Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzzer details

Fuzzer: sshsigopt_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 0 0.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 31 100.%
All colors 31 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
0 0 None 2 2 opt_flag call site: 00005 /src/openssh/misc.c:2590
0 0 None 0 3 sshsigopt_parse call site: 00028 /src/openssh/sshsig.c:715
0 0 None 0 0 opt_dequote call site: 00012 /src/openssh/misc.c:2614
0 0 None 0 0 sshsigopt_parse call site: 00002 /src/openssh/sshsig.c:643

Runtime coverage analysis

Covered functions
7
Functions that are reachable but not covered
9
Reachable functions
16
Percentage of reachable functions covered
43.75%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/sshsigopt_fuzz.cc 1
sshsig.c 2
misc.c 4

Fuzzer: sig_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 66 63.4%
gold [1:9] 8 7.69%
yellow [10:29] 1 0.96%
greenyellow [30:49] 1 0.96%
lawngreen 50+ 28 26.9%
All colors 104 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
450 450 2 :

['cert_new', 'sshkey_free']

450 450 sshkey_new call site: 00010 /src/openssh/sshkey.c:629
220 220 1 :

['sshkey_free']

220 220 sshkey_generate call site: 00007 /src/openssh/sshkey.c:1414
164 164 1 :

['_getentropy_fail']

168 229 _rs_stir call site: 00000 /src/openssh/openbsd-compat/arc4random.c:116
164 164 2 :

['sshfatal', 'ERR_get_error']

164 164 _ssh_compat_getentropy call site: 00000 /src/openssh/openbsd-compat/bsd-getentropy.c:45
158 158 5 :

['strlcpy', 'do_log', 'strrchr', 'match_pattern_list', 'getpid']

158 158 sshlogv call site: 00028 /src/openssh/log.c:460
73 73 2 :

['abort', 'ssh_err']

73 73 generate_or_die(int,unsignedint) call site: 00000 /src/openssh/regress/misc/fuzz-harness/sig_fuzz.cc:18
13 13 1 :

['rsa_hash_id_from_keyname']

21 703 ssh_rsa_verify call site: 00000 /src/openssh/ssh-rsa.c:508
4 4 1 :

['timingsafe_bcmp']

4 9 openssh_RSA_verify call site: 00000 /src/openssh/ssh-rsa.c:659
2 2 1 :

['_exit']

2 2 _rs_init call site: 00000 /src/openssh/openbsd-compat/arc4random.c:102
2 2 1 :

['memset']

2 2 _rs_forkdetect call site: 00000 /src/openssh/openbsd-compat/./arc4random.h:58
2 2 1 :

['munmap']

2 2 _rs_allocate call site: 00000 /src/openssh/openbsd-compat/./arc4random.h:71
2 2 1 :

['EC_KEY_free']

2 2 ssh_ecdsa_generate call site: 00000 /src/openssh/ssh-ecdsa.c:135

Runtime coverage analysis

Covered functions
104
Functions that are reachable but not covered
38
Reachable functions
55
Percentage of reachable functions covered
30.91%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/sig_fuzz.cc 2
sshkey.c 13
sshbuf.c 3
misc.c 1
log.c 3
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
openbsd-compat/freezero.c 1
ssherr.c 1

Fuzzer: authopt_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 56 37.0%
gold [1:9] 3 1.98%
yellow [10:29] 1 0.66%
greenyellow [30:49] 1 0.66%
lawngreen 50+ 90 59.6%
All colors 151 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
168 765 4 :

['a2tun', 'xstrdup', 'free', 'strchr']

168 765 a2tun call site: 00082 /src/openssh/misc.c:536
2 2 1 :

['getpagesize']

8 8 recallocarray call site: 00051 /src/openssh/openbsd-compat/recallocarray.c:64
2 2 1 :

['ntohs']

2 2 a2port call site: 00075 /src/openssh/misc.c:524
0 11 1 :

['sshauthopt_free']

0 11 sshauthopt_merge call site: 00145 /src/openssh/auth-options.c:635
0 0 None 12 100 sshauthopt_merge call site: 00132 /src/openssh/auth-options.c:541
0 0 None 8 19 sshauthopt_merge call site: 00142 /src/openssh/auth-options.c:614
0 0 None 6 675 sshauthopt_parse call site: 00003 /src/openssh/auth-options.c:333
0 0 None 2 2 recallocarray call site: 00053 /src/openssh/openbsd-compat/recallocarray.c:77
0 0 None 2 2 strtonum call site: 00071 /src/openssh/openbsd-compat/strtonum.c:52
0 0 None 0 11 sshauthopt_parse call site: 00004 /src/openssh/auth-options.c:335
0 0 None 0 11 sshauthopt_parse call site: 00041 /src/openssh/auth-options.c:405
0 0 None 0 11 sshauthopt_parse call site: 00044 /src/openssh/auth-options.c:417

Runtime coverage analysis

Covered functions
19
Functions that are reachable but not covered
42
Reachable functions
61
Percentage of reachable functions covered
31.15%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/authopt_fuzz.cc 1
auth-options.c 7
misc.c 8
openbsd-compat/recallocarray.c 1
openbsd-compat/strtonum.c 1
xmalloc.c 2
fatal.c 1
log.c 2
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
cleanup.c 1
openbsd-compat/freezero.c 1

Fuzzer: pubkey_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 42 38.1%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 68 61.8%
All colors 110 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
254 254 1 :

['sshkey_get_sigtype']

254 1066 cert_parse call site: 00000 /src/openssh/sshkey.c:1869
158 158 5 :

['strlcpy', 'do_log', 'strrchr', 'match_pattern_list', 'getpid']

158 158 sshlogv call site: 00013 /src/openssh/log.c:460
13 13 1 :

['rsa_hash_id_from_keyname']

21 703 ssh_rsa_verify call site: 00000 /src/openssh/ssh-rsa.c:508
4 4 1 :

['timingsafe_bcmp']

4 9 openssh_RSA_verify call site: 00000 /src/openssh/ssh-rsa.c:659
2 2 1 :

['BN_clear_free']

2 2 sshbuf_get_bignum2 call site: 00000 /src/openssh/sshbuf-getput-crypto.c:48
2 2 1 :

['explicit_bzero']

2 2 sshkey_xmss_free_state call site: 00000 /src/openssh/sshkey-xmss.c:144
2 2 1 :

['SHA512']

2 2 core_hash_SHA2 call site: 00000 /src/openssh/xmss_hash.c:55
0 222 1 :

['cert_free']

0 222 cert_new call site: 00083 /src/openssh/sshkey.c:595
0 220 1 :

['sshkey_free']

0 220 sshkey_new call site: 00081 /src/openssh/sshkey.c:630
0 203 1 :

['sshbuf_free']

0 203 sshbuf_froms call site: 00000 /src/openssh/sshbuf-getput-basic.c:561
0 203 1 :

['sshbuf_free']

0 203 sshbuf_fromb call site: 00049 /src/openssh/sshbuf.c:151
0 0 None 254 1269 cert_parse call site: 00000 /src/openssh/sshkey.c:1865

Runtime coverage analysis

Covered functions
157
Functions that are reachable but not covered
32
Reachable functions
76
Percentage of reachable functions covered
57.89%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/pubkey_fuzz.cc 1
sshkey.c 11
sshbuf.c 9
misc.c 1
log.c 3
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
openbsd-compat/freezero.c 1
sshbuf-getput-basic.c 3

Fuzzer: privkey_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 46 35.6%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 83 64.3%
All colors 129 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
254 254 1 :

['sshkey_get_sigtype']

254 1066 cert_parse call site: 00000 /src/openssh/sshkey.c:1869
158 158 5 :

['strlcpy', 'do_log', 'strrchr', 'match_pattern_list', 'getpid']

158 158 sshlogv call site: 00014 /src/openssh/log.c:460
82 242 4 :

['xmss_sign_open', 'sshkey_xmss_params', 'malloc', 'sshlog']

82 455 ssh_xmss_verify call site: 00000 /src/openssh/ssh-xmss.c:314
13 13 1 :

['rsa_hash_id_from_keyname']

21 703 ssh_rsa_verify call site: 00000 /src/openssh/ssh-rsa.c:508
4 2086 12 :

['sshbuf_put', 'sshbuf_new', 'sshbuf_ptr', 'sshbuf_put_u8', 'sshlog', 'ssh_digest_memory', 'sshbuf_len', 'sshbuf_put_u32', 'crypto_sign_ed25519_open', 'malloc', 'strlen', 'calloc']

4 2504 ssh_ed25519_sk_verify call site: 00000 /src/openssh/ssh-ed25519-sk.c:172
4 23 4 :

['sshkey_ecdsa_nid_from_name', 'memcmp', 'strcmp', 'sshkey_impl_from_type']

4 243 sshkey_private_deserialize call site: 00062 /src/openssh/sshkey.c:2533
4 4 1 :

['timingsafe_bcmp']

4 9 openssh_RSA_verify call site: 00000 /src/openssh/ssh-rsa.c:659
2 191 2 :

['timingsafe_bcmp', 'sshbuf_ptr']

2 191 sshbuf_cmp call site: 00000 /src/openssh/sshbuf-misc.c:245
2 2 1 :

['BN_clear_free']

2 2 sshbuf_get_bignum2 call site: 00000 /src/openssh/sshbuf-getput-crypto.c:48
0 711 1 :

['sshbuf_put_u8']

0 716 sshbuf_dtob64 call site: 00000 /src/openssh/sshbuf-misc.c:111
0 222 1 :

['cert_free']

0 222 cert_new call site: 00093 /src/openssh/sshkey.c:595
0 220 1 :

['sshkey_free']

0 220 sshkey_new call site: 00091 /src/openssh/sshkey.c:630

Runtime coverage analysis

Covered functions
161
Functions that are reachable but not covered
33
Reachable functions
80
Percentage of reachable functions covered
58.75%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/privkey_fuzz.cc 1
sshbuf.c 9
sshkey.c 14
sshbuf-getput-basic.c 4
misc.c 1
log.c 3
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
openbsd-compat/freezero.c 1

Fuzzer: agent_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1092 66.9%
gold [1:9] 58 3.55%
yellow [10:29] 27 1.65%
greenyellow [30:49] 16 0.98%
lawngreen 50+ 437 26.8%
All colors 1630 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
3596 5247 17 :

['read_passphrase', 'sshbuf_ptr', 'parse_userauth_request', 'sshkey_type', 'sshkey_sign', 'sshkey_equal', 'check_websafe_message_contents', 'sshbuf_len', 'agent_decode_alg', 'sshkey_is_sk', 'sshkey_fingerprint', 'identity_permitted', 'strncmp', 'buf_equal', 'notify_start', 'confirm_key', 'lookup_identity']

4246 10455 process_sign_request2 call site: 00640 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:855
2224 3778 20 :

['sshkey_type', 'sshbuf_reset', 'xcalloc', 'match_pattern_list', 'strerror', 'monotime', 'sshkey_ssh_name', 'identity_permitted', 'dump_dest_constraints', 'sshfatal', 'parse_key_constraints', 'strcasecmp', 'sshkey_is_sk', 'realpath', 'xstrdup', 'lookup_identity', 'sshkey_fingerprint', '__errno_location', 'sshkey_shield_private', 'socket_is_remote']

2224 6346 process_add_identity call site: 01133 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:1361
1566 3198 6 :

['permitted_by_dest_constraints', 'sshfatal', 'sshlog', 'sshkey_type', 'free', 'sshkey_fingerprint']

1566 3198 identity_permitted call site: 00742 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:483
757 757 3 :

['process_ext_session_bind', 'free', 'strcmp']

757 1258 process_extension call site: 01582 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:1776
433 433 1 :

['sshkey_parse_private_pem_fileblob']

433 433 sshkey_parse_private_fileblob_type call site: 00388 /src/openssh/sshkey.c:3585
400 1188 4 :

['identity_permitted', 'sshfatal', 'free_identity', 'lookup_identity']

400 1909 process_remove_identity call site: 01266 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:1000
344 344 6 :

['sshfatal', 'waitpid', '__errno_location', 'ssh_signal', 'strerror', 'kill']

344 344 notify_complete call site: 01073 /src/openssh/readpass.c:320
202 202 1 :

['cert_compare']

202 221 sshkey_equal call site: 00375 /src/openssh/sshkey.c:721
164 164 1 :

['_getentropy_fail']

168 229 _rs_stir call site: 00277 /src/openssh/openbsd-compat/arc4random.c:116
164 164 2 :

['sshfatal', 'ERR_get_error']

164 164 _ssh_compat_getentropy call site: 00278 /src/openssh/openbsd-compat/bsd-getentropy.c:45
162 233 2 :

['sshfatal', 'ssh_err']

162 233 no_identities call site: 00597 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:1522
162 233 2 :

['sshfatal', 'ssh_err']

162 233 send_status call site: 00609 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:610

Runtime coverage analysis

Covered functions
242
Functions that are reachable but not covered
278
Reachable functions
442
Percentage of reachable functions covered
37.1%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/agent_fuzz.cc 1
regress/misc/fuzz-harness/agent_fuzz_helper.c 10
log.c 5
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
xmalloc.c 6
fatal.c 1
regress/misc/fuzz-harness/../../../ssh-agent.c 40
ssh-pkcs11.c 30
sshkey.c 68
sshbuf.c 14
misc.c 6
openbsd-compat/freezero.c 1
sshbuf-getput-basic.c 17
openbsd-compat/recallocarray.c 1
sshbuf-misc.c 2
openbsd-compat/base64.c 2
cipher.c 8
openbsd-compat/bcrypt_pbkdf.c 2
hash.c 1
openbsd-compat/blowfish.c 6
openbsd-compat/arc4random.c 6
openbsd-compat/./arc4random.h 3
openbsd-compat/bsd-getentropy.c 1
openbsd-compat/./chacha_private.h 3
cipher-chachapoly-libcrypto.c 3
poly1305.c 1
openbsd-compat/timingsafe_bcmp.c 1
ssherr.c 1
digest-openssl.c 4
openbsd-compat/strlcat.c 1
readpass.c 6
openbsd-compat/readpassphrase.c 1
openbsd-compat/bsd-closefrom.c 2
ssh-sk.c 8
sshkey-xmss.c 1

Fuzzer: kex_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 490 35.2%
gold [1:9] 135 9.71%
yellow [10:29] 3 0.21%
greenyellow [30:49] 3 0.21%
lawngreen 50+ 759 54.6%
All colors 1390 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
1383 7125 13 :

['ssh_packet_log_type', 'ssh_packet_check_rekey', 'sshbuf_consume_end', 'ssh_packet_disconnect', 'sshbuf_ptr', 'sshbuf_putb', 'sshbuf_get_u8', 'sshbuf_consume', 'ssh_packet_write_wait', 'sshbuf_reset', 'ssh_packet_enable_delayed_compress', 'uncompress_buffer', 'sshpkt_disconnect']

1383 7599 ssh_packet_read_poll2 call site: 01312 /src/openssh/packet.c:1692
1131 1131 1 :

['ssh_packet_disconnect']

1383 7404 ssh_packet_read_poll2 call site: 01316 /src/openssh/packet.c:1713
1131 1131 1 :

['ssh_packet_disconnect']

1131 2234 ssh_packet_send2_wrapped call site: 00885 /src/openssh/packet.c:1302
1131 1131 1 :

['ssh_packet_disconnect']

1131 1131 kex_choose_conf call site: 01087 /src/openssh/kex.c:966
790 790 4 :

['get_peer_port', 'get_local_port', 'get_peer_ipaddr', 'get_local_ipaddr']

790 790 ssh_remote_ipaddr call site: 00574 /src/openssh/packet.c:521
727 737 8 :

['BN_clear_free', 'getline', 'arc4random_uniform', 'dh_new_group', 'rewind', 'parse_prime', 'fclose', 'free']

727 1425 choose_dh call site: 00000 /src/openssh/dh.c:167
548 755 7 :

['__errno_location', 'ssh_packet_write_poll', 'ppoll', 'ms_subtract_diff', 'monotime_tv', 'ssh_packet_have_data_to_write', 'ms_to_timespec']

548 755 ssh_packet_write_wait call site: 00933 /src/openssh/packet.c:2135
486 920 4 :

['sshfatal', 'free', 'match_filter_denylist', 'sshlog']

486 920 compat_kex_proposal call site: 00638 /src/openssh/compat.c:146
433 433 1 :

['sshkey_parse_private_pem_fileblob']

433 433 sshkey_parse_private_fileblob_type call site: 00355 /src/openssh/sshkey.c:3585
285 509 3 :

['bcrypt_pbkdf', 'sshbuf_get_string', 'strlen']

289 3053 private2_decrypt call site: 00199 /src/openssh/sshkey.c:3025
283 283 1 :

['ssh_packet_read_poll2_mux']

283 283 ssh_packet_read_poll2 call site: 01256 /src/openssh/packet.c:1570
252 929 3 :

['uncompress_buffer', 'sshbuf_putb', 'sshbuf_reset']

252 4159 ssh_packet_read_poll2 call site: 01323 /src/openssh/packet.c:1744

Runtime coverage analysis

Covered functions
498
Functions that are reachable but not covered
181
Reachable functions
454
Percentage of reachable functions covered
60.13%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/kex_fuzz.cc 11
log.c 6
xmalloc.c 4
fatal.c 1
match.c 5
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
cleanup.c 1
sshbuf.c 16
sshkey.c 42
misc.c 10
sshbuf-getput-basic.c 15
openbsd-compat/recallocarray.c 1
sshbuf-misc.c 2
openbsd-compat/base64.c 1
openbsd-compat/freezero.c 1
cipher.c 13
openbsd-compat/bcrypt_pbkdf.c 2
hash.c 1
openbsd-compat/blowfish.c 6
openbsd-compat/arc4random.c 6
openbsd-compat/./arc4random.h 3
openbsd-compat/bsd-getentropy.c 1
openbsd-compat/./chacha_private.h 3
cipher-chachapoly-libcrypto.c 4
poly1305.c 1
openbsd-compat/timingsafe_bcmp.c 1
ssherr.c 1
ssh_api.c 11
entropy.c 1
openbsd-compat/openssl-compat.c 2
packet.c 48
kex.c 22
mac.c 6
umac.c 26
./umac.c 26
hmac.c 6
digest-openssl.c 9
canohost.c 7
kex-names.c 7
openbsd-compat/strlcat.c 1
compat.c 2
dispatch.c 2

Fuzzer: sshsig_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 71 26.6%
gold [1:9] 3 1.12%
yellow [10:29] 1 0.37%
greenyellow [30:49] 9 3.38%
lawngreen 50+ 182 68.4%
All colors 266 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
166 166 1 :

['xstrdup']

166 166 tohex call site: 00118 /src/openssh/misc.c:1539
162 162 1 :

['sshfatal']

162 162 xcalloc call site: 00130 /src/openssh/xmalloc.c:56
122 158 5 :

['strlcpy', 'do_log', 'strrchr', 'match_pattern_list', 'getpid']

122 158 sshlogv call site: 00023 /src/openssh/log.c:460
82 242 4 :

['xmss_sign_open', 'sshkey_xmss_params', 'malloc', 'sshlog']

82 455 ssh_xmss_verify call site: 00000 /src/openssh/ssh-xmss.c:314
50 50 3 :

['sshkey_ec_validate_public', 'EC_KEY_get0_public_key', 'EC_KEY_get0_group']

52 52 ssh_ecdsa_deserialize_public call site: 00000 /src/openssh/ssh-ecdsa.c:177
13 13 1 :

['rsa_hash_id_from_keyname']

21 703 ssh_rsa_verify call site: 00000 /src/openssh/ssh-rsa.c:508
6 6 3 :

['closelog', 'exit', 'openlog']

6 6 log_init call site: 00008 /src/openssh/log.c:213
2 217 2 :

['sshbuf_get_string_direct', 'EC_KEY_set_public_key']

6 221 sshbuf_get_eckey call site: 00000 /src/openssh/sshbuf-getput-crypto.c:110
2 2 1 :

['strlen']

2 2 strlcat call site: 00133 /src/openssh/openbsd-compat/strlcat.c:48
2 2 1 :

['BN_clear_free']

2 2 sshbuf_get_bignum2 call site: 00000 /src/openssh/sshbuf-getput-crypto.c:48
0 254 1 :

['sshkey_get_sigtype']

0 1066 cert_parse call site: 00000 /src/openssh/sshkey.c:1869
0 233 1 :

['sshkey_deserialize_sk']

0 233 ssh_ecdsa_sk_deserialize_public call site: 00000 /src/openssh/ssh-ecdsa-sk.c:133

Runtime coverage analysis

Covered functions
154
Functions that are reachable but not covered
37
Reachable functions
108
Percentage of reachable functions covered
65.74%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/sshsig_fuzz.cc 1
sshbuf.c 13
log.c 5
sshsig.c 6
misc.c 2
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
openbsd-compat/freezero.c 1
sshbuf-misc.c 1
openbsd-compat/timingsafe_bcmp.c 1
sshbuf-getput-basic.c 10
ssherr.c 1
digest-openssl.c 5
xmalloc.c 3
fatal.c 1
cleanup.c 1
openbsd-compat/strlcat.c 1
openbsd-compat/recallocarray.c 1
sshkey.c 17

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
sshkey_check_revoked /src/openssh/authfile.c 2 ['N/A', 'N/A'] 22 0 58 9 2 178 0 1399 650
kex_gen_client /src/openssh/kexgen.c 1 ['N/A'] 27 0 134 24 5 449 0 2231 583
ssh_xmss_sign /src/openssh/ssh-xmss.c 9 ['N/A', 'N/A', 'N/A', 'N/A', 'size_t', 'N/A', 'N/A', 'N/A', 'int'] 15 0 375 67 27 140 0 826 335
xxxmain /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c 2 ['int', 'N/A'] 19 0 848 142 33 437 0 2507 298
kexgex_server /src/openssh/kexgexs.c 1 ['N/A'] 28 0 17 3 2 374 0 1965 173
ssh_sk_sign /src/openssh/regress/misc/sk-dummy/sk-dummy.c 10 ['int', 'N/A', 'size_t', 'N/A', 'N/A', 'size_t', 'char', 'N/A', 'N/A', 'N/A'] 7 0 180 22 7 63 0 199 162
sshauthopt_from_cert /src/openssh/auth-options.c 1 ['N/A'] 7 0 108 19 9 74 0 500 124
sshkey_save_private /src/openssh/authfile.c 7 ['N/A', 'N/A', 'N/A', 'N/A', 'int', 'N/A', 'int'] 22 0 86 11 5 184 0 1045 121
ssh_krl_to_blob /src/openssh/krl.c 2 ['N/A', 'N/A'] 17 0 412 78 30 78 0 486 96
subprocess /src/openssh/misc.c 9 ['N/A', 'N/A', 'int', 'N/A', 'N/A', 'int', 'N/A', 'N/A', 'N/A'] 8 0 708 108 31 69 0 326 87

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
64.0%
823 / 1283
Cyclomatic complexity statically reachable by fuzzers
67.0%
6088 / 9069

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

regress/misc/fuzz-harness/sshsigopt_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


regress/misc/fuzz-harness/sig_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshlog', 'freezero', 'sshkey_is_cert', 'sshbuf_free']

regress/misc/fuzz-harness/authopt_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshauthopt_parse', 'recallocarray', 'sshauthopt_merge', 'a2port', 'dup_strings']

regress/misc/fuzz-harness/pubkey_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshlog', 'sshbuf_fromb', 'sshbuf_set_parent', 'cert_new', 'sshkey_free']

regress/misc/fuzz-harness/privkey_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshlog', 'sshbuf_ptr', 'sshkey_private_deserialize', 'sshbuf_set_parent', 'sshbuf_fromb', 'cert_new', 'sshkey_free', 'sshkey_froms']

regress/misc/fuzz-harness/agent_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['identity_permitted', 'process_add_smartcard_key', 'process_add_identity', 'sshkey_ssh_name', 'sshkey_fingerprint', 'sshkey_verify', 'sshkey_parse_private_fileblob_type', 'xstrdup', 'private2_decrypt', 'fingerprint_b64']

regress/misc/fuzz-harness/kex_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['ssh_remote_ipaddr', 'crypto_hash_sha512', 'ssh_packet_close_internal', 'sshkey_parse_private_fileblob_type', 'private2_decrypt', 'cipher_init', 'sshkey_check_rsa_length', 'ssh_packet_write_poll', 'ssh_packet_send2_wrapped', 'ssh_packet_next']

regress/misc/fuzz-harness/sshsig_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['match_pattern_list', 'hash_buffer', 'log_init', 'sshbuf_fromb', 'sshlog', 'ssh_digest_memory', 'tohex', 'sshbuf_allocate', 'sshbuf_put_stringb', 'sshsig_wrap_verify']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/openssh/hmac.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/log.c ['sig_fuzz', 'authopt_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['sig_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz']
/src/openssh/kexdh.c [] []
/src/openssh/kexgex.c [] []
/src/openssh/openbsd-compat/base64.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/misc.c ['sshsigopt_fuzz', 'sig_fuzz', 'authopt_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['sshsigopt_fuzz', 'authopt_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz']
/src/openssh/openbsd-compat/port-net.c [] []
/src/openssh/ssherr.c ['sig_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['agent_fuzz', 'kex_fuzz', 'sshsig_fuzz']
/src/openssh/openbsd-compat/libressl-api-compat.c [] []
/src/openssh/smult_curve25519_ref.c [] []
/src/openssh/xmss_hash.c [] []
/src/openssh/match.c ['sig_fuzz', 'authopt_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['kex_fuzz', 'sshsig_fuzz']
/src/openssh/ssh-ed25519-sk.c [] []
/src/openssh/sshbuf-misc.c ['agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['agent_fuzz', 'kex_fuzz', 'sshsig_fuzz']
/src/openssh/openbsd-compat/./arc4random.h ['agent_fuzz', 'kex_fuzz'] []
/src/openssh/ssh-ecdsa-sk.c [] []
/src/openssh/xmalloc.c ['authopt_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['agent_fuzz', 'kex_fuzz', 'sshsig_fuzz']
/src/openssh/ssh-pkcs11.c ['agent_fuzz'] []
/src/openssh/sshbuf-io.c [] []
/src/openssh/kexgen.c [] []
/src/openssh/kexgexc.c [] []
/src/openssh/auth-options.c ['authopt_fuzz'] ['authopt_fuzz']
/src/openssh/openbsd-compat/arc4random_uniform.c [] []
/src/openssh/authfile.c [] []
/src/openssh/ssh-ed25519.c [] []
/src/openssh/platform-misc.c [] []
/src/openssh/kexc25519.c [] []
/src/openssh/dispatch.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/kexecdh.c [] []
/src/openssh/openbsd-compat/bsd-closefrom.c ['agent_fuzz'] []
/src/openssh/regress/misc/fuzz-harness/authopt_fuzz.cc ['authopt_fuzz'] ['authopt_fuzz']
/src/openssh/cipher-chachapoly-libcrypto.c ['agent_fuzz', 'kex_fuzz'] []
/src/openssh/readpass.c ['agent_fuzz'] ['agent_fuzz']
/src/openssh/utf8.c [] []
/src/openssh/openbsd-compat/readpassphrase.c ['agent_fuzz'] []
/src/openssh/digest-openssl.c ['agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['agent_fuzz', 'kex_fuzz', 'sshsig_fuzz']
/src/openssh/openbsd-compat/recallocarray.c ['authopt_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['authopt_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz']
/src/openssh/fatal.c ['authopt_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] []
/src/openssh/dh.c [] []
/src/openssh/regress/misc/fuzz-harness/sshsigopt_fuzz.cc ['sshsigopt_fuzz'] ['sshsigopt_fuzz']
/src/openssh/regress/misc/sk-dummy/sk-dummy.c [] []
/src/openssh/compat.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/umac.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/atomicio.c [] []
/src/openssh/kex.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/poly1305.c ['agent_fuzz', 'kex_fuzz'] []
/src/openssh/./umac.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/packet.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/openbsd-compat/vis.c ['sig_fuzz', 'authopt_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/ed25519.c [] []
/src/openssh/kexgexs.c [] []
/src/openssh/xmss_hash_address.c [] []
/src/openssh/openbsd-compat/arc4random.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/sshkey-xmss.c ['agent_fuzz'] []
/src/openssh/regress/misc/fuzz-harness/ssh-sk-null.cc [] []
/src/openssh/openbsd-compat/strlcat.c ['agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['agent_fuzz', 'kex_fuzz', 'sshsig_fuzz']
/src/openssh/openbsd-compat/getopt_long.c [] []
/src/openssh/bitmap.c [] []
/src/openssh/platform-tracing.c [] []
/src/openssh/krl.c [] []
/src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c ['agent_fuzz'] []
/src/openssh/openbsd-compat/bsd-getpeereid.c [] []
/src/openssh/ssh-sk.c ['agent_fuzz'] []
/src/openssh/regress/misc/fuzz-harness/sshsig_fuzz.cc ['sshsig_fuzz'] ['sshsig_fuzz']
/src/openssh/regress/misc/fuzz-harness/privkey_fuzz.cc ['privkey_fuzz'] ['privkey_fuzz']
/src/openssh/mac.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/openbsd-compat/bsd-getentropy.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/bcrypt_pbkdf.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz']
/src/openssh/openbsd-compat/bsd-misc.c [] []
/src/openssh/cipher.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/sshbuf-getput-crypto.c [] []
/src/openssh/regress/misc/fuzz-harness/pubkey_fuzz.cc ['pubkey_fuzz'] ['pubkey_fuzz']
/src/openssh/regress/misc/fuzz-harness/agent_fuzz.cc ['agent_fuzz'] ['agent_fuzz']
/src/openssh/ssh_api.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/ssh-rsa.c [] []
/src/openssh/canohost.c ['kex_fuzz'] []
/src/openssh/sntrup761.c [] []
/src/openssh/xmss_fast.c [] []
/src/openssh/xmss_wots.c [] []
/src/openssh/kexsntrup761x25519.c [] []
/src/openssh/xmss_commons.c [] []
/src/openssh/addrmatch.c [] []
/src/openssh/openbsd-compat/openssl-compat.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/regress/misc/fuzz-harness/kex_fuzz.cc ['kex_fuzz'] ['kex_fuzz']
/src/openssh/hash.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/freezero.c ['sig_fuzz', 'authopt_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['sig_fuzz', 'authopt_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz']
/src/openssh/sshbuf-getput-basic.c ['pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz']
/src/openssh/openbsd-compat/blowfish.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz']
/src/openssh/openbsd-compat/strlcpy.c ['sig_fuzz', 'authopt_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/regress/misc/fuzz-harness/sig_fuzz.cc ['sig_fuzz'] ['sig_fuzz']
/src/openssh/cleanup.c ['authopt_fuzz', 'kex_fuzz', 'sshsig_fuzz'] []
/src/openssh/ssh-ecdsa.c [] []
/src/openssh/sshkey.c ['sig_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['sig_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz']
/src/openssh/ssh-xmss.c [] []
/src/openssh/sshsig.c ['sshsigopt_fuzz', 'sshsig_fuzz'] ['sshsigopt_fuzz', 'sshsig_fuzz']
/src/openssh/regress/misc/fuzz-harness/agent_fuzz_helper.c ['agent_fuzz'] ['agent_fuzz']
/src/openssh/addr.c [] []
/src/openssh/openbsd-compat/timingsafe_bcmp.c ['agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['agent_fuzz', 'kex_fuzz', 'sshsig_fuzz']
/src/openssh/platform-pledge.c [] []
/src/openssh/sshbuf.c ['sig_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz'] ['sig_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'agent_fuzz', 'kex_fuzz', 'sshsig_fuzz']
/src/openssh/entropy.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/kex-names.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/openbsd-compat/strtonum.c ['authopt_fuzz'] ['authopt_fuzz']
/src/openssh/openbsd-compat/./chacha_private.h ['agent_fuzz', 'kex_fuzz'] []

Directories in report

Directory
/src/openssh/regress/misc/sk-dummy/
/src/openssh/regress/misc/fuzz-harness/../../../
/src/openssh/./
/src/openssh/openbsd-compat/
/src/openssh/
/src/openssh/regress/misc/fuzz-harness/
/src/openssh/openbsd-compat/./