Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: authopt_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 57 36.7%
gold [1:9] 3 1.93%
yellow [10:29] 1 0.64%
greenyellow [30:49] 1 0.64%
lawngreen 50+ 93 60.0%
All colors 155 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
169 748 4 :

['xstrdup', 'strchr', 'a2tun', 'free']

169 748 a2tun call site: 00084 /src/openssh/misc.c:557
2 2 1 :

['getpagesize']

8 8 recallocarray call site: 00052 /src/openssh/openbsd-compat/recallocarray.c:64
2 2 1 :

['ntohs']

2 2 a2port call site: 00077 /src/openssh/misc.c:545
0 11 1 :

['sshauthopt_free']

0 11 sshauthopt_merge call site: 00149 /src/openssh/auth-options.c:635
0 0 None 12 100 sshauthopt_merge call site: 00135 /src/openssh/auth-options.c:541
0 0 None 8 19 sshauthopt_merge call site: 00146 /src/openssh/auth-options.c:614
0 0 None 6 669 sshauthopt_parse call site: 00003 /src/openssh/auth-options.c:333
0 0 None 2 2 recallocarray call site: 00054 /src/openssh/openbsd-compat/recallocarray.c:77
0 0 None 2 2 strtonum call site: 00072 /src/openssh/openbsd-compat/strtonum.c:52
0 0 None 0 11 sshauthopt_parse call site: 00004 /src/openssh/auth-options.c:335
0 0 None 0 11 sshauthopt_parse call site: 00042 /src/openssh/auth-options.c:405
0 0 None 0 11 sshauthopt_parse call site: 00045 /src/openssh/auth-options.c:417

Runtime coverage analysis

Covered functions
19
Functions that are reachable but not covered
42
Reachable functions
61
Percentage of reachable functions covered
31.15%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/authopt_fuzz.cc 1
auth-options.c 7
misc.c 8
openbsd-compat/recallocarray.c 1
openbsd-compat/strtonum.c 1
xmalloc.c 2
fatal.c 1
log.c 2
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
cleanup.c 1
openbsd-compat/freezero.c 1

Fuzzer: pubkey_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 50 26.4%
gold [1:9] 4 2.11%
yellow [10:29] 0 0.0%
greenyellow [30:49] 1 0.52%
lawngreen 50+ 134 70.8%
All colors 189 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
209 209 1 :

['ssh_digest_buffer']

209 607 webauthn_check_prepare_hash call site: 00000 /src/openssh/ssh-ecdsa-sk.c:217
158 158 5 :

['do_log', 'strrchr', 'strlcpy', 'match_pattern_list', 'getpid']

158 158 sshlogv call site: 00015 /src/openssh/log.c:462
13 13 1 :

['rsa_hash_id_from_keyname']

23 674 ssh_rsa_verify call site: 00000 /src/openssh/ssh-rsa.c:504
2 2 1 :

['BN_clear_free']

2 2 sshbuf_get_bignum2 call site: 00000 /src/openssh/sshbuf-getput-crypto.c:48
2 2 1 :

['explicit_bzero']

2 2 sshkey_xmss_free_state call site: 00000 /src/openssh/sshkey-xmss.c:144
2 2 1 :

['munmap']

2 2 sshkey_prekey_free call site: 00105 /src/openssh/sshkey.c:769
2 2 1 :

['SHA512']

2 2 core_hash_SHA2 call site: 00000 /src/openssh/xmss_hash.c:55
0 717 1 :

['sshbuf_put_u8']

0 722 sshbuf_dtob64 call site: 00000 /src/openssh/sshbuf-misc.c:147
0 225 1 :

['sshkey_free']

0 225 sshkey_new call site: 00087 /src/openssh/sshkey.c:722
0 225 1 :

['cert_free']

0 225 cert_new call site: 00089 /src/openssh/sshkey.c:687
0 199 1 :

['sshbuf_free']

0 199 sshbuf_froms call site: 00141 /src/openssh/sshbuf-getput-basic.c:561
0 199 1 :

['sshbuf_free']

0 199 sshbuf_fromb call site: 00055 /src/openssh/sshbuf.c:153

Runtime coverage analysis

Covered functions
168
Functions that are reachable but not covered
32
Reachable functions
79
Percentage of reachable functions covered
59.49%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/pubkey_fuzz.cc 1
sshkey.c 19
sshbuf.c 14
misc.c 1
log.c 3
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
openbsd-compat/freezero.c 1
sshbuf-getput-basic.c 9
openbsd-compat/recallocarray.c 1

Fuzzer: sshsigopt_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 0 0.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 32 100.%
All colors 32 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
0 0 None 2 2 opt_flag call site: 00005 /src/openssh/misc.c:2617
0 0 None 0 3 sshsigopt_parse call site: 00029 /src/openssh/sshsig.c:720
0 0 None 0 0 opt_dequote call site: 00013 /src/openssh/misc.c:2641
0 0 None 0 0 sshsigopt_parse call site: 00002 /src/openssh/sshsig.c:648

Runtime coverage analysis

Covered functions
7
Functions that are reachable but not covered
9
Reachable functions
16
Percentage of reachable functions covered
43.75%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/sshsigopt_fuzz.cc 1
sshsig.c 2
misc.c 4

Fuzzer: sig_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 71 58.1%
gold [1:9] 8 6.55%
yellow [10:29] 1 0.81%
greenyellow [30:49] 1 0.81%
lawngreen 50+ 41 33.6%
All colors 122 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
462 462 2 :

['sshkey_free', 'cert_new']

462 462 sshkey_new call site: 00010 /src/openssh/sshkey.c:721
225 225 1 :

['sshkey_free']

225 225 sshkey_generate call site: 00007 /src/openssh/sshkey.c:1509
165 165 1 :

['_getentropy_fail']

169 230 _rs_stir call site: 00000 /src/openssh/openbsd-compat/arc4random.c:116
165 165 2 :

['ERR_get_error', 'sshfatal']

165 165 _ssh_compat_getentropy call site: 00000 /src/openssh/openbsd-compat/bsd-getentropy.c:45
158 158 5 :

['do_log', 'strrchr', 'strlcpy', 'match_pattern_list', 'getpid']

158 158 sshlogv call site: 00030 /src/openssh/log.c:462
73 73 2 :

['ssh_err', 'abort']

73 73 generate_or_die(int,unsignedint) call site: 00000 /src/openssh/regress/misc/fuzz-harness/sig_fuzz.cc:18
13 13 1 :

['rsa_hash_id_from_keyname']

23 674 ssh_rsa_verify call site: 00000 /src/openssh/ssh-rsa.c:504
2 2 1 :

['_exit']

2 2 _rs_init call site: 00000 /src/openssh/openbsd-compat/arc4random.c:102
2 2 1 :

['memset']

2 2 _rs_forkdetect call site: 00000 /src/openssh/openbsd-compat/./arc4random.h:60
2 2 1 :

['munmap']

2 2 _rs_allocate call site: 00000 /src/openssh/openbsd-compat/./arc4random.h:73
2 2 1 :

['BN_clear_free']

2 2 sshbuf_get_bignum2 call site: 00000 /src/openssh/sshbuf-getput-crypto.c:48
0 199 1 :

['sshbuf_free']

0 199 sshbuf_froms call site: 00000 /src/openssh/sshbuf-getput-basic.c:561

Runtime coverage analysis

Covered functions
101
Functions that are reachable but not covered
40
Reachable functions
57
Percentage of reachable functions covered
29.82%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/sig_fuzz.cc 2
sshkey.c 14
sshbuf.c 3
misc.c 1
log.c 3
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
openbsd-compat/freezero.c 1
ssherr.c 1

Fuzzer: privkey_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 51 25.1%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 2 0.98%
lawngreen 50+ 150 73.8%
All colors 203 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
209 209 1 :

['ssh_digest_buffer']

209 607 webauthn_check_prepare_hash call site: 00000 /src/openssh/ssh-ecdsa-sk.c:217
158 158 5 :

['do_log', 'strrchr', 'strlcpy', 'match_pattern_list', 'getpid']

158 158 sshlogv call site: 00016 /src/openssh/log.c:462
82 243 4 :

['malloc', 'sshlog', 'xmss_sign_open', 'sshkey_xmss_params']

82 452 ssh_xmss_verify call site: 00000 /src/openssh/ssh-xmss.c:314
13 13 1 :

['rsa_hash_id_from_keyname']

23 674 ssh_rsa_verify call site: 00000 /src/openssh/ssh-rsa.c:504
2 2 1 :

['EVP_PKEY_get1_RSA']

30 1010 ssh_rsa_deserialize_private call site: 00000 /src/openssh/ssh-rsa.c:243
2 2 1 :

['BN_clear_free']

2 2 sshbuf_get_bignum2 call site: 00000 /src/openssh/sshbuf-getput-crypto.c:48
2 2 1 :

['munmap']

2 2 sshkey_prekey_free call site: 00115 /src/openssh/sshkey.c:769
0 717 1 :

['sshbuf_put_u8']

0 722 sshbuf_dtob64 call site: 00000 /src/openssh/sshbuf-misc.c:147
0 225 1 :

['sshkey_free']

0 225 sshkey_new call site: 00097 /src/openssh/sshkey.c:722
0 225 1 :

['cert_free']

0 225 cert_new call site: 00099 /src/openssh/sshkey.c:687
0 199 1 :

['sshbuf_free']

0 199 sshbuf_froms call site: 00070 /src/openssh/sshbuf-getput-basic.c:561
0 199 1 :

['sshbuf_free']

0 199 sshbuf_fromb call site: 00086 /src/openssh/sshbuf.c:153

Runtime coverage analysis

Covered functions
163
Functions that are reachable but not covered
33
Reachable functions
83
Percentage of reachable functions covered
60.24%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/privkey_fuzz.cc 1
sshbuf.c 14
sshkey.c 22
sshbuf-getput-basic.c 9
misc.c 1
log.c 3
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
openbsd-compat/freezero.c 1
openbsd-compat/recallocarray.c 1

Fuzzer: sshsig_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 77 23.8%
gold [1:9] 4 1.23%
yellow [10:29] 0 0.0%
greenyellow [30:49] 9 2.78%
lawngreen 50+ 233 72.1%
All colors 323 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
167 167 1 :

['xstrdup']

167 167 tohex call site: 00125 /src/openssh/misc.c:1560
163 163 1 :

['sshfatal']

163 163 xcalloc call site: 00137 /src/openssh/xmalloc.c:56
122 158 5 :

['do_log', 'strrchr', 'strlcpy', 'match_pattern_list', 'getpid']

122 158 sshlogv call site: 00025 /src/openssh/log.c:462
82 243 4 :

['malloc', 'sshlog', 'xmss_sign_open', 'sshkey_xmss_params']

82 452 ssh_xmss_verify call site: 00000 /src/openssh/ssh-xmss.c:314
49 49 5 :

['EC_KEY_get0_group', 'EVP_PKEY_new', 'sshkey_ec_validate_public', 'EC_KEY_get0_public_key', 'EVP_PKEY_set1_EC_KEY']

55 55 ssh_ecdsa_deserialize_public call site: 00000 /src/openssh/ssh-ecdsa.c:251
13 13 1 :

['rsa_hash_id_from_keyname']

23 674 ssh_rsa_verify call site: 00000 /src/openssh/ssh-rsa.c:504
6 6 3 :

['openlog', 'closelog', 'exit']

6 6 log_init call site: 00008 /src/openssh/log.c:215
2 219 2 :

['sshbuf_get_string_direct', 'EC_KEY_set_public_key']

6 223 sshbuf_get_eckey call site: 00000 /src/openssh/sshbuf-getput-crypto.c:110
2 2 1 :

['strlen']

2 2 strlcat call site: 00140 /src/openssh/openbsd-compat/strlcat.c:48
2 2 1 :

['BN_clear_free']

2 2 sshbuf_get_bignum2 call site: 00000 /src/openssh/sshbuf-getput-crypto.c:48
2 2 1 :

['munmap']

2 2 sshkey_prekey_free call site: 00228 /src/openssh/sshkey.c:769
0 235 1 :

['sshkey_deserialize_sk']

0 235 ssh_ecdsa_sk_deserialize_public call site: 00000 /src/openssh/ssh-ecdsa-sk.c:133

Runtime coverage analysis

Covered functions
156
Functions that are reachable but not covered
38
Reachable functions
111
Percentage of reachable functions covered
65.77%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/sshsig_fuzz.cc 1
sshbuf.c 14
log.c 5
sshsig.c 6
misc.c 2
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
openbsd-compat/freezero.c 1
sshbuf-misc.c 1
openbsd-compat/timingsafe_bcmp.c 1
sshbuf-getput-basic.c 12
ssherr.c 1
digest-openssl.c 5
xmalloc.c 3
fatal.c 1
cleanup.c 1
openbsd-compat/strlcat.c 1
openbsd-compat/recallocarray.c 1
sshkey.c 21

Fuzzer: agent_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1269 67.7%
gold [1:9] 65 3.47%
yellow [10:29] 65 3.47%
greenyellow [30:49] 22 1.17%
lawngreen 50+ 451 24.0%
All colors 1872 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
3672 5328 17 :

['buf_equal', 'parse_userauth_request', 'notify_start', 'identity_permitted', 'sshkey_sign', 'agent_decode_alg', 'confirm_key', 'sshkey_equal', 'match_pattern_list', 'check_websafe_message_contents', 'sshkey_type', 'sshbuf_ptr', 'read_passphrase', 'sshkey_fingerprint', 'sshkey_is_sk', 'lookup_identity', 'sshbuf_len']

4326 10559 process_sign_request2 call site: 00742 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:860
2237 3796 20 :

['__errno_location', 'sshkey_ssh_name', 'realpath', 'xcalloc', 'sshfatal', 'strcasecmp', 'sshkey_type', 'xstrdup', 'monotime', 'strerror', 'parse_key_constraints', 'socket_is_remote', 'sshkey_fingerprint', 'sshbuf_reset', 'dump_dest_constraints', 'identity_permitted', 'sshkey_is_sk', 'lookup_identity', 'match_pattern_list', 'sshkey_shield_private']

2237 6398 process_add_identity call site: 01325 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:1377
1571 3210 6 :

['free', 'sshkey_type', 'sshlog', 'sshkey_fingerprint', 'sshfatal', 'permitted_by_dest_constraints']

1571 3210 identity_permitted call site: 00849 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:488
767 767 1 :

['process_ext_session_bind']

767 1112 process_extension call site: 01824 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:1801
451 451 1 :

['sshkey_parse_private_pem_fileblob']

451 451 sshkey_parse_private_fileblob_type call site: 00465 /src/openssh/sshkey.c:3657
402 1198 4 :

['free_identity', 'lookup_identity', 'identity_permitted', 'sshfatal']

402 1927 process_remove_identity call site: 01462 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:1006
346 346 6 :

['ssh_signal', 'kill', '__errno_location', 'waitpid', 'strerror', 'sshfatal']

346 346 notify_complete call site: 01264 /src/openssh/readpass.c:320
204 204 1 :

['cert_compare']

204 222 sshkey_equal call site: 00452 /src/openssh/sshkey.c:845
165 165 1 :

['_getentropy_fail']

169 230 _rs_stir call site: 00340 /src/openssh/openbsd-compat/arc4random.c:116
165 165 2 :

['ERR_get_error', 'sshfatal']

165 165 _ssh_compat_getentropy call site: 00341 /src/openssh/openbsd-compat/bsd-getentropy.c:45
163 234 2 :

['ssh_err', 'sshfatal']

163 234 no_identities call site: 00697 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:1538
163 234 2 :

['ssh_err', 'sshfatal']

163 234 send_status call site: 00710 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:615

Runtime coverage analysis

Covered functions
246
Functions that are reachable but not covered
282
Reachable functions
449
Percentage of reachable functions covered
37.19%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/agent_fuzz.cc 1
regress/misc/fuzz-harness/agent_fuzz_helper.c 10
log.c 5
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
xmalloc.c 6
fatal.c 1
regress/misc/fuzz-harness/../../../ssh-agent.c 41
ssh-pkcs11.c 30
sshkey.c 75
sshbuf.c 14
misc.c 6
openbsd-compat/freezero.c 1
sshbuf-getput-basic.c 18
openbsd-compat/recallocarray.c 1
sshbuf-misc.c 2
openbsd-compat/base64.c 2
cipher.c 8
openbsd-compat/bcrypt_pbkdf.c 2
hash.c 1
openbsd-compat/blowfish.c 6
openbsd-compat/arc4random.c 6
openbsd-compat/./arc4random.h 3
openbsd-compat/bsd-getentropy.c 1
openbsd-compat/./chacha_private.h 3
cipher-chachapoly-libcrypto.c 3
poly1305.c 1
openbsd-compat/timingsafe_bcmp.c 1
ssh-ecdsa.c 1
ssherr.c 1
digest-openssl.c 4
openbsd-compat/strlcat.c 1
readpass.c 6
openbsd-compat/readpassphrase.c 1
openbsd-compat/bsd-closefrom.c 2
ssh-sk.c 8
sshkey-xmss.c 1

Fuzzer: kex_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 587 38.2%
gold [1:9] 144 9.38%
yellow [10:29] 3 0.19%
greenyellow [30:49] 1 0.06%
lawngreen 50+ 799 52.0%
All colors 1534 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
1388 7152 13 :

['ssh_packet_check_rekey', 'sshbuf_putb', 'uncompress_buffer', 'ssh_packet_write_wait', 'ssh_packet_enable_delayed_compress', 'sshbuf_reset', 'sshpkt_disconnect', 'ssh_packet_log_type', 'sshbuf_get_u8', 'sshbuf_ptr', 'sshbuf_consume', 'sshbuf_consume_end', 'ssh_packet_disconnect']

1388 7629 ssh_packet_read_poll2 call site: 01454 /src/openssh/packet.c:1691
1134 1134 1 :

['ssh_packet_disconnect']

1388 7432 ssh_packet_read_poll2 call site: 01458 /src/openssh/packet.c:1712
1134 1134 1 :

['ssh_packet_disconnect']

1134 2242 ssh_packet_send2_wrapped call site: 00991 /src/openssh/packet.c:1301
1134 1134 1 :

['ssh_packet_disconnect']

1134 1134 kex_choose_conf call site: 01198 /src/openssh/kex.c:964
794 794 4 :

['get_peer_ipaddr', 'get_peer_port', 'get_local_ipaddr', 'get_local_port']

794 794 ssh_remote_ipaddr call site: 00668 /src/openssh/packet.c:521
759 769 8 :

['parse_prime', 'arc4random_uniform', 'dh_new_group', 'getline', 'BN_clear_free', 'rewind', 'fclose', 'free']

759 1276 choose_dh call site: 00000 /src/openssh/dh.c:167
552 761 7 :

['ms_subtract_diff', 'ppoll', 'ms_to_timespec', 'ssh_packet_have_data_to_write', '__errno_location', 'monotime_tv', 'ssh_packet_write_poll']

552 761 ssh_packet_write_wait call site: 01040 /src/openssh/packet.c:2142
489 925 4 :

['sshfatal', 'sshlog', 'match_filter_denylist', 'free']

489 925 compat_kex_proposal call site: 00742 /src/openssh/compat.c:146
451 451 1 :

['sshkey_parse_private_pem_fileblob']

451 451 sshkey_parse_private_fileblob_type call site: 00428 /src/openssh/sshkey.c:3657
286 512 3 :

['bcrypt_pbkdf', 'sshbuf_get_string', 'strlen']

290 3071 private2_decrypt call site: 00260 /src/openssh/sshkey.c:3103
285 285 1 :

['ssh_packet_read_poll2_mux']

285 285 ssh_packet_read_poll2 call site: 01394 /src/openssh/packet.c:1569
254 937 3 :

['sshbuf_putb', 'uncompress_buffer', 'sshbuf_reset']

254 4177 ssh_packet_read_poll2 call site: 01465 /src/openssh/packet.c:1743

Runtime coverage analysis

Covered functions
488
Functions that are reachable but not covered
183
Reachable functions
458
Percentage of reachable functions covered
60.04%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/kex_fuzz.cc 11
log.c 6
xmalloc.c 4
fatal.c 1
match.c 5
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
cleanup.c 1
sshbuf.c 16
sshkey.c 48
misc.c 11
sshbuf-getput-basic.c 16
openbsd-compat/recallocarray.c 1
sshbuf-misc.c 2
openbsd-compat/base64.c 1
openbsd-compat/freezero.c 1
cipher.c 13
openbsd-compat/bcrypt_pbkdf.c 2
hash.c 1
openbsd-compat/blowfish.c 6
openbsd-compat/arc4random.c 6
openbsd-compat/./arc4random.h 3
openbsd-compat/bsd-getentropy.c 1
openbsd-compat/./chacha_private.h 3
cipher-chachapoly-libcrypto.c 4
poly1305.c 1
openbsd-compat/timingsafe_bcmp.c 1
ssh-ecdsa.c 1
ssherr.c 1
ssh_api.c 11
entropy.c 1
openbsd-compat/openssl-compat.c 2
packet.c 49
kex.c 22
mac.c 6
umac.c 26
./umac.c 26
hmac.c 6
digest-openssl.c 9
canohost.c 7
kex-names.c 7
openbsd-compat/strlcat.c 1
compat.c 2
dispatch.c 2

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
kex_gen_client /src/openssh/kexgen.c 1 ['N/A'] 27 0 141 25 5 785 0 3052 1413
sshkey_check_revoked /src/openssh/authfile.c 2 ['N/A', 'N/A'] 20 0 58 9 2 181 0 1410 637
xxxmain /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c 2 ['int', 'N/A'] 22 0 1254 220 52 465 0 2644 417
ssh_xmss_sign /src/openssh/ssh-xmss.c 9 ['N/A', 'N/A', 'N/A', 'N/A', 'size_t', 'N/A', 'N/A', 'N/A', 'int'] 15 0 375 67 27 140 0 828 335
kexgex_server /src/openssh/kexgexs.c 1 ['N/A'] 28 0 17 3 2 376 0 1973 164
ssh_sk_sign /src/openssh/regress/misc/sk-dummy/sk-dummy.c 10 ['int', 'N/A', 'size_t', 'N/A', 'N/A', 'size_t', 'char', 'N/A', 'N/A', 'N/A'] 7 0 175 21 7 63 0 199 162
sshauthopt_from_cert /src/openssh/auth-options.c 1 ['N/A'] 7 0 108 19 9 74 0 503 124

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
70.0%
1154 / 1653
Cyclomatic complexity statically reachable by fuzzers
67.0%
6762 / 10089

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

regress/misc/fuzz-harness/authopt_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshauthopt_parse', 'recallocarray', 'sshauthopt_merge', 'a2port', 'dup_strings']

regress/misc/fuzz-harness/pubkey_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshlog', 'sshbuf_fromb', 'recallocarray', 'sshbuf_set_parent', 'cert_new', 'sshkey_free_contents', 'sshkey_free', 'sshbuf_froms']

regress/misc/fuzz-harness/sshsigopt_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


regress/misc/fuzz-harness/sig_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshlog', 'sshbuf_free', 'sshkey_is_cert']

regress/misc/fuzz-harness/privkey_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshlog', 'sshbuf_ptr', 'recallocarray', 'sshbuf_set_parent', 'sshbuf_fromb', 'cert_new', 'sshkey_free_contents', 'sshkey_free', 'sshkey_private_deserialize']

regress/misc/fuzz-harness/sshsig_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['match_pattern_list', 'sshbuf_fromb', 'hash_buffer', 'log_init', 'sshlog', 'sshsig_peek_hashalg', 'ssh_digest_memory', 'tohex', 'recallocarray', 'sshbuf_allocate']

regress/misc/fuzz-harness/agent_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['identity_permitted', 'process_add_smartcard_key', 'process_add_identity', 'sshkey_ssh_name', 'process_extension', 'sshkey_fingerprint', 'sshkey_parse_private_fileblob_type', 'cipher_init', 'private2_decrypt', 'fingerprint_b64']

regress/misc/fuzz-harness/kex_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['ssh_remote_ipaddr', 'crypto_hash_sha512', 'sshkey_parse_private_fileblob_type', 'ssh_packet_close_internal', 'cipher_init', 'private2_decrypt', 'sshkey_check_rsa_length', 'sshbuf_putb', 'ssh_packet_write_poll', 'sshkey_ec_validate_private']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/openssh/mac.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/kexc25519.c [] []
/src/openssh/regress/misc/fuzz-harness/agent_fuzz.cc ['agent_fuzz'] ['agent_fuzz']
/src/openssh/openbsd-compat/strlcpy.c ['authopt_fuzz', 'pubkey_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/utf8.c [] []
/src/openssh/regress/misc/fuzz-harness/sshsig_fuzz.cc ['sshsig_fuzz'] ['sshsig_fuzz']
/src/openssh/atomicio.c [] []
/src/openssh/xmalloc.c ['authopt_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/addrmatch.c [] []
/src/openssh/readpass.c ['agent_fuzz'] ['agent_fuzz']
/src/openssh/ssh-pkcs11.c ['agent_fuzz'] []
/src/openssh/dh.c [] []
/src/openssh/xmss_hash.c [] []
/src/openssh/kexgex.c [] []
/src/openssh/platform-pledge.c [] []
/src/openssh/auth-options.c ['authopt_fuzz'] ['authopt_fuzz']
/src/openssh/sshbuf-getput-crypto.c [] []
/src/openssh/xmss_fast.c [] []
/src/openssh/cleanup.c ['authopt_fuzz', 'sshsig_fuzz', 'kex_fuzz'] []
/src/openssh/sshbuf-getput-basic.c ['pubkey_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['pubkey_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/libressl-api-compat.c [] []
/src/openssh/openbsd-compat/vis.c ['authopt_fuzz', 'pubkey_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/poly1305.c ['agent_fuzz', 'kex_fuzz'] []
/src/openssh/kexgen.c [] []
/src/openssh/regress/misc/fuzz-harness/agent_fuzz_helper.c ['agent_fuzz'] ['agent_fuzz']
/src/openssh/openbsd-compat/bsd-getpeereid.c [] []
/src/openssh/addr.c [] []
/src/openssh/ssherr.c ['sig_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/./libcrux_mlkem768_sha3.h [] []
/src/openssh/regress/misc/fuzz-harness/kex_fuzz.cc ['kex_fuzz'] ['kex_fuzz']
/src/openssh/ssh-ed25519-sk.c [] []
/src/openssh/ssh-xmss.c [] []
/src/openssh/kex-names.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/kexdh.c [] []
/src/openssh/kexecdh.c [] []
/src/openssh/openbsd-compat/./arc4random.h ['agent_fuzz', 'kex_fuzz'] []
/src/openssh/misc.c ['authopt_fuzz', 'pubkey_fuzz', 'sshsigopt_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['authopt_fuzz', 'sshsigopt_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/regress/misc/fuzz-harness/privkey_fuzz.cc ['privkey_fuzz'] ['privkey_fuzz']
/src/openssh/openbsd-compat/arc4random_uniform.c [] []
/src/openssh/openbsd-compat/bsd-getentropy.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/kex.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/cipher-chachapoly-libcrypto.c ['agent_fuzz', 'kex_fuzz'] []
/src/openssh/sshbuf.c ['pubkey_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['pubkey_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/strlcat.c ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/regress/misc/sk-dummy/sk-dummy.c [] []
/src/openssh/ssh-rsa.c [] []
/src/openssh/openbsd-compat/bcrypt_pbkdf.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz']
/src/openssh/ssh-ecdsa-sk.c [] []
/src/openssh/regress/misc/fuzz-harness/authopt_fuzz.cc ['authopt_fuzz'] ['authopt_fuzz']
/src/openssh/ssh-sk.c ['agent_fuzz'] []
/src/openssh/authfile.c [] []
/src/openssh/openbsd-compat/arc4random.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/blowfish.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz']
/src/openssh/bitmap.c [] []
/src/openssh/compat.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/regress/misc/fuzz-harness/sshsigopt_fuzz.cc ['sshsigopt_fuzz'] ['sshsigopt_fuzz']
/src/openssh/xmss_wots.c [] []
/src/openssh/fatal.c ['authopt_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] []
/src/openssh/platform-tracing.c [] []
/src/openssh/canohost.c ['kex_fuzz'] []
/src/openssh/hash.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/./umac.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/misc-agent.c [] []
/src/openssh/openbsd-compat/getopt_long.c [] []
/src/openssh/sshkey.c ['pubkey_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['pubkey_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/hmac.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/entropy.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/sshbuf-io.c [] []
/src/openssh/openbsd-compat/timingsafe_bcmp.c ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/sshbuf-misc.c ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/packet.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/regress/misc/fuzz-harness/sig_fuzz.cc ['sig_fuzz'] ['sig_fuzz']
/src/openssh/regress/misc/fuzz-harness/ssh-sk-null.cc [] []
/src/openssh/ed25519.c [] []
/src/openssh/openbsd-compat/bsd-closefrom.c ['agent_fuzz'] []
/src/openssh/cipher.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c ['agent_fuzz'] []
/src/openssh/openbsd-compat/bsd-misc.c [] []
/src/openssh/openbsd-compat/base64.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/port-net.c [] []
/src/openssh/dispatch.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/xmss_commons.c [] []
/src/openssh/openbsd-compat/readpassphrase.c ['agent_fuzz'] []
/src/openssh/krl.c [] []
/src/openssh/kexmlkem768x25519.c [] []
/src/openssh/openbsd-compat/freezero.c ['authopt_fuzz', 'pubkey_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['authopt_fuzz', 'pubkey_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/usr/include/x86_64-linux-gnu/bits/uintn-identity.h [] []
/src/openssh/openbsd-compat/./chacha_private.h ['agent_fuzz', 'kex_fuzz'] []
/src/openssh/log.c ['authopt_fuzz', 'pubkey_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['pubkey_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/strtonum.c ['authopt_fuzz'] ['authopt_fuzz']
/src/openssh/kexsntrup761x25519.c [] []
/src/openssh/match.c ['authopt_fuzz', 'pubkey_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sshsig_fuzz', 'kex_fuzz']
/src/openssh/kexgexs.c [] []
/src/openssh/ssh_api.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/kexgexc.c [] []
/src/openssh/sshsig.c ['sshsigopt_fuzz', 'sshsig_fuzz'] ['sshsigopt_fuzz', 'sshsig_fuzz']
/src/openssh/ssh-ed25519.c [] []
/src/openssh/regress/misc/fuzz-harness/pubkey_fuzz.cc ['pubkey_fuzz'] ['pubkey_fuzz']
/src/openssh/sntrup761.c [] []
/src/openssh/smult_curve25519_ref.c [] []
/src/openssh/xmss_hash_address.c [] []
/src/openssh/openbsd-compat/openssl-compat.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/sshkey-xmss.c ['agent_fuzz'] []
/src/openssh/ssh-ecdsa.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/recallocarray.c ['authopt_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['authopt_fuzz', 'pubkey_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/platform-misc.c [] []
/src/openssh/umac.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/digest-openssl.c ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']

Directories in report

Directory
/src/openssh/regress/misc/fuzz-harness/
/src/openssh/openbsd-compat/
/src/openssh/openbsd-compat/./
/src/openssh/
/usr/include/x86_64-linux-gnu/bits/
/src/openssh/regress/misc/fuzz-harness/../../../
/src/openssh/regress/misc/sk-dummy/
/src/openssh/./