | public static void fuzzerTearDown() { method fuzzerTestOneInput (line 30) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/java-diff-utils/DiffUtilsFuzzer.java class DiffUtilsFuzzer (line 24) | public class DiffUtilsFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/java-example/ExampleFuzzTest.java class ExampleFuzzTest (line 20) | public class ExampleFuzzTest { method exampleTest (line 21) | @FuzzTest FILE: projects/java-example/ExampleFuzzer.java class ExampleFuzzer (line 20) | public class ExampleFuzzer { method fuzzerInitialize (line 21) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/java-example/ExampleFuzzerNative.cpp function parseInternal (line 24) | __attribute__((optnone)) void parseInternal(const std::string &input) { function JNIEXPORT (line 38) | JNIEXPORT jboolean JNICALL Java_ExampleFuzzerNative_parse( FILE: projects/java-example/ExampleFuzzerNative.java class ExampleFuzzerNative (line 19) | public class ExampleFuzzerNative { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method parse (line 33) | private static native boolean parse(String bytes); FILE: projects/java-example/ExampleValueProfileFuzzer.java class ExampleValueProfileFuzzer (line 20) | public class ExampleValueProfileFuzzer { method base64 (line 21) | private static String base64(byte[] input) { method insecureEncrypt (line 25) | private static long insecureEncrypt(long input) { method fuzzerTestOneInput (line 30) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method mustNeverBeCalled (line 49) | private static void mustNeverBeCalled() { FILE: projects/java-example/MutatorFuzzTest.java class MutatorFuzzTest (line 24) | class MutatorFuzzTest { method mutatorFuzz (line 25) | @FuzzTest method beforeAll (line 33) | @BeforeAll method afterAll (line 38) | @AfterAll FILE: projects/java-jwt/project-parent/fuzz-targets/src/test/java/com/example/JWTFuzzer.java class JWTFuzzer (line 28) | class JWTFuzzer { method myFuzzTest (line 29) | @FuzzTest FILE: projects/java-uuid-generator/GeneratorsFuzzer.java class GeneratorsFuzzer (line 23) | public class GeneratorsFuzzer { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/java-xmlbuilder/XmlBuilderFuzzer.java class XmlBuilderFuzzer (line 22) | public class XmlBuilderFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/javacpp/JavacppFuzzer.java class JavacppFuzzer (line 24) | public class JavacppFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/javaparser/parseFuzzer.java class parseFuzzer (line 29) | public class parseFuzzer { method fuzzerTestOneInput (line 30) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/javapoet/TypeSpecFuzzer.java class TypeSpecFuzzer (line 20) | public class TypeSpecFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/javascript-example/fuzz_value_profiling.js function encrypt (line 20) | function encrypt(n) { FILE: projects/javassist/ClassFuzzer.java class ClassFuzzer (line 30) | public class ClassFuzzer { method fuzzerTestOneInput (line 31) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jaxb/src/main/java/ossfuzz/DataTypeConverterFuzzer.java class DataTypeConverterFuzzer (line 11) | public class DataTypeConverterFuzzer { method DataTypeConverterFuzzer (line 16) | DataTypeConverterFuzzer(int integer, String string) { method test (line 22) | void test() { method fuzzerTestOneInput (line 164) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/jbig2dec/jbig2_fuzzer.cc function jbig2_fuzzer_free (line 65) | static void jbig2_fuzzer_free(Jbig2Allocator *allocator, void *ptr) function LLVMFuzzerTestOneInput (line 115) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/jboss-logging/project-parent/fuzz-targets/src/test/java/com/example/LoggingFuzzer.java class LoggingFuzzer (line 26) | class LoggingFuzzer { method myFuzzTest (line 28) | @FuzzTest FILE: projects/jdom/SAXBuilderFuzzer.java class SAXBuilderFuzzer (line 27) | public class SAXBuilderFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jedi/fuzz_script.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 26) | def main(): FILE: projects/jedis/JedisURIFuzzer.java class JedisURIFuzzer (line 22) | public class JedisURIFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jersey/HttpHeaderReaderFuzzer.java class HttpHeaderReaderFuzzer (line 7) | public class HttpHeaderReaderFuzzer { method fuzzerTestOneInput (line 8) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jettison/JsonFuzzer.java class JsonFuzzer (line 21) | public class JsonFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jetty/project-parent/fuzz-targets/src/test/java/com/example/AbstractHttpClientServerTest.java class AbstractHttpClientServerTest (line 42) | public abstract class AbstractHttpClientServerTest method start (line 48) | public void start(Scenario scenario, Handler handler) throws Exception method startServer (line 54) | protected void startServer(Scenario scenario, Handler handler) throws ... method startClient (line 69) | protected void startClient(Scenario scenario) throws Exception method startClient (line 74) | protected void startClient(Scenario scenario, Consumer con... method startClient (line 79) | protected void startClient(Scenario scenario, Function K serialised(K original) { FILE: projects/jimfs/FileSystemFuzzer.java class FileSystemFuzzer (line 33) | public class FileSystemFuzzer { method fuzzerTestOneInput (line 34) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jimp/fuzz.js function ignoredError (line 160) | function ignoredError(error) { function pickRandom (line 166) | function pickRandom(array) { FILE: projects/jinja2/fuzz_env_jinja_lexer.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 45) | def main(): FILE: projects/jinja2/fuzz_jinja_compile_expr.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 36) | def main(): FILE: projects/jinja2/fuzz_jinja_compile_templates.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 42) | def main(): FILE: projects/jline3/LineReaderFuzzer.java class LineReaderFuzzer (line 33) | public class LineReaderFuzzer { method fuzzerTestOneInput (line 34) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method generateNanorcFile (line 70) | public static Path generateNanorcFile(FuzzedDataProvider data) throws ... FILE: projects/jmespathpy/fuzz_parse.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 33) | def main(): FILE: projects/jmh/src/main/java/ossfuzz/OptionsBuilderFuzzer.java class OptionsBuilderFuzzer (line 38) | public class OptionsBuilderFuzzer { method optionalInt (line 42) | Optional optionalInt() { method intArray (line 50) | int[] intArray() { method stringCollection (line 58) | Collection stringCollection() { method optionalStringCollection (line 67) | Optional> optionalStringCollection() { method timeValue (line 75) | TimeValue timeValue() { method optionalTimeValue (line 79) | Optional optionalTimeValue() { method verboseModeValue (line 87) | VerboseMode verboseModeValue() { method resultFormatValue (line 92) | ResultFormatType resultFormatValue() { method warmupModeValue (line 102) | WarmupMode warmupModeValue() { method modeValue (line 107) | Mode modeValue() { method timeUnitValue (line 112) | TimeUnit timeUnitValue() { method OptionsBuilderFuzzer (line 117) | OptionsBuilderFuzzer(FuzzedDataProvider fuzzedDataProvider) { method stringValue (line 121) | String stringValue() { method boolValue (line 125) | boolean boolValue() { method intValue (line 129) | int intValue() { method test (line 133) | void test() { method fuzzerTestOneInput (line 170) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/joblib/fuzz_serialization_roundtrip.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 38) | def main(): FILE: projects/joda-convert/FromStringFuzzer.java class FromStringFuzzer (line 22) | public class FromStringFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/joda-convert/StringConvertFuzzer.java class StringConvertFuzzer (line 22) | public class StringConvertFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/joda-convert/ToStringFuzzer.java class ToStringFuzzer (line 22) | public class ToStringFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/joda-time/TimeFuzzer.java class TimeFuzzer (line 5) | public class TimeFuzzer { method fuzzerTestOneInput (line 6) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jolt/JsonUtilsFuzzer.java class JsonUtilsFuzzer (line 23) | public class JsonUtilsFuzzer { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/joni/AddrListFixFuzzer.java class AddrListFixFuzzer (line 29) | public class AddrListFixFuzzer { method fuzzerTestOneInput (line 30) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/joni/RegexMatcherFuzzer.java class RegexMatcherFuzzer (line 28) | public class RegexMatcherFuzzer { method fuzzerTestOneInput (line 29) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jooq/GenerationToolFuzzer.java class GenerationToolFuzzer (line 26) | public class GenerationToolFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) throws ... FILE: projects/jopt-simple/src/main/java/ossfuzz/OptionParserFuzzer.java class OptionParserFuzzer (line 26) | public class OptionParserFuzzer { method OptionParserFuzzer (line 30) | public OptionParserFuzzer(FuzzedDataProvider fuzzedDataProvider) { method test (line 35) | void test() { method fuzzerTestOneInput (line 60) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/jose4j/project-parent/fuzz-targets/src/test/java/com/example/JsonUtilFuzzer.java class JsonUtilFuzzer (line 31) | public class JsonUtilFuzzer { method myFuzzTest (line 32) | @FuzzTest FILE: projects/js-yaml/fuzz.js function generateRandomLoadOptions (line 38) | function generateRandomLoadOptions(provider) { function generateRandomDumpOptions (line 45) | function generateRandomDumpOptions(provider) { function getSchema (line 61) | function getSchema(number) { FILE: projects/jsch/jsch-fuzzer/src/main/java/com/jcraft/jsch/OpenSSHConfigFuzzer.java class OpenSSHConfigFuzzer (line 26) | public class OpenSSHConfigFuzzer { method OpenSSHConfigFuzzer (line 30) | public OpenSSHConfigFuzzer(FuzzedDataProvider fuzzedDataProvider) thro... method test (line 34) | void test() { method fuzzerTestOneInput (line 44) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/jsemver/VersionFuzzer.java class VersionFuzzer (line 24) | public class VersionFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jsign/AuthenticodeAppxSignerFuzzer.java class AuthenticodeAppxSignerFuzzer (line 26) | public class AuthenticodeAppxSignerFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(byte[] data) throws Exception { FILE: projects/jsign/AuthenticodeCabSignerFuzzer.java class AuthenticodeCabSignerFuzzer (line 26) | public class AuthenticodeCabSignerFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(byte[] data) throws Exception { FILE: projects/jsign/AuthenticodeExeSignerFuzzer.java class AuthenticodeExeSignerFuzzer (line 26) | public class AuthenticodeExeSignerFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(byte[] data) throws Exception { FILE: projects/jsign/AuthenticodeMsiSignerFuzzer.java class AuthenticodeMsiSignerFuzzer (line 26) | public class AuthenticodeMsiSignerFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(byte[] data) throws Exception { FILE: projects/jsmin/fuzz_minimize.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 32) | def main(): FILE: projects/json-flattener/project-parent/fuzz-targets/src/test/java/com/example/FlattenFuzzer.java class FlattenFuzzer (line 29) | class FlattenFuzzer { method myFuzzTest (line 35) | @FuzzTest method jsonFlattenerFactory (line 50) | static JsonFlattenerFactory jsonFlattenerFactory(PrintMode pm, Flatten... FILE: projects/json-flattener/project-parent/fuzz-targets/src/test/java/com/example/UnflattenFuzzer.java class UnflattenFuzzer (line 31) | class UnflattenFuzzer { method myFuzzTest (line 36) | @FuzzTest method jsonUnflattenerFactory (line 50) | static JsonUnflattenerFactory jsonUnflattenerFactory(PrintMode pm, Fla... FILE: projects/json-java/JsonJavaFuzzer.java class JsonJavaFuzzer (line 22) | public class JsonJavaFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/json-patch/fuzz_create_merge.go function FuzzCreateMerge (line 7) | func FuzzCreateMerge(data []byte) int { FILE: projects/json-patch/fuzz_decode_apply.go function FuzzDecodeApply (line 7) | func FuzzDecodeApply(data []byte) int { FILE: projects/json-sanitizer/DenylistFuzzer.java class DenylistFuzzer (line 22) | public class DenylistFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/json-sanitizer/IdempotenceFuzzer.java class IdempotenceFuzzer (line 21) | public class IdempotenceFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/json-sanitizer/ValidJsonFuzzer.java class ValidJsonFuzzer (line 24) | public class ValidJsonFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/json-simple/project-parent/fuzz-targets/src/test/java/com/example/JsonEncodeDecodeFuzzer.java class JsonEncodeDecodeFuzzer (line 29) | public class JsonEncodeDecodeFuzzer { method fuzzerTestOneInput (line 30) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/json-simple/project-parent/fuzz-targets/src/test/java/com/example/JsonParserFuzzer.java class JsonParserFuzzer (line 26) | public class JsonParserFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/json-smart-v2/JSONParserFuzzer.java class JSONParserFuzzer (line 22) | public class JSONParserFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/json2avro/ConverterFuzzer.java class ConverterFuzzer (line 23) | public class ConverterFuzzer { method fuzzerTestOneInput (line 31) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jsoncpp/json_proto_converter.cc type json_proto (line 19) | namespace json_proto { FILE: projects/jsoncpp/json_proto_converter.h function namespace (line 25) | namespace json_proto { FILE: projects/jsoncpp/jsoncpp_fuzz_proto.cc type Json (line 32) | namespace Json { class Exception (line 33) | class Exception function FuzzJson (line 36) | void FuzzJson(std::string data_str, int32_t hash_settings) { function DEFINE_PROTO_FUZZER (line 63) | DEFINE_PROTO_FUZZER(const json_proto::JsonParseAPI &json_proto) { FILE: projects/jsonnet/convert_jsonnet_fuzzer_multi.cc function ImportCallback (line 25) | int ImportCallback(void* ctx, const char* base, const char* rel, function ConvertJsonnetToJson (line 33) | std::string ConvertJsonnetToJson(const std::string& jsonnet) { function LLVMFuzzerTestOneInput (line 52) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/jsonnet/convert_jsonnet_fuzzer_regular.cc function ImportCallback (line 25) | int ImportCallback(void* ctx, const char* base, const char* rel, function ConvertJsonnetToJson (line 33) | std::string ConvertJsonnetToJson(const std::string& jsonnet) { function LLVMFuzzerTestOneInput (line 52) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/jsonnet/convert_jsonnet_fuzzer_stream.cc function ImportCallback (line 25) | int ImportCallback(void* ctx, const char* base, const char* rel, function ConvertJsonnetToJson (line 33) | std::string ConvertJsonnetToJson(const std::string& jsonnet) { function LLVMFuzzerTestOneInput (line 52) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/jsonp-api/CreateJsonFuzzer.java class CreateJsonFuzzer (line 24) | public class CreateJsonFuzzer { method write (line 26) | @Override method fuzzerInitialize (line 30) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 35) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method testJsonCreators (line 42) | public static void testJsonCreators(FuzzedDataProvider data) { FILE: projects/jsonp-api/GeneratorFuzzer.java class GeneratorFuzzer (line 26) | public class GeneratorFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jsonpath/src/main/java/ossfuzz/PathParserFuzzer.java class PathParserFuzzer (line 27) | public class PathParserFuzzer { method PathParserFuzzer (line 31) | public PathParserFuzzer(FuzzedDataProvider fuzzedDataProvider) { method test (line 37) | void test() throws IOException { method fuzzerTestOneInput (line 60) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/jsoup/CssHtmlFuzzer.java class CssHtmlFuzzer (line 24) | public class CssHtmlFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jsoup/FragmentHtmlFuzzer.java class FragmentHtmlFuzzer (line 22) | public class FragmentHtmlFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jsoup/HtmlFuzzer.java class HtmlFuzzer (line 21) | public class HtmlFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jsoup/XmlFuzzer.java class XmlFuzzer (line 22) | public class XmlFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jsqlparser/project-parent/fuzz-targets/src/test/java/com/example/JSqlParserFuzzer.java class JSqlParserFuzzer (line 26) | class JSqlParserFuzzer { method myFuzzTest (line 27) | @FuzzTest FILE: projects/jstl-api/jstl-api-fuzzer/src/main/java/jakarta/servlet/jsp/ParserFuzzer.java class ParserFuzzer (line 8) | public class ParserFuzzer { method ParserFuzzer (line 12) | public ParserFuzzer(FuzzedDataProvider fuzzedDataProvider) throws Exce... method test (line 16) | void test() { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/jts/JtsFuzzer.java class JtsFuzzer (line 25) | public class JtsFuzzer { method fuzzerTestOneInput (line 29) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/juju/devices_fuzzer.go function Fuzz (line 18) | func Fuzz(data []byte) int { FILE: projects/jul-to-slf4j/BridgeFuzzer.java class BridgeFuzzer (line 22) | public class BridgeFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/junrar/JunrarFuzzer.java class JunrarFuzzer (line 31) | public class JunrarFuzzer { method fuzzerTestOneInput (line 32) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/jupyter-nbconvert/fuzz_markdown_converter.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 27) | def main(): FILE: projects/jupyter_server/fuzz_serialization.py function TestOneInput (line 27) | def TestOneInput(data): function main (line 45) | def main(): FILE: projects/jxls/ProcessTemplateFuzzer.java class ProcessTemplateFuzzer (line 36) | public class ProcessTemplateFuzzer { method fuzzerInitialize (line 39) | public static void fuzzerInitialize() throws IOException { method generateHashMap (line 44) | private static Map generateHashMap(FuzzedDataProvider ... method generateComment (line 53) | public static Comment generateComment(XSSFSheet sheet, CreationHelper ... method createDocument (line 62) | public static Path createDocument(FuzzedDataProvider data) throws IOEx... method fuzzerTestOneInput (line 86) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/kafka/fuzz_consumer.py function TestInput (line 21) | def TestInput(data): function main (line 71) | def main(): FILE: projects/kafka/fuzz_producer.py function TestInput (line 21) | def TestInput(data): function main (line 55) | def main(): FILE: projects/keras/fuzz_model.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 43) | def main(): FILE: projects/keras/fuzz_serialization.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 39) | def main(): FILE: projects/kie-soup/CronExpressionFuzzer.java class CronExpressionFuzzer (line 25) | public class CronExpressionFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/kiwisolver/fuzz_solver.py function TestOneInput (line 27) | def TestOneInput(data): function main (line 70) | def main(): FILE: projects/kryo/DeserializeCollectionsFuzzer.java class DeserializeCollectionsFuzzer (line 26) | public class DeserializeCollectionsFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class SomeClass (line 44) | public static final class SomeClass { FILE: projects/kryo/DeserializeNumbersFuzzer.java class DeserializeNumbersFuzzer (line 30) | public class DeserializeNumbersFuzzer { method fuzzerTestOneInput (line 31) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class SomeClass (line 48) | public static final class SomeClass { FILE: projects/kryo/DeserializeStringFuzzer.java class DeserializeStringFuzzer (line 24) | public class DeserializeStringFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class SomeClass (line 42) | public static final class SomeClass { FILE: projects/kubeflow-katib/generateNNImage_fuzzer.go function FuzzGenerateNNImage (line 22) | func FuzzGenerateNNImage(f *testing.F) { FILE: projects/kubeflow-model-registry/filter_fuzzer.go function FuzzFilterParse (line 22) | func FuzzFilterParse(f *testing.F) { FILE: projects/kubeflow-pipelines/expr_fuzzer.go function FuzzExprSelect (line 24) | func FuzzExprSelect(f *testing.F) { FILE: projects/kubeflow-spark-operator/parseSecret_fuzzer.go function FuzzParseCertManagerSecret (line 25) | func FuzzParseCertManagerSecret(f *testing.F) { function FuzzParseInternalCertSecret (line 38) | func FuzzParseInternalCertSecret(f *testing.F) { FILE: projects/lark-parser/fuzz_parse.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 37) | def main(): FILE: projects/lcms/cmsIT8_load_fuzzer.c function LLVMFuzzerTestOneInput (line 24) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_cgats_fuzzer.c function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_cie_cam02_fuzzer.c function LLVMFuzzerTestOneInput (line 16) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_devicelink_fuzzer.c function LLVMFuzzerTestOneInput (line 16) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_dict_fuzzer.c function wchar_t (line 17) | wchar_t* generateWideString(const char* characters, const uint8_t *data){ function LLVMFuzzerTestOneInput (line 34) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_gdb_fuzzer.c function LLVMFuzzerTestOneInput (line 16) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_md5_fuzzer.c function LLVMFuzzerTestOneInput (line 16) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_overwrite_transform_fuzzer.c function LLVMFuzzerTestOneInput (line 18) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_postscript_fuzzer.c function LLVMFuzzerTestOneInput (line 16) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_profile_fuzzer.c function LLVMFuzzerTestOneInput (line 32) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_transform_all_fuzzer.c function run_test (line 16) | void function LLVMFuzzerTestOneInput (line 44) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_transform_extended_fuzzer.c function run_test (line 19) | void function LLVMFuzzerTestOneInput (line 156) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_transform_fuzzer.c function LLVMFuzzerTestOneInput (line 8) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_universal_transform_fuzzer.c function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lcms/cms_virtual_profile_fuzzer.c function LLVMFuzzerTestOneInput (line 16) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/leveldb/fuzz_db.cc class AutoDbDeleter (line 33) | class AutoDbDeleter { method AutoDbDeleter (line 37) | AutoDbDeleter() = default; method AutoDbDeleter (line 39) | AutoDbDeleter(const AutoDbDeleter&) = delete; method AutoDbDeleter (line 40) | AutoDbDeleter& operator=(const AutoDbDeleter&) = delete; function OpenDB (line 51) | std::unique_ptr OpenDB() { type FuzzOp (line 64) | enum class FuzzOp { function LLVMFuzzerTestOneInput (line 81) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libarchive/libarchive_fuzzer.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) { FILE: projects/libcst/fuzz_transformer.py function TestOneInput (line 26) | def TestOneInput(data): function main (line 47) | def main(): FILE: projects/libevent/buffer_add_file_fuzzer.cc function LLVMFuzzerTestOneInput (line 31) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libevent/buffer_fuzzer.cc function LLVMFuzzerTestOneInput (line 29) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libevent/bufferevent_fuzzer.cc function LLVMFuzzerTestOneInput (line 28) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libevent/dns_config_fuzzer.cc function LLVMFuzzerTestOneInput (line 32) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libevent/fuzz_request_cb.c function handle_request (line 22) | static void handle_request(struct evhttp_request *req, void *arg) type evhttp (line 33) | struct evhttp FILE: projects/libevent/http_fuzzer.cc function LLVMFuzzerTestOneInput (line 34) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libevent/parse_query_fuzzer.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libevent/utils_fuzzer.cc function LLVMFuzzerTestOneInput (line 25) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libexif/exif_from_data_fuzzer.cc function mnote_dump (line 21) | static void mnote_dump(ExifData *data) { function dump_value (line 34) | static void dump_value(ExifEntry *entry, void *user_data) { function data_func (line 39) | static void data_func(ExifContent *content, void *user_data) { function data_dump (line 44) | static void data_dump(ExifData *data) { function LLVMFuzzerTestOneInput (line 48) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libexif/exif_loader_fuzzer.cc function content_func (line 20) | void content_func(ExifEntry *entry, void *user_data) { function data_func (line 25) | void data_func(ExifContent *content, void *user_data) { function test_exif_data (line 29) | static void function LLVMFuzzerTestOneInput (line 56) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libfdk-aac/aacDecoder_ConfigRaw.cpp function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/libfdk-aac/aacDecoder_DecodeFrame.cpp function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/libfdk-aac/aacDecoder_Open.cpp function LLVMFuzzerTestOneInput (line 18) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/libfuse/fuzz_optparse.c type options (line 28) | struct options { type fuse_opt (line 36) | struct fuse_opt function LLVMFuzzerTestOneInput (line 40) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libgd/gd_image_string_fuzzer.cc function LLVMFuzzerTestOneInput (line 31) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/libgd/parser_target.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/libical/libical_extended_fuzzer.cc function LLVMFuzzerTestOneInput (line 32) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) FILE: projects/libical/libical_fuzzer.cc function LLVMFuzzerTestOneInput (line 32) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) FILE: projects/libical/libicalvcard_fuzzer.cc function LLVMFuzzerTestOneInput (line 33) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) FILE: projects/libigl/igl_fuzzer.cpp function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size){ FILE: projects/libldac/libldac_encode_fuzzer.cc function TESTFUNC_TYPE (line 11) | TESTFUNC_TYPE FILE: projects/libmicrohttpd2/connection_helper.cpp type mhd_MemoryPool (line 31) | struct mhd_MemoryPool function destroy_global_pool (line 39) | void destroy_global_pool() { function mark_post_parse_ready (line 45) | void mark_post_parse_ready(MHD_Connection& c) { function is_post_parse_ready (line 50) | bool is_post_parse_ready(const MHD_Connection& c) { function clear_post_parse_ready (line 55) | void clear_post_parse_ready(const MHD_Connection& c) { function destroy_error_response (line 60) | static bool destroy_error_response(MHD_Connection c) { function pick_method (line 71) | static std::string pick_method(FuzzedDataProvider& fdp) { function pick_http_version (line 79) | static std::string pick_http_version(FuzzedDataProvider& fdp) { function ensure_lbuf_capacity (line 98) | bool ensure_lbuf_capacity(MHD_Connection& c, size_t min_needed) { type MHD_UploadAction (line 115) | struct MHD_UploadAction type MHD_UploadAction (line 118) | struct MHD_UploadAction type MHD_UploadAction (line 121) | struct MHD_UploadAction type MHD_UploadAction (line 126) | struct MHD_UploadAction type MHD_Request (line 127) | struct MHD_Request type MHD_String (line 127) | struct MHD_String type MHD_StringNullable (line 128) | struct MHD_StringNullable type MHD_StringNullable (line 128) | struct MHD_StringNullable type MHD_StringNullable (line 129) | struct MHD_StringNullable type MHD_Bool (line 130) | enum MHD_Bool type MHD_UploadAction (line 135) | struct MHD_UploadAction type MHD_Request (line 136) | struct MHD_Request type MHD_PostParseResult (line 136) | enum MHD_PostParseResult type MHD_Action (line 141) | struct MHD_Action type MHD_Request (line 143) | struct MHD_Request type MHD_String (line 144) | struct MHD_String type MHD_HTTP_Method (line 145) | enum MHD_HTTP_Method function init_daemon_connection (line 150) | void init_daemon_connection(FuzzedDataProvider& fdp, function init_connection_buffer (line 185) | void init_connection_buffer(FuzzedDataProvider& fdp, MHD_Connection& c) { function init_parsing_configuration (line 317) | void init_parsing_configuration(FuzzedDataProvider& fdp, MHD_Connection&... function prepare_headers_and_parse (line 349) | void prepare_headers_and_parse(MHD_Connection& connection, size_t size) { function prepare_body_and_process (line 405) | void prepare_body_and_process(MHD_Connection& connection, std::string& b... function final_cleanup (line 505) | void final_cleanup(MHD_Connection& connection, MHD_Daemon& daemon) { FILE: projects/libmicrohttpd2/connection_helper.h type mhd_MemoryPool (line 27) | struct mhd_MemoryPool type MHD_UploadAction (line 32) | struct MHD_UploadAction type MHD_UploadAction (line 33) | struct MHD_UploadAction type MHD_UploadAction (line 34) | struct MHD_UploadAction type MHD_UploadAction (line 36) | struct MHD_UploadAction type MHD_Request (line 36) | struct MHD_Request type MHD_String (line 36) | struct MHD_String type MHD_StringNullable (line 37) | struct MHD_StringNullable type MHD_StringNullable (line 37) | struct MHD_StringNullable type MHD_StringNullable (line 38) | struct MHD_StringNullable type MHD_Bool (line 39) | enum MHD_Bool type MHD_UploadAction (line 40) | struct MHD_UploadAction type MHD_Request (line 40) | struct MHD_Request type MHD_PostParseResult (line 40) | enum MHD_PostParseResult FILE: projects/libmicrohttpd2/fuzz_connection.cpp function fuzz_mhd_stream_process_post_finish (line 34) | static void fuzz_mhd_stream_process_post_finish(MHD_Connection& connecti... function LLVMFuzzerInitialize (line 87) | int LLVMFuzzerInitialize() { function LLVMFuzzerTestOneInput (line 93) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libmicrohttpd2/fuzz_crypto_ext.cpp function fuzz_hash_ext_multi (line 36) | static void fuzz_hash_ext_multi(FuzzedDataProvider &fdp, function LLVMFuzzerTestOneInput (line 168) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libmicrohttpd2/fuzz_crypto_int.cpp function fuzz_hash_int_multi (line 36) | static void fuzz_hash_int_multi(FuzzedDataProvider &fdp, function LLVMFuzzerTestOneInput (line 174) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libmicrohttpd2/fuzz_daemon.cpp type MHD_Daemon (line 21) | struct MHD_Daemon function start_daemon_once (line 24) | static void start_daemon_once() { function LLVMFuzzerTestOneInput (line 77) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/libmicrohttpd2/fuzz_daemon_connection.cpp function LLVMFuzzerInitialize (line 33) | int LLVMFuzzerInitialize() { function LLVMFuzzerTestOneInput (line 39) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libmicrohttpd2/fuzz_libinfo.cpp function LLVMFuzzerTestOneInput (line 25) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/libmicrohttpd2/fuzz_mhd2.cpp function ToMhdBool (line 30) | static inline enum MHD_Bool ToMhdBool(bool b) { function dummy_log (line 34) | static void dummy_log(void*, enum MHD_StatusCode, const char*, va_list) { function MHD_FN_PAR_NONNULL_ (line 38) | static MHD_FN_PAR_NONNULL_(2) MHD_FN_PAR_NONNULL_(3) function fuzz_digest_auth_calc (line 55) | void fuzz_digest_auth_calc(FuzzedDataProvider& fdp) { type MHD_Response (line 77) | struct MHD_Response type MHD_Response (line 82) | struct MHD_Response type MHD_HTTP_StatusCode (line 83) | enum MHD_HTTP_StatusCode type MHD_HTTP_StatusCode (line 84) | enum MHD_HTTP_StatusCode function fuzz_response_config (line 102) | void fuzz_response_config(FuzzedDataProvider& fdp, struct MHD_Response* ... function daemon_configuration (line 172) | void daemon_configuration(FuzzedDataProvider& fdp, MHD_Daemon* d) { function fuzz_daemon_lifecycle (line 209) | void fuzz_daemon_lifecycle(FuzzedDataProvider& fdp) { function LLVMFuzzerTestOneInput (line 260) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/libmicrohttpd2/fuzz_response.cpp function request_ended_cb (line 26) | static void request_ended_cb(void *cls, function pick_status_code (line 32) | static enum MHD_HTTP_StatusCode pick_status_code(FuzzedDataProvider &fdp) { function MHD_Response (line 43) | static MHD_Response* create_response(FuzzedDataProvider &fdp, function add_headers (line 133) | static void add_headers(FuzzedDataProvider &fdp, MHD_Response *r) { function randomise_response_options (line 153) | static void randomise_response_options(FuzzedDataProvider &fdp, MHD_Resp... function add_auth (line 188) | static void add_auth(FuzzedDataProvider &fdp, MHD_Response *r, function LLVMFuzzerTestOneInput (line 251) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libmicrohttpd2/fuzz_str.cpp function fuzz_tokens (line 30) | static void fuzz_tokens(FuzzedDataProvider& fdp) { function fuzz_conversion (line 83) | static void fuzz_conversion(FuzzedDataProvider& fdp) { function fuzz_decode (line 118) | static void fuzz_decode(FuzzedDataProvider& fdp) { function fuzz_quoted (line 143) | static void fuzz_quoted(FuzzedDataProvider& fdp) { function fuzz_base64 (line 176) | static void fuzz_base64(FuzzedDataProvider& fdp) { function fuzz_transformation (line 198) | static void fuzz_transformation(FuzzedDataProvider& fdp) { function fuzz_hex_conversion (line 210) | static void fuzz_hex_conversion(FuzzedDataProvider& fdp) { function LLVMFuzzerTestOneInput (line 241) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libmicrohttpd2/mhd_helper.cpp function b64encode (line 32) | std::string b64encode(const std::string &in) { function ToMhdBool (line 64) | enum MHD_Bool ToMhdBool(bool b) { function safe_ascii (line 68) | std::string safe_ascii(const std::string& in, bool allow_space) { function kv_cb (line 84) | static enum MHD_Bool kv_cb(void*, enum MHD_ValueKind, const struct MHD_N... function post_cb (line 87) | static enum MHD_Bool post_cb(void*, const struct MHD_PostField* pf) { function create_socket (line 92) | static int create_socket(uint16_t port) { function generate_daemon_options (line 139) | static void generate_daemon_options(const std::string& method, DaemonOpt... function generate_auth_header (line 168) | static std::string generate_auth_header(const DaemonOpts& opts, function append_headers (line 222) | static void append_headers(std::string& req, function make_multipart (line 242) | static std::string make_multipart(const DaemonOpts& opts, function append_request_headers (line 266) | static void append_request_headers(std::string& req, function append_chunked_payload (line 293) | static void append_chunked_payload(std::string& req, const std::string& ... function send_request (line 320) | static void send_request(int fd, const std::string& req) { function wait_for_response (line 351) | static void wait_for_response(int fd) { function send_http_request_blocking (line 391) | void send_http_request_blocking(uint16_t port, function generate_daemon_req_opts (line 451) | static void generate_daemon_req_opts(DaemonReqOpts& o, type MHD_UploadAction (line 494) | struct MHD_UploadAction type MHD_Request (line 495) | struct MHD_Request type MHD_PostParseResult (line 495) | enum MHD_PostParseResult type MHD_UploadAction (line 499) | struct MHD_UploadAction type MHD_Request (line 500) | struct MHD_Request type MHD_String (line 502) | struct MHD_String type MHD_StringNullable (line 503) | struct MHD_StringNullable type MHD_StringNullable (line 504) | struct MHD_StringNullable type MHD_StringNullable (line 505) | struct MHD_StringNullable type MHD_Bool (line 509) | enum MHD_Bool type MHD_UploadAction (line 513) | struct MHD_UploadAction type MHD_Request (line 515) | struct MHD_Request type MHD_HTTP_StatusCode (line 518) | enum MHD_HTTP_StatusCode type MHD_Response (line 519) | struct MHD_Response type MHD_Action (line 527) | struct MHD_Action type MHD_Request (line 527) | struct MHD_Request type MHD_Action (line 530) | struct MHD_Action type MHD_PostField (line 540) | struct MHD_PostField type lk (line 540) | enum MHD_Bool { type MHD_Action (line 554) | struct MHD_Action type MHD_Action (line 567) | struct MHD_Action type MHD_Request (line 568) | struct MHD_Request type MHD_StatusCode (line 571) | enum MHD_StatusCode type MHD_AuthBasicCreds (line 599) | struct MHD_AuthBasicCreds type MHD_Action (line 629) | struct MHD_Action type MHD_Request (line 630) | struct MHD_Request type MHD_StatusCode (line 633) | enum MHD_StatusCode type MHD_AuthDigestInfo (line 668) | struct MHD_AuthDigestInfo type MHD_DigestAuthResult (line 675) | enum MHD_DigestAuthResult type MHD_Action (line 727) | struct MHD_Action type MHD_Request (line 729) | struct MHD_Request type MHD_String (line 730) | struct MHD_String type MHD_HTTP_Method (line 731) | enum MHD_HTTP_Method type MHD_Action (line 737) | struct MHD_Action type MHD_Action (line 749) | struct MHD_Action type MHD_Request (line 751) | struct MHD_Request type MHD_String (line 752) | struct MHD_String type MHD_HTTP_Method (line 753) | enum MHD_HTTP_Method type MHD_StringNullable (line 755) | struct MHD_StringNullable type MHD_Response (line 793) | struct MHD_Response type MHD_Action (line 800) | struct MHD_Action type MHD_Action (line 806) | struct MHD_Action type MHD_Request (line 808) | struct MHD_Request type MHD_String (line 809) | struct MHD_String type MHD_HTTP_Method (line 810) | enum MHD_HTTP_Method type MHD_DigestAuthAlgo (line 838) | enum MHD_DigestAuthAlgo type MHD_Response (line 860) | struct MHD_Response FILE: projects/libmicrohttpd2/mhd_helper.h type DaemonReqOpts (line 45) | struct DaemonReqOpts { type MHD_Action (line 80) | struct MHD_Action type MHD_Request (line 81) | struct MHD_Request type MHD_String (line 82) | struct MHD_String type MHD_HTTP_Method (line 83) | enum MHD_HTTP_Method type MHD_Action (line 86) | struct MHD_Action type MHD_Request (line 87) | struct MHD_Request type MHD_String (line 88) | struct MHD_String type MHD_HTTP_Method (line 89) | enum MHD_HTTP_Method type MHD_Action (line 93) | struct MHD_Action type MHD_Request (line 94) | struct MHD_Request type MHD_String (line 95) | struct MHD_String type MHD_HTTP_Method (line 96) | enum MHD_HTTP_Method type MHD_Bool (line 103) | enum MHD_Bool FILE: projects/libmodbus/fuzz/FuzzClient.c type Fuzzer (line 31) | struct Fuzzer{ type Fuzzer (line 42) | typedef struct Fuzzer Fuzzer; function fuzzinit (line 46) | void fuzzinit(Fuzzer *fuzzer){ type sockaddr_in (line 66) | struct sockaddr_in type sockaddr (line 69) | struct sockaddr function clean (line 83) | void clean(Fuzzer *fuzzer){ function LLVMFuzzerTestOneInput (line 91) | extern int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { function client (line 112) | int client(Fuzzer *fuzzer){ FILE: projects/libmodbus/fuzz/FuzzServer.c type Fuzzer (line 32) | struct Fuzzer{ type Fuzzer (line 43) | typedef struct Fuzzer Fuzzer; type sockaddr_in (line 51) | struct sockaddr_in type sockaddr (line 59) | struct sockaddr function LLVMFuzzerTestOneInput (line 72) | extern int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { function server (line 92) | int server(Fuzzer *fuzzer) FILE: projects/libpng-proto/libpng_transforms_fuzzer.cc type PngReader (line 11) | struct PngReader { type PngArrayStream (line 17) | struct PngArrayStream { function PngArrayStreamCallback (line 23) | void PngArrayStreamCallback(png_structp png_ptr, png_bytep data, function PngErrorHandler (line 38) | void PngErrorHandler(png_structp png_ptr, png_const_charp error_message) { function PngWarningHandler (line 43) | void PngWarningHandler(png_structp png_ptr, png_const_charp warning_mess... function LLVMFuzzerTestOneInput (line 50) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libpng-proto/png_proto_fuzzer_example.cc function WriteInt (line 10) | static void WriteInt(std::stringstream &out, uint32_t x) { function WriteByte (line 15) | static void WriteByte(std::stringstream &out, uint8_t x) { function Compress (line 19) | static std::string Compress(const std::string &s) { function WriteChunk (line 32) | static void WriteChunk(std::stringstream &out, const char *type, function ProtoToPng (line 49) | std::string ProtoToPng(const PngProto &png_proto) { function DEFINE_PROTO_FUZZER (line 117) | DEFINE_PROTO_FUZZER(const PngProto &png_proto) { FILE: projects/libpng-proto/png_proto_mutator.cc type PngProtoCBRegistration (line 23) | struct PngProtoCBRegistration method PngProtoCBRegistration (line 25) | PngProtoCBRegistration(FuzzMutatorCallback const& _callback) FILE: projects/libraw/libraw_fuzzer.cc type InterpolationOptions (line 24) | enum InterpolationOptions { function LLVMFuzzerTestOneInput (line 35) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/libsass/data_context_fuzzer.cc function LLVMFuzzerTestOneInput (line 3) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libsodium/fake_random.h function fake_random_buffer (line 32) | static void type randombytes_implementation (line 43) | struct randombytes_implementation function setup_fake_random (line 52) | void FILE: projects/libsodium/secret_key_auth_fuzzer.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const unsigned char *data, size_t size) { FILE: projects/libsodium/secretbox_easy_fuzzer.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const unsigned char *data, size_t size) { FILE: projects/libteken/libteken_fuzzer.c function dummy_bell (line 6) | static void dummy_bell(void *s) {} function dummy_cursor (line 7) | static void dummy_cursor(void *s, const teken_pos_t *p) {} function dummy_putchar (line 8) | static void dummy_putchar(void *s, const teken_pos_t *p, teken_char_t c, function dummy_fill (line 10) | static void dummy_fill(void *s, const teken_rect_t *r, teken_char_t c, function dummy_copy (line 12) | static void dummy_copy(void *s, const teken_rect_t *r, const teken_pos_t... function dummy_param (line 13) | static void dummy_param(void *s, int cmd, unsigned int value) {} function dummy_respond (line 14) | static void dummy_respond(void *s, const void *buf, size_t len) {} function LLVMFuzzerTestOneInput (line 26) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libtsm/libtsm_fuzzer.c function terminal_write_fn (line 10) | static void terminal_write_fn(struct tsm_vte *vte, function term_draw_cell (line 21) | static int term_draw_cell(struct tsm_screen *screen, uint32_t id, function LLVMFuzzerTestOneInput (line 34) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/libunwind/fuzz_libunwind.c function get_save_loc (line 34) | void get_save_loc(int regnum) { function get_random_reg (line 47) | void get_random_reg(int regnum) { function check_is_signal (line 59) | void check_is_signal() { function get_proc_name (line 73) | void get_proc_name() { function dispatch (line 86) | void dispatch(const uint8_t *data, size_t size) { function recurse1 (line 104) | void recurse1(const uint8_t *data, size_t size) { function recurse2 (line 115) | void recurse2(const uint8_t *data, size_t size) { function recurse3 (line 126) | void recurse3(const uint8_t *data, size_t size) { function recurse4 (line 137) | void recurse4(const uint8_t *data, size_t size) { function LLVMFuzzerTestOneInput (line 148) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libusb/libusb_fuzzer.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libwebsockets/lws_upng_inflate_fuzzer.cpp function lws_api_test_gunzip (line 20) | static void lws_api_test_gunzip(FuzzedDataProvider &provider) { function LLVMFuzzerTestOneInput (line 38) | int LLVMFuzzerTestOneInput(const uint8_t *data, uint32_t size) { FILE: projects/libyaml/libyaml_deconstructor_alt_fuzzer.c function LLVMFuzzerTestOneInput (line 28) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libyaml/libyaml_deconstructor_fuzzer.c function LLVMFuzzerTestOneInput (line 28) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libyaml/libyaml_dumper_fuzzer.c function nodes_equal (line 30) | bool nodes_equal(yaml_document_t *document1, int index1, function documents_equal (line 96) | bool documents_equal(yaml_document_t *document1, yaml_document_t *docume... function copy_document (line 134) | bool copy_document(yaml_document_t *document_to, function LLVMFuzzerTestOneInput (line 204) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libyaml/libyaml_emitter_fuzzer.c function events_equal (line 30) | bool events_equal(yaml_event_t *event1, yaml_event_t *event2) { function copy_event (line 153) | bool copy_event(yaml_event_t *event_to, yaml_event_t *event_from) { function LLVMFuzzerTestOneInput (line 208) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libyaml/libyaml_loader_fuzzer.c function LLVMFuzzerTestOneInput (line 27) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libyaml/libyaml_parser_fuzzer.c function LLVMFuzzerTestOneInput (line 27) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libyaml/libyaml_reformatter_alt_fuzzer.c function LLVMFuzzerTestOneInput (line 28) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libyaml/libyaml_reformatter_fuzzer.c function LLVMFuzzerTestOneInput (line 28) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libyaml/libyaml_scanner_fuzzer.c function LLVMFuzzerTestOneInput (line 27) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/libyaml/yaml_write_handler.h type yaml_output_buffer_t (line 18) | typedef struct yaml_output_buffer { function yaml_write_handler (line 24) | static int yaml_write_handler(void *data, unsigned char *buffer, size_t ... FILE: projects/lighttpd/fuzz_burl.c function run_burl_normalize (line 24) | void run_burl_normalize (buffer *psrc, buffer *ptmp, function LLVMFuzzerTestOneInput (line 32) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lit/fuzz.js method get (line 93) | get() { method set (line 96) | set(value) { function ignoredError (line 107) | function ignoredError(error) { FILE: projects/llamacpp/fuzzers/fuzz_apply_template.cpp function LLVMFuzzerTestOneInput (line 18) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/llamacpp/fuzzers/fuzz_grammar.cpp function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/llamacpp/fuzzers/fuzz_inference.cpp function __wrap_abort (line 24) | void __wrap_abort(void) { longjmp(fuzzing_jmp_buf, 1); } function LLVMFuzzerTestOneInput (line 26) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/llamacpp/fuzzers/fuzz_json_to_grammar.cpp function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/llamacpp/fuzzers/fuzz_load_model.cpp type llama_model_kv_override (line 22) | struct llama_model_kv_override function __wrap_abort (line 24) | void __wrap_abort(void) { longjmp(fuzzing_jmp_buf, 1); } function LLVMFuzzerTestOneInput (line 26) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/llamacpp/fuzzers/fuzz_structurally_created.cpp type FUZZ_LLAMA_VALUE_TYPES (line 30) | enum FUZZ_LLAMA_VALUE_TYPES { function __wrap_abort (line 149) | void __wrap_abort(void) { longjmp(fuzzing_jmp_buf, 1); } function create_fuzzed_gguf_file (line 151) | static bool create_fuzzed_gguf_file(const std::string &fname, function LLVMFuzzerTestOneInput (line 293) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/llamacpp/fuzzers/fuzz_structured.cpp type llama_model_kv_override (line 27) | struct llama_model_kv_override function __wrap_abort (line 138) | void __wrap_abort(void) { longjmp(fuzzing_jmp_buf, 1); } function LLVMFuzzerTestOneInput (line 140) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/llamacpp/fuzzers/fuzz_tokenizer.cpp function __wrap_abort (line 44) | void __wrap_abort(void) { longjmp(fuzzing_jmp_buf, 1); } function init (line 46) | void init() { function LLVMFuzzerTestOneInput (line 105) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/lodash/fuzz.js function ignoredError (line 193) | function ignoredError(error) { function generateDataObject (line 204) | function generateDataObject(provider) { function generatePropertyValue (line 218) | function generatePropertyValue(provider) { FILE: projects/logback/JoranFuzzer.java class JoranFuzzer (line 14) | public class JoranFuzzer { method fuzzerInitialize (line 18) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/looker-sdk/fuzz_looker.py function transport_requests_mock (line 37) | def transport_requests_mock( function TestOneInput (line 51) | def TestOneInput(data): function main (line 100) | def main(): FILE: projects/lua/fuzz_lua.c function lstop (line 53) | static void lstop (lua_State *L, lua_Debug *ar) { function laction (line 66) | static void laction (int i) { function l_message (line 76) | static void l_message (const char *pname, const char *msg) { function report (line 87) | static int report (lua_State *L, int status) { function msghandler (line 99) | static int msghandler (lua_State *L) { function docall (line 118) | static int docall (lua_State *L, int narg, int nres) { function dochunk (line 132) | static int dochunk (lua_State *L, int status) { function LLVMFuzzerTestOneInput (line 142) | int FILE: projects/lucene/CustomAnalyzerFuzzer.java class CustomAnalyzerFuzzer (line 41) | public class CustomAnalyzerFuzzer { method fuzzerTestOneInput (line 172) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method analyze (line 205) | public static List analyze(String field, String text, Analyzer... FILE: projects/lucene/IndexSearchFuzzer.java class IndexSearchFuzzer (line 42) | public class IndexSearchFuzzer { method fuzzerInitialize (line 52) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 67) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/lucene/QueryParserFuzzer.java class QueryParserFuzzer (line 46) | public class QueryParserFuzzer { method fuzzerTestOneInput (line 176) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/lxml/fuzz_html_parse.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 46) | def main(): FILE: projects/lxml/fuzz_sax.py function TestOneInput (line 26) | def TestOneInput(data): function main (line 45) | def main(): FILE: projects/lxml/fuzz_schematron.py function TestOneInput (line 27) | def TestOneInput(data): function main (line 44) | def main(): FILE: projects/lxml/fuzz_xml_parse.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 45) | def main(): FILE: projects/lxml/fuzz_xmlschema.py function TestOneInput (line 26) | def TestOneInput(data): function main (line 47) | def main(): FILE: projects/lxml/fuzz_xslt.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 36) | def main(): FILE: projects/lxml/test_utils.py function is_expected_error (line 20) | def is_expected_error(error_message_list: List[str], FILE: projects/lzo/all_lzo_compress.cc type LzoAlgorithm (line 36) | struct LzoAlgorithm { type Category (line 37) | enum class Category { LZO1, LZO2 } type Type (line 38) | enum class Type { method LzoAlgorithm (line 50) | constexpr LzoAlgorithm(Category category, Type type, int compression_l... method GetMaxCompressedSize (line 62) | size_t GetMaxCompressedSize(size_t size) const { function FuzzLzoAlgorithm (line 198) | void FuzzLzoAlgorithm(const LzoAlgorithm& algorithm, FILE: projects/lzo/lzo_compress_target.c function LLVMFuzzerTestOneInput (line 37) | extern int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/lzo/lzo_decompress_target.c function LLVMFuzzerTestOneInput (line 49) | extern int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/magic-enum/magic_enum_fuzzer.cc function LLVMFuzzerTestOneInput (line 17) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/mako/fuzz_lexer.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 31) | def main(): FILE: projects/mariadb-connector-j/MariaDbPoolDataSourceFuzzer.java class MariaDbPoolDataSourceFuzzer (line 28) | public class MariaDbPoolDataSourceFuzzer { method fuzzerTestOneInput (line 29) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/mariadb/fuzz_json.c function fuzz_get_object_get (line 22) | void fuzz_get_object_get(const uint8_t *data, size_t size) { function fuzz_json_locate_key (line 47) | void fuzz_json_locate_key(const uint8_t *data, size_t size) { function LLVMFuzzerTestOneInput (line 73) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/markupsafe/fuzz_encoding.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/matplotlib/fuzz_plt.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 47) | def main(): FILE: projects/maven-model/Xpp3ReaderFuzzer.java class Xpp3ReaderFuzzer (line 22) | public class Xpp3ReaderFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/maven/src/main/java/ossfuzz/MojoDescriptorFuzzer.java class MojoDescriptorFuzzer (line 30) | public class MojoDescriptorFuzzer { method fuzzerTestOneInput (line 32) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/maven/src/main/java/ossfuzz/ProjectArtifactMetadataFuzzer.java class ProjectArtifactMetadataFuzzer (line 30) | public class ProjectArtifactMetadataFuzzer { method fuzzerTestOneInput (line 32) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/mccabe/fuzz_get_code_complexity.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 31) | def main(): FILE: projects/mdit-py-plugins/fuzz_containers.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 30) | def main(): FILE: projects/mdit-py-plugins/fuzz_plugins_individually.py function TestOneInput (line 39) | def TestOneInput(data): function main (line 64) | def main(): FILE: projects/mdurl/fuzz_mdurl.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 27) | def main(): FILE: projects/memcached/fuzzer_proxy.c type event_base (line 21) | struct event_base function LLVMFuzzerInitialize (line 27) | extern int LLVMFuzzerInitialize(int *argc, char **argv) function LLVMFuzzerTestOneInput (line 68) | extern int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) FILE: projects/metadata-extractor/ImageMetadataReaderFuzzer.java class ImageMetadataReaderFuzzer (line 26) | public class ImageMetadataReaderFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/moby/backend_build_fuzzer.go function FuzzsanitizeRepoAndTags (line 21) | func FuzzsanitizeRepoAndTags(data []byte) int { FILE: projects/moby/containerstream_fuzzer.go function FuzzcopyEscapable (line 23) | func FuzzcopyEscapable(data []byte) int { FILE: projects/moby/daemon_fuzzer.go function init (line 38) | func init() { function IsJSON (line 42) | func IsJSON(input []byte) bool { function FuzzDaemonSimple (line 47) | func FuzzDaemonSimple(data []byte) int { FILE: projects/moby/jsonmessage_fuzzer.go function FuzzDisplayJSONMessagesStream (line 21) | func FuzzDisplayJSONMessagesStream(data []byte) int { FILE: projects/moby/remotecontext_fuzzer.go function FuzzreadAndParseDockerfile (line 22) | func FuzzreadAndParseDockerfile(data []byte) int { FILE: projects/mongoose/fuzz_netdriver_http.c function fn (line 15) | static void fn(struct mg_connection *c, int ev, void *ev_data, void *fn_... FILE: projects/more-itertools/fuzz_mi.py function get_random_list (line 21) | def get_random_list(fdp, min_len=5, max_len=100): function check_sliced (line 25) | def check_sliced(fdp): function check_windowed (line 33) | def check_windowed(fdp): function check_distinct_combinations (line 42) | def check_distinct_combinations(fdp): function check_substrings (line 53) | def check_substrings(fdp): function check_substrings_indexes (line 57) | def check_substrings_indexes(fdp): function check_locate (line 65) | def check_locate(fdp): function check_islice_extended (line 73) | def check_islice_extended(fdp): function check_interleave_evenly (line 81) | def check_interleave_evenly(fdp): function check_collapse (line 90) | def check_collapse(fdp): function check_chunked (line 98) | def check_chunked(fdp): function check_intersperse (line 106) | def check_intersperse(fdp): function TestOneInput (line 114) | def TestOneInput(data): function main (line 133) | def main(): FILE: projects/mpg123/decode_fuzzer.cc function LLVMFuzzerTestOneInput (line 11) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/mpg123/read_fuzzer.c function fuzzer_release_tmpfile (line 39) | static void fuzzer_release_tmpfile(char* filename) { function LLVMFuzzerTestOneInput (line 46) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/mrab-regex/fuzz_match.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 51) | def main(): FILE: projects/mrab-regex/fuzz_regex.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 50) | def main(): FILE: projects/mrab-regex/fuzz_search.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 51) | def main(): FILE: projects/msal/fuzz_auth.py class FuzzHttpClient (line 25) | class FuzzHttpClient: method __init__ (line 27) | def __init__(self, fdp, verify=True, proxies=None, timeout=None): method post (line 36) | def post(self, url, params=None, data=None, headers=None, **kwargs): method get (line 39) | def get(self, url, params=None, headers=None, **kwargs): method close (line 42) | def close(self): class FuzzResponse (line 46) | class FuzzResponse(object): method __init__ (line 47) | def __init__(self, fdp, requests_resp=None, status_code=None, text=None): method raise_for_status (line 55) | def raise_for_status(self): function is_expected (line 59) | def is_expected(error_list,error_msg): function TestInput (line 65) | def TestInput(input_bytes): function main (line 90) | def main(): FILE: projects/msal/fuzz_tokencache.py function build_token (line 23) | def build_token(issuer="issuer",subject="subject",id="id",**claims): function build_response (line 30) | def build_response(uid,utid,access_token,expires_in,token_type,**kwargs): function is_expected (line 45) | def is_expected(error_list,error_msg): function TestInput (line 51) | def TestInput(input_bytes): function main (line 87) | def main(): FILE: projects/msgpack-python/fuzz_unpack.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 43) | def main(): FILE: projects/muduo/muduo_http_fuzzer.cpp function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size){ FILE: projects/multidict/fuzz_md.py function run_operation (line 23) | def run_operation(md, fdp, operation): function TestOneInput (line 91) | def TestOneInput(data): function main (line 127) | def main(): FILE: projects/multierr/fuzz_test.go function FuzzCombine (line 23) | func FuzzCombine(f *testing.F) { FILE: projects/muparser/set_eval_fuzzer.cc function LLVMFuzzerTestOneInput (line 22) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/mupdf/pdf_fuzzer.cc function fz_free_ossfuzz (line 65) | static void fz_free_ossfuzz(void *opaque, void *ptr) function LLVMFuzzerTestOneInput (line 123) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/mutagen/fuzz_parser.py function TestOneInput (line 23) | def TestOneInput(data: bytes) -> int: FILE: projects/mvel/project-parent/fuzz-targets/src/test/java/com/example/MvelFuzzer.java class MvelFuzzer (line 27) | class MvelFuzzer { method myFuzzTest (line 29) | @FuzzTest FILE: projects/mxj/fuzz.go function FuzzMapXml (line 3) | func FuzzMapXml(data []byte) int { FILE: projects/mybatis-3/PooledDataSourceFuzzer.java class PooledDataSourceFuzzer (line 24) | public class PooledDataSourceFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/mybatis-3/ResolverUtilFuzzer.java class ResolverUtilFuzzer (line 25) | public class ResolverUtilFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/mysql-connector-j/ServerLoginFuzzer.java class ServerLoginFuzzer (line 27) | public class ServerLoginFuzzer extends TestServer { method ServerLoginFuzzer (line 29) | ServerLoginFuzzer() { method fuzzerTestOneInput (line 32) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPov... FILE: projects/mysql-connector-j/SqlPreparedStatementFuzzer.java class SqlPreparedStatementFuzzer (line 27) | public class SqlPreparedStatementFuzzer extends TestServer { method SqlPreparedStatementFuzzer (line 29) | SqlPreparedStatementFuzzer() { method updateRow (line 32) | void updateRow(FuzzedDataProvider fuzzedDataPovider) throws SQLExcepti... method fuzzerTestOneInput (line 41) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPov... FILE: projects/mysql-connector-j/SqlStatementFuzzer.java class SqlStatementFuzzer (line 27) | public class SqlStatementFuzzer extends TestServer { method SqlStatementFuzzer (line 29) | SqlStatementFuzzer() { method updateRow (line 32) | void updateRow(FuzzedDataProvider fuzzedDataPovider) throws SQLExcepti... method fuzzerTestOneInput (line 39) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPov... FILE: projects/mysql-connector-j/TestServer.java class TestServer (line 24) | public class TestServer { method TestServer (line 26) | TestServer() { method initializeMysqlConnectorJ (line 35) | static boolean initializeMysqlConnectorJ() { method createTestTable (line 48) | void createTestTable() throws SQLException { method getUserName (line 58) | String getUserName() { method getPassword (line 62) | String getPassword() { method getConnection (line 66) | Connection getConnection(String connectionOptions) throws SQLException { method getConnection (line 70) | Connection getConnection() throws SQLException { FILE: projects/mysql-server/targets/fuzz_docommand.cc function LLVMFuzzerInitialize (line 52) | int LLVMFuzzerInitialize(const int* argc, char*** argv) { class Channel_info_fuzz (line 75) | class Channel_info_fuzz : public Channel_info { method Vio (line 79) | virtual Vio *create_and_init_vio() const { method Channel_info_fuzz (line 85) | Channel_info_fuzz(bool is_admin_conn) : m_is_admin_conn(is_admin_conn) {} method THD (line 87) | virtual THD *create_thd() { method is_admin_connection (line 102) | virtual bool is_admin_connection() const { return m_is_admin_conn; } function LLVMFuzzerTestOneInput (line 108) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/mysql-server/targets/fuzz_initfile.cc function LLVMFuzzerInitialize (line 36) | int LLVMFuzzerInitialize(const int* argc, char*** argv) { function bufferToFile (line 41) | static int bufferToFile(const char * name, const uint8_t *Data, size_t S... function LLVMFuzzerTestOneInput (line 64) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/mysql-server/targets/fuzz_mysqld.cc function LLVMFuzzerInitialize (line 35) | int LLVMFuzzerInitialize(const int* argc, char*** argv) { class Channel_info_fuzz (line 40) | class Channel_info_fuzz : public Channel_info { method Vio (line 44) | virtual Vio *create_and_init_vio() const { method Channel_info_fuzz (line 50) | Channel_info_fuzz(bool is_admin_conn) : m_is_admin_conn(is_admin_conn) {} method THD (line 52) | virtual THD *create_thd() { method is_admin_connection (line 67) | virtual bool is_admin_connection() const { return m_is_admin_conn; } function try_connection (line 70) | static void try_connection(Channel_info *channel_info) { function LLVMFuzzerTestOneInput (line 116) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/mysql-server/targets/fuzz_real_query.cc function LLVMFuzzerTestOneInput (line 14) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/mysql-server/targets/fuzz_stmt_fetch.cc function LLVMFuzzerTestOneInput (line 15) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/mysql-server/targets/onefile.cc function main (line 7) | int main(int argc, char** argv) FILE: projects/mysql-server/targets/util_fuzz.cc function remove_cb (line 8) | static int remove_cb(const char *fpath, const struct stat *sb, int typef... function utilfuzz_rmrf (line 19) | int utilfuzz_rmrf(char *path) { function cp_cb (line 28) | static int cp_cb(const char *fpath, const struct stat *sb, int typeflag,... function utilfuzz_cpr (line 48) | int utilfuzz_cpr(char *pathfrom, char *pathto) { FILE: projects/nbclassic/fuzz_cell.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 30) | def main(): FILE: projects/nbformat/fuzz_read.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 37) | def main(): FILE: projects/nccl/fuzz_xml.cpp function LLVMFuzzerTestOneInput (line 24) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/netaddr-py/fuzz_parsing.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 46) | def main(): FILE: projects/nettle/fuzz_dsa_openssl_private_key_from_der.c function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/nettle/fuzz_dsa_sha1_keypair_from_sexp.c function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/nettle/fuzz_dsa_sha256_keypair_from_sexp.c function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/nettle/fuzz_dsa_signature_from_sexp.c function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/nettle/fuzz_rsa_keypair_from_der.c function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/nettle/fuzz_rsa_keypair_from_sexp.c function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/nettle/fuzz_rsa_public_key_from_der.c function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/netty-tcnative/NettyTcnativeFuzzer.java class NettyTcnativeFuzzer (line 26) | public class NettyTcnativeFuzzer { method fuzzerTestOneInput (line 46) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method createSSLContext (line 120) | private static Long createSSLContext(FuzzedDataProvider data) throws E... FILE: projects/netty/src/main/java/io/netty/buffer/ByteBufUtilFuzzer.java class ByteBufUtilFuzzer (line 25) | public class ByteBufUtilFuzzer { method ByteBufUtilFuzzer (line 29) | public ByteBufUtilFuzzer(FuzzedDataProvider fuzzedDataProvider) { method getByteArray (line 33) | byte[] getByteArray() { method getCharBuffer (line 38) | CharBuffer getCharBuffer() { method getCharSequence (line 45) | CharSequence getCharSequence() { method validIndex (line 50) | int validIndex(ByteBuf buffer) { method validLength (line 58) | int validLength(ByteBuf buffer, int start) { method test (line 67) | void test() { method fuzzerTestOneInput (line 118) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/netty/src/main/java/io/netty/buffer/LongLongHashMapFuzzer.java class LongLongHashMapFuzzer (line 10) | public class LongLongHashMapFuzzer { method LongLongHashMapFuzzer (line 14) | public LongLongHashMapFuzzer(FuzzedDataProvider fuzzedDataProvider) { method test (line 18) | void test() { method fuzzerTestOneInput (line 39) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/netty/src/main/java/io/netty/handler/HandlerFuzzerBase.java class HandlerFuzzerBase (line 26) | public abstract class HandlerFuzzerBase { method test (line 29) | public void test(FuzzedDataProvider provider) { FILE: projects/netty/src/main/java/io/netty/handler/codec/http/HttpRequestDecoderFuzzer.java class HttpRequestDecoderFuzzer (line 22) | public class HttpRequestDecoderFuzzer extends HandlerFuzzerBase { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/netty/src/main/java/io/netty/handler/codec/http/cookie/ServerCookieDecoderFuzzer.java class ServerCookieDecoderFuzzer (line 21) | public class ServerCookieDecoderFuzzer { method ServerCookieDecoderFuzzer (line 25) | public ServerCookieDecoderFuzzer(FuzzedDataProvider fuzzedDataProvider) { method test (line 30) | void test() { method fuzzerTestOneInput (line 41) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/networkx/fuzz_graph6.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 31) | def main(): FILE: projects/networkx/fuzz_graphml.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 33) | def main(): FILE: projects/networkx/fuzz_sparse6.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 32) | def main(): FILE: projects/nfstream/pcap_fuzzer.py function TestOneInput (line 25) | def TestOneInput(input_bytes): function main (line 36) | def main(): FILE: projects/nginx/fuzz/http_request_fuzzer.cc type fuzzing_data (line 107) | struct fuzzing_data { type fuzzing_data (line 112) | struct fuzzing_data type fuzzing_data (line 113) | struct fuzzing_data function cleanup_reply (line 122) | static void cleanup_reply(void *data) { req_reply = NULL; } function request_recv_handler (line 125) | static ssize_t request_recv_handler(ngx_connection_t *c, u_char *buf, function reply_recv_handler (line 136) | static ssize_t reply_recv_handler(ngx_connection_t *c, u_char *buf, function ngx_int_t (line 159) | static ngx_int_t add_event(ngx_event_t *ev, ngx_int_t event, ngx_uint_t ... function ngx_int_t (line 163) | static ngx_int_t init_event(ngx_cycle_t *cycle, ngx_msec_t timer) { function ngx_chain_t (line 168) | static ngx_chain_t *send_chain(ngx_connection_t *c, ngx_chain_t *in, function InitializeNginx (line 176) | int InitializeNginx(void) { function invalid_call (line 241) | long int invalid_call(ngx_connection_s *a, ngx_chain_s *b, function DEFINE_PROTO_FUZZER (line 246) | DEFINE_PROTO_FUZZER(const HttpProto &input) { FILE: projects/nginx/fuzz/wrappers.c function __wrap_connect (line 22) | int __wrap_connect(int sockfd, const struct sockaddr *addr, socklen_t ad... function __wrap_bind (line 26) | int __wrap_bind(int sockfd, const struct sockaddr *addr, socklen_t addrl... function __wrap_shutdown (line 30) | int __wrap_shutdown(int socket, int how) { return 0; } function __wrap_listen (line 32) | ssize_t __wrap_listen(int fd, void *buf, size_t bytes) { return 0; } function __wrap_setsockopt (line 34) | int __wrap_setsockopt(int fd, int level, int optname, const void *optval, function __wrap_chmod (line 39) | int __wrap_chmod(const char *pathname, mode_t mode){ function __wrap_chown (line 43) | int __wrap_chown(const char *pathname, uid_t owner, gid_t group){ type passwd (line 47) | struct passwd type group (line 48) | struct group type passwd (line 50) | struct passwd type group (line 55) | struct group FILE: projects/nimbus-jwt/nimbus-jwt-fuzzer/src/main/java/com/nimbusds/jwt/JWTParserFuzzer.java class JWTParserFuzzer (line 24) | public class JWTParserFuzzer { method JWTParserFuzzer (line 28) | public JWTParserFuzzer(FuzzedDataProvider fuzzedDataProvider) throws E... method test (line 32) | void test() { method fuzzerTestOneInput (line 42) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/nodejs/add_fuzzers_to_node_gyp.go function createGypTargetEntry (line 122) | func createGypTargetEntry(fuzzerName string) string { function main (line 128) | func main() { FILE: projects/nodejs/fuzz_sources/fuzz_ClientHelloParser.cc function LLVMFuzzerTestOneInput (line 18) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_blob.cc function LLVMFuzzerTestOneInput (line 31) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_buffer_compare.cc function LLVMFuzzerTestOneInput (line 22) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_buffer_equals.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_buffer_includes.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_cipheriv.cc function LLVMFuzzerTestOneInput (line 65) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_common.cc type fuzz (line 36) | namespace fuzz { function OnePump (line 59) | static inline bool OnePump(v8::Isolate* isolate, function DrainUntilIdle (line 71) | static inline void DrainUntilIdle(v8::Isolate* isolate, function BuildBufCmpOnce (line 84) | static void BuildBufCmpOnce() { function GlobalShutdown (line 111) | void GlobalShutdown() { function InitializePersistentEnvOnce (line 154) | static void InitializePersistentEnvOnce() { function RunEnvString (line 235) | void RunEnvString(v8::Isolate* /*unused*/, function RunInEnvironment (line 260) | void RunInEnvironment(v8::Isolate* /*unused*/, FILE: projects/nodejs/fuzz_sources/fuzz_common.h function namespace (line 28) | namespace fuzz { FILE: projects/nodejs/fuzz_sources/fuzz_createPrivateKeyDER.cc function LLVMFuzzerTestOneInput (line 31) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_createPrivateKeyJWK.cc function LLVMFuzzerTestOneInput (line 31) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_createPrivateKeyPEM.cc function LLVMFuzzerTestOneInput (line 31) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_diffieHellmanDER.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_diffieHellmanJWK.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_diffieHellmanPEM.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_fs_write_open_read.cc function LLVMFuzzerTestOneInput (line 43) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_fs_write_read_append.cc function LLVMFuzzerTestOneInput (line 22) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_httpparser1.cc function LLVMFuzzerTestOneInput (line 43) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_js_format.h function ReplaceAll_ (line 21) | inline void ReplaceAll_(std::string& s, std::string_view from, std::stri... function string (line 31) | string FormatJs(std::string_view tmpl, const StrLike&... vals) { function std (line 42) | inline std::string ToSingleQuotedJsLiteral(std::string_view s) { FILE: projects/nodejs/fuzz_sources/fuzz_js_precompiled.h function namespace (line 19) | namespace fuzz::precompiled { FILE: projects/nodejs/fuzz_sources/fuzz_path_basename.cc function LLVMFuzzerTestOneInput (line 26) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_path_dirname.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_path_extname.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_path_format.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_path_isAbsolute.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_path_join.cc function LLVMFuzzerTestOneInput (line 30) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_path_normalize.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_path_parse.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_path_relative.cc function LLVMFuzzerTestOneInput (line 24) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_path_resolve.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_path_toNamespacedPath.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_querystring_parse.cc function LLVMFuzzerTestOneInput (line 32) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_quic_token.cc function LLVMFuzzerTestOneInput (line 24) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_sign_verify.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_stream1.cc function LLVMFuzzerTestOneInput (line 34) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_string_decoder.cc function LLVMFuzzerTestOneInput (line 33) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_strings.cc function DrainLastException (line 40) | static inline void DrainLastException(napi_env env) { function free_string (line 50) | static void free_string(node_api_nogc_env /*env*/, void* data, void* /*h... function napi_value (line 58) | static napi_value CaptureEnvInit(napi_env env, napi_value exports) { function LLVMFuzzerTestOneInput (line 63) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_tls_socket_request.cc function LLVMFuzzerTestOneInput (line 100) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_v8_deserialize.cc function LLVMFuzzerTestOneInput (line 31) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_x509.cc function LLVMFuzzerTestOneInput (line 36) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_zlib_brotliCompress.cc function LLVMFuzzerTestOneInput (line 30) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_zlib_brotliDecompress.cc function LLVMFuzzerTestOneInput (line 30) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_zlib_createBrotliDecompress.cc function LLVMFuzzerTestOneInput (line 35) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/nodejs/fuzz_sources/fuzz_zlib_gzip_createUnzip.cc function LLVMFuzzerTestOneInput (line 36) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/ntlm-auth/fuzz_ntlm_auth.py function fuzz_hash (line 24) | def fuzz_hash(data): function fuzz_compute_response (line 30) | def fuzz_compute_response(data): function fuzz_compute_keys (line 46) | def fuzz_compute_keys(data): function TestOneInput (line 63) | def TestOneInput(data): function main (line 69) | def main(): FILE: projects/ntlm2/fuzz_auth.py class ServerThread (line 26) | class ServerThread(Thread): method __init__ (line 27) | def __init__(self, fdp): method run (line 37) | def run(self): function TestInput (line 47) | def TestInput(data): function main (line 65) | def main(): FILE: projects/ntlm2/fuzz_core.py function TestInput (line 21) | def TestInput(data): function main (line 27) | def main(): FILE: projects/ntpsec/fuzz/FuzzClient.c type peer (line 21) | struct peer function LLVMFuzzerTestOneInput (line 23) | extern int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {//n... FILE: projects/ntpsec/fuzz/FuzzExtens.c function LLVMFuzzerTestOneInput (line 22) | extern int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {//n... FILE: projects/ntpsec/fuzz/FuzzServer.c function LLVMFuzzerTestOneInput (line 21) | extern int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {//n... FILE: projects/ntpsec/fuzz/setup.c type peer (line 23) | struct peer type peer (line 25) | struct peer type peer (line 26) | struct peer function dns_take_server (line 28) | void dns_take_server(struct peer *a, sockaddr_u *b) { function dns_take_status (line 34) | void dns_take_status(struct peer *a, DNS_Status b) { FILE: projects/numexpr/fuzz_numexpr.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 33) | def main(): FILE: projects/numpy/fuzz_binary_loader.py function TestOneInput (line 26) | def TestOneInput(input_bytes): function main (line 50) | def main(): FILE: projects/numpy/fuzz_datetime.py function TestOneInput (line 23) | def TestOneInput(input_bytes): function main (line 33) | def main(): FILE: projects/numpy/fuzz_dtype.py function TestOneInput (line 23) | def TestOneInput(input_bytes): function main (line 35) | def main(): FILE: projects/numpy/fuzz_fromfile_loader.py function TestOneInput (line 26) | def TestOneInput(input_bytes): function main (line 44) | def main(): FILE: projects/numpy/fuzz_fromregex_loader.py function TestOneInput (line 27) | def TestOneInput(input_bytes): function main (line 60) | def main(): FILE: projects/numpy/fuzz_loader.py function get_fuzz_types (line 23) | def get_fuzz_types(): function TestOneInput (line 40) | def TestOneInput(fuzz_data): function main (line 59) | def main(): FILE: projects/oauth2/fuzz_helpers.py function TestInput (line 22) | def TestInput(data): function main (line 80) | def main(): FILE: projects/oauthlib/fuzz_oauth1_sig.py class FuzzMockRequest (line 25) | class FuzzMockRequest: method __init__ (line 26) | def __init__( function TestOneInput (line 39) | def TestOneInput(data): function main (line 65) | def main(): FILE: projects/ogre/image_fuzz.cpp function LLVMFuzzerTestOneInput (line 33) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ogre/stream_fuzz.cpp function LLVMFuzzerTestOneInput (line 30) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ohc/OhcFuzzer.java class OhcFuzzer (line 28) | public class OhcFuzzer { method fuzzerTestOneInput (line 29) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class CacheSerializerImpl (line 116) | private static class CacheSerializerImpl implements CacheSerializer int: FILE: projects/pygments/fuzz_lexers.py function TestOneInput (line 34) | def TestOneInput(data: bytes) -> int: FILE: projects/pyjson5/fuzz_json.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 30) | def main(): FILE: projects/pyjwt/fuzz_jwt.py function test_decoding (line 25) | def test_decoding(data): function test_roundtrip (line 35) | def test_roundtrip(data): function TestOneInput (line 55) | def TestOneInput(data): function main (line 60) | def main(): FILE: projects/pymysql/fuzz_connection.py function SetFuzzedInput (line 30) | def SetFuzzedInput(input_bytes): class ServerThread (line 34) | class ServerThread(threading.Thread): method __init__ (line 35) | def __init__(self): method run (line 43) | def run(self): function TestOneInput (line 59) | def TestOneInput(data): function main (line 89) | def main(): FILE: projects/pynacl/fuzz_hash.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 43) | def main(): FILE: projects/pynacl/fuzz_signing.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/pyodbc/fake_odbc_driver.c function SQLRETURN (line 17) | SQLRETURN SQLAllocHandle(SQLSMALLINT a1, SQLHANDLE a2, SQLHANDLE *a3) { function SQLRETURN (line 21) | SQLRETURN function SQLRETURN (line 29) | SQLRETURN SQLSetConnectAttr(SQLHDBC ConnectionHandle, SQLINTEGER Attribute, function SQLRETURN (line 34) | SQLRETURN SQL_API SQLExecDirectW(SQLHSTMT hstmt, SQLWCHAR *szSqlStr, function SQLRETURN (line 39) | SQLRETURN SQL_API SQLRowCount(SQLHSTMT StatementHandle, SQLLEN *RowCount) { function SQLRETURN (line 43) | SQLRETURN SQL_API SQLNumResultCols(SQLHSTMT StatementHandle, FILE: projects/pyodbc/fuzz_curs_exec.py function fuzz_exec (line 22) | def fuzz_exec(data): function TestOneInput (line 41) | def TestOneInput(data): function main (line 48) | def main(): FILE: projects/pyparsing/fuzz_parse.py function dict_parse_generator (line 30) | def dict_parse_generator(fdp): function TestOneInput (line 57) | def TestOneInput(data): function main (line 77) | def main(): FILE: projects/pyrsistent/fuzz_vector.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 54) | def main(): FILE: projects/pytables/fuzz_file.py function TestOneInput (line 26) | def TestOneInput(data): function main (line 45) | def main(): FILE: projects/pytables/fuzz_file_extended.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 52) | def main(): FILE: projects/pytest-py/fuzz_source.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 31) | def main(): FILE: projects/python-ecdsa/fuzz_ecdsa.py function target1 (line 22) | def target1(fdp): function target2 (line 41) | def target2(fdp): function TestOneInput (line 46) | def TestOneInput(data): function main (line 56) | def main(): FILE: projects/python-ecdsa/fuzz_eddsa.py function target1 (line 23) | def target1(fdp): function target2 (line 32) | def target2(fdp): function TestOneInput (line 43) | def TestOneInput(data): function main (line 53) | def main(): FILE: projects/python-ecdsa/fuzz_keys.py function target1 (line 25) | def target1(fdp): function target2 (line 32) | def target2(fdp): function target3 (line 42) | def target3(fdp): function target4 (line 54) | def target4(fdp): function target5 (line 66) | def target5(fdp): function target6 (line 81) | def target6(fdp): function target7 (line 89) | def target7(fdp): function target8 (line 97) | def target8(fdp): function target9 (line 106) | def target9(fdp): function TestOneInput (line 113) | def TestOneInput(data): function main (line 131) | def main(): FILE: projects/python-email-validator/fuzz_validator.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 30) | def main(): FILE: projects/python-fastjsonschema/fuzz_compile.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 35) | def main(): FILE: projects/python-future/fuzz_future_email.py function TestOneInput (line 26) | def TestOneInput(data): function main (line 32) | def main(): FILE: projects/python-future/fuzz_future_htmlparser.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 35) | def main(): FILE: projects/python-future/fuzz_future_urllib.py function TestOneInput (line 26) | def TestOneInput(data): function main (line 44) | def main(): FILE: projects/python-future/fuzz_past.py function fuzz_dict (line 27) | def fuzz_dict(data): function fuzz_str (line 44) | def fuzz_str(data): function TestOneInput (line 50) | def TestOneInput(data): function main (line 55) | def main(): FILE: projects/python-graphviz/fuzz_graph.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 37) | def main(): FILE: projects/python-hyperlink/fuzz_host.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 30) | def main(): FILE: projects/python-hyperlink/fuzz_parse.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/python-jose/fuzz_jwe.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/python-jose/fuzz_jws.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 35) | def main(): FILE: projects/python-lz4/fuzz_lz4.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 27) | def main(): FILE: projects/python-markdown/fuzz_convert.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 32) | def main(): FILE: projects/python-markdownify/fuzz_convert.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 33) | def main(): FILE: projects/python-nameparser/fuzz_fullname.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 38) | def main(): FILE: projects/python-nvd3/fuzz_linechart.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 75) | def main(): FILE: projects/python-pathspec/fuzz_pathspec.py function test_raw (line 21) | def test_raw(data): function test_git (line 34) | def test_git(data): function TestOneInput (line 49) | def TestOneInput(data): function main (line 54) | def main(): FILE: projects/python-prompt-toolkit/fuzz_contrib.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 37) | def main(): FILE: projects/python-prompt-toolkit/fuzz_formatted_text.py function fuzz_html (line 21) | def fuzz_html(data): function fuzz_ansi (line 31) | def fuzz_ansi(data): function TestOneInput (line 38) | def TestOneInput(data): function main (line 43) | def main(): FILE: projects/python-pypdf/fuzz_encryption.py function TestInputOne (line 25) | def TestInputOne(data): FILE: projects/python-rison/fuzz_decode.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 40) | def main(): FILE: projects/python-rison/fuzz_roundtrip.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 38) | def main(): FILE: projects/python-rsa/fuzz_roundtrip.py function TestOneInput (line 23) | def TestOneInput(input_bytes): function main (line 41) | def main(): FILE: projects/python-tabulate/fuzz_tabulate.py function ConsumeListofLists (line 23) | def ConsumeListofLists(fdp): function ConsumeDictionary (line 31) | def ConsumeDictionary(fdp): function ConsumeNestedDictionary (line 40) | def ConsumeNestedDictionary(fdp): function ConsumeDictionaryWithList (line 55) | def ConsumeDictionaryWithList(fdp): function TestOneInput (line 65) | def TestOneInput(data): function main (line 121) | def main(): FILE: projects/python3-openid/fuzz_html_parse.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 30) | def main(): FILE: projects/pytz/fuzz_pytz.py function TestOneInput (line 25) | def TestOneInput(data): function main (line 48) | def main(): FILE: projects/pyxdg/fuzz_desktop_entry.py function TestOneInput (line 25) | def TestOneInput(input_bytes): function main (line 42) | def main(): FILE: projects/pyxdg/fuzz_icon.py function TestOneInput (line 26) | def TestOneInput(input_bytes): function main (line 44) | def main(): FILE: projects/pyxdg/fuzz_menu.py function verify_xml (line 29) | def verify_xml(data): function TestOneInput (line 40) | def TestOneInput(input_bytes): function main (line 60) | def main(): FILE: projects/pyxdg/fuzz_mime.py function TestOneInput (line 25) | def TestOneInput(input_bytes): function main (line 73) | def main(): FILE: projects/pyyaml/fuzz_emitter.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 39) | def main(): FILE: projects/pyyaml/fuzz_loader.py function TestOneInput (line 26) | def TestOneInput(input_bytes): function main (line 46) | def main(): FILE: projects/pyyaml/fuzz_reader.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 36) | def main(): FILE: projects/pyzmq/fuzz_frame.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 28) | def main(): FILE: projects/qdox/project-parent/fuzz-targets/src/test/java/com/example/JavaProjectBuilderFuzzer.java class JavaProjectBuilderFuzzer (line 29) | class JavaProjectBuilderFuzzer { method myFuzzTest (line 30) | @FuzzTest FILE: projects/quartz/CronScheduleBuilderFuzzer.java class CronScheduleBuilderFuzzer (line 25) | public class CronScheduleBuilderFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/radvd/fuzz_config.c function dlog (line 40) | void dlog(int level, int flevel, char const *fmt, ...) {} function flog (line 41) | void flog(int level, char const *fmt, ...) {} function set_debuglevel (line 42) | void set_debuglevel(int level) {} function get_debuglevel (line 43) | int get_debuglevel(void) { return 0; } type Interface (line 46) | struct Interface function LLVMFuzzerTestOneInput (line 48) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/radvd/fuzz_process.c function dlog (line 36) | void dlog(int level, int flevel, char const *fmt, ...) {} function flog (line 37) | void flog(int level, char const *fmt, ...) {} function get_debuglevel (line 38) | int get_debuglevel(void) { return 0; } function set_debuglevel (line 40) | void set_debuglevel(int level) {} function LLVMFuzzerTestOneInput (line 42) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/rapidjson/fuzzer.cpp function fuzzWithFlags (line 26) | void fuzzWithFlags(const std::string &s) function LLVMFuzzerTestOneInput (line 47) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) FILE: projects/rdf4j/ParserFuzzer.java class ParserFuzzer (line 25) | public class ParserFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/redis-py/fuzz_backoff.py function TestInput (line 21) | def TestInput(data): function main (line 48) | def main(): FILE: projects/redis-py/fuzz_encoder.py function TestInput (line 21) | def TestInput(data): function main (line 37) | def main(): FILE: projects/redis-py/fuzz_func.py function dummy_callback (line 21) | def dummy_callback(obj): function TestInput (line 24) | def TestInput(data): function main (line 91) | def main(): FILE: projects/redis-py/fuzz_helper.py function TestInput (line 21) | def TestInput(data): function main (line 74) | def main(): FILE: projects/redis-py/fuzz_util.py function TestInput (line 21) | def TestInput(data): function main (line 40) | def main(): FILE: projects/redux/fuzz.js function ignoredError (line 143) | function ignoredError(error) { function loggerMiddleware (line 149) | function loggerMiddleware(_store) { FILE: projects/reflections/ConfigurationBuilderFuzzer.java class ConfigurationBuilderFuzzer (line 23) | public class ConfigurationBuilderFuzzer { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/reflections/FilterBuilderFuzzer.java class FilterBuilderFuzzer (line 20) | public class FilterBuilderFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/reload4j/src/main/java/ossfuzz/LoggerFuzzer.java class LoggerFuzzer (line 7) | public class LoggerFuzzer { method LoggerFuzzer (line 15) | LoggerFuzzer(FuzzedDataProvider fuzzedDataProvider) { method test (line 39) | void test() { method fuzzerTestOneInput (line 62) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/reload4j/src/main/java/ossfuzz/MyAppender.java class MyAppender (line 6) | public class MyAppender extends AppenderSkeleton { method MyAppender (line 7) | public MyAppender() { method append (line 10) | @Override method close (line 14) | @Override method requiresLayout (line 22) | @Override FILE: projects/requests/fuzz_requests.py function is_expected_error (line 33) | def is_expected_error(error_content_list, error_msg): function TestOneInput (line 40) | def TestOneInput(data): function main (line 128) | def main(): FILE: projects/retrofit/PathTraversalFuzzer.java class PathTraversalFuzzer (line 32) | public class PathTraversalFuzzer { method fuzzerTestOneInput (line 33) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/retrofit/RequestFuzzer.java class RequestFuzzer (line 35) | public class RequestFuzzer { type CallMethod (line 36) | interface CallMethod { method postRequestBody (line 37) | @POST("/") method fuzzerTestOneInput (line 41) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/retry/fuzz_retry.py class TestingError (line 24) | class TestingError(Exception): method __init__ (line 25) | def __init__(self, message): function error_method (line 28) | def error_method(): function TestInput (line 39) | def TestInput(data): function main (line 81) | def main(): FILE: projects/rfc3967/fuzz_rfc3986.py function fuzz_parseresult (line 21) | def fuzz_parseresult(data): function fuzz_normalizers (line 35) | def fuzz_normalizers(data): function fuzz_uri (line 43) | def fuzz_uri(data): function fuzz_iri (line 51) | def fuzz_iri(data): function fuzz_api (line 57) | def fuzz_api(data): function fuzz_validators (line 66) | def fuzz_validators(data): function TestOneInput (line 101) | def TestOneInput(data): function main (line 110) | def main(): FILE: projects/rhino/src/main/java/ossfuzz/ParserFuzzer.java class ParserFuzzer (line 23) | public class ParserFuzzer { method ParserFuzzer (line 27) | public ParserFuzzer(FuzzedDataProvider fuzzedDataProvider) { method test (line 33) | void test() throws IOException { method fuzzerTestOneInput (line 46) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/rich/fuzz_markdown.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 31) | def main(): FILE: projects/roaring-bitmap/RoaringBitmapFuzzer.java class RoaringBitmapFuzzer (line 27) | public class RoaringBitmapFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/rome/XmlReaderFuzzer.java class XmlReaderFuzzer (line 27) | public class XmlReaderFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/ruby/fuzz_array.cpp function VALUE (line 41) | static VALUE call_array_aref(VALUE args) { function VALUE (line 46) | static VALUE call_array_aset(VALUE args) { function VALUE (line 52) | static VALUE call_array_concat(VALUE args) { function VALUE (line 57) | static VALUE call_array_plus(VALUE args) { function VALUE (line 62) | static VALUE call_array_minus(VALUE args) { function VALUE (line 67) | static VALUE call_array_and(VALUE args) { function VALUE (line 72) | static VALUE call_array_or(VALUE args) { function VALUE (line 77) | static VALUE call_array_flatten(VALUE args) { function VALUE (line 82) | static VALUE call_array_compact(VALUE ary) { function VALUE (line 86) | static VALUE call_array_uniq(VALUE ary) { function VALUE (line 90) | static VALUE call_array_rotate(VALUE args) { function VALUE (line 95) | static VALUE call_array_sample(VALUE ary) { function VALUE (line 99) | static VALUE call_array_fetch(VALUE args) { function LLVMFuzzerTestOneInput (line 104) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ruby/fuzz_bignum.cpp function LLVMFuzzerTestOneInput (line 38) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ruby/fuzz_hash.cpp function VALUE (line 39) | static VALUE call_hash_aref(VALUE args) { function VALUE (line 44) | static VALUE call_hash_aset(VALUE args) { function VALUE (line 49) | static VALUE call_hash_delete(VALUE args) { function VALUE (line 54) | static VALUE call_hash_rehash(VALUE hash) { function VALUE (line 58) | static VALUE call_hash_clear(VALUE hash) { function VALUE (line 62) | static VALUE call_hash_merge(VALUE args) { function VALUE (line 67) | static VALUE call_hash_update(VALUE args) { function VALUE (line 72) | static VALUE call_hash_invert(VALUE hash) { function VALUE (line 76) | static VALUE call_hash_to_a(VALUE hash) { function VALUE (line 80) | static VALUE call_hash_shift(VALUE hash) { function VALUE (line 84) | static VALUE call_hash_compare_by_id(VALUE hash) { function VALUE (line 88) | static VALUE call_hash_flatten(VALUE args) { function VALUE (line 93) | static VALUE call_hash_fetch(VALUE args) { function LLVMFuzzerTestOneInput (line 98) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ruby/fuzz_iseq.cpp function VALUE (line 27) | static VALUE call_iseq_load_from_binary(VALUE arg) { function LLVMFuzzerTestOneInput (line 48) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ruby/fuzz_json.c function VALUE (line 32) | static VALUE json_fuzzer_parse(VALUE json_str) { function VALUE (line 49) | static VALUE call_json_parse(VALUE arg) { function LLVMFuzzerTestOneInput (line 67) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ruby/fuzz_pack.cpp function VALUE (line 38) | static VALUE call_array_pack(VALUE arg) { function VALUE (line 57) | static VALUE call_string_unpack(VALUE arg) { function LLVMFuzzerTestOneInput (line 77) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ruby/fuzz_prism.cpp function LLVMFuzzerTestOneInput (line 29) | int FILE: projects/ruby/fuzz_regex.cpp function VALUE (line 44) | static VALUE call_regex_match(VALUE args) { function VALUE (line 50) | static VALUE call_regex_match_op(VALUE args) { function VALUE (line 56) | static VALUE call_regex_scan(VALUE args) { function VALUE (line 62) | static VALUE call_regex_gsub(VALUE args) { function LLVMFuzzerTestOneInput (line 67) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/ruby/fuzz_ruby_parser.cpp function VALUE (line 35) | static VALUE function LLVMFuzzerTestOneInput (line 46) | int FILE: projects/ruby/fuzz_string.cpp function VALUE (line 24) | static VALUE call_str_dump(VALUE str) { return rb_str_dump(str); } function VALUE (line 25) | static VALUE call_str_inspect(VALUE str) { return rb_str_inspect(str); } function VALUE (line 26) | static VALUE call_str_length(VALUE str) { return rb_str_length(str); } function LLVMFuzzerTestOneInput (line 28) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/rxjava/src/main/java/ossfuzz/IntegerObserver.java class IntegerObserver (line 24) | public class IntegerObserver implements io.reactivex.rxjava3.core.Observ... method IntegerObserver (line 27) | public IntegerObserver() { method onComplete (line 31) | public void onComplete() { method onError (line 34) | public void onError(Throwable e) { method onNext (line 37) | public void onNext(Integer t) { method onSubscribe (line 41) | public void onSubscribe(Disposable d) { method getArrayList (line 44) | public ArrayList getArrayList() { FILE: projects/rxjava/src/main/java/ossfuzz/ObservableFuzzer.java class ObservableFuzzer (line 24) | public class ObservableFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/s2geometry/s2_fuzzer.cc function SplitString (line 31) | static std::vector SplitString(absl::string_view str, function isValidFormat (line 55) | bool isValidFormat(char *nt_string, size_t size) { function LLVMFuzzerTestOneInput (line 79) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/sacremoses/fuzz_detokenize.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 33) | def main(): FILE: projects/sacremoses/fuzz_normalizer.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/sacremoses/fuzz_split_xml.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/sacremoses/fuzz_tokenizer.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/scapy/pcap_fuzzer.py function TestOneInput (line 28) | def TestOneInput(input_bytes): function main (line 36) | def main(): FILE: projects/scikit-learn/fuzz_preprocessing_encoders.py function get_random_arr (line 24) | def get_random_arr(fdp): function TestOneInput (line 37) | def TestOneInput(data): function main (line 63) | def main(): FILE: projects/scipy/fuzz_io_mio5.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 34) | def main(): FILE: projects/scipy/fuzz_io_wavfile.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 35) | def main(): FILE: projects/sentencepiece/sample_encode_fuzzer.cc function LLVMFuzzerTestOneInput (line 24) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/serde_urlencoded/fuzz/fuzz_targets/reverse_roundtrip.rs type PlainEnum (line 28) | enum PlainEnum { type Enum (line 36) | enum Enum { type UnitStruct (line 46) | struct UnitStruct; type BasicStruct (line 49) | struct BasicStruct { type PairKey (line 53) | type PairKey = u64; type Data (line 56) | struct Data { function round_trip (line 109) | fn round_trip(val: T, check_equality: bool) FILE: projects/serde_urlencoded/fuzz/fuzz_targets/roundtrip.rs type PlainEnum (line 24) | enum PlainEnum { type Enum (line 32) | enum Enum { type FloatEnum (line 42) | enum FloatEnum { type TupleStruct (line 48) | struct TupleStruct(i32, String, i64); type Struct (line 51) | struct Struct { type FloatStruct (line 59) | struct FloatStruct { FILE: projects/servo-core/MonitorConfigFuzzer.java class MonitorConfigFuzzer (line 8) | public class MonitorConfigFuzzer { method fuzzerTestOneInput (line 9) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/setuptools/fuzz_config_pyprojecttoml.py function TestOneInput (line 27) | def TestOneInput(data): function main (line 43) | def main(): FILE: projects/shaderc/glslc_fuzzer.cc function CreateTemporaryGLSLFile (line 25) | std::string CreateTemporaryGLSLFile(const std::string &shader_content) { function LLVMFuzzerTestOneInput (line 35) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/shaderc/shaderc_fdp_fuzzer.cc function LLVMFuzzerTestOneInput (line 87) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/shaderc/shaderc_fuzzer.cc function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/shaderc/shaderc_general_fuzzer.cc function execute_shaderc_routines (line 23) | static void execute_shaderc_routines(const uint8_t *data, size_t size, function LLVMFuzzerTestOneInput (line 78) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/sharp/fuzz.js function ignoredError (line 173) | function ignoredError(error) { function pickFromArray (line 188) | function pickFromArray(array) { FILE: projects/sigstore-python/fuzz_verify_artifact.py class NullPolicy (line 20) | class NullPolicy: method verify (line 21) | def verify(self, cert): function TestOneInput (line 24) | def TestOneInput(data): function main (line 38) | def main(): FILE: projects/simd/simd_load_fuzzer.cpp function LLVMFuzzerTestOneInput (line 19) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size){ FILE: projects/simplejson/fuzz_decode.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 33) | def main(): FILE: projects/simplejson/fuzz_encode.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 35) | def main(): FILE: projects/six/fuzz_six.py function TestOneInput (line 26) | def TestOneInput(data): function main (line 59) | def main(): FILE: projects/sketches-core/FdtSketchFuzzer.java class FdtSketchFuzzer (line 24) | public class FdtSketchFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/sketches-core/MurmurHash3AdaptorFuzzer.java class MurmurHash3AdaptorFuzzer (line 25) | public class MurmurHash3AdaptorFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/slf4j-api/LoggingFuzzer.java class LoggingFuzzer (line 22) | public class LoggingFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/smart_open/fuzz_bytebuffer.py function TestInput (line 22) | def TestInput(data): function main (line 39) | def main(): FILE: projects/smart_open/fuzz_func.py function _handle_file (line 23) | def _handle_file(file_obj, mode): function TestInput (line 26) | def TestInput(data): function main (line 32) | def main(): FILE: projects/smart_open/fuzz_util.py function TestInput (line 21) | def TestInput(data): function main (line 81) | def main(): FILE: projects/smart_open/fuzz_zip.py function TestInput (line 24) | def TestInput(data): function main (line 45) | def main(): FILE: projects/snakeyaml/DefaultYamlFuzzer.java class DefaultYamlFuzzer (line 24) | public class DefaultYamlFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/snakeyaml/SecureYamlFuzzer.java class SecureYamlFuzzer (line 24) | public class SecureYamlFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/snappy-java/BitShuffleFuzzer.java class BitShuffleFuzzer (line 25) | public class BitShuffleFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method fuzz_bitshuffle_ints (line 33) | static void fuzz_bitshuffle_ints(int[] original){ method fuzz_bitshuffle_longs (line 53) | static void fuzz_bitshuffle_longs(long[] original){ method fuzz_bitshuffle_shorts (line 73) | static void fuzz_bitshuffle_shorts(short[] original){ FILE: projects/snappy-java/SnappyStreamFuzzer.java class SnappyStreamFuzzer (line 29) | public class SnappyStreamFuzzer { method fuzzerTestOneInput (line 30) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/soupsieve/fuzz_closest.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 53) | def main(): FILE: projects/soupsieve/fuzz_filter.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 41) | def main(): FILE: projects/soupsieve/fuzz_match.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 54) | def main(): FILE: projects/soupsieve/fuzz_select.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 49) | def main(): FILE: projects/spatial4j/SpatialContextFuzzer.java class SpatialContextFuzzer (line 28) | public class SpatialContextFuzzer { method fuzzerTestOneInput (line 29) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spdk/parse_json_fuzzer.cc function LLVMFuzzerTestOneInput (line 22) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) FILE: projects/spdlog/fuzz/backtrace_fuzzer.cc function LLVMFuzzerTestOneInput (line 22) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/spdlog/fuzz/format_fuzzer.cc class my_formatter_flag (line 26) | class my_formatter_flag : public spdlog::custom_flag_formatter method format (line 30) | void format(const spdlog::details::log_msg &, const std::tm &, spdlog:... method clone (line 35) | std::unique_ptr clone() const override function LLVMFuzzerTestOneInput (line 41) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/spdlog/fuzz/levels_fuzzer.cc function LLVMFuzzerTestOneInput (line 24) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/spdlog/fuzz/log_fuzzer.cc function LLVMFuzzerTestOneInput (line 22) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/spdlog/fuzz/pattern_fuzzer.cc function LLVMFuzzerTestOneInput (line 22) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/spidermonkey-ufi/target.c function main (line 13) | int main(int argc, char* argv[]) { FILE: projects/spirv-cross/parser_fuzzer.cpp function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/spirv-tools/generate_spirv_corpus.py function list_spvasm_files (line 36) | def list_spvasm_files(root_search_dir): function main (line 43) | def main(): FILE: projects/spring-amqp/project-parent/fuzz-targets/src/test/java/com/example/AllowedListDeserializingMessageConverterFuzzer.java class AllowedListDeserializingMessageConverterFuzzer (line 34) | class AllowedListDeserializingMessageConverterFuzzer { method myFuzzTest (line 35) | @FuzzTest class DummyClass (line 241) | public static class DummyClass implements Serializable { FILE: projects/spring-boot/BasicJsonParserFuzzer.java class BasicJsonParserFuzzer (line 6) | public class BasicJsonParserFuzzer { method fuzzerTestOneInput (line 7) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-boot/ConfigurationMetadataRepositoryJsonBuilderFuzzer.java class ConfigurationMetadataRepositoryJsonBuilderFuzzer (line 19) | public class ConfigurationMetadataRepositoryJsonBuilderFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/spring-boot/JsonMarshallerFuzzer.java class JsonMarshallerFuzzer (line 26) | public class JsonMarshallerFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-boot/TokenFuzzer.java class TokenFuzzer (line 19) | public class TokenFuzzer { method fuzzerTestOneInput (line 20) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-cloud-commons/EncryptionIntegrationFuzzer.java class EncryptionIntegrationFuzzer (line 13) | public class EncryptionIntegrationFuzzer { method fuzzerTestOneInput (line 14) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-cloud-config/src/main/java/ossfuzz/ConfigServerPropertiesFuzzer.java class ConfigServerPropertiesFuzzer (line 23) | public class ConfigServerPropertiesFuzzer { method ConfigServerPropertiesFuzzer (line 27) | public ConfigServerPropertiesFuzzer(FuzzedDataProvider fuzzedDataProvi... method test (line 32) | void test() { method fuzzerTestOneInput (line 53) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/spring-cloud-config/src/main/java/ossfuzz/EnvironmentFuzzer.java class EnvironmentFuzzer (line 26) | public class EnvironmentFuzzer { method EnvironmentFuzzer (line 30) | public EnvironmentFuzzer( FuzzedDataProvider fuzzedDataProvider) { method test (line 35) | void test() method fuzzerTestOneInput (line 77) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/spring-cloud-netflix/src/main/java/org/springframework/cloud/netflix/eureka/config/HostnameBasedUrlRandomizerFuzzer.java class HostnameBasedUrlRandomizerFuzzer (line 24) | public class HostnameBasedUrlRandomizerFuzzer { method HostnameBasedUrlRandomizerFuzzer (line 28) | public HostnameBasedUrlRandomizerFuzzer(FuzzedDataProvider dataProvide... method getString (line 32) | public String getString() { method getStringArrayList (line 36) | public ArrayList getStringArrayList() { method test (line 45) | void test() { method fuzzerTestOneInput (line 50) | public static void fuzzerTestOneInput(FuzzedDataProvider dataProvider) { FILE: projects/spring-cloud-sleuth-brave/W3CPropagationFuzzer.java class W3CPropagationFuzzer (line 21) | public class W3CPropagationFuzzer { method fuzzerInitialize (line 24) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 33) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-cloud-stream/RabbitExchangeQueueProvisionerFuzzer.java class RabbitExchangeQueueProvisionerFuzzer (line 28) | public class RabbitExchangeQueueProvisionerFuzzer { method fuzzerTestOneInput (line 29) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class DummyConnection (line 63) | public class DummyConnection implements Connection { method createChannel (line 65) | @Override method close (line 70) | @Override method isOpen (line 75) | @Override method getLocalPort (line 80) | @Override method addBlockedListener (line 85) | @Override method removeBlockedListener (line 90) | @Override method getDelegate (line 95) | @Override class DummyConnectionFactory (line 101) | public class DummyConnectionFactory implements ConnectionFactory { method createConnection (line 103) | @Override method getHost (line 108) | @Override method getPort (line 113) | @Override method getVirtualHost (line 118) | @Override method getUsername (line 123) | @Override method addConnectionListener (line 128) | @Override method removeConnectionListener (line 133) | @Override method clearConnectionListeners (line 138) | @Override FILE: projects/spring-data-jpa/QueryUtilsFuzzer.java class QueryUtilsFuzzer (line 28) | public class QueryUtilsFuzzer { method fuzzerTestOneInput (line 32) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-data-keyvalue/KeyValueTemplateFuzzer.java class KeyValueTemplateFuzzer (line 42) | public class KeyValueTemplateFuzzer { method fuzzerTestOneInput (line 43) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class Foo (line 97) | @Data class Bar (line 105) | @Data class ClassWithStringId (line 112) | @Data class ClassWithTypeAlias (line 120) | @ExplicitKeySpace(name = "aliased") method ClassWithTypeAlias (line 128) | ClassWithTypeAlias(String name) { class SubclassOfAliasedType (line 133) | static class SubclassOfAliasedType extends ClassWithTypeAlias { method SubclassOfAliasedType (line 137) | SubclassOfAliasedType(String name) { FILE: projects/spring-data-mongodb/ParameterBindingJsonReaderFuzzer.java class ParameterBindingJsonReaderFuzzer (line 22) | public class ParameterBindingJsonReaderFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-data-redis/GenericJackson2JsonRedisSerializerFuzzer.java class GenericJackson2JsonRedisSerializerFuzzer (line 23) | public class GenericJackson2JsonRedisSerializerFuzzer { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-data-redis/RedisStringDeserializationFuzzer.java class RedisStringDeserializationFuzzer (line 22) | public class RedisStringDeserializationFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-data-redis/RedisStringSerializationFuzzer.java class RedisStringSerializationFuzzer (line 22) | public class RedisStringSerializationFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-framework/spring-aop/AspectJExpressionPointcutFuzzer.java class AspectJExpressionPointcutFuzzer (line 22) | public class AspectJExpressionPointcutFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-framework/spring-beans/BeanWrapperFuzzer.java class BeanWrapperFuzzer (line 24) | public class BeanWrapperFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class Bean (line 35) | public static class Bean { method getProp (line 55) | public String getProp() { method setProp (line 59) | public void setProp(String prop) { method getNested (line 63) | public Bean getNested() { method setNested (line 67) | public void setNested(Bean nested) { method getArray (line 71) | public Bean[] getArray() { method setArray (line 75) | public void setArray(Bean[] array) { method getMultiArray (line 79) | public Bean[][] getMultiArray() { method setMultiArray (line 83) | public void setMultiArray(Bean[][] multiArray) { method getThreeDimensionalArray (line 87) | public Bean[][][] getThreeDimensionalArray() { method setThreeDimensionalArray (line 91) | public void setThreeDimensionalArray(Bean[][][] threeDimensionalArra... method getList (line 95) | public List getList() { method setList (line 99) | public void setList(List list) { method getMultiList (line 103) | public List> getMultiList() { method setMultiList (line 107) | public void setMultiList(List> multiList) { method getListNotParameterized (line 111) | public List getListNotParameterized() { method setListNotParameterized (line 115) | public void setListNotParameterized(List listNotParameterized) { method getMap (line 119) | public Map getMap() { method setMap (line 123) | public void setMap(Map map) { FILE: projects/spring-framework/spring-context/XmlApplicationContextFuzzer.java class XmlApplicationContextFuzzer (line 26) | public class XmlApplicationContextFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-framework/spring-expression/SpelExpressionFuzzer.java class SpelExpressionFuzzer (line 26) | public class SpelExpressionFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class DummyClass (line 67) | public static class DummyClass { FILE: projects/spring-framework/spring-jdbc/DataAccessObject.java type DataAccessObject (line 21) | public interface DataAccessObject { method setDataSource (line 22) | public void setDataSource(DataSource ds); method create (line 23) | public void create(PersistentClass persistentClass); method remove (line 24) | public void remove(PersistentClass persistentClass); method update (line 25) | public void update(PersistentClass persistentClass); method listPersistentClasses (line 26) | public List listPersistentClasses(); FILE: projects/spring-framework/spring-jdbc/JdbcCoreMapperFuzzer.java class JdbcCoreMapperFuzzer (line 28) | public class JdbcCoreMapperFuzzer extends MapperFuzzerServer { method JdbcCoreMapperFuzzer (line 31) | JdbcCoreMapperFuzzer(FuzzedDataProvider data) { method containedIn (line 41) | boolean containedIn(PersistentClass needle, List hays... method verifyPersistentClasses (line 57) | void verifyPersistentClasses(List persistentClasses) { method persistData (line 70) | void persistData(Template template) { method updateData (line 84) | void updateData(Template template, FuzzedDataProvider data) { method removeData (line 96) | void removeData(Template template, FuzzedDataProvider data) { method runTests (line 105) | void runTests(FuzzedDataProvider data) { method fuzzerTestOneInput (line 122) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-framework/spring-jdbc/Mapper.java class Mapper (line 22) | public class Mapper implements RowMapper { method mapRow (line 23) | public PersistentClass mapRow(ResultSet rs, int rowNum) throws SQLExce... FILE: projects/spring-framework/spring-jdbc/MapperFuzzerServer.java class MapperFuzzerServer (line 22) | public class MapperFuzzerServer extends Server { method MapperFuzzerServer (line 24) | public MapperFuzzerServer(boolean verbose) { method prepareTables (line 28) | public void prepareTables() throws SQLException { FILE: projects/spring-framework/spring-jdbc/PersistentClass.java class PersistentClass (line 18) | public class PersistentClass { method PersistentClass (line 23) | public PersistentClass(Integer intMember, String stringMember, Integer... method PersistentClass (line 29) | public PersistentClass(Integer intMember, String stringMember) { method setId (line 34) | public void setId(Integer id) { method getId (line 37) | public Integer getId() { method setIntMember (line 40) | public void setIntMember(Integer value) { method getIntMember (line 43) | public Integer getIntMember() { method setStringMember (line 46) | public void setStringMember(String value) { method getStringMember (line 49) | public String getStringMember() { FILE: projects/spring-framework/spring-jdbc/Server.java class Server (line 28) | public abstract class Server extends org.hsqldb.server.Server implements... method Server (line 41) | public Server(boolean verbose, String databaseName) { method prepareTables (line 51) | public abstract void prepareTables() throws SQLException; method close (line 53) | public void close() throws Exception { method setVerbose (line 57) | protected void setVerbose(boolean verbose) { method stop (line 69) | public int stop() { method getConnection (line 81) | Connection getConnection(String options) throws SQLException { method getConnection (line 85) | Connection getConnection() throws SQLException { FILE: projects/spring-framework/spring-jdbc/Template.java class Template (line 22) | public class Template implements DataAccessObject { method setDataSource (line 26) | public void setDataSource(DataSource dataSource) { method create (line 30) | public void create(PersistentClass persistentClass) { method remove (line 33) | public void remove(PersistentClass persistentClass) { method update (line 36) | public void update(PersistentClass persistentClass) { method listPersistentClasses (line 39) | public List listPersistentClasses() { FILE: projects/spring-framework/spring-jms/SimpleJmsHeaderMapperFuzzer.java class SimpleJmsHeaderMapperFuzzer (line 26) | public class SimpleJmsHeaderMapperFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method addHeader (line 49) | private static void addHeader(MessageBuilder builder, FuzzedDa... class DummyMessage (line 61) | public static class DummyMessage implements TextMessage { method setText (line 63) | @Override method getText (line 68) | @Override method getJMSMessageID (line 73) | @Override method setJMSMessageID (line 78) | @Override method getJMSTimestamp (line 83) | @Override method setJMSTimestamp (line 88) | @Override method getJMSCorrelationIDAsBytes (line 93) | @Override method setJMSCorrelationIDAsBytes (line 98) | @Override method setJMSCorrelationID (line 103) | @Override method getJMSCorrelationID (line 108) | @Override method getJMSReplyTo (line 113) | @Override method setJMSReplyTo (line 118) | @Override method getJMSDestination (line 123) | @Override method setJMSDestination (line 128) | @Override method getJMSDeliveryMode (line 133) | @Override method setJMSDeliveryMode (line 138) | @Override method getJMSRedelivered (line 143) | @Override method setJMSRedelivered (line 148) | @Override method getJMSType (line 153) | @Override method setJMSType (line 158) | @Override method getJMSExpiration (line 163) | @Override method setJMSExpiration (line 168) | @Override method getJMSDeliveryTime (line 173) | @Override method setJMSDeliveryTime (line 178) | @Override method getJMSPriority (line 183) | @Override method setJMSPriority (line 188) | @Override method clearProperties (line 193) | @Override method propertyExists (line 198) | @Override method getBooleanProperty (line 203) | @Override method getByteProperty (line 208) | @Override method getShortProperty (line 213) | @Override method getIntProperty (line 218) | @Override method getLongProperty (line 223) | @Override method getFloatProperty (line 228) | @Override method getDoubleProperty (line 233) | @Override method getStringProperty (line 238) | @Override method getObjectProperty (line 243) | @Override method getPropertyNames (line 248) | @Override method setBooleanProperty (line 253) | @Override method setByteProperty (line 258) | @Override method setShortProperty (line 263) | @Override method setIntProperty (line 268) | @Override method setLongProperty (line 273) | @Override method setFloatProperty (line 278) | @Override method setDoubleProperty (line 283) | @Override method setStringProperty (line 288) | @Override method setObjectProperty (line 293) | @Override method acknowledge (line 298) | @Override method clearBody (line 303) | @Override method getBody (line 308) | @Override method isBodyAssignableTo (line 313) | @Override FILE: projects/spring-framework/spring-messaging/PayloadMethodArgumentResolverFuzzer.java class PayloadMethodArgumentResolverFuzzer (line 36) | public class PayloadMethodArgumentResolverFuzzer { method fuzzerTestOneInput (line 40) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class DummyClass (line 82) | public static class DummyClass { method foo (line 109) | public void foo(String dummy) {} FILE: projects/spring-framework/spring-oxm/XStreamMarshallerFuzzer.java class XStreamMarshallerFuzzer (line 27) | public class XStreamMarshallerFuzzer { method write (line 32) | @Override method fuzzerInitialize (line 36) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 41) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class DummyClass (line 72) | public static class DummyClass { method foo (line 99) | public void foo(String dummy) {} FILE: projects/spring-framework/spring-tx/TransactionAttributeSourceEditorFuzzer.java class TransactionAttributeSourceEditorFuzzer (line 23) | public class TransactionAttributeSourceEditorFuzzer { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-framework/spring-web/ContentDispositionFuzzer.java class ContentDispositionFuzzer (line 20) | public class ContentDispositionFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-framework/spring-web/CookieLocaleResolverFuzzer.java class CookieLocaleResolverFuzzer (line 26) | public class CookieLocaleResolverFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-framework/spring-webflux/BindStatusFuzzer.java class BindStatusFuzzer (line 42) | public class BindStatusFuzzer { method fuzzerTestOneInput (line 43) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class DummyMessage (line 70) | public static class DummyMessage implements MessageSource { method getMessage (line 72) | @Override method getMessage (line 77) | @Override method getMessage (line 82) | @Override class DummyWebExchange (line 89) | public static class DummyWebExchange implements ServerWebExchange { method getRequest (line 91) | @Override method getResponse (line 96) | @Override method getAttributes (line 101) | @Override method getSession (line 108) | @Override method getPrincipal (line 113) | @Override method getFormData (line 118) | @Override method getMultipartData (line 123) | @Override method getLocaleContext (line 128) | @Override method getApplicationContext (line 133) | @Override method isNotModified (line 138) | @Override method checkNotModified (line 143) | @Override method checkNotModified (line 148) | @Override method checkNotModified (line 153) | @Override method transformUrl (line 158) | @Override method addUrlTransformer (line 163) | @Override method getLogPrefix (line 168) | @Override FILE: projects/spring-framework/spring-websocket/StompSubProtocolHandlerFuzzer.java class StompSubProtocolHandlerFuzzer (line 27) | public class StompSubProtocolHandlerFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class DummyEventPublisher (line 66) | public static class DummyEventPublisher implements ApplicationEventPub... method publishEvent (line 68) | @Override FILE: projects/spring-integration/SimpleJsonSerializerFuzzer.java class SimpleJsonSerializerFuzzer (line 22) | public class SimpleJsonSerializerFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-ldap/LdapQueryBuilderFuzzer.java class LdapQueryBuilderFuzzer (line 27) | public class LdapQueryBuilderFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-retry/PatternMatcher_match_Fuzzer.java class PatternMatcher_match_Fuzzer (line 25) | public class PatternMatcher_match_Fuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-security/BCryptPasswordEncoderFuzzer.java class BCryptPasswordEncoderFuzzer (line 22) | public class BCryptPasswordEncoderFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-security/BindAuthenticatorFuzzer.java class BindAuthenticatorFuzzer (line 38) | public class BindAuthenticatorFuzzer { method fuzzerTearDown (line 41) | public static void fuzzerTearDown() { method fuzzerTestOneInput (line 47) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method createInMemoryLdapServer (line 82) | private static void createInMemoryLdapServer() { FILE: projects/spring-security/EncodingUtilsConcatenateFuzzer.java class EncodingUtilsConcatenateFuzzer (line 21) | public class EncodingUtilsConcatenateFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method getArrayOfByteArrays (line 34) | private static byte[][] getArrayOfByteArrays(FuzzedDataProvider data) { FILE: projects/spring-security/HexFuzzer.java class HexFuzzer (line 23) | public class HexFuzzer { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(byte[] data) { FILE: projects/spring-security/InMemoryUserDetailsManagerChangePasswordFuzzer.java class InMemoryUserDetailsManagerChangePasswordFuzzer (line 32) | public class InMemoryUserDetailsManagerChangePasswordFuzzer { method fuzzerTestOneInput (line 40) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method fuzzerTearDown (line 76) | public static void fuzzerTearDown() { FILE: projects/spring-security/StrictHttpFirewallFuzzer.java class StrictHttpFirewallFuzzer (line 35) | public class StrictHttpFirewallFuzzer { method fuzzerTestOneInput (line 38) | public static void fuzzerTestOneInput(FuzzedDataProvider data) throws ... method validate (line 129) | private static void validate(String value) { FILE: projects/spring-security/Utf8Fuzzer.java class Utf8Fuzzer (line 24) | public class Utf8Fuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-security/acl/AclFormattingUtilsFuzzer.java class AclFormattingUtilsFuzzer (line 23) | public class AclFormattingUtilsFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-security/oauth2-client/ClientRegistrationFuzzer.java class ClientRegistrationFuzzer (line 31) | public class ClientRegistrationFuzzer { method fuzzerTestOneInput (line 33) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-security/oauth2-core/OAuth2AccessTokenFuzzer.java class OAuth2AccessTokenFuzzer (line 26) | public class OAuth2AccessTokenFuzzer { method fuzzerTestOneInput (line 32) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-security/oauth2-jose/NimbusJwtEncoderFuzzer.java class NimbusJwtEncoderFuzzer (line 42) | public class NimbusJwtEncoderFuzzer { method fuzzerTestOneInput (line 45) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method jwtClaimsSet (line 72) | public static JwtClaimsSet.Builder jwtClaimsSet() { class MockJwk (line 89) | private static final class MockJwk extends JWK{ method MockJwk (line 91) | protected MockJwk(KeyType kty, String kid, String x5t256) { method getRequiredParams (line 96) | @Override method isPrivate (line 102) | @Override method toPublicJWK (line 108) | @Override method size (line 114) | @Override method toRevokedJWK (line 120) | @Override FILE: projects/spring-shell/core/CommandParserFuzzer.java class CommandParserFuzzer (line 28) | public class CommandParserFuzzer { method fuzzerTestOneInput (line 30) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-shell/standard/BashCompletionsFuzzer.java class BashCompletionsFuzzer (line 25) | public class BashCompletionsFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-shell/table/TableFuzzer.java class TableFuzzer (line 26) | public class TableFuzzer { method fuzzerTestOneInput (line 28) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/spring-webflow/DefaultConversionServiceFuzzer.java class DefaultConversionServiceFuzzer (line 36) | public class DefaultConversionServiceFuzzer { method fuzzerTestOneInput (line 40) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/sql-parser/fuzz_sql_parse.cpp function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/sqlalchemy-utils/fuzz_db.py function TestInput (line 35) | def TestInput(data): function main (line 66) | def main(): FILE: projects/sqlalchemy-utils/fuzz_orm.py class FuzzTable (line 28) | class FuzzTable(Base): function TestInput (line 35) | def TestInput(data): function main (line 63) | def main(): FILE: projects/sqlalchemy-utils/fuzz_type.py function TestInput (line 46) | def TestInput(data): function main (line 111) | def main(): FILE: projects/sqlalchemy/sqlalchemy_fuzzer.py function TestOneInput (line 27) | def TestOneInput(input_bytes): function main (line 46) | def main(): FILE: projects/sqlalchemy_jsonfield/fuzz_basic.py function TestInput (line 28) | def TestInput(data): function main (line 50) | def main(): FILE: projects/sqlite-jdbc/SqliteConnectionFuzzer.java class SqliteConnectionFuzzer (line 26) | public class SqliteConnectionFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/sqlparse/fuzz_format.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 30) | def main(): FILE: projects/sqlparse/fuzz_parse.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 29) | def main(): FILE: projects/stack_data/fuzz_source.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 37) | def main(): FILE: projects/starnix-netlink/fuzz/fuzz_targets/core_fuzzer.rs type FuzzInput (line 27) | struct FuzzInput { FILE: projects/starnix-netlink/fuzz/fuzz_targets/utils_fuzzer.rs type FuzzInput (line 26) | struct FuzzInput { FILE: projects/stax/stax-fuzzer/src/main/java/ossfuzz/XMLStreamReaderFuzzer.java class XMLStreamReaderFuzzer (line 28) | public class XMLStreamReaderFuzzer { method XMLStreamReaderFuzzer (line 32) | public XMLStreamReaderFuzzer(FuzzedDataProvider fuzzedDataProvider) th... method test (line 36) | void test() { method fuzzerTestOneInput (line 51) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/stringtemplate4/StringFuzzer.java class StringFuzzer (line 20) | public class StringFuzzer { method fuzzerTestOneInput (line 21) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/struts/struts2-fuzzer/fuzzer/src/main/java/org/apache/struts/test/StrutsSimpleRequestFuzzer.java class StrutsSimpleRequestFuzzer (line 27) | public class StrutsSimpleRequestFuzzer { method main (line 32) | public static void main(String args[]) { method fuzzerTestOneInput (line 36) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... method runTest (line 40) | public void runTest(String fuzzyString) { FILE: projects/struts/struts2-fuzzer/webapp/src/main/java/org/apache/struts/test/TestAction.java class TestAction (line 21) | public class TestAction extends ActionSupport { method execute (line 24) | public String execute() { method getSubject (line 28) | public String getSubject() { method setSubject (line 32) | public void setSubject(String subject) { FILE: projects/swagger-core/YamlFuzzer.java class YamlFuzzer (line 24) | public class YamlFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/tablesaw/project-parent/fuzz-targets/src/test/java/com/example/ReaderFuzzer.java class ReaderFuzzer (line 31) | class ReaderFuzzer { method myFuzzTest (line 32) | @FuzzTest FILE: projects/tensorflow-addons/fuzz_text_ops.py function fuzz_parse_time (line 32) | def fuzz_parse_time(data): function fuzz_skip_gram (line 50) | def fuzz_skip_gram(data): function TestOneInput (line 77) | def TestOneInput(data): function main (line 85) | def main(): FILE: projects/threetenbp/ThreetenbpFuzzer.java class ThreetenbpFuzzer (line 29) | public class ThreetenbpFuzzer { method fuzzerTestOneInput (line 30) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/tidb/fuzzMarshalJSON.go function FuzzUnmarshalJSON (line 19) | func FuzzUnmarshalJSON(data []byte) int { FILE: projects/tidb/fuzzNewBitLiteral.go function FuzzNewBitLiteral (line 19) | func FuzzNewBitLiteral(data []byte) int { FILE: projects/tidb/fuzzNewHexLiteral.go function FuzzNewHexLiteral (line 19) | func FuzzNewHexLiteral(data []byte) int { FILE: projects/tidy-html5/fuzzer_temp_file.h function fuzzer_release_tmpfile (line 57) | static void fuzzer_release_tmpfile(char* filename) { function class (line 67) | class FuzzerTemporaryFile { FILE: projects/tidy-html5/tidy_config_fuzzer.c function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/tidy-html5/tidy_fuzzer.c function run_tidy_parser (line 23) | void run_tidy_parser(TidyBuffer* data_buffer, function LLVMFuzzerTestOneInput (line 41) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/tidy-html5/tidy_general_fuzzer.c function set_option (line 74) | void set_option(const uint8_t** data, size_t *size, TidyDoc *tdoc, TidyO... function TidyXhtml (line 83) | int TidyXhtml(const uint8_t* data, size_t size, TidyBuffer* output, Tidy... function LLVMFuzzerTestOneInput (line 147) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/tidy-html5/tidy_parse_file_fuzzer.c function TidyXhtml (line 25) | int TidyXhtml(const uint8_t* data, size_t size, TidyBuffer* output, Tidy... function LLVMFuzzerTestOneInput (line 51) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/tidy-html5/tidy_parse_string_fuzzer.c function TidyXhtml (line 24) | int TidyXhtml(const char* input, TidyBuffer* output, TidyBuffer* errbuf) { function LLVMFuzzerTestOneInput (line 39) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/tidy-html5/tidy_xml_fuzzer.c function TidyXml (line 25) | void TidyXml(char *fuzz_inp, TidyBuffer *toutput, function LLVMFuzzerTestOneInput (line 49) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/tink-cc/tink_encrypt_decrypt_fuzzer.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size){ FILE: projects/tinycss2/fuzz_components.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 61) | def main(): FILE: projects/tinycss2/fuzz_parse.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 28) | def main(): FILE: projects/tinyxml2/xmltest.cpp function LLVMFuzzerTestOneInput (line 22) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/tinyxml2/xmltest2.cpp function LLVMFuzzerTestOneInput (line 26) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/tomcat/DecodeFuzzer.java class DecodeFuzzer (line 33) | public class DecodeFuzzer { method fuzzerTestOneInput (line 43) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/tomcat/EnDecodeFuzzer.java class EnDecodeFuzzer (line 35) | public class EnDecodeFuzzer { method fuzzerTestOneInput (line 45) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/tomcat/FileHandlerFuzzer.java class FileHandlerFuzzer (line 30) | public class FileHandlerFuzzer { method fuzzerTearDown (line 42) | public static void fuzzerTearDown() { method fuzzerInitialize (line 58) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 75) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method deleteDirectory (line 112) | static boolean deleteDirectory(File directoryToBeDeleted) { FILE: projects/tomcat/HttpParserFuzzer.java class HttpParserFuzzer (line 21) | public class HttpParserFuzzer { method fuzzerTestOneInput (line 22) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/tomcat/WsPingPongFuzzer.java class WsPingPongFuzzer (line 48) | public class WsPingPongFuzzer { method fuzzerTearDown (line 55) | public static void fuzzerTearDown() { method fuzzerInitialize (line 66) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 86) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { class PongMessageHandler (line 127) | public static class PongMessageHandler extends TesterMessageCountClien... method PongMessageHandler (line 128) | public PongMessageHandler(CountDownLatch latch) { method onMessage (line 132) | @Override FILE: projects/toml/fuzz_dump.py function random_path (line 30) | def random_path(**kwargs): function random_inlinetabledict (line 33) | def random_inlinetabledict(**kwargs): function random_numpy (line 54) | def random_numpy(**kwargs): function TestOneInput (line 61) | def TestOneInput(data): function main (line 103) | def main(): FILE: projects/toml/fuzz_load.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 46) | def main(): FILE: projects/tomlkit/fuzz_dumps.py function test_one_input (line 21) | def test_one_input(input_bytes: bytes) -> None: function main (line 41) | def main(): FILE: projects/tomlkit/fuzz_parser.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 33) | def main(): FILE: projects/toolbelt/fuzz_multipart.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 42) | def main(): FILE: projects/toolz/fuzz_itertoolz.py function fuzz_curry (line 22) | def fuzz_curry(x, y): function ConsumeDictionary (line 26) | def ConsumeDictionary(fdp, dict_size): function ConsumeDictionaryReversed (line 33) | def ConsumeDictionaryReversed(fdp, dict_size): function ConsumeDictionaryWithList (line 40) | def ConsumeDictionaryWithList(fdp, dict_size): function TestOneInput (line 47) | def TestOneInput(data): function main (line 181) | def main(): FILE: projects/tqdm/fuzz_tqdm.py function gen_random_list (line 21) | def gen_random_list(fdp): function TestOneInput (line 35) | def TestOneInput(data): function main (line 57) | def main(): FILE: projects/tremor/decode_fuzzer.cc type vorbis_data (line 42) | struct vorbis_data { function read_func (line 48) | size_t read_func(void *ptr, size_t size1, size_t size2, void *datasource) { function LLVMFuzzerTestOneInput (line 59) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/tslib/fuzz.js function ignoredError (line 226) | function ignoredError(error) { FILE: projects/ttf-parser/fuzz/fuzz_targets/fuzz-aat.rs function u16_to_u8_vec (line 21) | fn u16_to_u8_vec(data: &[u16]) -> Vec { FILE: projects/ttf-parser/fuzz/fuzz_targets/fuzz-base.rs function get_fuzzed_char (line 20) | fn get_fuzzed_char(data: &[u8]) -> char { FILE: projects/ttf-parser/fuzz/fuzz_targets/fuzz-cpal.rs type VecPainter (line 36) | struct VecPainter(Vec); method outline_glyph (line 39) | fn outline_glyph(&mut self, glyph_id: GlyphId) { method paint (line 43) | fn paint(&mut self, paint: colr::Paint<'a>) { method push_layer (line 63) | fn push_layer(&mut self, mode: colr::CompositeMode) { method pop_layer (line 67) | fn pop_layer(&mut self) { method push_transform (line 71) | fn push_transform(&mut self, transform: ttf_parser::Transform) { method pop_transform (line 75) | fn pop_transform(&mut self) { method push_clip (line 79) | fn push_clip(&mut self) { method push_clip_box (line 83) | fn push_clip_box(&mut self, clipbox: colr::ClipBox) { method pop_clip (line 87) | fn pop_clip(&mut self) { type CustomStop (line 93) | struct CustomStop(f32, RgbaColor); type CustomPaint (line 96) | enum CustomPaint { type Command (line 104) | enum Command { FILE: projects/ttf-parser/fuzz/fuzz_targets/fuzz-glyph-index.rs constant CHARS (line 23) | const CHARS: &[char] = &[ FILE: projects/ttf-parser/fuzz/fuzz_targets/fuzz-outline.rs type Builder (line 23) | struct Builder(usize); method move_to (line 27) | fn move_to(&mut self, _: f32, _: f32) { method line_to (line 32) | fn line_to(&mut self, _: f32, _: f32) { method quad_to (line 37) | fn quad_to(&mut self, _: f32, _: f32, _: f32, _: f32) { method curve_to (line 42) | fn curve_to(&mut self, _: f32, _: f32, _: f32, _: f32, _: f32, _: f32) { method close (line 47) | fn close(&mut self) { FILE: projects/ttf-parser/fuzz/fuzz_targets/fuzz-table-with-builder.rs type Builder (line 48) | struct Builder(String); method move_to (line 51) | fn move_to(&mut self, x: f32, y: f32) { method line_to (line 55) | fn line_to(&mut self, x: f32, y: f32) { method quad_to (line 59) | fn quad_to(&mut self, x1: f32, y1: f32, x: f32, y: f32) { method curve_to (line 63) | fn curve_to(&mut self, x1: f32, y1: f32, x2: f32, y2: f32, x: f32, y: ... method close (line 67) | fn close(&mut self) { FILE: projects/ttf-parser/fuzz/fuzz_targets/fuzz-variable-outline.rs type Builder (line 23) | struct Builder(usize); method move_to (line 27) | fn move_to(&mut self, _: f32, _: f32) { method line_to (line 32) | fn line_to(&mut self, _: f32, _: f32) { method quad_to (line 37) | fn quad_to(&mut self, _: f32, _: f32, _: f32, _: f32) { method curve_to (line 42) | fn curve_to(&mut self, _: f32, _: f32, _: f32, _: f32, _: f32, _: f32) { method close (line 47) | fn close(&mut self) { FILE: projects/turf/fuzz.js function ignoredError (line 151) | function ignoredError(error) { FILE: projects/twelve-monkeys/WildcardStringParserFuzzer.java class WildcardStringParserFuzzer (line 24) | public class WildcardStringParserFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/twitter4j/TwitterObjectFactoryFuzzer.java class TwitterObjectFactoryFuzzer (line 38) | public class TwitterObjectFactoryFuzzer { method fuzzerTestOneInput (line 39) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/typescript-example/fuzz_explore_me.ts function fuzz (line 20) | function fuzz(data: Buffer) { FILE: projects/typescript-example/target.ts function exploreMe (line 1) | function exploreMe(a: number, b: number, c: string ) { FILE: projects/typescript/fuzz_ast.js function ignoredError (line 174) | function ignoredError(error) { FILE: projects/typescript/fuzz_compiler.js function ignoredError (line 54) | function ignoredError(error) { function getWatchOptions (line 64) | function getWatchOptions(provider) { function getWatchFileKind (line 75) | function getWatchFileKind(provider) { function getWatchDirectoryKind (line 87) | function getWatchDirectoryKind(provider) { function getFallbackPollingKind (line 97) | function getFallbackPollingKind(provider) { FILE: projects/typescript/fuzz_json_parser.js function ignoredError (line 48) | function ignoredError(error) { function createHost (line 52) | function createHost(provider) { function createExistingOptions (line 69) | function createExistingOptions(provider) { FILE: projects/typescript/fuzz_scanner.js function ignoredError (line 51) | function ignoredError(error) { FILE: projects/typescript/fuzz_transpile_module.js function ignoredError (line 35) | function ignoredError(error) { FILE: projects/typescript/fuzz_util.js function getCompilerOptions (line 20) | function getCompilerOptions(provider) { function getJsx (line 93) | function getJsx(provider) { function getModuleKind (line 103) | function getModuleKind(provider) { function getModuleResolutionKind (line 120) | function getModuleResolutionKind(provider) { function getScriptTarget (line 131) | function getScriptTarget(provider) { FILE: projects/typing_extensions/fuzz_typing_extensions.py function TestOneInput (line 26) | def TestOneInput(data): function main (line 67) | def main(): FILE: projects/tyrus/UriTemplateParserFuzzer.java class UriTemplateParserFuzzer (line 24) | public class UriTemplateParserFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/u-boot/btrfs.c function fuzz_btrfs (line 24) | static int fuzz_btrfs(const uint8_t *data, size_t size) FILE: projects/u-boot/efi_load_image.c function fuzz_efi_load_image (line 22) | static int fuzz_efi_load_image(const uint8_t *data, size_t size) FILE: projects/u-boot/fit_image_load.c function fuzz_fit_image_load (line 23) | static int fuzz_fit_image_load(const uint8_t *data, size_t size) FILE: projects/u-boot/image_decomp.c function fuzz_image_decomp (line 26) | static int fuzz_image_decomp(const uint8_t *data, size_t size) FILE: projects/ujson/hypothesis_structured_fuzzer.py function test_ujson_roundtrip (line 62) | def test_ujson_roundtrip(obj, kwargs): FILE: projects/ujson/json_differential_fuzzer.py function ClearAllIntegers (line 49) | def ClearAllIntegers(data): function TestOneInput (line 63) | def TestOneInput(input_bytes): function main (line 90) | def main(): FILE: projects/ujson/ujson_fuzzer.py function TestOneInput (line 36) | def TestOneInput(input_bytes): function main (line 52) | def main(): FILE: projects/unbound/fuzz_1.c function LLVMFuzzerTestOneInput (line 27) | int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) { FILE: projects/unbound/fuzz_2.c function LLVMFuzzerTestOneInput (line 6) | int LLVMFuzzerTestOneInput(const uint8_t *bin, size_t nr) { FILE: projects/unbound/fuzz_3.c function LLVMFuzzerTestOneInput (line 11) | int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t nr) { FILE: projects/unbound/fuzz_4.c function LLVMFuzzerTestOneInput (line 30) | int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t nr) { FILE: projects/unbound/parse_packet_fuzzer.c type regional (line 18) | struct regional function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t *buf, size_t len) FILE: projects/underscore/fuzz_compile.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 46) | def main(): FILE: projects/undertow/RedirectHandlerFuzzer.java class RedirectHandlerFuzzer (line 24) | public class RedirectHandlerFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/unirest-java/JacksonEngineFuzzer.java class JacksonEngineFuzzer (line 26) | public class JacksonEngineFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/unirest-java/JsonArrayFuzzer.java class JsonArrayFuzzer (line 26) | public class JsonArrayFuzzer { method fuzzerTestOneInput (line 27) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/univocity-parsers/project-parent/fuzz-targets/src/test/java/com/example/CsvParserFuzzer.java class CsvParserFuzzer (line 33) | class CsvParserFuzzer { method myFuzzTest (line 36) | @FuzzTest FILE: projects/univocity-parsers/project-parent/fuzz-targets/src/test/java/com/example/TsvParserFuzzer.java class TsvParserFuzzer (line 33) | class TsvParserFuzzer { method myFuzzTest (line 36) | @FuzzTest FILE: projects/upx/fuzzers/decompress_packed_file_fuzzer.cpp type OpenMode (line 21) | enum OpenMode { RO_MUST_EXIST, WO_MUST_EXIST_TRUNCATE, WO_MUST_CREATE, W... function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/upx/fuzzers/list_packed_file_fuzzer.cpp type OpenMode (line 21) | enum OpenMode { RO_MUST_EXIST, WO_MUST_EXIST_TRUNCATE, WO_MUST_CREATE, W... function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/upx/fuzzers/test_packed_file_fuzzer.cpp type OpenMode (line 21) | enum OpenMode { RO_MUST_EXIST, WO_MUST_EXIST_TRUNCATE, WO_MUST_CREATE, W... function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/uritemplate/fuzz_expand.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 28) | def main(): FILE: projects/urlextract/fuzz_find_urls.py function TestOneInput (line 28) | def TestOneInput(data): function main (line 41) | def main(): FILE: projects/urllib3/fuzz_requests.py class ServerThread (line 31) | class ServerThread(threading.Thread): method __init__ (line 32) | def __init__(self) -> None: method run (line 39) | def run(self) -> None: function TestOneInput (line 56) | def TestOneInput(data): function main (line 100) | def main(): FILE: projects/urllib3/fuzz_urlparse.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 38) | def main(): FILE: projects/userver/main.cpp function StartService (line 33) | int StartService(int argc, char* argv[]) { function HFND_FUZZING_ENTRY_FUNCTION_CXX (line 52) | HFND_FUZZING_ENTRY_FUNCTION_CXX(int argc, char* argv[]) { function LLVMFuzzerTestOneInput (line 58) | int LLVMFuzzerTestOneInput(const uint8_t* Data, size_t Size) { function main (line 65) | int main(int argc, char* argv[]) { FILE: projects/utf8parse/fuzz/fuzz_targets/parse.rs type FuzzReceiver (line 21) | struct FuzzReceiver; method codepoint (line 23) | fn codepoint(&mut self, _c: char) { method invalid_sequence (line 27) | fn invalid_sequence(&mut self) { FILE: projects/validators/fuzz_validators.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 73) | def main(): FILE: projects/vulkan-loader/fuzzers/fuzz_header.h function fuzz_init (line 25) | void fuzz_init(const uint8_t *data, size_t size) { function create_callback_file (line 36) | void create_callback_file(const char *filename) { function create_callback_file (line 59) | void create_callback_file(const char *filename) {} function fuzz_cleanup (line 62) | void fuzz_cleanup() { FILE: projects/vulkan-loader/fuzzers/instance_create_advanced_fuzzer.c function LLVMFuzzerInitialize (line 22) | int LLVMFuzzerInitialize(int *argc, char ***argv) { function create_config_file (line 33) | int create_config_file(const char* config_path, const char* config_filen... function remove_config_file (line 58) | void remove_config_file(const char* config_path, const char* config_file... function LLVMFuzzerTestOneInput (line 67) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/vulkan-loader/fuzzers/instance_create_fuzzer.c function create_config_file (line 24) | int create_config_file(const char* config_path, const char* config_filen... function remove_config_file (line 49) | void remove_config_file(const char* config_path, const char* config_file... function LLVMFuzzerTestOneInput (line 58) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/vulkan-loader/fuzzers/instance_enumerate_fuzzer.c function LLVMFuzzerInitialize (line 22) | int LLVMFuzzerInitialize(int *argc, char ***argv) { function create_config_file (line 32) | int create_config_file(const char* config_path, const char* config_filen... function remove_config_file (line 53) | void remove_config_file(const char* config_path, const char* config_file... function LLVMFuzzerTestOneInput (line 62) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/vulkan-loader/fuzzers/json_load_fuzzer.c function LLVMFuzzerTestOneInput (line 24) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/vulkan-loader/fuzzers/settings_fuzzer.c function create_config_file (line 24) | int create_config_file(const char* config_path, const char* config_filen... function remove_config_file (line 49) | void remove_config_file(const char* config_path, const char* config_file... function LLVMFuzzerTestOneInput (line 58) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/vulnerable-project/vulnerable.cc function LLVMFuzzerTestOneInput (line 18) | int LLVMFuzzerTestOneInput(uint8_t* data, size_t size) { FILE: projects/w3lib/fuzz_parse_data_uri.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 33) | def main(): FILE: projects/w3lib/fuzz_safe_download_url.py function TestOneInput (line 23) | def TestOneInput(data): function main (line 29) | def main(): FILE: projects/w3lib/fuzz_url_safe.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 30) | def main(): FILE: projects/wabt/read_binary_interp_fuzzer.cc function LLVMFuzzerTestOneInput (line 26) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/wabt/read_binary_ir_fuzzer.cc function LLVMFuzzerTestOneInput (line 25) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/wabt/wasm2wat_fuzzer.cc function LLVMFuzzerTestOneInput (line 20) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/wabt/wasm_objdump_fuzzer.cc function LLVMFuzzerTestOneInput (line 18) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/wabt/wat2wasm_fuzzer.cc function LLVMFuzzerTestOneInput (line 19) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/wazuh/fuzz_xml.c function LLVMFuzzerTestOneInput (line 19) | int FILE: projects/websocket-client/fuzz_http.py class FuzzMock (line 24) | class FuzzMock: method __init__ (line 26) | def __init__(self, packet): method gettimeout (line 30) | def gettimeout(self): method recv (line 33) | def recv(self, bufsize): method send (line 42) | def send(self, data): function TestOneInput (line 47) | def TestOneInput(data): function main (line 67) | def main(): FILE: projects/websocket-client/fuzz_url.py function TestOneInput (line 22) | def TestOneInput(data): function main (line 32) | def main(): FILE: projects/wheel/fuzz_wheel.py function TestOneInput (line 21) | def TestOneInput(data): function main (line 41) | def main(): FILE: projects/woodstox/XmlFuzzer.java class XmlFuzzer (line 24) | public class XmlFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method streamThrough (line 35) | public static int streamThrough(XMLStreamReader sr) throws XMLStreamEx... method getText (line 52) | public static String getText(XMLStreamReader sr) { FILE: projects/wtforms/fuzz_validators.py class FuzzField (line 21) | class FuzzField: method __init__ (line 22) | def __init__(self, text): method gettext (line 26) | def gettext(self, string): function TestOneInput (line 30) | def TestOneInput(data): function main (line 55) | def main(): FILE: projects/xerces-c/parse_target.cpp function LLVMFuzzerTestOneInput (line 25) | int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { FILE: projects/xerces-c/parse_target_proto.cpp function ignore (line 31) | void ignore(void* ctx, const char* msg, ...) {} function MakeUnique (line 34) | std::unique_ptr MakeUnique(T* obj, D del) { function DEFINE_PROTO_FUZZER (line 41) | DEFINE_PROTO_FUZZER(const xmlProtoFuzzer::XmlDocument& xmlDocument) { FILE: projects/xerces-c/xerces_fuzz_common.cpp function parseInMemory (line 22) | void parseInMemory(const uint8_t *Data, size_t Size) FILE: projects/xerces-c/xmlProtoConverter.cpp function string (line 24) | string ProtoConverter::removeNonAscii(string const& _utf8) function string (line 484) | string ProtoConverter::getPredefined(Element_Id _x, string const& _prop) function string (line 511) | string ProtoConverter::getUri(Element_Id _x) function string (line 754) | string ProtoConverter::protoToString(XmlDocument const& _x) FILE: projects/xerces-c/xmlProtoConverter.h function namespace (line 23) | namespace xmlProtoFuzzer { FILE: projects/xerces/parserFuzzer.java class parserFuzzer (line 22) | public class parserFuzzer { method fuzzerTestOneInput (line 24) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/xlrd/fuzz_open_workbook.py function TestOneInput (line 24) | def TestOneInput(data): function main (line 40) | def main(): FILE: projects/xmlbeans/regExFuzzer.java class regExFuzzer (line 21) | public class regExFuzzer { method fuzzerTestOneInput (line 23) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/xmlpull/PullParserFactoryFuzzer.java class PullParserFactoryFuzzer (line 11) | public class PullParserFactoryFuzzer { method fuzzerTestOneInput (line 12) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/xmltodict/unparse_parse_fuzzer.py function _gen_dict (line 30) | def _gen_dict(fdp: atheris.FuzzedDataProvider, depth: int): function _gen_string (line 41) | def _gen_string(fdp: atheris.FuzzedDataProvider): function _gen_list (line 47) | def _gen_list(fdp: atheris.FuzzedDataProvider, depth: int): function _gen_value (line 53) | def _gen_value(fdp: atheris.FuzzedDataProvider, depth: int) -> Any: function test_one_input (line 73) | def test_one_input(data: bytes): function main (line 115) | def main(): FILE: projects/xmlunit/DOMDifferenceEngineCompareFuzzer.java class DiffExpecter (line 23) | class DiffExpecter implements ComparisonListener { method DiffExpecter (line 33) | DiffExpecter(ComparisonType type) { method DiffExpecter (line 36) | DiffExpecter(ComparisonType type, int expected) { method DiffExpecter (line 39) | DiffExpecter(ComparisonType type, String controlXPath, method DiffExpecter (line 43) | DiffExpecter(ComparisonType type, int expected, method withParentXPath (line 56) | public DiffExpecter withParentXPath(String controlParentXPath, String ... method comparisonPerformed (line 63) | @Override method getParentXPath (line 69) | String getParentXPath(String xPath) { class DOMDifferenceEngineCompareFuzzer (line 84) | public class DOMDifferenceEngineCompareFuzzer { method fuzzerTestOneInput (line 86) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/xnio-api/xnio-fuzzer/src/main/java/org/xnio/http/HttpParserFuzzer.java class HttpParserFuzzer (line 9) | public class HttpParserFuzzer { method HttpParserFuzzer (line 13) | public HttpParserFuzzer(FuzzedDataProvider fuzzedDataProvider) throws ... method test (line 17) | void test() { method fuzzerTestOneInput (line 42) | public static void fuzzerTestOneInput(FuzzedDataProvider fuzzedDataPro... FILE: projects/xnnpack/fuzz_model.cc function LLVMFuzzerTestOneInput (line 27) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/xpdf/fuzz_JBIG2.cc function LLVMFuzzerTestOneInput (line 42) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) FILE: projects/xpdf/fuzz_pdfload.cc function LLVMFuzzerTestOneInput (line 41) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) FILE: projects/xpdf/fuzz_zxdoc.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { FILE: projects/xstream/XmlFuzzer.java class FuzzObj (line 29) | class FuzzObj { method FuzzObj (line 32) | public FuzzObj(String s1){ class XmlFuzzer (line 37) | public class XmlFuzzer { method fuzzerTestOneInput (line 38) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/xz-java/XZEncoderFuzzer.java class XZEncoderFuzzer (line 24) | public class XZEncoderFuzzer { method fuzzerTestOneInput (line 25) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/yajl-ruby/json_fuzzer.c type context (line 26) | typedef struct { function yajl_found_null (line 31) | static int yajl_found_null(void* ctx) { function yajl_found_boolean (line 35) | static int yajl_found_boolean(void* ctx, int boolean) { function yajl_found_number (line 39) | static int yajl_found_number(void* ctx, const char* v, unsigned int l) { function yajl_found_string (line 44) | static int yajl_found_string(void* ctx, const unsigned char* s, unsigned... function yajl_found_object_key (line 48) | static int yajl_found_object_key(void* ctx, const unsigned char* v, unsi... function yajl_found_start_object (line 53) | static int yajl_found_start_object(void* ctx) { function yajl_found_end_object (line 58) | static int yajl_found_end_object(void* ctx) { function yajl_found_start_array (line 64) | static int yajl_found_start_array(void* ctx) { function yajl_found_end_array (line 69) | static int yajl_found_end_array(void* ctx) { function LLVMFuzzerTestOneInput (line 89) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/yamlbeans/project-parent/fuzz-targets/src/test/java/com/example/YamlReaderFuzzer.java class YamlReaderFuzzer (line 29) | class YamlReaderFuzzer { method myFuzzTest (line 30) | @FuzzTest FILE: projects/yamlbeans/project-parent/fuzz-targets/src/test/java/com/example/YamlWriterFuzzer.java class YamlWriterFuzzer (line 32) | class YamlWriterFuzzer { method myFuzzTest (line 35) | @FuzzTest method getDummyClass (line 69) | public static DummyClass getDummyClass (FuzzedDataProvider data, int d... class DummyClass (line 220) | public static class DummyClass implements Serializable { FILE: projects/yarl/fuzz_url.py function TestOneInput (line 20) | def TestOneInput(data): function main (line 27) | def main(): FILE: projects/ygot/fuzz.go function Fuzz (line 5) | func Fuzz(data []byte) int { FILE: projects/zip-rs/fuzz/fuzz_targets/roundtrip.rs function arbitrary_unix_permissions (line 23) | fn arbitrary_unix_permissions(u: &mut Unstructured) -> arbitrary::Result... function arbitrary_path (line 28) | fn arbitrary_path(u: &mut Unstructured) -> arbitrary::Result { type Compression (line 42) | struct Compression { method arbitrary (line 48) | fn arbitrary(u: &mut Unstructured<'a>) -> arbitrary::Result { function arbitrary_file (line 71) | fn arbitrary_file(u: &mut Unstructured) -> arbitrary::Result> { type File (line 80) | struct File { type ZipEntry (line 93) | enum ZipEntry<'a> { function path (line 110) | fn path(&self) -> Option { type Operations (line 121) | struct Operations<'a> { function arbitrary (line 126) | fn arbitrary(u: &mut Unstructured<'a>) -> arbitrary::Result { function build_zip (line 148) | fn build_zip(zip_entries: &Vec) -> Result, ZipError> { FILE: projects/zip-rs/fuzz/fuzz_targets/structured_fuzz_reader.rs type ReadOperations (line 25) | enum ReadOperations<'a> { type Driver (line 37) | struct Driver<'a> { function read_file_attributes (line 46) | fn read_file_attributes(file: &mut zip::read::ZipFile) -> Result<(), zip... function fuzzed_extract (line 67) | fn fuzzed_extract(driver: Driver) -> Result<(), zip::result::ZipError> { FILE: projects/zip4j/Zip4jFuzzer.java class Zip4jFuzzer (line 34) | public class Zip4jFuzzer { method fuzzerTestOneInput (line 35) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/zipp/fuzz_zipp.py function gen_path (line 25) | def gen_path(fdp): function build_fixture (line 34) | def build_fixture(fdp): function TestOneInput (line 45) | def TestOneInput(data): function main (line 60) | def main(): FILE: projects/zlib/checksum_fuzzer.c function LLVMFuzzerTestOneInput (line 10) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t dataLen) { FILE: projects/zlib/compress_fuzzer.c function check_compress_level (line 25) | static void check_compress_level(uint8_t *compr, size_t comprLen, function write_zlib_header (line 38) | static void write_zlib_header(uint8_t *s, unsigned compression_method, u... function check_decompress (line 49) | static void check_decompress(uint8_t *compr, size_t comprLen, unsigned c... function LLVMFuzzerTestOneInput (line 62) | int LLVMFuzzerTestOneInput(const uint8_t *d, size_t size) { FILE: projects/zlib/example_dict_fuzzer.c function test_dict_deflate (line 27) | int test_dict_deflate(unsigned char **compr, size_t *comprLen) function test_dict_inflate (line 92) | int test_dict_inflate(unsigned char *compr, size_t comprLen) { function LLVMFuzzerTestOneInput (line 138) | int LLVMFuzzerTestOneInput(const uint8_t *d, size_t size) { FILE: projects/zlib/example_flush_fuzzer.c function test_flush (line 37) | int test_flush(unsigned char *compr, z_size_t *comprLen) { function test_sync (line 74) | int test_sync(unsigned char *compr, size_t comprLen, unsigned char *unco... function LLVMFuzzerTestOneInput (line 110) | int LLVMFuzzerTestOneInput(const uint8_t *d, size_t size) { FILE: projects/zlib/example_large_fuzzer.c function test_large_deflate (line 26) | int test_large_deflate(unsigned char *compr, size_t comprLen, function test_large_inflate (line 81) | int test_large_inflate(unsigned char *compr, size_t comprLen, function LLVMFuzzerTestOneInput (line 115) | int LLVMFuzzerTestOneInput(const uint8_t *d, size_t size) { FILE: projects/zlib/example_small_fuzzer.c function test_deflate (line 25) | int test_deflate(unsigned char *compr, size_t comprLen) { function test_inflate (line 62) | int test_inflate(unsigned char *compr, size_t comprLen, unsigned char *u... function LLVMFuzzerTestOneInput (line 96) | int LLVMFuzzerTestOneInput(const uint8_t *d, size_t size) { FILE: projects/zlib/gzio_fuzzer.c function LLVMFuzzerTestOneInput (line 28) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t dataLen) { FILE: projects/zlib/minigzip_fuzzer.c function myfree (line 81) | void myfree(void *q, void *p) type gzFile_s (line 87) | struct gzFile_s { function gzFile (line 100) | gzFile gzopen(const char *path, const char *mode) function gzFile (line 105) | gzFile gzdopen(int fd, const char *mode) function gzFile (line 110) | gzFile gz_open(const char *path, int fd, const char *mode) function gzwrite (line 163) | int gzwrite(gzFile gz, const void *buf, unsigned len) function gzread (line 183) | int gzread(gzFile gz, void *buf, unsigned len) function gzclose (line 217) | int gzclose(gzFile gz) function error (line 268) | int error(const char *msg) function gz_compress (line 278) | int gz_compress(FILE *in, gzFile out) function gz_compress_mmap (line 313) | int gz_compress_mmap(FILE *in, gzFile out) function gz_uncompress (line 346) | void gz_uncompress(gzFile in, FILE *out) function file_compress (line 371) | int file_compress(char *file, char *mode) function file_uncompress (line 404) | int file_uncompress(char *file) function LLVMFuzzerTestOneInput (line 445) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t dataLen) { FILE: projects/zlib/zlib_uncompress2_fuzzer.cc function LLVMFuzzerTestOneInput (line 10) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/zlib/zlib_uncompress3_fuzzer.cc function LLVMFuzzerTestOneInput (line 26) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/zlib/zlib_uncompress_fuzzer.cc function LLVMFuzzerTestOneInput (line 14) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/znc/msg_parse_fuzzer.cpp function LLVMFuzzerTestOneInput (line 23) | int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size){ FILE: projects/zookeeper/DataTreeFuzzer.java class DataTreeFuzzer (line 25) | public class DataTreeFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/zookeeper/MessageTrackerPeekReceivedFuzzer.java class MessageTrackerPeekReceivedFuzzer (line 24) | public class MessageTrackerPeekReceivedFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/zookeeper/ProcessTxnFuzzer.java class ProcessTxnFuzzer (line 25) | public class ProcessTxnFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/zookeeper/SerializeFuzzer.java class SerializeFuzzer (line 25) | public class SerializeFuzzer { method fuzzerTestOneInput (line 26) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { FILE: projects/zopfli/zopfli_compress_fuzzer.cc function LLVMFuzzerTestOneInput (line 24) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/zopfli/zopfli_deflate_fuzzer.cc function LLVMFuzzerTestOneInput (line 21) | int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { FILE: projects/zt-zip/project-parent/fuzz-targets/src/test/java/com/example/UnpackFuzzer.java class UnpackFuzzer (line 34) | class UnpackFuzzer { method myFuzzTest (line 35) | @FuzzTest FILE: projects/zxing/MultiFormatDecodeFuzzer.java class MultiFormatDecodeFuzzer (line 29) | public final class MultiFormatDecodeFuzzer { method fuzzerInitialize (line 32) | public static void fuzzerInitialize() { method fuzzerTestOneInput (line 35) | public static void fuzzerTestOneInput(byte[] input) { FILE: projects/zxing/MultiFormatEncodeFuzzer.java class MultiFormatEncodeFuzzer (line 67) | public final class MultiFormatEncodeFuzzer { method fuzzerTestOneInput (line 69) | public static void fuzzerTestOneInput(FuzzedDataProvider data) { method getReader (line 99) | private static Reader getReader(BarcodeFormat format) { class TrivialBinarizer (line 132) | private static final class TrivialBinarizer extends Binarizer { method TrivialBinarizer (line 135) | public TrivialBinarizer(BitMatrix matrix) { method getBlackRow (line 140) | public BitArray getBlackRow(int y, BitArray row) throws NotFoundExce... method getBlackMatrix (line 144) | public BitMatrix getBlackMatrix() throws NotFoundException { method createBinarizer (line 148) | public Binarizer createBinarizer(LuminanceSource source) { class TrivialLuminanceSource (line 153) | private static final class TrivialLuminanceSource extends LuminanceSou... method TrivialLuminanceSource (line 156) | public TrivialLuminanceSource(BitMatrix matrix) { method getRow (line 161) | public byte[] getRow(int y, byte[] row) { method getMatrix (line 176) | public byte[] getMatrix() { FILE: tools/vscode-extension/src/cifuzz.ts function cifuzzGenerator (line 26) | function cifuzzGenerator( FILE: tools/vscode-extension/src/commands/cmdBuildFuzzerFromWorkspace.ts function cmdInputCollectorBuildFuzzersFromWorkspace (line 27) | async function cmdInputCollectorBuildFuzzersFromWorkspace() { function cmdDispatchBuildFuzzersFromWorkspace (line 68) | async function cmdDispatchBuildFuzzersFromWorkspace(args: any) { FILE: tools/vscode-extension/src/commands/cmdBuildFuzzerFromWorkspaceCFLite.ts function cmdInputCollectorBuildFuzzersFromWorkspaceCFLite (line 22) | async function cmdInputCollectorBuildFuzzersFromWorkspaceCFLite() { function cmdDispatchbuildFuzzersFromWorkspaceClusterfuzzLite (line 41) | async function cmdDispatchbuildFuzzersFromWorkspaceClusterfuzzLite(_args... FILE: tools/vscode-extension/src/commands/cmdCreateOSSFuzzSetup.ts function createOssFuzzSetup (line 20) | async function createOssFuzzSetup() { FILE: tools/vscode-extension/src/commands/cmdDispatcherGenerateClusterfuzzLite.ts function cmdDispatcherGenerateClusterfuzzLite (line 26) | async function cmdDispatcherGenerateClusterfuzzLite( FILE: tools/vscode-extension/src/commands/cmdDisplayCoverage.ts function displayCodeCoverageFromOssFuzz (line 28) | async function displayCodeCoverageFromOssFuzz( FILE: tools/vscode-extension/src/commands/cmdEndToEndCoverage.ts function runEndToEndAndGetCoverage (line 38) | async function runEndToEndAndGetCoverage( function cmdDispatchEndToEndRun (line 79) | async function cmdDispatchEndToEndRun(args: any) { function endToEndRun (line 94) | async function endToEndRun( FILE: tools/vscode-extension/src/commands/cmdFIGetOptimalTargets.ts function runGetOptimalTargetsHandler (line 19) | async function runGetOptimalTargetsHandler() { FILE: tools/vscode-extension/src/commands/cmdListFuzzers.ts function listFuzzersHandler (line 26) | async function listFuzzersHandler() { FILE: tools/vscode-extension/src/commands/cmdRedo.ts function cmdDispatcherRe (line 22) | async function cmdDispatcherRe() { FILE: tools/vscode-extension/src/commands/cmdReproduceTestcase.ts function cmdInputCollectorReproduceTestcase (line 26) | async function cmdInputCollectorReproduceTestcase() { function cmdDispatchReproduceTestcase (line 51) | async function cmdDispatchReproduceTestcase(args: any) { function reproduceTestcase (line 55) | async function reproduceTestcase(crashInfoFileInput: string) { FILE: tools/vscode-extension/src/commands/cmdRunFI.ts function runFuzzIntrospectorHandler (line 22) | async function runFuzzIntrospectorHandler() { FILE: tools/vscode-extension/src/commands/cmdRunFuzzer.ts function cmdInputCollectorRunSpecificFuzzer (line 22) | async function cmdInputCollectorRunSpecificFuzzer() { function cmdDispatchRunFuzzerHandler (line 75) | async function cmdDispatchRunFuzzerHandler(args: any) { FILE: tools/vscode-extension/src/commands/cmdSetOSSFuzzPath.ts function setOssFuzzPath (line 23) | async function setOssFuzzPath() { FILE: tools/vscode-extension/src/commands/cmdSetupCIFuzz.ts function setupCIFuzzHandler (line 22) | async function setupCIFuzzHandler() { FILE: tools/vscode-extension/src/commands/cmdSetupFI.ts function setUpFuzzIntrospectorHandler (line 22) | async function setUpFuzzIntrospectorHandler() { FILE: tools/vscode-extension/src/commands/cmdSetupOSSFuzz.ts function setUpOssFuzzHandler (line 26) | async function setUpOssFuzzHandler() { FILE: tools/vscode-extension/src/commands/cmdTemplate.ts function cTemplates (line 189) | async function cTemplates() { function cppTemplates (line 226) | async function cppTemplates() { function pythonTepmlates (line 270) | async function pythonTepmlates() { function javaTemplates (line 307) | async function javaTemplates() { function cmdDispatcherTemplate (line 334) | async function cmdDispatcherTemplate(context: vscode.ExtensionContext) { FILE: tools/vscode-extension/src/commands/cmdTestFuzzer.ts function cmdInputCollectorTestFuzzer (line 31) | async function cmdInputCollectorTestFuzzer() { function cmdDispatchTestFuzzerHandler (line 71) | async function cmdDispatchTestFuzzerHandler(args: any) { FILE: tools/vscode-extension/src/commands/cmdTestFuzzerCFLite.ts function cmdInputCollectorTestFuzzerCFLite (line 35) | async function cmdInputCollectorTestFuzzerCFLite() { function cmdDispatchTestFuzzerHandlerCFLite (line 63) | async function cmdDispatchTestFuzzerHandlerCFLite(args: any) { FILE: tools/vscode-extension/src/config.ts class ExtensionConfig (line 19) | class ExtensionConfig { method printConfig (line 29) | async printConfig() { FILE: tools/vscode-extension/src/coverageHelper.ts function loadSummaryJsonCoverage (line 59) | async function loadSummaryJsonCoverage( function compareLocalToRemoteCoverage (line 70) | async function compareLocalToRemoteCoverage( function loadCoverageIntoWorkspace (line 135) | async function loadCoverageIntoWorkspace( function clearCoverage (line 292) | async function clearCoverage() { FILE: tools/vscode-extension/src/extension.ts function activate (line 47) | function activate(context: vscode.ExtensionContext) { function deactivate (line 225) | function deactivate() { FILE: tools/vscode-extension/src/fuzzIntrospectorHelper.ts function setUpFuzzIntrospector (line 26) | async function setUpFuzzIntrospector() { function runFuzzIntrospector (line 62) | async function runFuzzIntrospector() { function getOptimalTargetsFromIntrospector (line 97) | async function getOptimalTargetsFromIntrospector() { FILE: tools/vscode-extension/src/logger.ts function println (line 21) | function println(line: string) { function printRaw (line 25) | function printRaw(line: string) { function debugPrintln (line 29) | function debugPrintln(line: string) { FILE: tools/vscode-extension/src/ossfuzzWrappers.ts function buildFuzzersFromWorkspaceClusterfuzzLite (line 28) | async function buildFuzzersFromWorkspaceClusterfuzzLite() { function buildFuzzersFromWorkspace (line 59) | async function buildFuzzersFromWorkspace( function runFuzzerHandlerCFLite (line 274) | async function runFuzzerHandlerCFLite( function runFuzzerHandler (line 317) | async function runFuzzerHandler( function isPathValidOssFuzzPath (line 370) | async function isPathValidOssFuzzPath(path: string) { FILE: tools/vscode-extension/src/projectIntegrationHelper.ts function setupProjectInitialFiles (line 23) | async function setupProjectInitialFiles(isClusterfuzzLite: boolean) { function createProjectYamlContent (line 233) | function createProjectYamlContent( function getLicenseHeader (line 269) | function getLicenseHeader() { function getBaseDockerFile (line 293) | function getBaseDockerFile(language: string) { function createReadmeFile (line 306) | function createReadmeFile( function setupJavaProjectInitialFiles (line 335) | async function setupJavaProjectInitialFiles( function setupCProjectInitialFiles (line 411) | async function setupCProjectInitialFiles( function setupCPPProjectInitialFiles (line 530) | async function setupCPPProjectInitialFiles( function setupPythonProjectInitialFiles (line 654) | async function setupPythonProjectInitialFiles( FILE: tools/vscode-extension/src/utils.ts function setStatusText (line 30) | async function setStatusText(statusText: string) { function downloadRemoteURL (line 36) | async function downloadRemoteURL( function getLocalOutBuildDir (line 57) | async function getLocalOutBuildDir(projectName: string) { function getOSSFuzzCloudURL (line 63) | async function getOSSFuzzCloudURL(projectName: string) { function hasOssFuzzInWorkspace (line 96) | async function hasOssFuzzInWorkspace() { function getOssFuzzWorkspaceProjectName (line 129) | async function getOssFuzzWorkspaceProjectName() { function listFuzzersForProject (line 164) | async function listFuzzersForProject( function determineWorkspaceLanguage (line 204) | async function determineWorkspaceLanguage() { function systemSync (line 246) | async function systemSync(cmd: string, args: Array) { function systemSyncLogIfFailure (line 296) | async function systemSyncLogIfFailure(