Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: ssh_privkey_fuzzer_nalloc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 491 94.9%
gold [1:9] 4 0.77%
yellow [10:29] 1 0.19%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 21 4.06%
All colors 517 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
427 58 realloc call site: 00058 ssh_pki_import_pubkey_blob
19 496 pki_private_key_from_base64 call site: 00496 ssh_key_free
18 8 _ssh_log call site: 00008 ssh_vlog
14 27 ssh_pki_import_privkey_base64 call site: 00027 ssh_pki_openssh_privkey_import
6 49 calloc call site: 00049 ssh_buffer_allocate_size
3 487 pki_private_key_from_base64 call site: 00487 pem_get_password
2 46 nalloc_fail call site: 00046 fprintf
1 56 realloc call site: 00056 __errno_location
1 491 pki_private_key_from_base64 call site: 00491 PEM_read_bio_PrivateKey

Runtime coverage analysis

Covered functions
32
Functions that are reachable but not covered
141
Reachable functions
155
Percentage of reachable functions covered
9.03%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_privkey_fuzzer.c 1
tests/fuzz/nallocinc.c 7
src/base64.c 6
src/pki.c 11
src/log.c 9
src/pki_container_openssh.c 4
src/buffer.c 19
src/string.c 7
src/bignum.c 1
src/pki_crypto.c 12
src/libcrypto.c 1
src/external/bcrypt_pbkdf.c 2
src/md_crypto.c 3
src/external/blowfish.c 6
src/wrapper.c 1

Fuzzer: ssh_sshsig_fuzzer_nalloc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 366 68.9%
gold [1:9] 30 5.64%
yellow [10:29] 19 3.57%
greenyellow [30:49] 32 6.02%
lawngreen 50+ 84 15.8%
All colors 531 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
222 298 sshsig_verify call site: 00298 ssh_pki_import_signature_blob
56 210 pki_import_pubkey_buffer call site: 00210 _ssh_buffer_unpack
18 7 _ssh_log call site: 00007 ssh_vlog
18 173 ssh_pki_import_pubkey_blob call site: 00173 pki_import_cert_buffer
16 270 pki_key_clean call site: 00270 pki_import_pubkey_buffer
6 126 ssh_buffer_unpack_va call site: 00126 _ssh_log
4 100 ssh_buffer_unpack_va call site: 00100 ssh_buffer_get_ssh_string
4 202 pki_pubkey_build_rsa call site: 00202 BN_clear_free
2 53 ssh_buffer_new call site: 00053 buffer_shift
2 92 ssh_buffer_unpack_va call site: 00092 ssh_buffer_get_u8
2 95 ssh_buffer_get_data call site: 00095 ssh_buffer_get_data
2 133 ssh_buffer_unpack_va call site: 00133 explicit_bzero

Runtime coverage analysis

Covered functions
66
Functions that are reachable but not covered
119
Reachable functions
167
Percentage of reachable functions covered
28.74%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_sshsig_fuzzer.c 1
tests/fuzz/nallocinc.c 7
src/pki.c 20
src/log.c 9
src/base64.c 4
src/buffer.c 27
src/string.c 9
src/bignum.c 4
src/pki_crypto.c 11
src/md_crypto.c 8
src/pki_ed25519_common.c 1

Fuzzer: ssh_bind_config_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 606 75.0%
gold [1:9] 17 2.10%
yellow [10:29] 10 1.23%
greenyellow [30:49] 6 0.74%
lawngreen 50+ 168 20.8%
All colors 807 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
457 102 realloc call site: 00102 ssh_pki_import_pubkey_blob
44 565 ssh_pki_import_privkey_file call site: 00565 ssh_pki_import_privkey_base64
24 75 ssh_bind_config_parse_line call site: 00075 ssh_pki_import_privkey_base64
17 711 ssh_bind_options_set call site: 00711 _ssh_set_error_invalid
10 618 ssh_bind_options_set call site: 00618 _ssh_log
6 7 calloc call site: 00007 nalloc_backtrace_exclude
5 731 ssh_bind_options_set call site: 00731 _ssh_set_error_invalid
3 21 ssh_log_function call site: 00021 ssh_log_custom
3 794 ssh_bind_config_parse_line call site: 00794 _ssh_log
2 30 current_timestring call site: 00030 strftime
2 33 ssh_log_stderr call site: 00033 fprintf
2 48 ssh_bind_config_parse_line call site: 00048 _ssh_set_error_oom

Runtime coverage analysis

Covered functions
63
Functions that are reachable but not covered
222
Reachable functions
267
Percentage of reachable functions covered
16.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_bind_config_fuzzer.c 1
tests/fuzz/nallocinc.c 7
src/bind.c 2
src/bind_config.c 6
src/log.c 10
src/error.c 3
src/config_parser.c 3
src/options.c 5
src/pki.c 14
src/pki_container_openssh.c 4
src/base64.c 4
src/buffer.c 19
src/string.c 7
src/bignum.c 1
src/pki_crypto.c 14
src/libcrypto.c 1
src/external/bcrypt_pbkdf.c 2
src/md_crypto.c 3
src/external/blowfish.c 6
src/wrapper.c 1
src/misc.c 3
src/kex.c 6
src/token.c 7

Fuzzer: ssh_pubkey_fuzzer_nalloc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 435 67.4%
gold [1:9] 64 9.92%
yellow [10:29] 41 6.35%
greenyellow [30:49] 8 1.24%
lawngreen 50+ 97 15.0%
All colors 645 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
205 308 pki_import_cert_buffer call site: 00308 pki_openssh_import_privkey_blob
103 527 pki_private_key_from_base64 call site: 00527 ssh_pki_export_privkey_to_pubkey
23 243 pki_import_pubkey_buffer call site: 00243 pki_pubkey_build_ecdsa
18 27 _ssh_log call site: 00027 ssh_vlog
12 162 ssh_pki_openssh_import call site: 00162 ssh_pki_import_pubkey_blob
9 219 pki_pubkey_build_rsa call site: 00219 ssh_make_string_bn
6 47 ssh_pki_import_pubkey_file call site: 00047 _ssh_log
4 120 ssh_buffer_unpack_va call site: 00120 ssh_buffer_get_ssh_string
4 148 ssh_buffer_unpack_va call site: 00148 _ssh_log
4 518 pki_private_key_from_base64 call site: 00518 pem_get_password
3 57 ssh_pki_import_pubkey_file call site: 00057 _ssh_log
3 135 ssh_string_len call site: 00135 ssh_string_burn

Runtime coverage analysis

Covered functions
74
Functions that are reachable but not covered
123
Reachable functions
179
Percentage of reachable functions covered
31.28%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_pubkey_fuzzer.c 1
src/misc.c 2
tests/fuzz/nallocinc.c 8
src/pki.c 15
src/log.c 9
src/pki_container_openssh.c 4
src/base64.c 4
src/buffer.c 19
src/string.c 8
src/bignum.c 1
src/pki_crypto.c 13
src/libcrypto.c 1
src/external/bcrypt_pbkdf.c 2
src/md_crypto.c 3
src/external/blowfish.c 6
src/wrapper.c 1

Fuzzer: ssh_client_config_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 293 38.6%
gold [1:9] 72 9.49%
yellow [10:29] 35 4.61%
greenyellow [30:49] 23 3.03%
lawngreen 50+ 335 44.1%
All colors 758 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
20 90 _ssh_log call site: 00090 _ssh_log
16 297 ssh_options_set call site: 00297 _ssh_set_error_invalid
14 159 ssh_free call site: 00159 ssh_message_free
13 76 ssh_socket_close call site: 00076 ssh_poll_free
13 120 crypto_free call site: 00120 ssh_key_clean
13 597 ssh_config_parse_line call site: 00597 ssh_match_localnetwork
10 737 ssh_config_parse_line call site: 00737 ssh_options_set
8 59 ssh_free call site: 00059 ssh_channel_do_free
8 445 ssh_options_set call site: 00445 _ssh_set_error_invalid
8 588 match_cidr_address_list call site: 00588 _ssh_log
7 431 ssh_options_set call site: 00431 _ssh_set_error_invalid
6 7 calloc call site: 00007 nalloc_backtrace_exclude

Runtime coverage analysis

Covered functions
105
Functions that are reachable but not covered
217
Reachable functions
304
Percentage of reachable functions covered
28.62%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_client_config_fuzzer.c 1
tests/fuzz/nallocinc.c 7
src/session.c 3
src/wrapper.c 4
src/socket.c 4
src/error.c 3
src/buffer.c 5
src/misc.c 21
src/agent.c 3
src/channels.c 1
src/pcap.c 1
src/poll.c 5
src/log.c 12
src/pki.c 2
src/pki_crypto.c 1
src/string.c 4
src/dh_crypto.c 1
src/gzip.c 1
src/messages.c 1
src/auth.c 2
src/callbacks.c 1
src/options.c 2
src/config_parser.c 6
src/kex.c 6
src/token.c 7
src/config.c 11
src/match.c 8

Fuzzer: ssh_known_hosts_fuzzer_nalloc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 106 25.8%
gold [1:9] 18 4.39%
yellow [10:29] 6 1.46%
greenyellow [30:49] 2 0.48%
lawngreen 50+ 278 67.8%
All colors 410 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
18 16 _ssh_log call site: 00016 ssh_vlog
13 220 ssh_buffer_unpack_va call site: 00220 _ssh_log
11 201 ssh_buffer_unpack_va call site: 00201 ssh_buffer_get_ssh_string
7 351 ssh_string_cmp call site: 00351 ssh_string_cmp
6 103 hmac_init call site: 00103 EVP_sha256
4 245 pki_pubkey_build_rsa call site: 00245 BN_clear_free
3 234 ssh_buffer_unpack_va call site: 00234 strlen
3 285 pki_import_pubkey_buffer call site: 00285 _ssh_log
3 301 pki_pubkey_build_ed25519 call site: 00301 _ssh_log
2 66 ssh_buffer_new call site: 00066 buffer_shift
2 297 pki_pubkey_build_ed25519 call site: 00297 _ssh_log
2 308 pki_import_pubkey_buffer call site: 00308 _ssh_log

Runtime coverage analysis

Covered functions
100
Functions that are reachable but not covered
86
Reachable functions
172
Percentage of reachable functions covered
50.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_known_hosts_fuzzer.c 1
tests/fuzz/nallocinc.c 7
src/knownhosts.c 7
src/misc.c 8
src/log.c 9
src/base64.c 4
src/buffer.c 19
src/libcrypto.c 4
src/match.c 3
src/pki.c 11
src/string.c 8
src/bignum.c 1
src/pki_crypto.c 6
src/init.c 2
src/threads/pthread.c 2
src/dh.c 1
src/socket.c 1
src/poll.c 1
src/threads.c 1
src/threads/libcrypto.c 1

Fuzzer: ssh_server_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1473 64.3%
gold [1:9] 19 0.83%
yellow [10:29] 24 1.04%
greenyellow [30:49] 9 0.39%
lawngreen 50+ 764 33.3%
All colors 2289 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
332 1353 ssh_list_prepend call site: 01353 ssh_send_kex
168 481 sha512_final call site: 00481 pki_openssh_import_privkey_blob
86 1266 ssh_packet_send call site: 01266 ssh_send_rekex
38 1134 ssh_buffer_pack_va call site: 01134 _ssh_buffer_pack
31 1026 pki_key_dup call site: 01026 ssh_key_free
29 786 ssh_find_all_matching call site: 00786 ssh_prefix_default_algos
29 830 ssh_bind_options_set call site: 00830 ssh_bind_set_algo
25 447 ssh_pki_import_pubkey_blob call site: 00447 pki_private_key_decrypt
25 1713 packet_send2 call site: 01713 compress_buffer
24 2003 cipher_new call site: 02003 _ssh_log
22 226 ssh_pki_import_privkey_base64 call site: 00226 ssh_pki_openssh_privkey_import
21 1802 pki_key_to_blob call site: 01802 ssh_buffer_add_ssh_string

Runtime coverage analysis

Covered functions
394
Functions that are reachable but not covered
284
Reachable functions
525
Percentage of reachable functions covered
45.9%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_server_fuzzer.c 2
tests/fuzz/nallocinc.c 11
src/bind.c 4
src/session.c 7
src/wrapper.c 10
src/socket.c 16
src/error.c 3
src/buffer.c 31
src/misc.c 28
src/agent.c 3
src/channels.c 1
src/pcap.c 5
src/poll.c 21
src/log.c 12
src/pki.c 22
src/pki_crypto.c 18
src/string.c 11
src/dh_crypto.c 6
src/gzip.c 4
src/messages.c 1
src/auth.c 2
src/callbacks.c 2
src/options.c 7
src/pki_container_openssh.c 4
src/base64.c 4
src/bignum.c 4
src/libcrypto.c 7
src/external/bcrypt_pbkdf.c 2
src/md_crypto.c 20
src/external/blowfish.c 6
src/kex.c 18
src/token.c 7
src/server.c 4
src/client.c 3
src/getrandom_crypto.c 1
src/packet.c 10
src/knownhosts.c 10
src/config_parser.c 1
src/config.c 1
src/match.c 3
src/packet_crypt.c 1
src/dh.c 3
src/kdf.c 5
src/dh-gex.c 1
src/ecdh_crypto.c 3
src/curve25519.c 1
src/curve25519_crypto.c 1
src/sntrup761.c 4
src/external/sntrup761.c 24

Fuzzer: ssh_client_fuzzer_nalloc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 2605 77.6%
gold [1:9] 49 1.46%
yellow [10:29] 194 5.78%
greenyellow [30:49] 24 0.71%
lawngreen 50+ 482 14.3%
All colors 3354 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
537 2701 match_group call site: 02701 ssh_userauth_agent_publickey
401 2297 ssh_pki_import_pubkey_blob call site: 02297 ssh_userauth_try_publickey
138 541 ssh_path_expand_escape call site: 00541 ssh_config_parse_file
121 681 ssh_lowercase call site: 00681 ssh_config_parse
102 1289 pki_import_pubkey_buffer call site: 01289 ssh_userauth_publickey_auto
77 904 ssh_connect call site: 00904 ssh_socket_connect_proxyjump
77 2198 ssh_client_sntrup761x25519_init call site: 02198 atomicio
75 409 ssh_options_set call site: 00409 ssh_options_set
72 3265 ssh_disconnect call site: 03265 select_loop
52 1624 packet_send2 call site: 01624 ssh_pcap_context_write
51 1237 ssh_string_get_char call site: 01237 pki_pubkey_build_ed25519
47 1078 ssh_buffer_add_data call site: 01078 base64_to_bin

Runtime coverage analysis

Covered functions
301
Functions that are reachable but not covered
456
Reachable functions
698
Percentage of reachable functions covered
34.67%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_client_fuzzer.c 2
tests/fuzz/nallocinc.c 11
src/session.c 9
src/wrapper.c 10
src/socket.c 23
src/error.c 4
src/buffer.c 31
src/misc.c 28
src/agent.c 11
src/channels.c 31
src/pcap.c 5
src/poll.c 26
src/log.c 13
src/pki.c 43
src/pki_crypto.c 22
src/string.c 12
src/dh_crypto.c 6
src/gzip.c 4
src/messages.c 1
src/auth.c 13
src/callbacks.c 6
src/options.c 4
src/config_parser.c 6
src/kex.c 18
src/token.c 7
src/config.c 12
src/client.c 7
src/init.c 1
src/threads/pthread.c 2
src/match.c 9
src/threads.c 1
src/connect.c 4
src/knownhosts.c 14
src/dh.c 4
src/base64.c 6
src/libcrypto.c 6
src/bignum.c 4
src/packet.c 10
src/getrandom_crypto.c 1
src/server.c 1
src/packet_crypt.c 1
src/md_crypto.c 20
src/kdf.c 5
src/dh-gex.c 1
src/ecdh_crypto.c 3
src/curve25519.c 1
src/curve25519_crypto.c 1
src/sntrup761.c 4
src/external/sntrup761.c 24
src/pki_container_openssh.c 5
src/external/bcrypt_pbkdf.c 2
src/external/blowfish.c 6
src/pki_ed25519_common.c 1
src/connector.c 17

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
ssh_packet_userauth_request /src/libssh/src/messages.c 4 ['N/A', 'char', 'N/A', 'N/A'] 35 0 898 187 54 460 0 3075 297
ssh_packet_socket_callback /src/libssh/src/packet.c 3 ['N/A', 'size_t', 'N/A'] 27 0 992 133 47 415 1 2727 241
ssh_channel_request_pty /src/libssh/src/channels.c 1 ['N/A'] 26 0 15 3 2 439 0 2794 163
ssh_server_connection_callback /src/libssh/src/server.c 1 ['N/A'] 29 0 491 85 25 423 0 2662 161
ssh_packet_server_sntrup761x25519_init /src/libssh/src/sntrup761.c 4 ['N/A', 'char', 'N/A', 'N/A'] 28 0 398 64 24 460 0 2891 143
ssh_packet_server_dhgex_request /src/libssh/src/dh-gex.c 4 ['N/A', 'char', 'N/A', 'N/A'] 18 0 284 51 18 408 0 2573 97
ssh_pki_export_privkey_file /src/libssh/src/pki.c 5 ['N/A', 'N/A', 'N/A', 'N/A', 'N/A'] 14 0 27 3 2 127 0 588 89
channel_rcv_request /src/libssh/src/channels.c 4 ['N/A', 'char', 'N/A', 'N/A'] 23 0 746 137 43 426 0 2771 69
ssh_channel_select /src/libssh/src/channels.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 13 0 642 137 40 98 0 445 67
ssh_packet_kexinit /src/libssh/src/kex.c 4 ['N/A', 'char', 'N/A', 'N/A'] 16 0 953 164 54 221 0 1469 67

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
68.0%
678 / 997
Cyclomatic complexity statically reachable by fuzzers
76.0%
6294 / 8274

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

tests/fuzz/ssh_privkey_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['realloc', 'pki_private_key_from_base64', '_ssh_log', 'ssh_pki_import_privkey_base64', 'calloc', 'nalloc_fail']

tests/fuzz/ssh_sshsig_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshsig_verify', 'pki_import_pubkey_buffer', '_ssh_log', 'ssh_pki_import_pubkey_blob', 'pki_key_clean', 'ssh_buffer_unpack_va', 'pki_pubkey_build_rsa', 'ssh_buffer_new']

tests/fuzz/ssh_bind_config_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['realloc', 'ssh_pki_import_privkey_file', 'ssh_bind_config_parse_line', 'ssh_bind_options_set', 'calloc', 'ssh_log_function', 'current_timestring']

tests/fuzz/ssh_pubkey_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['pki_import_cert_buffer', 'pki_private_key_from_base64', 'pki_import_pubkey_buffer', '_ssh_log', 'ssh_pki_openssh_import', 'pki_pubkey_build_rsa', 'ssh_pki_import_pubkey_file', 'ssh_buffer_unpack_va']

tests/fuzz/ssh_client_config_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['_ssh_log', 'ssh_options_set', 'ssh_free', 'ssh_socket_close', 'crypto_free', 'ssh_config_parse_line', 'match_cidr_address_list']

tests/fuzz/ssh_known_hosts_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['_ssh_log', 'ssh_buffer_unpack_va', 'ssh_string_cmp', 'hmac_init', 'pki_pubkey_build_rsa', 'pki_import_pubkey_buffer', 'pki_pubkey_build_ed25519', 'ssh_buffer_new']

tests/fuzz/ssh_server_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['ssh_list_prepend', 'sha512_final', 'ssh_packet_send', 'ssh_buffer_pack_va', 'pki_key_dup', 'ssh_find_all_matching', 'ssh_bind_options_set', 'ssh_pki_import_pubkey_blob', 'packet_send2', 'cipher_new']

tests/fuzz/ssh_client_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['match_group', 'ssh_pki_import_pubkey_blob', 'ssh_path_expand_escape', 'ssh_lowercase', 'pki_import_pubkey_buffer', 'ssh_connect', 'ssh_client_sntrup761x25519_init', 'ssh_options_set', 'ssh_disconnect', 'packet_send2']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
ssh_dh_init 36 19 52.77% ['ssh_sshsig_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_privkey_fuzzer_nalloc', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc', 'ssh_bind_config_fuzzer']
pki_private_key_from_base64 77 40 51.94% ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_privkey_fuzzer_nalloc', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc', 'ssh_bind_config_fuzzer']
pki_pubkey_build_rsa 42 23 54.76% ['ssh_sshsig_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_privkey_fuzzer_nalloc', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc', 'ssh_bind_config_fuzzer']
ssh_pki_import_privkey_file 62 32 51.61% ['ssh_server_fuzzer', 'ssh_bind_config_fuzzer', 'ssh_client_fuzzer_nalloc', 'ssh_client_config_fuzzer']
ssh_pki_openssh_import 135 74 54.81% ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_privkey_fuzzer_nalloc', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc', 'ssh_bind_config_fuzzer']
ssh_config_make_absolute 41 19 46.34% ['ssh_bind_config_fuzzer', 'ssh_client_fuzzer_nalloc', 'ssh_client_config_fuzzer']
match_cidr_address_list 168 80 47.61% ['ssh_bind_config_fuzzer', 'ssh_client_fuzzer_nalloc', 'ssh_client_config_fuzzer']
ssh_options_set 692 380 54.91% ['ssh_server_fuzzer', 'ssh_bind_config_fuzzer', 'ssh_client_fuzzer_nalloc', 'ssh_client_config_fuzzer']
ssh_socket_close 33 15 45.45% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc', 'ssh_client_config_fuzzer']
hmac_init 37 17 45.94% ['ssh_server_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc']
ssh_key_cmp 47 16 34.04% ['ssh_server_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc']
ssh_bind_accept_fd 112 39 34.82% ['ssh_server_fuzzer']
ssh_channel_new 44 22 50.0% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
channel_default_bufferize 45 18 40.0% ['ssh_server_fuzzer']
ssh_curve25519_init 50 25 50.0% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_retrieve_dhgroup 52 16 30.76% ['ssh_server_fuzzer']
sshkdf_derive_key 73 25 34.24% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_mac_ctx_init 35 19 54.28% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_send_kex 89 48 53.93% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_hashbufout_add_cookie 31 17 54.83% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_message_queue 35 18 51.42% ['ssh_server_fuzzer']
ssh_execute_server_request 230 80 34.78% ['ssh_server_fuzzer']
ssh_msg_userauth_build_digest 53 28 52.83% ['ssh_server_fuzzer']
ssh_packet_send 62 24 38.70% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_packet_newkeys 83 32 38.55% ['ssh_server_fuzzer']
ssh_packet_encrypt 90 37 41.11% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
pki_key_dup_common_init 37 15 40.54% ['ssh_server_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc']
ssh_key_signature_to_char 33 16 48.48% ['ssh_sshsig_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc', 'ssh_server_fuzzer']
ssh_pki_export_signature_blob 54 26 48.14% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
pki_key_dup 221 59 26.69% ['ssh_server_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc']
pki_key_to_blob 335 126 37.61% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
pki_sign_data 81 43 53.08% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_get_key_params 44 20 45.45% ['ssh_server_fuzzer']
ssh_auth_reply_default 44 12 27.27% ['ssh_server_fuzzer']
ssh_channel_free 38 5 13.15% ['ssh_client_fuzzer_nalloc']
ssh_connect 121 55 45.45% ['ssh_client_fuzzer_nalloc']
ssh_packet_client_curve25519_reply 57 29 50.87% ['ssh_client_fuzzer_nalloc']
ssh_client_select_hostkeys 70 27 38.57% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
revert_kex_callbacks 36 5 13.88% ['ssh_client_fuzzer_nalloc']
ssh_known_hosts_get_algorithms_names 75 25 33.33% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_options_apply 121 53 43.80% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_packet_client_sntrup761x25519_reply 64 22 34.37% ['ssh_client_fuzzer_nalloc']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/libssh/src/wrapper.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/pki_container_openssh.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_pubkey_fuzzer_nalloc']
/src/libssh/src/md_crypto.c ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/error.c ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/options.c ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/auth.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/packet_cb.c [] []
/src/libssh/src/poll.c ['ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/ttyopts.c [] []
/src/libssh/src/match.c ['ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/kex.c ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/external/sntrup761.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/crypto_common.c [] []
/src/libssh/src/curve25519.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/config.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer']
/src/libssh/tests/fuzz/ssh_known_hosts_fuzzer.c ['ssh_known_hosts_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc']
/src/libssh/src/pki.c ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/libcrypto.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/server.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/dh-gex.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/bind_config.c ['ssh_bind_config_fuzzer'] ['ssh_bind_config_fuzzer']
/src/libssh/tests/fuzz/ssh_server_fuzzer.c ['ssh_server_fuzzer'] ['ssh_server_fuzzer']
/src/libssh/src/pcap.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] []
/src/libssh/src/threads/libcrypto.c ['ssh_known_hosts_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc']
/src/libssh/src/ecdh.c [] []
/src/libssh/src/pki_ed25519_common.c ['ssh_sshsig_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc'] []
/src/libssh/src/misc.c ['ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/tests/fuzz/ssh_client_config_fuzzer.c ['ssh_client_config_fuzzer'] ['ssh_client_config_fuzzer']
/src/libssh/src/string.c ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_sshsig_fuzzer_nalloc', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/tests/fuzz/ssh_privkey_fuzzer.c ['ssh_privkey_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc']
/src/libssh/src/socket.c ['ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/external/bcrypt_pbkdf.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] []
/src/libssh/src/log.c ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/packet.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/init.c ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/agent.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/client.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/bignum.c ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_sshsig_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/dh_crypto.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/getrandom_crypto.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/threads/pthread.c ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/sntrup761.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/tests/fuzz/ssh_client_fuzzer.c ['ssh_client_fuzzer_nalloc'] ['ssh_client_fuzzer_nalloc']
/src/libssh/tests/fuzz/ssh_bind_config_fuzzer.c ['ssh_bind_config_fuzzer'] ['ssh_bind_config_fuzzer']
/src/libssh/src/bind.c ['ssh_bind_config_fuzzer', 'ssh_server_fuzzer'] ['ssh_bind_config_fuzzer', 'ssh_server_fuzzer']
/src/libssh/src/knownhosts.c ['ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/messages.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer']
/src/libssh/tests/fuzz/nallocinc.c ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/curve25519_crypto.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/callbacks.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/tests/fuzz/ssh_pubkey_fuzzer.c ['ssh_pubkey_fuzzer_nalloc'] ['ssh_pubkey_fuzzer_nalloc']
/src/libssh/src/channels.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/kdf.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/dh.c ['ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/tests/fuzz/ssh_sshsig_fuzzer.c ['ssh_sshsig_fuzzer_nalloc'] ['ssh_sshsig_fuzzer_nalloc']
/src/libssh/src/pki_crypto.c ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/gzip.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/token.c ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/base64.c ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc']
/src/libssh/src/config_parser.c ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/session.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/buffer.c ['ssh_privkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_sshsig_fuzzer_nalloc', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/ecdh_crypto.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/external/blowfish.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] []
/src/libssh/src/connect.c ['ssh_client_fuzzer_nalloc'] []
/src/libssh/src/connector.c ['ssh_client_fuzzer_nalloc'] []
/src/libssh/src/packet_crypt.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/threads.c ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc']

Directories in report

Directory
/src/libssh/src/external/
/src/libssh/src/threads/
/src/libssh/tests/fuzz/
/src/libssh/src/