Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: ssh_privkey_fuzzer_nalloc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 493 94.9%
gold [1:9] 4 0.77%
yellow [10:29] 1 0.19%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 21 4.04%
All colors 519 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
429 58 realloc call site: 00058 ssh_pki_import_pubkey_blob
19 498 pki_private_key_from_base64 call site: 00498 ssh_key_free
18 8 _ssh_log call site: 00008 ssh_vlog
14 27 ssh_pki_import_privkey_base64 call site: 00027 ssh_pki_openssh_privkey_import
6 49 calloc call site: 00049 ssh_buffer_allocate_size
3 489 pki_private_key_from_base64 call site: 00489 pem_get_password
2 46 nalloc_fail call site: 00046 fprintf
1 56 realloc call site: 00056 __errno_location
1 493 pki_private_key_from_base64 call site: 00493 PEM_read_bio_PrivateKey

Runtime coverage analysis

Covered functions
32
Functions that are reachable but not covered
141
Reachable functions
155
Percentage of reachable functions covered
9.03%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_privkey_fuzzer.c 1
tests/fuzz/nallocinc.c 7
src/base64.c 6
src/pki.c 11
src/log.c 9
src/pki_container_openssh.c 4
src/buffer.c 19
src/string.c 7
src/bignum.c 1
src/pki_crypto.c 12
src/libcrypto.c 1
src/external/bcrypt_pbkdf.c 2
src/md_crypto.c 3
src/external/blowfish.c 6
src/wrapper.c 1

Fuzzer: ssh_bind_config_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 602 74.4%
gold [1:9] 44 5.43%
yellow [10:29] 15 1.85%
greenyellow [30:49] 15 1.85%
lawngreen 50+ 133 16.4%
All colors 809 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
429 102 realloc call site: 00102 ssh_pki_import_pubkey_blob
27 584 ssh_pki_import_privkey_file call site: 00584 ssh_bind_key_size_allowed
20 79 ssh_pki_import_privkey_base64 call site: 00079 ssh_pki_openssh_privkey_import
19 542 pki_private_key_from_base64 call site: 00542 ssh_key_free
17 713 ssh_bind_options_set call site: 00713 _ssh_set_error_invalid
10 620 ssh_bind_options_set call site: 00620 _ssh_log
9 569 ssh_pki_import_privkey_file call site: 00569 _ssh_log
6 7 calloc call site: 00007 nalloc_backtrace_exclude
6 733 ssh_bind_options_set call site: 00733 _ssh_set_error_invalid
3 21 ssh_log_function call site: 00021 ssh_log_custom
3 533 pki_private_key_from_base64 call site: 00533 pem_get_password
3 580 ssh_pki_import_privkey_file call site: 00580 _ssh_log

Runtime coverage analysis

Covered functions
64
Functions that are reachable but not covered
227
Reachable functions
273
Percentage of reachable functions covered
16.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_bind_config_fuzzer.c 1
tests/fuzz/nallocinc.c 7
src/bind.c 2
src/bind_config.c 6
src/log.c 10
src/error.c 3
src/config_parser.c 3
src/options.c 5
src/pki.c 14
src/pki_container_openssh.c 4
src/base64.c 4
src/buffer.c 19
src/string.c 7
src/bignum.c 1
src/pki_crypto.c 14
src/libcrypto.c 1
src/external/bcrypt_pbkdf.c 2
src/md_crypto.c 3
src/external/blowfish.c 6
src/wrapper.c 1
src/misc.c 3
src/kex.c 6
src/token.c 7

Fuzzer: ssh_pubkey_fuzzer_nalloc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 444 68.5%
gold [1:9] 58 8.95%
yellow [10:29] 38 5.86%
greenyellow [30:49] 12 1.85%
lawngreen 50+ 96 14.8%
All colors 648 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
205 310 pki_import_cert_buffer call site: 00310 pki_openssh_import_privkey_blob
104 529 pki_private_key_from_base64 call site: 00529 ssh_pki_export_privkey_to_pubkey
23 243 pki_import_pubkey_buffer call site: 00243 pki_pubkey_build_ecdsa
18 27 _ssh_log call site: 00027 ssh_vlog
16 292 pki_key_clean call site: 00292 pki_import_pubkey_buffer
14 160 ssh_pki_openssh_import call site: 00160 ssh_pki_import_pubkey_blob
6 47 ssh_pki_import_pubkey_file call site: 00047 _ssh_log
4 120 ssh_buffer_unpack_va call site: 00120 ssh_buffer_get_ssh_string
4 148 ssh_buffer_unpack_va call site: 00148 _ssh_log
4 224 pki_pubkey_build_rsa call site: 00224 BN_clear_free
4 284 pki_import_pubkey_buffer call site: 00284 _ssh_log
4 520 pki_private_key_from_base64 call site: 00520 pem_get_password

Runtime coverage analysis

Covered functions
75
Functions that are reachable but not covered
122
Reachable functions
179
Percentage of reachable functions covered
31.84%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_pubkey_fuzzer.c 1
src/misc.c 2
tests/fuzz/nallocinc.c 8
src/pki.c 15
src/log.c 9
src/pki_container_openssh.c 4
src/base64.c 4
src/buffer.c 19
src/string.c 8
src/bignum.c 1
src/pki_crypto.c 13
src/libcrypto.c 1
src/external/bcrypt_pbkdf.c 2
src/md_crypto.c 3
src/external/blowfish.c 6
src/wrapper.c 1

Fuzzer: ssh_known_hosts_fuzzer_nalloc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 104 25.1%
gold [1:9] 21 5.08%
yellow [10:29] 7 1.69%
greenyellow [30:49] 1 0.24%
lawngreen 50+ 280 67.7%
All colors 413 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
18 16 _ssh_log call site: 00016 ssh_vlog
13 220 ssh_buffer_unpack_va call site: 00220 _ssh_log
11 201 ssh_buffer_unpack_va call site: 00201 ssh_buffer_get_ssh_string
7 354 ssh_key_cmp call site: 00354 ssh_string_cmp
6 103 hmac_init call site: 00103 EVP_sha256
4 245 pki_pubkey_build_rsa call site: 00245 BN_clear_free
3 234 ssh_buffer_unpack_va call site: 00234 strlen
3 290 pki_import_pubkey_buffer call site: 00290 _ssh_log
3 301 pki_pubkey_build_ed25519 call site: 00301 _ssh_log
2 66 ssh_buffer_new call site: 00066 buffer_shift
2 297 pki_pubkey_build_ed25519 call site: 00297 _ssh_log
2 347 ssh_key_cmp call site: 00347 ssh_key_is_private

Runtime coverage analysis

Covered functions
100
Functions that are reachable but not covered
86
Reachable functions
172
Percentage of reachable functions covered
50.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_known_hosts_fuzzer.c 1
tests/fuzz/nallocinc.c 7
src/knownhosts.c 7
src/misc.c 8
src/log.c 9
src/base64.c 4
src/buffer.c 19
src/libcrypto.c 4
src/match.c 3
src/pki.c 11
src/string.c 8
src/bignum.c 1
src/pki_crypto.c 6
src/init.c 2
src/threads/pthread.c 2
src/dh.c 1
src/socket.c 1
src/poll.c 1
src/threads.c 1
src/threads/libcrypto.c 1

Fuzzer: ssh_client_config_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 293 33.9%
gold [1:9] 80 9.25%
yellow [10:29] 61 7.06%
greenyellow [30:49] 26 3.00%
lawngreen 50+ 404 46.7%
All colors 864 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
20 92 _ssh_log call site: 00092 _ssh_log
15 122 crypto_free call site: 00122 ssh_key_clean
15 455 ssh_options_set call site: 00455 _ssh_set_error_invalid
14 169 ssh_free call site: 00169 ssh_message_free
13 78 ssh_socket_close call site: 00078 ssh_poll_free
13 622 ssh_config_parse_line_internal call site: 00622 ssh_match_localnetwork
13 824 ssh_config_parse_line_internal call site: 00824 ssh_options_set
9 612 match_cidr_address_list call site: 00612 _ssh_log
8 61 ssh_free call site: 00061 ssh_channel_do_free
8 315 ssh_options_set call site: 00315 _ssh_set_error_invalid
7 307 ssh_options_set call site: 00307 _ssh_set_error_invalid
7 441 ssh_options_set call site: 00441 _ssh_set_error_invalid

Runtime coverage analysis

Covered functions
113
Functions that are reachable but not covered
215
Reachable functions
310
Percentage of reachable functions covered
30.65%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_client_config_fuzzer.c 1
tests/fuzz/nallocinc.c 7
src/session.c 3
src/wrapper.c 4
src/socket.c 4
src/error.c 3
src/buffer.c 5
src/misc.c 21
src/agent.c 3
src/pki_context.c 3
src/channels.c 1
src/pcap.c 1
src/poll.c 5
src/log.c 12
src/pki.c 2
src/pki_crypto.c 1
src/string.c 4
src/dh_crypto.c 1
src/gzip.c 1
src/messages.c 1
src/auth.c 2
src/callbacks.c 1
src/options.c 2
src/config_parser.c 6
src/kex.c 6
src/token.c 7
src/config.c 14
src/match.c 8

Fuzzer: ssh_sshsig_fuzzer_nalloc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 385 68.9%
gold [1:9] 47 8.42%
yellow [10:29] 52 9.31%
greenyellow [30:49] 14 2.50%
lawngreen 50+ 60 10.7%
All colors 558 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
247 300 sshsig_verify call site: 00300 ssh_pki_import_signature_blob
45 221 pki_import_pubkey_buffer call site: 00221 pki_pubkey_build_ed25519
18 7 _ssh_log call site: 00007 ssh_vlog
18 173 ssh_pki_import_pubkey_blob call site: 00173 pki_import_cert_buffer
18 270 pki_key_clean call site: 00270 pki_import_pubkey_buffer
6 126 ssh_buffer_unpack_va call site: 00126 _ssh_log
4 100 ssh_buffer_unpack_va call site: 00100 ssh_buffer_get_ssh_string
4 202 pki_pubkey_build_rsa call site: 00202 BN_clear_free
3 136 ssh_buffer_unpack_va call site: 00136 strlen
2 53 ssh_buffer_new call site: 00053 buffer_shift
2 92 ssh_buffer_unpack_va call site: 00092 ssh_buffer_get_u8
2 95 ssh_buffer_get_data call site: 00095 ssh_buffer_get_data

Runtime coverage analysis

Covered functions
67
Functions that are reachable but not covered
119
Reachable functions
168
Percentage of reachable functions covered
29.17%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_sshsig_fuzzer.c 1
tests/fuzz/nallocinc.c 7
src/pki.c 21
src/log.c 9
src/base64.c 4
src/buffer.c 27
src/string.c 9
src/bignum.c 4
src/pki_crypto.c 11
src/md_crypto.c 8
src/pki_ed25519_common.c 1

Fuzzer: ssh_server_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 2095 70.7%
gold [1:9] 26 0.87%
yellow [10:29] 23 0.77%
greenyellow [30:49] 16 0.54%
lawngreen 50+ 801 27.0%
All colors 2961 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
522 2322 libcrux_ml_kem_vector_portable_vector_type_zero call site: 02322 libcrux_ml_kem_ind_cpa_generate_keypair_unpacked_1c
351 1368 ssh_list_prepend call site: 01368 ssh_send_kex
168 491 sha512_final call site: 00491 pki_openssh_import_privkey_blob
85 1282 ssh_packet_send call site: 01282 ssh_send_rekex
61 2872 libcrux_ml_kem_ind_cpa_serialize_public_key_mut_89 call site: 02872 ssh_packet_send
38 1149 ssh_buffer_pack_va call site: 01149 _ssh_buffer_pack
31 1041 pki_key_dup call site: 01041 ssh_key_free
29 796 ssh_find_all_matching call site: 00796 ssh_prefix_default_algos
29 840 ssh_bind_options_set call site: 00840 ssh_bind_set_algo
25 457 ssh_pki_import_pubkey_blob call site: 00457 pki_private_key_decrypt
25 1747 packet_send2 call site: 01747 compress_buffer
24 2044 cipher_new call site: 02044 _ssh_log

Runtime coverage analysis

Covered functions
441
Functions that are reachable but not covered
521
Reachable functions
790
Percentage of reachable functions covered
34.05%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_server_fuzzer.c 2
tests/fuzz/nallocinc.c 11
src/bind.c 4
src/session.c 7
src/wrapper.c 10
src/socket.c 16
src/error.c 3
src/buffer.c 31
src/misc.c 28
src/agent.c 3
src/pki_context.c 3
src/channels.c 1
src/pcap.c 5
src/poll.c 21
src/log.c 12
src/pki.c 22
src/pki_crypto.c 18
src/string.c 11
src/dh_crypto.c 6
src/gzip.c 4
src/messages.c 1
src/auth.c 2
src/callbacks.c 2
src/options.c 7
src/pki_container_openssh.c 4
src/base64.c 4
src/bignum.c 4
src/libcrypto.c 7
src/external/bcrypt_pbkdf.c 2
src/md_crypto.c 20
src/external/blowfish.c 6
src/kex.c 19
src/token.c 7
src/server.c 4
src/client.c 3
src/getrandom_crypto.c 1
src/packet.c 10
src/knownhosts.c 11
src/config_parser.c 1
src/config.c 1
src/match.c 3
src/packet_crypt.c 1
src/dh.c 3
src/kdf.c 5
src/dh-gex.c 1
src/ecdh_crypto.c 4
src/curve25519.c 1
src/curve25519_crypto.c 1
src/sntrup761.c 3
src/external/sntrup761.c 24
src/hybrid_mlkem.c 1
src/mlkem_native.c 1
src/mlkem.c 1
src/external/libcrux_mlkem768_sha3.c 256

Fuzzer: ssh_client_fuzzer_nalloc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 2754 67.0%
gold [1:9] 46 1.12%
yellow [10:29] 251 6.11%
greenyellow [30:49] 59 1.43%
lawngreen 50+ 997 24.2%
All colors 4107 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
536 3452 match_group call site: 03452 ssh_userauth_agent_publickey
400 3049 ssh_pki_import_pubkey_blob call site: 03049 ssh_userauth_try_publickey
202 706 ssh_lowercase call site: 00706 ssh_config_parse
145 559 ssh_path_expand_escape call site: 00559 ssh_config_parse_file
95 1415 pki_import_cert_buffer call site: 01415 ssh_userauth_publickey_auto
86 1011 ssh_connect call site: 01011 ssh_socket_connect_proxyjump
83 419 ssh_options_set call site: 00419 ssh_options_set
76 4015 ssh_disconnect call site: 04015 select_loop
73 2954 ssh_client_hybrid_mlkem_init call site: 02954 atomicio
52 1744 packet_send2 call site: 01744 ssh_pcap_context_write
51 1354 ssh_string_get_char call site: 01354 pki_pubkey_build_ed25519
48 1194 ssh_buffer_add_data call site: 01194 base64_to_bin

Runtime coverage analysis

Covered functions
574
Functions that are reachable but not covered
462
Reachable functions
966
Percentage of reachable functions covered
52.17%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
tests/fuzz/ssh_client_fuzzer.c 2
tests/fuzz/nallocinc.c 11
src/session.c 9
src/wrapper.c 10
src/socket.c 24
src/error.c 4
src/buffer.c 31
src/misc.c 28
src/agent.c 11
src/pki_context.c 3
src/channels.c 31
src/pcap.c 5
src/poll.c 26
src/log.c 13
src/pki.c 43
src/pki_crypto.c 22
src/string.c 12
src/dh_crypto.c 6
src/gzip.c 4
src/messages.c 1
src/auth.c 13
src/callbacks.c 6
src/options.c 4
src/config_parser.c 6
src/kex.c 19
src/token.c 7
src/config.c 15
src/client.c 7
src/init.c 1
src/threads/pthread.c 2
src/match.c 9
src/threads.c 1
src/connect.c 4
src/knownhosts.c 15
src/dh.c 4
src/base64.c 6
src/libcrypto.c 6
src/bignum.c 4
src/packet.c 10
src/getrandom_crypto.c 1
src/server.c 1
src/packet_crypt.c 1
src/md_crypto.c 20
src/kdf.c 5
src/dh-gex.c 1
src/ecdh_crypto.c 4
src/curve25519.c 1
src/curve25519_crypto.c 1
src/sntrup761.c 3
src/external/sntrup761.c 24
src/hybrid_mlkem.c 1
src/mlkem_native.c 1
src/mlkem.c 1
src/external/libcrux_mlkem768_sha3.c 256
src/pki_container_openssh.c 5
src/external/bcrypt_pbkdf.c 2
src/external/blowfish.c 6
src/pki_ed25519_common.c 1
src/connector.c 17

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
ssh_packet_client_hybrid_mlkem_reply /src/libssh/src/hybrid_mlkem.c 4 ['N/A', 'char', 'N/A', 'N/A'] 33 0 394 40 17 821 0 3584 400
ssh_packet_userauth_request /src/libssh/src/messages.c 4 ['N/A', 'char', 'N/A', 'N/A'] 39 0 898 187 54 725 0 3767 295
ssh_packet_socket_callback /src/libssh/src/packet.c 3 ['N/A', 'size_t', 'N/A'] 31 0 992 133 47 681 1 3415 244
ssh_server_connection_callback /src/libssh/src/server.c 1 ['N/A'] 33 0 491 85 25 691 0 3359 168
ssh_channel_request_pty /src/libssh/src/channels.c 1 ['N/A'] 30 0 15 3 2 705 0 3479 163
ssh_packet_server_sntrup761x25519_init /src/libssh/src/sntrup761.c 4 ['N/A', 'char', 'N/A', 'N/A'] 32 0 398 64 24 725 0 3574 122
ssh_packet_server_dhgex_request /src/libssh/src/dh-gex.c 4 ['N/A', 'char', 'N/A', 'N/A'] 22 0 284 51 18 674 0 3258 97
ssh_pki_export_privkey_file /src/libssh/src/pki.c 5 ['N/A', 'N/A', 'N/A', 'N/A', 'N/A'] 14 0 27 3 2 127 0 588 89
channel_rcv_request /src/libssh/src/channels.c 4 ['N/A', 'char', 'N/A', 'N/A'] 27 0 746 137 43 692 0 3465 69
ssh_channel_select /src/libssh/src/channels.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 13 0 642 137 40 98 0 445 67

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
76.0%
1087 / 1433
Cyclomatic complexity statically reachable by fuzzers
78.0%
7473 / 9618

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

tests/fuzz/ssh_privkey_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['realloc', 'pki_private_key_from_base64', '_ssh_log', 'ssh_pki_import_privkey_base64', 'calloc', 'nalloc_fail']

tests/fuzz/ssh_bind_config_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['realloc', 'ssh_pki_import_privkey_file', 'ssh_pki_import_privkey_base64', 'pki_private_key_from_base64', 'ssh_bind_options_set', 'calloc', 'ssh_log_function']

tests/fuzz/ssh_pubkey_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['pki_import_cert_buffer', 'pki_private_key_from_base64', 'pki_import_pubkey_buffer', '_ssh_log', 'pki_key_clean', 'ssh_pki_openssh_import', 'ssh_pki_import_pubkey_file', 'ssh_buffer_unpack_va', 'pki_pubkey_build_rsa']

tests/fuzz/ssh_known_hosts_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['_ssh_log', 'ssh_buffer_unpack_va', 'ssh_key_cmp', 'hmac_init', 'pki_pubkey_build_rsa', 'pki_import_pubkey_buffer', 'pki_pubkey_build_ed25519', 'ssh_buffer_new']

tests/fuzz/ssh_client_config_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['_ssh_log', 'crypto_free', 'ssh_options_set', 'ssh_free', 'ssh_socket_close', 'ssh_config_parse_line_internal', 'match_cidr_address_list']

tests/fuzz/ssh_sshsig_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshsig_verify', 'pki_import_pubkey_buffer', '_ssh_log', 'ssh_pki_import_pubkey_blob', 'pki_key_clean', 'ssh_buffer_unpack_va', 'pki_pubkey_build_rsa', 'ssh_buffer_new']

tests/fuzz/ssh_server_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['libcrux_ml_kem_vector_portable_vector_type_zero', 'ssh_list_prepend', 'sha512_final', 'ssh_packet_send', 'libcrux_ml_kem_ind_cpa_serialize_public_key_mut_89', 'ssh_buffer_pack_va', 'pki_key_dup', 'ssh_find_all_matching', 'ssh_bind_options_set', 'ssh_pki_import_pubkey_blob']

tests/fuzz/ssh_client_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['match_group', 'ssh_pki_import_pubkey_blob', 'ssh_lowercase', 'ssh_path_expand_escape', 'pki_import_cert_buffer', 'ssh_connect', 'ssh_options_set', 'ssh_disconnect', 'ssh_client_hybrid_mlkem_init', 'packet_send2']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
ssh_dh_init 36 19 52.77% ['ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_privkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc']
pki_private_key_from_base64 77 40 51.94% ['ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_privkey_fuzzer_nalloc']
ssh_bind_options_set 361 191 52.90% ['ssh_server_fuzzer', 'ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer']
ssh_pki_import_privkey_file 62 32 51.61% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer']
ssh_pki_openssh_import 135 69 51.11% ['ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_privkey_fuzzer_nalloc']
pki_pubkey_build_rsa 42 21 50.0% ['ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_privkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc']
hmac_init 37 17 45.94% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc']
ssh_key_cmp 50 17 34.0% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc']
ssh_config_make_absolute 41 19 46.34% ['ssh_client_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer']
match_cidr_address_list 168 90 53.57% ['ssh_client_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer']
ssh_socket_close 33 15 45.45% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc', 'ssh_client_config_fuzzer']
ssh_bind_accept_fd 127 41 32.28% ['ssh_server_fuzzer']
ssh_channel_new 44 22 50.0% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
channel_default_bufferize 45 18 40.0% ['ssh_server_fuzzer']
ssh_curve25519_init 50 25 50.0% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_retrieve_dhgroup 52 16 30.76% ['ssh_server_fuzzer']
ssh_packet_server_hybrid_mlkem_init 255 102 40.0% ['ssh_server_fuzzer']
sshkdf_derive_key 73 25 34.24% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_mac_ctx_init 35 19 54.28% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_send_kex 89 48 53.93% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_hashbufout_add_cookie 31 17 54.83% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_message_queue 35 18 51.42% ['ssh_server_fuzzer']
ssh_execute_server_request 243 81 33.33% ['ssh_server_fuzzer']
ssh_msg_userauth_build_digest 53 28 52.83% ['ssh_server_fuzzer']
ssh_mlkem_encapsulate 57 20 35.08% ['ssh_server_fuzzer']
ssh_packet_send 62 24 38.70% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_packet_newkeys 86 44 51.16% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_packet_encrypt 90 37 41.11% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
pki_key_dup_common_init 43 15 34.88% ['ssh_pubkey_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_key_signature_to_char 33 16 48.48% ['ssh_server_fuzzer', 'ssh_sshsig_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc']
ssh_pki_export_signature_blob 54 26 48.14% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
pki_key_dup 221 59 26.69% ['ssh_pubkey_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
pki_key_to_blob 335 126 37.61% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
pki_sign_data 81 43 53.08% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_get_key_params 44 20 45.45% ['ssh_server_fuzzer']
ssh_auth_reply_default 51 13 25.49% ['ssh_server_fuzzer']
ssh_channel_free 38 5 13.15% ['ssh_client_fuzzer_nalloc']
ssh_connect 121 55 45.45% ['ssh_client_fuzzer_nalloc']
ssh_packet_client_dhgex_group 118 48 40.67% ['ssh_client_fuzzer_nalloc']
libcrux_sha3_generic_keccak_portable_keccak1_96 31 15 48.38% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
libcrux_sha3_generic_keccak_portable_keccak1_ad0 31 15 48.38% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_client_hybrid_mlkem_init 87 43 49.42% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_packet_client_hybrid_mlkem_reply 148 43 29.05% ['ssh_client_fuzzer_nalloc']
ssh_client_select_hostkeys 70 27 38.57% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
revert_kex_callbacks 45 4 8.888% ['ssh_client_fuzzer_nalloc']
ssh_known_hosts_get_algorithms_names 75 25 33.33% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_options_apply 121 53 43.80% ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
ssh_packet_client_sntrup761x25519_reply 64 19 29.68% ['ssh_client_fuzzer_nalloc']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/libssh/src/libcrypto.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/pki_crypto.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/server.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/external/bcrypt_pbkdf.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] []
/src/libssh/tests/fuzz/ssh_privkey_fuzzer.c ['ssh_privkey_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc']
/src/libssh/src/pki_context.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/connector.c ['ssh_client_fuzzer_nalloc'] []
/src/libssh/src/error.c ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/auth.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/packet.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/tests/fuzz/ssh_client_fuzzer.c ['ssh_client_fuzzer_nalloc'] ['ssh_client_fuzzer_nalloc']
/src/libssh/src/pcap.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] []
/src/libssh/src/connect.c ['ssh_client_fuzzer_nalloc'] []
/src/libssh/src/kex.c ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/callbacks.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/tests/fuzz/ssh_server_fuzzer.c ['ssh_server_fuzzer'] ['ssh_server_fuzzer']
/src/libssh/tests/fuzz/ssh_client_config_fuzzer.c ['ssh_client_config_fuzzer'] ['ssh_client_config_fuzzer']
/src/libssh/src/bind_config.c ['ssh_bind_config_fuzzer'] ['ssh_bind_config_fuzzer']
/src/libssh/tests/fuzz/ssh_bind_config_fuzzer.c ['ssh_bind_config_fuzzer'] ['ssh_bind_config_fuzzer']
/src/libssh/src/channels.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/getrandom_crypto.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/curve25519.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/init.c ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/config.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer']
/src/libssh/src/threads.c ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/poll.c ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/crypto_common.c [] []
/src/libssh/src/external/libcrux_mlkem768_sha3.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/agent.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/string.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/mlkem.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/dh.c ['ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/session.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/threads/pthread.c ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/knownhosts.c ['ssh_known_hosts_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/misc.c ['ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/dh-gex.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/socket.c ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/hybrid_mlkem.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/messages.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer']
/src/libssh/src/mlkem_native.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/buffer.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/external/blowfish.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] []
/src/libssh/src/match.c ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/pki_ed25519_common.c ['ssh_sshsig_fuzzer_nalloc', 'ssh_client_fuzzer_nalloc'] []
/src/libssh/src/packet_cb.c [] []
/src/libssh/src/packet_crypt.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/curve25519_crypto.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/ttyopts.c [] []
/src/libssh/tests/fuzz/ssh_sshsig_fuzzer.c ['ssh_sshsig_fuzzer_nalloc'] ['ssh_sshsig_fuzzer_nalloc']
/src/libssh/tests/fuzz/nallocinc.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/base64.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc']
/src/libssh/src/options.c ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/dh_crypto.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/token.c ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/bind.c ['ssh_bind_config_fuzzer', 'ssh_server_fuzzer'] ['ssh_bind_config_fuzzer', 'ssh_server_fuzzer']
/src/libssh/tests/fuzz/ssh_known_hosts_fuzzer.c ['ssh_known_hosts_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc']
/src/libssh/tests/fuzz/ssh_pubkey_fuzzer.c ['ssh_pubkey_fuzzer_nalloc'] ['ssh_pubkey_fuzzer_nalloc']
/src/libssh/src/config_parser.c ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_bind_config_fuzzer', 'ssh_client_config_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/ecdh_crypto.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/pki_container_openssh.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_pubkey_fuzzer_nalloc']
/src/libssh/src/sntrup761.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/pki.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/threads/libcrypto.c ['ssh_known_hosts_fuzzer_nalloc'] ['ssh_known_hosts_fuzzer_nalloc']
/src/libssh/src/ecdh.c [] []
/src/libssh/src/external/sntrup761.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/bignum.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/gzip.c ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/client.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/log.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_known_hosts_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/md_crypto.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_sshsig_fuzzer_nalloc', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/wrapper.c ['ssh_privkey_fuzzer_nalloc', 'ssh_bind_config_fuzzer', 'ssh_pubkey_fuzzer_nalloc', 'ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_client_config_fuzzer', 'ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']
/src/libssh/src/kdf.c ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc'] ['ssh_server_fuzzer', 'ssh_client_fuzzer_nalloc']

Directories in report

Directory
/src/libssh/src/
/src/libssh/tests/fuzz/
/src/libssh/src/threads/
/src/libssh/src/external/