Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: authopt_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 57 36.7%
gold [1:9] 3 1.93%
yellow [10:29] 0 0.0%
greenyellow [30:49] 2 1.29%
lawngreen 50+ 93 60.0%
All colors 155 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
169 748 4 :

['a2tun', 'xstrdup', 'free', 'strchr']

169 748 a2tun call site: 00084 /src/openssh/misc.c:561
2 2 1 :

['getpagesize']

8 8 recallocarray call site: 00052 /src/openssh/openbsd-compat/recallocarray.c:64
2 2 1 :

['ntohs']

2 2 a2port call site: 00077 /src/openssh/misc.c:549
0 11 1 :

['sshauthopt_free']

0 11 sshauthopt_merge call site: 00149 /src/openssh/auth-options.c:635
0 0 None 12 100 sshauthopt_merge call site: 00135 /src/openssh/auth-options.c:541
0 0 None 8 19 sshauthopt_merge call site: 00146 /src/openssh/auth-options.c:614
0 0 None 6 669 sshauthopt_parse call site: 00003 /src/openssh/auth-options.c:333
0 0 None 2 2 recallocarray call site: 00054 /src/openssh/openbsd-compat/recallocarray.c:77
0 0 None 2 2 strtonum call site: 00072 /src/openssh/openbsd-compat/strtonum.c:52
0 0 None 0 11 sshauthopt_parse call site: 00004 /src/openssh/auth-options.c:335
0 0 None 0 11 sshauthopt_parse call site: 00042 /src/openssh/auth-options.c:405
0 0 None 0 11 sshauthopt_parse call site: 00045 /src/openssh/auth-options.c:417

Runtime coverage analysis

Covered functions
19
Functions that are reachable but not covered
42
Reachable functions
61
Percentage of reachable functions covered
31.15%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/authopt_fuzz.cc 1
auth-options.c 7
misc.c 8
openbsd-compat/recallocarray.c 1
openbsd-compat/strtonum.c 1
xmalloc.c 2
fatal.c 1
log.c 2
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
cleanup.c 1
openbsd-compat/freezero.c 1

Fuzzer: sig_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 140 72.1%
gold [1:9] 8 4.12%
yellow [10:29] 1 0.51%
greenyellow [30:49] 1 0.51%
lawngreen 50+ 44 22.6%
All colors 194 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
884 884 2 :

['sshkey_free', 'cert_new']

884 884 sshkey_new call site: 00010 /src/openssh/sshkey.c:703
439 439 1 :

['sshkey_free']

439 439 sshkey_generate call site: 00007 /src/openssh/sshkey.c:1499
165 165 1 :

['_getentropy_fail']

169 230 _rs_stir call site: 00000 /src/openssh/openbsd-compat/arc4random.c:116
165 165 2 :

['sshfatal', 'ERR_get_error']

165 165 _ssh_compat_getentropy call site: 00000 /src/openssh/openbsd-compat/bsd-getentropy.c:45
158 158 5 :

['do_log', 'match_pattern_list', 'strrchr', 'strlcpy', 'getpid']

158 158 sshlogv call site: 00030 /src/openssh/log.c:462
73 73 2 :

['ssh_err', 'abort']

73 73 generate_or_die(int,unsignedint) call site: 00000 /src/openssh/regress/misc/fuzz-harness/sig_fuzz.cc:18
13 13 1 :

['ssh_rsa_hash_id_from_keyname']

23 674 ssh_rsa_verify call site: 00000 /src/openssh/ssh-rsa.c:528
2 2 1 :

['_exit']

2 2 _rs_init call site: 00000 /src/openssh/openbsd-compat/arc4random.c:102
2 2 1 :

['memset']

2 2 _rs_forkdetect call site: 00000 /src/openssh/openbsd-compat/./arc4random.h:60
2 2 1 :

['munmap']

2 2 _rs_allocate call site: 00000 /src/openssh/openbsd-compat/./arc4random.h:73
2 2 1 :

['BN_clear_free']

2 2 sshbuf_get_bignum2 call site: 00000 /src/openssh/sshbuf-getput-crypto.c:48
0 199 1 :

['sshbuf_free']

0 199 sshbuf_froms call site: 00000 /src/openssh/sshbuf-getput-basic.c:561

Runtime coverage analysis

Covered functions
101
Functions that are reachable but not covered
63
Reachable functions
84
Percentage of reachable functions covered
25.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/sig_fuzz.cc 2
sshkey.c 19
sshbuf.c 9
misc.c 1
log.c 3
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
openbsd-compat/freezero.c 1
ssh-pkcs11-client.c 3
fatal.c 1
cleanup.c 1
sshbuf-getput-basic.c 4
openbsd-compat/recallocarray.c 1
ssherr.c 1
sshbuf-misc.c 1
xmalloc.c 1

Fuzzer: privkey_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 104 40.4%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 4 1.55%
lawngreen 50+ 149 57.9%
All colors 257 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
418 418 1 :

['pkcs11_key_free']

418 879 sshkey_free_contents call site: 00109 /src/openssh/sshkey.c:763
209 209 1 :

['ssh_digest_buffer']

209 607 webauthn_check_prepare_hash call site: 00000 /src/openssh/ssh-ecdsa-sk.c:217
158 158 5 :

['do_log', 'match_pattern_list', 'strrchr', 'strlcpy', 'getpid']

158 158 sshlogv call site: 00016 /src/openssh/log.c:462
13 13 1 :

['ssh_rsa_hash_id_from_keyname']

23 674 ssh_rsa_verify call site: 00000 /src/openssh/ssh-rsa.c:528
2 2 1 :

['EVP_PKEY_get1_RSA']

30 1010 ssh_rsa_deserialize_private call site: 00000 /src/openssh/ssh-rsa.c:243
2 2 1 :

['BN_clear_free']

2 2 sshbuf_get_bignum2 call site: 00000 /src/openssh/sshbuf-getput-crypto.c:48
2 2 1 :

['munmap']

2 2 sshkey_prekey_free call site: 00187 /src/openssh/sshkey.c:751
0 717 1 :

['sshbuf_put_u8']

0 722 sshbuf_dtob64 call site: 00000 /src/openssh/sshbuf-misc.c:147
0 439 1 :

['sshkey_free']

0 439 sshkey_new call site: 00097 /src/openssh/sshkey.c:704
0 439 1 :

['cert_free']

0 439 cert_new call site: 00099 /src/openssh/sshkey.c:669
0 199 1 :

['sshbuf_free']

0 199 sshbuf_froms call site: 00070 /src/openssh/sshbuf-getput-basic.c:561
0 199 1 :

['sshbuf_free']

0 199 sshbuf_fromb call site: 00086 /src/openssh/sshbuf.c:153

Runtime coverage analysis

Covered functions
144
Functions that are reachable but not covered
48
Reachable functions
100
Percentage of reachable functions covered
52.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/privkey_fuzz.cc 1
sshbuf.c 14
sshkey.c 27
sshbuf-getput-basic.c 11
misc.c 1
log.c 3
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
openbsd-compat/freezero.c 1
ssh-pkcs11-client.c 3
fatal.c 1
cleanup.c 1
openbsd-compat/recallocarray.c 1
ssherr.c 1
sshbuf-misc.c 1
xmalloc.c 1

Fuzzer: sshsig_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 122 33.0%
gold [1:9] 3 0.81%
yellow [10:29] 4 1.08%
greenyellow [30:49] 4 1.08%
lawngreen 50+ 236 63.9%
All colors 369 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
418 418 1 :

['pkcs11_key_free']

418 879 sshkey_free_contents call site: 00222 /src/openssh/sshkey.c:763
167 167 1 :

['xstrdup']

167 167 tohex call site: 00125 /src/openssh/misc.c:1564
163 163 1 :

['sshfatal']

163 163 xcalloc call site: 00137 /src/openssh/xmalloc.c:56
122 158 5 :

['do_log', 'match_pattern_list', 'strrchr', 'strlcpy', 'getpid']

122 158 sshlogv call site: 00025 /src/openssh/log.c:462
49 49 5 :

['EC_KEY_get0_group', 'EC_KEY_get0_public_key', 'EVP_PKEY_new', 'EVP_PKEY_set1_EC_KEY', 'sshkey_ec_validate_public']

55 55 ssh_ecdsa_deserialize_public call site: 00000 /src/openssh/ssh-ecdsa.c:251
13 13 1 :

['ssh_rsa_hash_id_from_keyname']

23 674 ssh_rsa_verify call site: 00000 /src/openssh/ssh-rsa.c:528
6 6 3 :

['closelog', 'exit', 'openlog']

6 6 log_init call site: 00008 /src/openssh/log.c:215
2 219 2 :

['sshbuf_get_string_direct', 'EC_KEY_set_public_key']

6 223 sshbuf_get_eckey call site: 00000 /src/openssh/sshbuf-getput-crypto.c:110
2 2 1 :

['strlen']

2 2 strlcat call site: 00140 /src/openssh/openbsd-compat/strlcat.c:48
2 2 1 :

['BN_clear_free']

2 2 sshbuf_get_bignum2 call site: 00000 /src/openssh/sshbuf-getput-crypto.c:48
2 2 1 :

['munmap']

2 2 sshkey_prekey_free call site: 00278 /src/openssh/sshkey.c:751
0 439 1 :

['sshkey_free']

0 439 sshkey_new call site: 00212 /src/openssh/sshkey.c:704

Runtime coverage analysis

Covered functions
142
Functions that are reachable but not covered
48
Reachable functions
122
Percentage of reachable functions covered
60.66%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/sshsig_fuzz.cc 1
sshbuf.c 14
log.c 5
sshsig.c 6
misc.c 2
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
openbsd-compat/freezero.c 1
sshbuf-misc.c 2
openbsd-compat/timingsafe_bcmp.c 1
sshbuf-getput-basic.c 12
ssherr.c 1
digest-openssl.c 5
xmalloc.c 4
fatal.c 1
cleanup.c 1
openbsd-compat/strlcat.c 1
openbsd-compat/recallocarray.c 1
sshkey.c 25
ssh-pkcs11-client.c 3

Fuzzer: pubkey_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 103 42.3%
gold [1:9] 4 1.64%
yellow [10:29] 0 0.0%
greenyellow [30:49] 2 0.82%
lawngreen 50+ 134 55.1%
All colors 243 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
418 418 1 :

['pkcs11_key_free']

418 879 sshkey_free_contents call site: 00099 /src/openssh/sshkey.c:763
209 209 1 :

['ssh_digest_buffer']

209 607 webauthn_check_prepare_hash call site: 00000 /src/openssh/ssh-ecdsa-sk.c:217
158 158 5 :

['do_log', 'match_pattern_list', 'strrchr', 'strlcpy', 'getpid']

158 158 sshlogv call site: 00015 /src/openssh/log.c:462
13 13 1 :

['ssh_rsa_hash_id_from_keyname']

23 674 ssh_rsa_verify call site: 00000 /src/openssh/ssh-rsa.c:528
2 2 1 :

['BN_clear_free']

2 2 sshbuf_get_bignum2 call site: 00000 /src/openssh/sshbuf-getput-crypto.c:48
2 2 1 :

['munmap']

2 2 sshkey_prekey_free call site: 00177 /src/openssh/sshkey.c:751
0 717 1 :

['sshbuf_put_u8']

0 722 sshbuf_dtob64 call site: 00000 /src/openssh/sshbuf-misc.c:147
0 439 1 :

['sshkey_free']

0 439 sshkey_new call site: 00087 /src/openssh/sshkey.c:704
0 439 1 :

['cert_free']

0 439 cert_new call site: 00089 /src/openssh/sshkey.c:669
0 199 1 :

['sshbuf_free']

0 199 sshbuf_froms call site: 00196 /src/openssh/sshbuf-getput-basic.c:561
0 199 1 :

['sshbuf_free']

0 199 sshbuf_fromb call site: 00055 /src/openssh/sshbuf.c:153
0 0 None 42 5492 ssh_ecdsa_sk_verify call site: 00000 /src/openssh/ssh-ecdsa-sk.c:255

Runtime coverage analysis

Covered functions
133
Functions that are reachable but not covered
48
Reachable functions
97
Percentage of reachable functions covered
50.52%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/pubkey_fuzz.cc 1
sshkey.c 24
sshbuf.c 14
misc.c 1
log.c 3
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
openbsd-compat/freezero.c 1
sshbuf-getput-basic.c 11
ssh-pkcs11-client.c 3
fatal.c 1
cleanup.c 1
openbsd-compat/recallocarray.c 1
ssherr.c 1
sshbuf-misc.c 1
xmalloc.c 1

Fuzzer: sshsigopt_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 0 0.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 32 100.%
All colors 32 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
0 0 None 2 2 opt_flag call site: 00005 /src/openssh/misc.c:2623
0 0 None 0 3 sshsigopt_parse call site: 00029 /src/openssh/sshsig.c:720
0 0 None 0 0 opt_dequote call site: 00013 /src/openssh/misc.c:2647
0 0 None 0 0 sshsigopt_parse call site: 00002 /src/openssh/sshsig.c:648

Runtime coverage analysis

Covered functions
7
Functions that are reachable but not covered
9
Reachable functions
16
Percentage of reachable functions covered
43.75%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/sshsigopt_fuzz.cc 1
sshsig.c 2
misc.c 4

Fuzzer: agent_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1156 65.7%
gold [1:9] 74 4.20%
yellow [10:29] 18 1.02%
greenyellow [30:49] 55 3.12%
lawngreen 50+ 456 25.9%
All colors 1759 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
4147 5796 17 :

['notify_start', 'sshbuf_ptr', 'match_pattern_list', 'agent_decode_alg', 'buf_equal', 'identity_permitted', 'sshbuf_len', 'lookup_identity', 'parse_userauth_request', 'sshkey_fingerprint', 'check_websafe_message_contents', 'sshkey_sign', 'confirm_key', 'sshkey_equal', 'read_passphrase', 'sshkey_is_sk', 'sshkey_type']

4801 11543 process_sign_request2 call site: 00782 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:859
2371 3925 20 :

['match_pattern_list', 'strerror', 'xcalloc', 'parse_key_constraints', 'monotime', 'sshkey_shield_private', 'sshkey_is_sk', 'strcasecmp', 'identity_permitted', 'dump_dest_constraints', 'sshkey_ssh_name', 'sshkey_fingerprint', 'lookup_identity', 'sshfatal', '__errno_location', 'sshkey_type', 'sshbuf_reset', 'socket_is_remote', 'xstrdup', 'realpath']

2371 7416 process_add_identity call site: 01413 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:1356
1565 3202 6 :

['sshfatal', 'sshlog', 'permitted_by_dest_constraints', 'free', 'sshkey_type', 'sshkey_fingerprint']

1565 3202 identity_permitted call site: 00878 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:488
788 788 1 :

['process_ext_session_bind']

788 1140 process_extension call site: 01712 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:1780
653 653 1 :

['sshkey_parse_private_pem_fileblob']

653 653 sshkey_parse_private_fileblob_type call site: 00195 /src/openssh/sshkey.c:3637
418 418 1 :

['pkcs11_key_free']

418 879 sshkey_free_contents call site: 00101 /src/openssh/sshkey.c:763
401 1421 4 :

['sshfatal', 'free_identity', 'identity_permitted', 'lookup_identity']

401 2371 process_remove_identity call site: 01539 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:1005
346 346 6 :

['kill', 'strerror', 'ssh_signal', 'sshfatal', 'waitpid', '__errno_location']

346 346 notify_complete call site: 01355 /src/openssh/readpass.c:320
204 204 1 :

['cert_compare']

204 221 sshkey_equal call site: 00497 /src/openssh/sshkey.c:829
165 165 1 :

['_getentropy_fail']

169 230 _rs_stir call site: 00385 /src/openssh/openbsd-compat/arc4random.c:116
165 165 2 :

['sshfatal', 'ERR_get_error']

165 165 _ssh_compat_getentropy call site: 00386 /src/openssh/openbsd-compat/bsd-getentropy.c:45
163 234 2 :

['sshfatal', 'ssh_err']

163 234 no_identities call site: 00738 /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c:1517

Runtime coverage analysis

Covered functions
247
Functions that are reachable but not covered
229
Reachable functions
397
Percentage of reachable functions covered
42.32%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/agent_fuzz.cc 1
regress/misc/fuzz-harness/agent_fuzz_helper.c 9
log.c 6
match.c 2
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
xmalloc.c 6
fatal.c 1
regress/misc/fuzz-harness/../../../ssh-agent.c 41
ssh-pkcs11-client.c 13
openbsd-compat/recallocarray.c 1
sshbuf.c 15
misc.c 6
openbsd-compat/freezero.c 1
sshkey.c 77
sshbuf-getput-basic.c 18
ssherr.c 1
sshbuf-misc.c 3
openbsd-compat/base64.c 2
cipher.c 8
openbsd-compat/bcrypt_pbkdf.c 2
hash.c 1
openbsd-compat/blowfish.c 6
openbsd-compat/arc4random.c 6
openbsd-compat/./arc4random.h 3
openbsd-compat/bsd-getentropy.c 1
openbsd-compat/./chacha_private.h 3
cipher-chachapoly-libcrypto.c 3
poly1305.c 1
openbsd-compat/timingsafe_bcmp.c 1
ssh-ecdsa.c 1
digest-openssl.c 4
openbsd-compat/strlcat.c 1
readpass.c 6
openbsd-compat/readpassphrase.c 1
openbsd-compat/bsd-closefrom.c 2
ssh-sk.c 8
atomicio.c 2

Fuzzer: kex_fuzz

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 622 39.4%
gold [1:9] 144 9.13%
yellow [10:29] 3 0.19%
greenyellow [30:49] 3 0.19%
lawngreen 50+ 804 51.0%
All colors 1576 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
1454 7416 13 :

['sshbuf_ptr', 'sshbuf_consume_end', 'sshbuf_get_u8', 'ssh_packet_write_wait', 'uncompress_buffer', 'ssh_packet_enable_delayed_compress', 'sshbuf_consume', 'ssh_packet_disconnect', 'ssh_packet_check_rekey', 'ssh_packet_log_type', 'sshpkt_disconnect', 'sshbuf_putb', 'sshbuf_reset']

1454 7893 ssh_packet_read_poll2 call site: 01496 /src/openssh/packet.c:1702
1200 1200 1 :

['ssh_packet_disconnect']

1454 7696 ssh_packet_read_poll2 call site: 01500 /src/openssh/packet.c:1723
1200 1200 1 :

['ssh_packet_disconnect']

1200 2308 ssh_packet_send2_wrapped call site: 01033 /src/openssh/packet.c:1312
1200 1200 1 :

['ssh_packet_disconnect']

1200 1200 kex_choose_conf call site: 01240 /src/openssh/kex.c:964
813 823 8 :

['dh_new_group', 'getline', 'rewind', 'free', 'arc4random_uniform', 'fclose', 'BN_clear_free', 'parse_prime']

813 1330 choose_dh call site: 00000 /src/openssh/dh.c:167
794 794 4 :

['get_peer_ipaddr', 'get_peer_port', 'get_local_port', 'get_local_ipaddr']

794 794 ssh_remote_ipaddr call site: 00712 /src/openssh/packet.c:532
653 653 1 :

['sshkey_parse_private_pem_fileblob']

653 653 sshkey_parse_private_fileblob_type call site: 00060 /src/openssh/sshkey.c:3637
552 761 7 :

['ssh_packet_write_poll', '__errno_location', 'ms_to_timespec', 'monotime_tv', 'ssh_packet_have_data_to_write', 'ppoll', 'ms_subtract_diff']

552 761 ssh_packet_write_wait call site: 01082 /src/openssh/packet.c:2153
502 502 1 :

['pkcs11_sign']

1438 1438 sshkey_sign call site: 00000 /src/openssh/sshkey.c:2192
489 925 4 :

['sshfatal', 'free', 'sshlog', 'match_filter_denylist']

489 925 compat_kex_proposal call site: 00787 /src/openssh/compat.c:146
445 884 2 :

['sshkey_free', 'cert_new']

445 884 sshkey_new call site: 00168 /src/openssh/sshkey.c:703
439 439 1 :

['cert_free']

439 449 sshkey_free_contents call site: 00237 /src/openssh/sshkey.c:768

Runtime coverage analysis

Covered functions
491
Functions that are reachable but not covered
187
Reachable functions
465
Percentage of reachable functions covered
59.78%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
regress/misc/fuzz-harness/kex_fuzz.cc 11
log.c 6
xmalloc.c 4
fatal.c 1
match.c 5
openbsd-compat/strlcpy.c 1
openbsd-compat/vis.c 2
cleanup.c 1
sshbuf.c 16
sshkey.c 51
misc.c 11
sshbuf-getput-basic.c 16
openbsd-compat/recallocarray.c 1
sshbuf-misc.c 3
openbsd-compat/base64.c 1
openbsd-compat/freezero.c 1
ssh-pkcs11-client.c 3
ssherr.c 1
cipher.c 13
openbsd-compat/bcrypt_pbkdf.c 2
hash.c 1
openbsd-compat/blowfish.c 6
openbsd-compat/arc4random.c 6
openbsd-compat/./arc4random.h 3
openbsd-compat/bsd-getentropy.c 1
openbsd-compat/./chacha_private.h 3
cipher-chachapoly-libcrypto.c 4
poly1305.c 1
openbsd-compat/timingsafe_bcmp.c 1
ssh-ecdsa.c 1
ssh_api.c 11
entropy.c 1
openbsd-compat/openssl-compat.c 2
packet.c 49
kex.c 22
mac.c 6
umac.c 26
./umac.c 26
hmac.c 6
digest-openssl.c 9
canohost.c 7
kex-names.c 7
openbsd-compat/strlcat.c 1
compat.c 2
dispatch.c 2

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
kex_gen_client /src/openssh/kexgen.c 1 ['N/A'] 27 0 141 25 5 795 0 3110 1417
sshkey_check_revoked /src/openssh/authfile.c 2 ['N/A', 'N/A'] 20 0 58 9 2 191 0 1452 624
xxxmain /src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c 2 ['int', 'N/A'] 22 0 1254 220 52 405 0 2420 415
ssh_sk_sign /src/openssh/regress/misc/sk-dummy/sk-dummy.c 10 ['int', 'N/A', 'size_t', 'N/A', 'N/A', 'size_t', 'char', 'N/A', 'N/A', 'N/A'] 7 0 175 21 7 63 0 199 164
kexgex_server /src/openssh/kexgexs.c 1 ['N/A'] 28 0 17 3 2 382 0 2007 162
sshauthopt_from_cert /src/openssh/auth-options.c 1 ['N/A'] 7 0 108 19 9 74 0 503 124
sshkey_save_private /src/openssh/authfile.c 7 ['N/A', 'N/A', 'N/A', 'N/A', 'int', 'N/A', 'int'] 23 0 86 11 5 197 0 1160 115
ssh_krl_to_blob /src/openssh/krl.c 2 ['N/A', 'N/A'] 17 0 412 78 30 78 0 486 94
kex_gen_server /src/openssh/kexgen.c 1 ['N/A'] 27 0 17 3 2 718 0 2858 88
subprocess /src/openssh/misc.c 9 ['N/A', 'N/A', 'int', 'N/A', 'N/A', 'int', 'N/A', 'N/A', 'N/A'] 8 0 708 108 31 69 0 327 85

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
73.0%
1135 / 1557
Cyclomatic complexity statically reachable by fuzzers
71.0%
6635 / 9341

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

regress/misc/fuzz-harness/authopt_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshauthopt_parse', 'recallocarray', 'sshauthopt_merge', 'a2port', 'dup_strings']

regress/misc/fuzz-harness/sig_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshkey_ssh_name_from_type_nid', 'sshlog', 'sshbuf_ptr', 'sshkey_impl_from_key', 'sshkey_is_cert', 'sshbuf_free', 'sshbuf_len']

regress/misc/fuzz-harness/privkey_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshkey_ssh_name_from_type_nid', 'sshlog', 'sshkey_impl_from_key', 'sshbuf_ptr', 'sshkey_free', 'recallocarray', 'sshbuf_allocate', 'sshbuf_set_parent', 'sshbuf_fromb', 'cert_new']

regress/misc/fuzz-harness/sshsig_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshkey_ssh_name_from_type_nid', 'match_pattern_list', 'sshkey_impl_from_key', 'sshbuf_fromb', 'hash_buffer', 'log_init', 'sshlog', 'sshkey_free', 'sshsig_peek_hashalg', 'ssh_digest_memory']

regress/misc/fuzz-harness/pubkey_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['sshkey_ssh_name_from_type_nid', 'sshlog', 'sshkey_impl_from_key', 'sshbuf_fromb', 'sshkey_free', 'recallocarray', 'sshbuf_allocate', 'sshbuf_set_parent', 'cert_new']

regress/misc/fuzz-harness/sshsigopt_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


regress/misc/fuzz-harness/agent_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['identity_permitted', 'process_add_smartcard_key', 'process_add_identity', 'sshkey_puts_opts_internal', 'sshkey_ssh_name', 'process_extension', 'sshkey_fingerprint', 'sshkey_parse_private2', 'sshbuf_put_string', 'cipher_init']

regress/misc/fuzz-harness/kex_fuzz.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['ssh_remote_ipaddr', 'crypto_hash_sha512', 'sshkey_parse_private2', 'ssh_packet_close_internal', 'cipher_init', 'private2_decrypt', 'ssh_err', 'sshkey_check_rsa_length', 'sshkey_from_blob_internal', 'sshkey_ec_validate_private']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/openssh/dispatch.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/dh.c [] []
/src/openssh/xmalloc.c ['authopt_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/hash.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/arc4random_uniform.c [] []
/src/openssh/regress/misc/fuzz-harness/pubkey_fuzz.cc ['pubkey_fuzz'] ['pubkey_fuzz']
/src/openssh/openbsd-compat/bcrypt_pbkdf.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz']
/src/openssh/digest-openssl.c ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/sshbuf-getput-crypto.c [] []
/src/openssh/openbsd-compat/bsd-getentropy.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/misc.c ['authopt_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'sshsigopt_fuzz', 'agent_fuzz', 'kex_fuzz'] ['authopt_fuzz', 'sshsig_fuzz', 'sshsigopt_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/bsd-getpeereid.c [] []
/src/openssh/ssh_api.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/regress/misc/fuzz-harness/agent_fuzz_helper.c ['agent_fuzz'] ['agent_fuzz']
/src/openssh/./libcrux_mlkem768_sha3.h [] []
/src/openssh/cipher.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/kexgex.c [] []
/src/openssh/cipher-chachapoly-libcrypto.c ['agent_fuzz', 'kex_fuzz'] []
/src/openssh/kex-names.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/ssh-ecdsa.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/cleanup.c ['authopt_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'kex_fuzz'] []
/src/openssh/sshsig.c ['sshsig_fuzz', 'sshsigopt_fuzz'] ['sshsig_fuzz', 'sshsigopt_fuzz']
/src/openssh/kexc25519.c [] []
/src/openssh/ed25519.c [] []
/src/openssh/entropy.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/openbsd-compat/strlcpy.c ['authopt_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/timingsafe_bcmp.c ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/fatal.c ['authopt_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] []
/src/openssh/match.c ['authopt_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sshsig_fuzz', 'kex_fuzz']
/src/openssh/kexgexs.c [] []
/src/openssh/ssh-ed25519-sk.c [] []
/src/openssh/openbsd-compat/bsd-misc.c [] []
/src/openssh/platform-tracing.c [] []
/src/openssh/regress/misc/fuzz-harness/privkey_fuzz.cc ['privkey_fuzz'] ['privkey_fuzz']
/src/openssh/regress/misc/fuzz-harness/sshsig_fuzz.cc ['sshsig_fuzz'] ['sshsig_fuzz']
/src/openssh/misc-agent.c [] []
/src/openssh/openbsd-compat/./chacha_private.h ['agent_fuzz', 'kex_fuzz'] []
/src/openssh/auth-options.c ['authopt_fuzz'] ['authopt_fuzz']
/src/openssh/atomicio.c ['agent_fuzz'] []
/src/openssh/openbsd-compat/strlcat.c ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/umac.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/regress/misc/sk-dummy/sk-dummy.c [] []
/src/openssh/kex.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/kexmlkem768x25519.c [] []
/src/openssh/kexecdh.c [] []
/src/openssh/ssh-ed25519.c [] []
/src/openssh/krl.c [] []
/usr/include/x86_64-linux-gnu/bits/uintn-identity.h [] []
/src/openssh/platform-pledge.c [] []
/src/openssh/openbsd-compat/./arc4random.h ['agent_fuzz', 'kex_fuzz'] []
/src/openssh/compat.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/bitmap.c [] []
/src/openssh/sshkey.c ['sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/arc4random.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/hmac.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/ssherr.c ['sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sshsig_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/ssh-ecdsa-sk.c [] []
/src/openssh/ssh-rsa.c [] []
/src/openssh/log.c ['authopt_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/vis.c ['authopt_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/platform-misc.c [] []
/src/openssh/openbsd-compat/libressl-api-compat.c [] []
/src/openssh/readpass.c ['agent_fuzz'] ['agent_fuzz']
/src/openssh/regress/misc/fuzz-harness/kex_fuzz.cc ['kex_fuzz'] ['kex_fuzz']
/src/openssh/openbsd-compat/recallocarray.c ['authopt_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] ['authopt_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/port-net.c [] []
/src/openssh/kexgexc.c [] []
/src/openssh/smult_curve25519_ref.c [] []
/src/openssh/canohost.c ['kex_fuzz'] []
/src/openssh/openbsd-compat/bsd-closefrom.c ['agent_fuzz'] []
/src/openssh/regress/misc/fuzz-harness/sshsigopt_fuzz.cc ['sshsigopt_fuzz'] ['sshsigopt_fuzz']
/src/openssh/sshbuf-getput-basic.c ['sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/ssh-pkcs11-client.c ['sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] []
/src/openssh/mac.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/kexdh.c [] []
/src/openssh/sshbuf-misc.c ['sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] ['privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/kexgen.c [] []
/src/openssh/openbsd-compat/freezero.c ['authopt_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] ['authopt_fuzz', 'sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/utf8.c [] []
/src/openssh/sshbuf.c ['sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz'] ['sig_fuzz', 'privkey_fuzz', 'sshsig_fuzz', 'pubkey_fuzz', 'agent_fuzz', 'kex_fuzz']
/src/openssh/openbsd-compat/readpassphrase.c ['agent_fuzz'] []
/src/openssh/regress/misc/fuzz-harness/agent_fuzz.cc ['agent_fuzz'] ['agent_fuzz']
/src/openssh/regress/misc/fuzz-harness/authopt_fuzz.cc ['authopt_fuzz'] ['authopt_fuzz']
/src/openssh/sntrup761.c [] []
/src/openssh/openbsd-compat/blowfish.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz']
/src/openssh/packet.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/kexsntrup761x25519.c [] []
/src/openssh/regress/misc/fuzz-harness/sig_fuzz.cc ['sig_fuzz'] ['sig_fuzz']
/src/openssh/regress/misc/fuzz-harness/../../../ssh-agent.c ['agent_fuzz'] []
/src/openssh/openbsd-compat/strtonum.c ['authopt_fuzz'] ['authopt_fuzz']
/src/openssh/openbsd-compat/getopt_long.c [] []
/src/openssh/addr.c [] []
/src/openssh/sshbuf-io.c [] []
/src/openssh/./umac.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/openbsd-compat/openssl-compat.c ['kex_fuzz'] ['kex_fuzz']
/src/openssh/authfile.c [] []
/src/openssh/openbsd-compat/base64.c ['agent_fuzz', 'kex_fuzz'] ['agent_fuzz', 'kex_fuzz']
/src/openssh/regress/misc/fuzz-harness/ssh-sk-null.cc [] []
/src/openssh/poly1305.c ['agent_fuzz', 'kex_fuzz'] []
/src/openssh/ssh-sk.c ['agent_fuzz'] []
/src/openssh/addrmatch.c [] []

Directories in report

Directory
/src/openssh/openbsd-compat/./
/usr/include/x86_64-linux-gnu/bits/
/src/openssh/./
/src/openssh/
/src/openssh/openbsd-compat/
/src/openssh/regress/misc/fuzz-harness/
/src/openssh/regress/misc/fuzz-harness/../../../
/src/openssh/regress/misc/sk-dummy/