Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.h
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.h
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_timer.h
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_tab.h
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_tab.c
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.h
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.h
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem.c
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.h
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.h
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_timer.c
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.c
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem.h
Examining data/code-saturne-6.2.0+repack/preprocessor/util/ecs_elt_typ_liste.h
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr_priv.h
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_famille_priv.h
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_famille_chaine.h
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.c
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_famille.h
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_priv.h
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_def.c
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.h
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_famille_chaine.c
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr.c
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr_chaine.h
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.h
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr.h
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_att.c
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_att.h
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage_priv.h
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr_chaine.c
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_famille.c
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_def.h
Examining data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_med.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_med.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_med_priv.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_nopo.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ccm.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns_priv.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ccm.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_post.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_comm.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_cgns.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_comm.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_post.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens_priv.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_nopo.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.h
Examining data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_cgns.c
Examining data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.h
Examining data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_main.c
Examining data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c
Examining data/code-saturne-6.2.0+repack/build-aux/catalyst-5.6/CoProcessingTest.cxx
Examining data/code-saturne-6.2.0+repack/build-aux/catalyst/CoProcessingTest.cxx
Examining data/code-saturne-6.2.0+repack/docs/doxygen/keywords.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_remarks.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/richards.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_source_terms-scalar_in_a_channel.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_radiative_transfer.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/turbomachinery.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_coupling.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_electric_scaling.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cavitation.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_head_losses.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_parameters.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_source_terms.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/uspt1d.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_extra_operations-nusselt_calculation.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_gwf.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/bft_error_example.c
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_extra_operations_examples.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_initialization.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_solver.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_cooling_towers.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/condensation.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_physical_properties.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_f_user_parameters.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_boundary_conditions_examples.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_lagrangian_particle_tracking_module.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_boundary_conditions_ale.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_les_inflow.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/drift_coal_scalars.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_atmospheric_model.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/usthht.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/drift_scalars.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_modules.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_tabs.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_fluid_structure_interaction.h
Examining data/code-saturne-6.2.0+repack/docs/doxygen/examples/cs_user_performance_tuning.h
Examining data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c
Examining data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c
Examining data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp
Examining data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c
Examining data/code-saturne-6.2.0+repack/tests/cs_random_test.c
Examining data/code-saturne-6.2.0+repack/tests/cs_moment_test.c
Examining data/code-saturne-6.2.0+repack/tests/cs_core_test.c
Examining data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c
Examining data/code-saturne-6.2.0+repack/tests/cs_check_quadrature.c
Examining data/code-saturne-6.2.0+repack/tests/fvm_selector_postfix_test.c
Examining data/code-saturne-6.2.0+repack/tests/bft_mem_test.c
Examining data/code-saturne-6.2.0+repack/tests/cs_matrix_test.c
Examining data/code-saturne-6.2.0+repack/tests/cs_tree_test.c
Examining data/code-saturne-6.2.0+repack/tests/fvm_selector_test.c
Examining data/code-saturne-6.2.0+repack/tests/bft_error_test.c
Examining data/code-saturne-6.2.0+repack/tests/cs_check_sdm.c
Examining data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c
Examining data/code-saturne-6.2.0+repack/tests/cs_interface_test.c
Examining data/code-saturne-6.2.0+repack/tests/bft_mem_usage_test.c
Examining data/code-saturne-6.2.0+repack/tests/cs_sizes_test.c
Examining data/code-saturne-6.2.0+repack/tests/cs_blas_test.c
Examining data/code-saturne-6.2.0+repack/tests/bft_backtrace_test.c
Examining data/code-saturne-6.2.0+repack/tests/bft_printf_test.c
Examining data/code-saturne-6.2.0+repack/tests/cs_map_test.c
Examining data/code-saturne-6.2.0+repack/tests/cs_file_test.c
Examining data/code-saturne-6.2.0+repack/libple/tests/ple_coupling_test.c
Examining data/code-saturne-6.2.0+repack/libple/pyple/ple_coupling_wrapper.c
Examining data/code-saturne-6.2.0+repack/libple/src/ple_defs.h
Examining data/code-saturne-6.2.0+repack/libple/src/ple_coupling.h
Examining data/code-saturne-6.2.0+repack/libple/src/ple_locator.c
Examining data/code-saturne-6.2.0+repack/libple/src/ple_locator.h
Examining data/code-saturne-6.2.0+repack/libple/src/ple_defs.c
Examining data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c
Examining data/code-saturne-6.2.0+repack/libple/src/ple_config_defs.h
Examining data/code-saturne-6.2.0+repack/libple/examples/my_ple_mesh_priv.h
Examining data/code-saturne-6.2.0+repack/libple/examples/my_ple_point_location.c
Examining data/code-saturne-6.2.0+repack/libple/examples/my_ple_mesh.h
Examining data/code-saturne-6.2.0+repack/libple/examples/my_ple_point_location.h
Examining data/code-saturne-6.2.0+repack/libple/examples/my_ple_mesh.c
Examining data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.h
Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_headers.h
Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_ke.c
Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_kw.h
Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_rotation.h
Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_inflow.c
Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_kw.c
Examining data/code-saturne-6.2.0+repack/src/turb/cs_les_filter.h
Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_rotation.c
Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_bc.c
Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_bc.h
Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_model.c
Examining data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.c
Examining data/code-saturne-6.2.0+repack/src/turb/cs_clip_ke.h
Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_model.h
Examining data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.h
Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_ke.h
Examining data/code-saturne-6.2.0+repack/src/turb/cs_les_filter.c
Examining data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c
Examining data/code-saturne-6.2.0+repack/src/turb/cs_turbulence_inflow.h
Examining data/code-saturne-6.2.0+repack/src/turb/cs_clip_ke.c
Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_cfbl_headers.h
Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_hgn_source_terms_step.c
Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_hgn_thermo.c
Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_cf_model.c
Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_hgn_source_terms_step.h
Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_hgn_thermo.h
Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_hgn_phase_thermo.c
Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_cf_model.h
Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_hgn_phase_thermo.h
Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_cf_thermo.h
Examining data/code-saturne-6.2.0+repack/src/cfbl/cs_cf_thermo.c
Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_post_output.c
Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_source_terms.c
Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_boundary_function.c
Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_fsi_struct.c
Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_initialization.c
Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_post_profile.c
Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_volume_function.c
Examining data/code-saturne-6.2.0+repack/src/meg/cs_meg_immersed_boundaries_inout.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_quality.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_geom.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_stl.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_geom.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_builder.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_extrude.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_adjacencies.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_refine.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_adjacencies.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_extrude.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_intersect.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_connect.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_bad_cells.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_thinwall.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_mesh.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_intersect.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_set.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_coarsen.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_update.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_mesh.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_split.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_bad_cells.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_headers.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_warping.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_connect.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_update.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_boundary.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_partition.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_quantities.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_smoother.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_builder.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_save.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_boundary_layer.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_boundary.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_coherency.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_thinwall.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_set.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_quality.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_remove.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_refine.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_smoother.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_halo.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_coherency.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_boundary_layer.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_warping.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_halo.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_quantities.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_remove.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_from_builder.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_coarsen.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_save.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.h
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_join_split.c
Examining data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_from_builder.c
Examining data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr_headers.h
Examining data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.h
Examining data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_source_terms.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_modak.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_dir.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_bcs.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_pun.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_property_fields.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_restart.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_solve.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_absorption.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_headers.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_solve.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_dir.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_bcs.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_restart.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_property_fields.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_options.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_options.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_wall_flux.c
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_pun.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_absorption.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_source_terms.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_wall_flux.h
Examining data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_modak.c
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_headers.h
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_variables.h
Examining data/code-saturne-6.2.0+repack/src/gui/cs_tree_xml.c
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_particles.c
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.c
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui.c
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.h
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_boundary_conditions.h
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_conjugate_heat_transfer.h
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_util.c
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_mesh.h
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_boundary_conditions.c
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.h
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_conjugate_heat_transfer.c
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_mobile_mesh.c
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.h
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui.h
Examining data/code-saturne-6.2.0+repack/src/gui/cs_tree_xml.h
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_mesh.c
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_particles.h
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_mobile_mesh.h
Examining data/code-saturne-6.2.0+repack/src/gui/cs_gui_util.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_box.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_convert_array.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_triangulate.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_triangulate.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_append.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_from_desc.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_box_tree.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_tesselation.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_box.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_periodicity.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_headers.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_neighborhood.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.cxx
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_triangulate.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extract.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_periodicity.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_trace.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_defs.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_hilbert.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_project.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_point_location.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_priv.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_point_location.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_box_tree.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_priv.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_morton.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_vtk_histogram.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_morton.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_order.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_append.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_defs.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_box_priv.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extract.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_from_desc.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_vtk_histogram.cxx
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_triangulate.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_group.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_convert_array.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extrude.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_project.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extrude.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_trace.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_neighborhood.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_tesselation.h
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_order.c
Examining data/code-saturne-6.2.0+repack/src/fvm/fvm_hilbert.c
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_air_props.h
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_at_data_assim.h
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atprke.c
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.h
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_at_data_assim.c
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_headers.h
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_air_props.c
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.h
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atprke.h
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_profile_std.c
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.h
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_intprf.h
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol.h
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_profile_std.h
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_intprf.c
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol.c
Examining data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_field.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_map.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_sort_partition.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_notebook.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_post.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_restart_default.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_fp_exception.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_system_info.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_ast_coupling.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_ast_coupling.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_post.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_renumber.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx
Examining data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_field_pointer.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_wall_functions.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_timer.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_renumber.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_equation_iterative_solve.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_boundary_conditions.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_utils.cxx
Examining data/code-saturne-6.2.0+repack/src/base/cs_selector.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_stokes_model.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_field_default.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_probe.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_control.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_sort.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_coupling.cxx
Examining data/code-saturne-6.2.0+repack/src/base/cs_param_types.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_time_step.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_array.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_opts.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_parall.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_order.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_mass_source_terms.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_time_plot.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_prototypes.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_param_types.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_log.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_thermal_model.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_parameters_check.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_time_step.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_parall.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_interface.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_halo.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_sort_partition.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_volume_zone.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_selector.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_head_losses.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_boundary.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_rotation.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_tree.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_porous_model.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_field_default.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_thermal_model.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_flag_check.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_wall_functions.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_fan.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_eos.cxx
Examining data/code-saturne-6.2.0+repack/src/base/cs_random.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_ext_neighborhood.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_restart_map.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_search.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_halo_perio.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_boundary_zone.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_calcium.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_field_operator.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_opts.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_head_losses.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_block_to_part.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_math.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_coupling.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_post_util.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_base.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_1d_wall_thermal_check.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_defs.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_volume_mass_injection.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_io.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_post_default.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_1d_wall_thermal.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_file.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_1d_wall_thermal_check.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_notebook.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_range_set.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_field_operator.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_system_info.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_restart_map.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_assert.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_vof.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_interface.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_restart.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_map.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_defs.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_control.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_array_reduce.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_block_dist.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_random.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_physical_constants.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_preprocess.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_preprocess.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_tree.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_interpolate.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_field.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_measures_util.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_measures_util.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_vof.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_block_dist.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_post_default.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_gas_mix.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_field_pointer.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx
Examining data/code-saturne-6.2.0+repack/src/base/cs_stokes_model.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_coupling.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_base.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_volume_zone.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_halo_perio.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_coolprop.cxx
Examining data/code-saturne-6.2.0+repack/src/base/cs_numbering.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_parameters_check.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_log_setup.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_volume_mass_injection.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_range_set.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_resource.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_boundary_zone.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_io.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_physical_constants.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_array.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_search.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_zone.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_log_setup.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_time_moment.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_math.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_restart.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_log.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_ale.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_rank_neighbors.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_block_to_part.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_1d_wall_thermal.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_order.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_fp_exception.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_part_to_block.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_halo.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx
Examining data/code-saturne-6.2.0+repack/src/base/cs_gas_mix.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_mass_source_terms.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_base_headers.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_porous_model.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_rank_neighbors.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_part_to_block.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_sort.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_calcium.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_equation_iterative_solve.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_headers.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_fan.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_interpolate.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_file.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_timer.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_ale.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_post_util.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_flag_check.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_numbering.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_array_reduce.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_resource.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_parameters.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_boundary_conditions.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_ext_neighborhood.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_probe.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_base_cuda.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_rotation.h
Examining data/code-saturne-6.2.0+repack/src/base/cs_parameters.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_boundary.c
Examining data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_turbomachinery.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_lagr_boundary_conditions.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_head_losses.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_zones.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_parameters.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_lagr_model.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_coupling.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_gwf.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_performance_tuning.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_radiative_transfer.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_source_terms.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_1d_wall_thermal.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_postprocess.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_extra_operations.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_mesh.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_radiative_transfer_bcs.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_boundary_conditions.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_lagr_particle.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_hgn.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_physical_properties.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_lagr_volume_conditions.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_electric_scaling.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_solver.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_porosity.c
Examining data/code-saturne-6.2.0+repack/src/user/cs_user_initialization.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-vorticity_field.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_porosity-from_cad.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_source_terms-base.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_performance_tuning-parallel-io.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_turbomachinery.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_hgn-relax_time_scale.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_lagr_boundary_conditions.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-scalar_balance.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_initialization-medcoupling_remapper_3d.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_coupling-syrthes.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_coupling-saturne.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_head_losses.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-stopping_criterion.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-cdo-condif.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-coupling.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_source_terms-turbulence.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-volume_mass_injection.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_zones.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-input-save.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-quality.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_lagr_model.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_source_terms-scalar_in_a_channel.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-probes-interpolate.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_source_terms-momentum.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-linear_solvers.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_performance_tuning-matrix.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_cad_intersect.h
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_radiative_transfer.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_performance_tuning-partition.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-ctwr.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-sfc.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-cdo-gwf.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-turbomachinery.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-balance_by_zone.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-time_moments.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-modify.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_1d_wall_thermal.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-periodicity.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-boundary_forces.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-nusselt_and_friction_calculation.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-base.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-boundary_pressure_profile.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_gwf-example.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-boundary.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_radiative_transfer_bcs.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_boundary_conditions-medcoupling_remapper_2d.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-groups_from_free_faces.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_boundary_conditions-electric_arcs_ieljou_3_or_4.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_initialization-base.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_boundary_conditions-notebook.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_mesh-joining.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_lagr_particle.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_solver-heat-equation.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-fans.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_physical_properties.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_lagr_volume_conditions.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_lagr_particle-coal.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_electric_scaling.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_porosity.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_source_terms-richards.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_user_performance_tuning-numbering.c
Examining data/code-saturne-6.2.0+repack/src/user_examples/cs_cad_intersect.cxx
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_log.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_coupling.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_dlvo.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_orientation.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_fragmentation.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_new.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_query.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_new.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_car.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_gradients.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_event.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_log.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_post.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_agglo.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_post.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_adh.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_options.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_extract.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_poisson.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_agglo.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_geom.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_resuspension.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_event.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_car.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_fragmentation.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_precipitation_model.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_poisson.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_adh.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_deposition_model.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_dlvo.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_orientation.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_options.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_extract.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_query.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_head_losses.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_geom.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_print.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_prototypes.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_coupling.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_precipitation_model.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_print.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_gradients.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde_model.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_resuspension.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_clogging.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_head_losses.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_headers.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_deposition_model.h
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde_model.c
Examining data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_clogging.h
Examining data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.h
Examining data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c
Examining data/code-saturne-6.2.0+repack/src/elec/cs_elec_headers.h
Examining data/code-saturne-6.2.0+repack/src/darc/cs_gwf_parameters.c
Examining data/code-saturne-6.2.0+repack/src/darc/cs_gwf_physical_properties.h
Examining data/code-saturne-6.2.0+repack/src/darc/cs_gwf_physical_properties.c
Examining data/code-saturne-6.2.0+repack/src/darc/cs_darc_headers.h
Examining data/code-saturne-6.2.0+repack/src/darc/cs_gwf_parameters.h
Examining data/code-saturne-6.2.0+repack/src/pprt/cs_pprt_headers.h
Examining data/code-saturne-6.2.0+repack/src/pprt/cs_combustion_model.h
Examining data/code-saturne-6.2.0+repack/src/pprt/cs_combustion_model.c
Examining data/code-saturne-6.2.0+repack/src/pprt/cs_physical_model.h
Examining data/code-saturne-6.2.0+repack/src/pprt/cs_physical_model.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_xdef.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_vecteq.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_sles.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdoeb_vecteq.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_common.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_static_condensation.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_time.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_eval.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_vecteq.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_common.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_coupling.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_scheme_geometry.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_priv.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_bc.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_flag.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_gwf.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_soil.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_flag.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_property.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_vecteq.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_main.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_assemble.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_local.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_ac.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_field_interpolation.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_walldistance.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_field_interpolation.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_advection.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdoeb_vecteq.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_basis_func.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_priv.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_reco.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_advection.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_soil.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_walldistance.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_maxwell.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_quadrature.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_system.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_assemble.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_maxwell.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_reco.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_sles.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hodge.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_mesh_deform.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hodge.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_scaleq.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdoeb_priv.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_main.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_thermal_system.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_scheme_geometry.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_basis_func.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_domain_setup.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_vecteq.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_priv.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_stokes.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_eval.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_time.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_scaleq.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_cw_eval.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_property.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_xdef.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_builder.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_cw_eval.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_domain_setup.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_domain.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_navsto.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_navsto.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_ac.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_builder.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_static_condensation.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_coupling.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_thermal_system.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_system.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_source_term.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_diffusion.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_gwf.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_equation_bc.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_domain.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_priv.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_stokes.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_local.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_predco.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_source_term.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_diffusion.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_mesh_deform.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_hho_scaleq.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_predco.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_param_cdo.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_scaleq.h
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_quadrature.c
Examining data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_headers.h
Examining data/code-saturne-6.2.0+repack/src/bft/bft_mem.h
Examining data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c
Examining data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.h
Examining data/code-saturne-6.2.0+repack/src/bft/bft_mem.c
Examining data/code-saturne-6.2.0+repack/src/bft/bft_error.h
Examining data/code-saturne-6.2.0+repack/src/bft/cs_bft_headers.h
Examining data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.h
Examining data/code-saturne-6.2.0+repack/src/bft/bft_printf.h
Examining data/code-saturne-6.2.0+repack/src/bft/bft_error.c
Examining data/code-saturne-6.2.0+repack/src/bft/bft_printf.c
Examining data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c
Examining data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c
Examining data/code-saturne-6.2.0+repack/src/apps/cs_solver.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_gradient_perio.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_multigrid_smoother.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_bad_cells_regularisation.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_default.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_blas.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_building.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_divergence.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_bad_cells_regularisation.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_face_viscosity.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_pc.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_bw_time_diff.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_it_priv.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_tuning.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_grid.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_priv.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_alge_headers.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_divergence.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_benchmark.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_tuning.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_grid.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_benchmark.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_multigrid_smoother.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_util.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_cell_to_vertex.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_default.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_balance.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_default.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_blas.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_default.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_it_priv.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_balance.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_sles_pc.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler_priv.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_gradient.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_cell_to_vertex.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_util.h
Examining data/code-saturne-6.2.0+repack/src/alge/cs_gradient_perio.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix_building.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c
Examining data/code-saturne-6.2.0+repack/src/alge/cs_face_viscosity.c
Examining data/code-saturne-6.2.0+repack/examples/3-stratified_junction/case1/cs_user_postprocess.c
Examining data/code-saturne-6.2.0+repack/examples/2-full_domain/case3/cs_user_parameters.c
Examining data/code-saturne-6.2.0+repack/examples/2-full_domain/case3/cs_user_extra_operations.c
Examining data/code-saturne-6.2.0+repack/examples/2-full_domain/case2/cs_user_parameters.c
Examining data/code-saturne-6.2.0+repack/examples/2-full_domain/case1/cs_user_parameters.c

FINAL RESULTS:

data/code-saturne-6.2.0+repack/docs/doxygen/examples/bft_error_example.c:90:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, arg_ptr);
data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:317:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(cmd.c_str());
data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:425:46:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    unique_ptr<FILE, decltype(&pclose)> pipe(popen(cmd, "r"), pclose);
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1192:18:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
    if ((char *)(cuserid(str_user)) == NULL)
data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:334:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_group_name, group_name);
data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:580:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(app_names, app_type);
data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:582:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(app_names + rank_info[3], app_name);
data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:613:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(sendbuf, app_type);
data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:617:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(sendbuf + l_rank_info[3], app_name);
data/code-saturne-6.2.0+repack/libple/src/ple_defs.c:169:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, arg_ptr);
data/code-saturne-6.2.0+repack/libple/src/ple_defs.c:297:36:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
static ple_printf_t *_ple_printf = vprintf;
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:152:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_sys_info_cpu_string, s);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:206:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(str_date, ecs_glob_build_date);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:222:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(str_date, __TIME__);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:375:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(opt_str, _("  (default file: \"%s\")"),
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:388:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(opt_str, _("  (default file: \"%s\")"),
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:444:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(opt_str,
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:664:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(str_system, sys_config.sysname);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:666:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(str_system, sys_config.release);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:667:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(str_machine, sys_config.nodename);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:924:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(cmd->nom_cas, argv[iarg]);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:975:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(outfic_err, "%s.err", outfic);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1011:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(cmd->nom_out, outfic);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1114:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(cmd->fic_maillage, argv[iarg]);
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr.c:99:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(descr_loc->nom, nom);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:185:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(noms_groupes->val[ind], tab_nom_cpct.val[ind]);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:739:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(val_nom_grp + (pos_nom_grp[ind_grp] - 1),
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:216:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(str_coul, "%s %d", _("Color"), (int)(coul_val[icoul]));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:307:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(str_fam, "%s %d", _("Family"), min_fam_val + ifam);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post.c:85:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cas->nom_cas, nom_cas);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:115:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cas_cgns->nom_cas, nom_cas);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:244:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(base_cgns->nom_maillage, nom_maillage);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:273:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(base_cgns->nom_fic, "%s_%s.cgns", cas_cgns->nom_cas, nom_maillage);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:91:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(nom_base, cas_ens->nom_cas);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:112:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(cas_ens->prefixe_rep, nom_base);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:127:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(cas_ens->nom_fic_case, cas_ens->prefixe_rep);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:128:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(cas_ens->nom_fic_case, cas_ens->prefixe_fic);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:152:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(cas_ens->prefixe_fic, nom_base);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:164:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(cas_ens->nom_fic_case, nom_base);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:267:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cas_ens->nom_cas, nom_cas);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:388:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(nom_fic_geo, cas_ens->prefixe_rep);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:389:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(nom_fic_geo, cas_ens->prefixe_fic);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:410:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(nom_cas, cas_ens->prefixe_rep);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:99:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cas_med->nom_cas, nom_cas);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:104:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cas_med->nom_fic, nom_cas);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:246:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(maillage_med->nom_maillage, nom_maillage);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:286:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*env_path, cs_root_dir);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:287:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(*env_path, rel_path);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:288:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(*env_path, dir_path);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:323:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(lib_path, "%s/%s.so", pkglibdir, dl_name);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:242:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(base->nom_fic, nom_fichier);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:900:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(nom_tmp, nom_fam);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:948:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(nom_boco_loc[ind_nom], nom_tmp);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1923:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  else if (sscanf(chaine, "%*s %*s %s", chaine_aux) != 1)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1946:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  else if (sscanf(chaine, "%*s %*s %s", chaine_aux) != 1)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2233:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  else if (sscanf(chaine, "%*s %*s %s", chaine_aux) != 1)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2257:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  else if (sscanf(chaine, "%*s %*s %s", chaine_aux) != 1)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2529:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (sscanf(ligne, "%*s %d %d %s",
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2531:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (sscanf(ligne, "%*s %d %s",
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2533:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        if (sscanf(ligne, "%*s %s",
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2570:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(nom_fic_geo + ind, nom_fic_geo_base);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:403:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  retour = sscanf(chaine, "%*s %s %*s %s", sch1, sch2);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:861:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(*nom_grp, chaine + ind);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1101:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(*nom_cl, ch_nom_cl);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:561:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    retval = sscanf(line, "%d %d %s",
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:593:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(_phys_name[cpt_phys_names], name+s_id);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:655:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    retour = sscanf(chaine, " %s %s %s",
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:874:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    retour = sscanf(chaine, " %s %s %s",
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1628:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(ideas_grp_name, ssch);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1631:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(ideas_grp_name, ssch);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:111:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(fic->nom_fic, nom_fichier);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:322:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(nom_maillage_med, nom_maillage);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:502:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(nom_maillage_med, nom_maillage);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1232:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(nom_maillage_med, nom_maillage);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1638:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(nom_maillage, nom_maillage_med);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c:187:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(this_part->nom_part, nom_maillage);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c:297:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(this_part->nom_typ_ele[this_part->nbr_typ_ele - 1],
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:360:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(nom_fam_med, str_num_fam_med);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:189:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(bt->s_addr[i], s_addr);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:208:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(bt->s_func[i], s_func);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:228:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(bt->s_file[i], s_file);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:268:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(comm->name, file_name);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.c:301:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, arg_ptr);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:143:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fic_imp, ECS_LOC_IMP_FMT_CHAR "\n", "NULL");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:153:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(fic_imp, ECS_LOC_IMP_FMT_INT "\n", val_imp);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:161:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(fic_imp, ECS_LOC_IMP_FMT_REAL "\n", val_imp);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:169:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(fic_imp, ECS_LOC_IMP_FMT_CHAR "\n", val_imp);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:177:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(fic_imp, ECS_LOC_IMP_FMT_SIZE_T "\n", (unsigned long)val_imp);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:183:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fic_imp, ECS_LOC_IMP_FMT_PTR  "\n", val);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:274:14:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    retval = vfprintf(f->ptr, format, arg_ptr);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:592:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(f->name, name);
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:224:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(v->name, name);
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:426:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(new_info->name, name);
data/code-saturne-6.2.0+repack/src/alge/cs_matrix_tuning.c:293:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(m_variant->name[j], mv_s->name[j]);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:600:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(tmp_s[0], "%-36s", "");
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:631:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(tmp_s[0], "%-36s", "");
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:998:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(mg->post_name, name);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1079:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(var_name, "mg %s %2d", base_name, (ii+1));
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1115:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(var_name, "rk %s %2d",
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1200:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(mgd->pc_name, name);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1238:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(mgd->pc_name, name);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1263:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(mgd->pc_name, name);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2811:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(_lv_names[i*2], "%s:descent:%0*d", name, w, i);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2812:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(_lv_names[i*2+1], "%s:ascent:%0*d", name, w, i);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2819:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(_lv_names[i*2], "%s:coarse:%0*d", name, w, i);
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:398:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sles->_name, name);
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:855:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(val_name, base_name);
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:857:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(val_name, name);
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1224:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(retval->_name, name);
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1938:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(val_name, base_name);
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1940:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(val_name, name);
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:225:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s_matrix.dat", name);
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:231:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s_rhs.dat", name);
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:242:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s_matrix.txt", name);
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:248:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s_rhs.txt", name);
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:259:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s_matrix.m", name);
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:267:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s_rhs.m", name);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:273:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, arg_ptr);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1114:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(format,
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1133:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(format,
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1567:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(format, (double)(_data[i]));
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1582:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(format, _data[i]);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1723:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(idx->names + idx->names_size, inp->name);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1727:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(idx->types + idx->types_size, inp->type_name);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2253:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(fmt, f_fmt);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2255:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(fmt, f_fmt);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2270:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(fmt, j, cmp1[i], cmp2[i]);
data/code-saturne-6.2.0+repack/src/atmo/cs_at_data_assim.c:190:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s_%s", "measures", f->name);
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:626:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(_atmo_chem.spack_file_name, "%s", file_name);
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:651:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(_atmo_chem.aero_file_name, "%s", file_name);
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:686:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (fscanf(file, "%s\n", line) != 1)
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:698:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (fscanf(file, "%s\n", line) != 1)
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:724:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (fscanf(file, "%s %lf\n", line, &(_atmo_chem.molar_mass[i])) != 2)
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:737:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(name, label);
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:378:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(namelist_ssh, cs_glob_atmo_chemistry->aero_file_name);
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:490:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(name, suffix);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:236:11:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  return  vfprintf(_bft_printf_file, format, arg_ptr);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:338:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, arg_ptr);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:348:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format(printf, 1, 2)))
data/code-saturne-6.2.0+repack/src/base/cs_base.c:796:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*env_path, cs_root_dir);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:797:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(*env_path, rel_path);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:798:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(*env_path, dir_path);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1072:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(app_name, argv[arg_id + 1]);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1098:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(app_name, buf + i);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1608:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(file_name, "%s.%0*d", base_name, n_dec, cs_glob_rank_id);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1612:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(file_name, base_name);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1896:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(format, arg_ptr_2);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1909:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(_status_file, format, arg_ptr);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1987:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_bft_printf_file_name, log_name);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1988:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(_bft_printf_file_name, ext);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2003:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(_bft_printf_file_name,
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2049:28:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      bft_printf_proxy_set(vprintf);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2051:31:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      ple_printf_function_set(vprintf);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2380:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(_f_name, "%s%s%s", datadir, subdir, base_name);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2461:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(lib_path, "%s%c%s.so", pkglibdir, DIR_SEPARATOR, name);
data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:136:12:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    return vfprintf(_bft_printf_file, format, arg_ptr);
data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:166:13:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
  msgsize = vsprintf (cs_buf_print_f, format, arg_ptr);
data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:168:13:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  msgsize = vsnprintf (cs_buf_print_f, CS_BUF_PRINT_F_SIZE, format, arg_ptr);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:648:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(comm->port_name, port_name);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:1368:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access(path, F_OK) == 0)
data/code-saturne-6.2.0+repack/src/base/cs_field.c:2424:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(name0, name);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:2640:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(kd->def_val.v_p, default_value);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:3264:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(kv->val.v_p, str);
data/code-saturne-6.2.0+repack/src/base/cs_file.c:1842:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(f->name, name);
data/code-saturne-6.2.0+repack/src/base/cs_file.c:3793:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dirnames[n_ent], ent->d_name);
data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:632:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cpl->cells_criteria, criteria_cells);
data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:636:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cpl->faces_criteria, criteria_faces);
data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:658:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cpl->faces_criteria, group_name);
data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:2665:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(cpl->namesca, f->name);
data/code-saturne-6.2.0+repack/src/base/cs_io.c:555:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(idx->names + idx->names_size, inp->sec_name);
data/code-saturne-6.2.0+repack/src/base/cs_io.c:746:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(header_data, base_header);
data/code-saturne-6.2.0+repack/src/base/cs_io.c:813:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(tmpname, filename);
data/code-saturne-6.2.0+repack/src/base/cs_io.c:1710:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *)(outp->buffer) + 56, sec_name);
data/code-saturne-6.2.0+repack/src/base/cs_io.c:2366:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *)(inp->buffer + 56), header->sec_name);
data/code-saturne-6.2.0+repack/src/base/cs_log.c:467:14:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    retval = vfprintf(_cs_log[log], format, arg_ptr);
data/code-saturne-6.2.0+repack/src/base/cs_log.c:518:14:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    retval = vfprintf(_cs_log[log], format, arg_ptr);
data/code-saturne-6.2.0+repack/src/base/cs_log.h:217:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  __attribute__((format(printf, 2, 3)));
data/code-saturne-6.2.0+repack/src/base/cs_map.c:166:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(m->keys + m->keys_size, key);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:173:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(mi->name, name);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:176:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(mi->medfile_path, medfile_path);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:179:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(mi->interp_method, interp_method);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:333:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(fname, subdir);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:336:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(fname, filename);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:338:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(fname, _ext);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx:223:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r->name, name);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx:228:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r->medfile_path, medfile_path);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx:233:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(r->field_names[i], field_names[i]);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_utils.cxx:578:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(m->sel_criteria, selection_criteria);
data/code-saturne-6.2.0+repack/src/base/cs_notebook.c:258:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e->description, description);
data/code-saturne-6.2.0+repack/src/base/cs_opts.c:219:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(opts->app_name, argv[arg_id + 1]);
data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_coupling.cxx:313:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(c->name, name);
data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_coupling.cxx:506:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(mesh->sel_criteria, select_criteria);
data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx:321:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r->name, name);
data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1184:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((_user_variable_defs + _n_user_variables)->name, name);
data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1228:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((_user_variable_defs + _n_user_variables)->name, name);
data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1229:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((_user_variable_defs + _n_user_variables)->ref_name, variable_name);
data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1263:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((_user_property_defs + _n_user_properties)->name, name);
data/code-saturne-6.2.0+repack/src/base/cs_parameters_check.h:81:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  __attribute__((format(printf, 3, 4)));
data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:212:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cs_glob_thermal_table->material,  material);
data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:252:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(cs_glob_thermal_table->method, method);
data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:295:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(fvm_name, _porosity_from_scan_opt.file_name);
data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:300:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(fvm_name, _porosity_from_scan_opt.output_name);
data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:304:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(fvm_name, suffix);
data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:537:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(_porosity_from_scan_opt.file_name, "%s", file_name);
data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:562:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(_porosity_from_scan_opt.output_name, "%s", output_name);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:1494:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(mesh_name, "%s_%05d", post_mesh->name, ts->nt_cur);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3495:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(post_mesh->name, mesh_name);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3869:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(wd->case_name, case_name);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3872:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(wd->dir_name, dir_name);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3878:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(wd->fmt_opts, fmt_opts);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3895:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(_cs_post_default_format_options, wd->fmt_opts);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3939:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(post_mesh->name, mesh_name);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3943:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(post_mesh->criteria[0], cell_criteria);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4004:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(post_mesh->name, mesh_name);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4053:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(post_mesh->name, mesh_name);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4057:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(post_mesh->criteria[1], i_face_criteria);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4063:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(post_mesh->criteria[2], b_face_criteria);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4134:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(post_mesh->name, mesh_name);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4203:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(post_mesh->name, mesh_name);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4207:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(post_mesh->criteria[3], cell_criteria);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4271:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(post_mesh->name, mesh_name);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4461:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(post_mesh->name, post_base->name);
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:203:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(tmp_name, "%s%c%s",
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:480:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(new_dest, new_src);
data/code-saturne-6.2.0+repack/src/base/cs_probe.c:277:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(label, name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:307:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(loc->name, h.sec_name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:875:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(_sec_name, prefix);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:876:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(_sec_name, name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:879:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(_sec_name, name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:882:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(_sec_name, postfix);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1698:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(new_writer->name, name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1710:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(new_writer->path, _path);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1748:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(mw->prev_files[mw->n_prev_files - 1], fname);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2172:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(_name, _path);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2175:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(_name, name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2188:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(_name, _path);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2211:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(_re_name, _path);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2215:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(_re_name, _subdir);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2224:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(_re_name, name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2243:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(restart->name, _name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2465:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((restart->location[restart->n_locations-1]).name, location_name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2518:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((_location_ref[_n_locations_ref-1]).name, location_name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3061:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sec_name, name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3062:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(sec_name, coords_postfix);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3079:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sec_name, name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3080:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(sec_name, cell_num_postfix);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3208:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sec_name, name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3209:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(sec_name, coords_postfix);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3245:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sec_name, name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3246:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(sec_name, cell_num_postfix);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:881:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(sec_name, key);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2248:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(sec_name, key);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2400:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(sec_name, key);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2545:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(sec_name, "%s::%s", name, _coeff_name[c_id]);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2554:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(sec_name, "rij::%s", _coeff_name[c_id]);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2693:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(sec_name, "%s::%s", f->name, _coeff_name[c_id]);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1911:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(scb->app_name, saturne_name);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1917:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(scb->face_cpl_sel_c, boundary_cpl_criteria);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1923:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(scb->cell_cpl_sel_c, volume_cpl_criteria);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1929:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(scb->face_loc_sel_c, boundary_loc_criteria);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1935:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(scb->cell_loc_sel_c, volume_loc_criteria);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2045:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sat_coupling->sat_name, sat_name);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2057:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sat_coupling->face_cpl_sel, face_cpl_sel_c);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2061:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sat_coupling->cell_cpl_sel, cell_cpl_sel_c);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2066:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sat_coupling->face_loc_sel, face_loc_sel_c);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2070:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sat_coupling->cell_loc_sel, cell_loc_sel_c);
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:569:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(coupled_mesh_name, _("SYRTHES %s cells"), syr_coupling->syr_name);
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:601:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(coupled_mesh_name, _("SYRTHES %s faces"), syr_coupling->syr_name);
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1370:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(syr_coupling->syr_name, syr_name);
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1384:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(syr_coupling->face_sel, face_sel_criterion);
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1388:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(syr_coupling->cell_sel, cell_sel_criterion);
data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:343:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_syr_coupling_builder->app_name, ai.app_name);
data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:517:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(scb->app_name, syrthes_name);
data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:523:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(scb->face_sel_c, boundary_criteria);
data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:529:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(scb->cell_sel_c, volume_criteria);
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:1721:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mt->name, s);
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2704:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(names + names_idx[j], name);
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:304:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name, "%s%s%s.csv", file_prefix, plot_name, "_coords");
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:644:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(p->plot_name, plot_name);
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:647:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(p->file_name, "%s%s.dat", file_prefix, plot_name);
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:650:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(p->file_name, "%s%s.csv", file_prefix, plot_name);
data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.c:521:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(s->label, label);
data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.c:526:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(s->label, name);
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:381:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(n->name, name);
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:448:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(node->name, name);
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:677:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *)node->value, val);
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:1266:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(tbm->rotor_cells_c[r_id], cell_criteria);
data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:200:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(bt->s_addr[i], s_addr);
data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:219:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(bt->s_func[i], s_func);
data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:239:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(bt->s_file[i], s_file);
data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:346:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(s_cplus_func + l, bt->s_func[i] + j);
data/code-saturne-6.2.0+repack/src/bft/bft_error.c:160:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, arg_ptr);
data/code-saturne-6.2.0+repack/src/bft/bft_error.h:85:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  __attribute__((format(printf, 4, 5)));
data/code-saturne-6.2.0+repack/src/bft/bft_printf.c:99:55:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
static bft_printf_proxy_t        *_bft_printf_proxy = vprintf;
data/code-saturne-6.2.0+repack/src/bft/bft_printf.h:83:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  __attribute__((format(printf, 1, 2)));
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:943:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(field_name, "%s_cells", adv->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:968:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(field_name, "%s_vertices", adv->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:992:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(field_name, "%s_boundary_flux", adv->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:160:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(desc, "%s", "Homogenous Dirichlet");
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:163:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(desc, "%s", "Dirichlet");
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:166:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(desc, "%s", "Homogeneous Neumann");
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:169:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(desc, "%s", "Neumann");
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:172:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(desc, "%s", "Robin");
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:175:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(desc, "%s", "Sliding");
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_bc.h:178:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(desc, "%s", "Dirichlet on the tangential component");
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:1562:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(_eqp->name, "%s:gkb_transfo", eqp->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2700:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(_eqp->name, "%s", eqp->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2863:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(_eqp->name, "%s:alu0", eqp->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:2942:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(postlabel, "%s.Border", field->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:2212:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(postlabel, "%s.Border", field->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_scaleq.c:3358:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(postlabel, "%s.UpwCoef", eqp->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.c:218:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename, "%s-sol-%04d.log", eqname, nt);
data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.c:222:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename, "%s-rhs-%04d.log", eqname, nt);
data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c:198:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(label, "%s.Courant", adv->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c:249:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(label, "%s.Peclet", eqp->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c:299:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(label, "%s.Fourier", pty->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:138:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(label, "%s.Balance.%s", eq->param->name, tag);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:2318:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(bdy_flux_name, "%s_normal_boundary_flux", eq->varname);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:3325:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(postlabel, "%s.Balance", eqp->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:3364:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(postlabel, "%s.BdyFlux", eqp->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_common.c:656:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "<CDO/%s> Monitoring", eqname);
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:570:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(pty_name, "%s_time", eq_name);
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:845:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(name, "%s_diffusivity", eq_name);
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:873:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(name, "%s_reaction", eq_name);
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:889:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(name, "%s_precip", eq_name);
data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:2573:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(pty_name, "%s_diff_pty", varname);
data/code-saturne-6.2.0+repack/src/cdo/cs_source_term.c:109:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(n, "%s_%2d", base_name, id);
data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:396:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ct->criteria, zone_criteria);
data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1830:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(name, suf);
data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1831:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(label, suf);
data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:160:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(send_chars + n_chars, gc->group_name[j]);
data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:238:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(recv_chars + n_chars, gc->group_name[j]);
data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:274:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dest->group_name[i], src->group_name[i]);
data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:421:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(_class->group_name[i], group_names[i]);
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:1152:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(this_nodal->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:1268:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(new_nodal->name, this_nodal->name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:2363:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(new_nodal->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.c:242:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(this_selector->group_name[0], set_group_names[0]);
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.c:247:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(this_selector->group_name[j], name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:984:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(pf->infix, infix);
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1157:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(pf->missing_operand[pf->n_missing_operands], missing);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:449:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(tmp_name, "%s/%s", dir_path, file_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:462:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(tmp_name, "%s/%s", dir_path, file_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1414:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1419:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->name, _name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1460:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->input_name, n);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:582:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(state_full_name, state_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:583:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(state_full_name, state_number);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3239:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(full_name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3243:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(full_name, vector_char2);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3244:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(full_name, vector_char1);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3271:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(vect_short_name, short_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3273:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(full_name, vector_char2);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3274:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(vect_short_name, vector_char1);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3450:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(full_name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3600:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(_ccm_version_string, "%s", "CCMIO");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3684:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(writer->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3703:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(writer->mesh_filename, path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3707:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(writer->mesh_filename, writer->name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3712:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(writer->mesh_basename, writer->name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3716:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(writer->path, path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3880:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(w->mesh_filename, "%s%s-%s.ccmg",
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3885:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(w->mesh_basename, "%s-%s.ccmg",
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3891:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(w->mesh_filename, "%s%s.ccmg", w->path, w->name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3894:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(w->mesh_basename, "%s.ccmg", w->name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4090:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(w->solution_filename, "%s%s-%s.ccmp",
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4096:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(w->solution_filename, "%s%s.ccmp",
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:287:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(w->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:289:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(w->name, postfix);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:306:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->filename, path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:314:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(w->filename, w->name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:577:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(writer->bases[i]->name, base_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:748:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(sol_name, "Steady (%s)",
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:751:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(sol_name, "Solution %3d (%s)",
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:2567:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(this_writer->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:290:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(var->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:381:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(line + l, "%32s ", description); /* Description max 49 chars,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:406:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(var->file_name, "%s.", this_case->file_name_prefix);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:408:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(var->file_name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:441:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(var->case_line, line);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:442:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(var->case_line, var->file_name + this_case->dir_name_length);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:526:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(this_case->geom_file_name, this_case->file_name_prefix);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:527:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(this_case->geom_file_name, extension);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:578:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(this_case->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:596:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(this_case->case_file_name, dir_prefix);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:607:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(this_case->file_name_prefix, this_case->case_file_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:810:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(this_case->part_name[i], part_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:478:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(var_name, "%s[%s]", c->name, tmpe);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:480:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(var_name, c->name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:484:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(t_stamp, "_%s_%.4i", var_name, w->nt);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:494:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(w->file_name, "%s%s%s.txt", w->path, w->name, t_stamp);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:499:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(w->file_name, "%s%s%s.tex", w->path, w->name, t_stamp);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:505:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(w->file_name, "%s%s%s.png", w->path, w->name, t_stamp);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:561:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(w->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:564:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(w->path, path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1267:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(&component_name[i_dim * MED_SNAME_SIZE],
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1274:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(&component_name[i_dim * MED_SNAME_SIZE],
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1283:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(&component_name[i_dim * MED_SNAME_SIZE],
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4268:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(writer->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4283:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(writer->filename, path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4287:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(writer->filename, writer->name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.cxx:949:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(writer->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.cxx:954:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(writer->name, _name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:187:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(c_name, "%s[%s]", c->name, tmpe);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:189:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(c_name, c->name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:338:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(w->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:397:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(tracefile_path, path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:400:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(tracefile_path, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:199:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(w->file_name, "%s%s%s.dat", w->path, w->name, t_stamp);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:201:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(w->file_name, "%s%s%s.csv", w->path, w->name, t_stamp);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:331:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(w->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:334:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(w->path, path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:186:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name, "%scoords%s.dat", w->prefix, t_stamp);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:188:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name, "%scoords%s.csv", w->prefix, t_stamp);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:340:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(plot_name, "%s[%s]", c->name, tmpe);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:342:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(plot_name, c->name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:442:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(w->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:446:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(w->prefix, "%s%s_", path, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:450:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->prefix, path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_trace.h:45:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  {char str[256]; sprintf(str, "%s:%d", __FILE__, __LINE__); \
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:525:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(_name, "%s%s", wf->dl_prefix, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:662:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(tmp_path, this_writer->path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:687:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(tmp_name, "%s_%s", this_writer->name, mesh_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:775:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(this_writer->mesh_names[i], name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:845:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(closest_name, tmp_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1029:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(tmp_options + i0, tmp_options + i1 + 1);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1051:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(format_options, tmp_options);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1134:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(tmp_options + i0, tmp_options + i1 + 1);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1166:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(this_writer->name, name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1179:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(this_writer->path, path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c:2434:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(s, comp3[component_id]);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c:2438:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(s, comp6[component_id]);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c:2440:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(s, comp9[component_id]);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:189:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(path0, param);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3090:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tmp, f->name);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3401:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(kdname, f->name);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3988:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, s_list);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:4126:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(label, "%s%1i", prefix, fluid_id);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:853:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(probe_labels[i], pn);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.c:490:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(_boundary->label[izone], label);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.c:493:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(_boundary->nature[izone], nature);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:1592:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(vars->model, name);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:1595:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(vars->model_value, model);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1318:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(rubriq, "stat_bord_%s",
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_options.c:144:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cs_glob_lagr_boundary_interactions->nombrd[ipp], varname);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:362:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(class_name, _class_ext);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1144:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(name, _class_name);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1195:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(name, _comp_name);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1196:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(name, _class_name);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1245:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(name, _comp_name);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1246:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(name, _class_name);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3459:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mt->name, s);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5443:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(names + names_idx[i], name);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5465:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(names + names_idx[j], name);
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:107:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename, "log%cJoin%02dDBG_%s_%04d.dat", CS_DIR_SEPARATOR,
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:139:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename, "log%cJoin%02dDBG_%s_%04d.dat", CS_DIR_SEPARATOR,
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:295:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesh_name,"%s%02d%s%05d",
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:302:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesh_name,"%s%02d", "WorkMesh_j", param.num);
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:380:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesh_name,"%s%05d", "LocalMesh_n", CS_MAX(cs_glob_rank_id, 0));
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:384:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesh_name,"%s", "LocalMesh");
data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.c:174:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesh_name,"%s%02d%s%05d",
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:455:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(mesh_name,"%s%02d", "AdjacentJoinFaces_j", join_param.num);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:476:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(mesh_name,"%s%02d", "JoinFacesAfterMerge_j", join_param.num);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:556:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(mesh_name,"%s%02d", "InteriorJoinedFaces_j", join_param.num);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:580:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesh_name,"%s%02d", "BoundaryJoinedFaces_j", join_param.num);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:645:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(name,"%s%02d", "CleanFaces_j", param.num);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:702:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fullname, "log%cJoin%02dDBG_%s%04d.dat", DIR_SEPARATOR,
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:727:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(mesh_name,"%s%02d%s%05d", basename, param.num, "_n", rank);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_split.c:1665:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(new_mesh_name,"%s%05d", "AfterSplitting_n",
data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2151:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(join->criteria, sel_criteria);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2174:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(logname, "log%cjoin_%02d%s%s.log", DIR_SEPARATOR,
data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2177:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(join->log_name, logname);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:470:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(mesh->group, name);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:485:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(mesh->group + mesh->group_idx[n_groups_o], name);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:747:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(g_lst, g_cur);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:756:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(g_lst + size_tot, g_cur);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:675:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ml->select_str, criteria);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_save.c:178:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(_name, "%s%c%s",
data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:1677:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, errstr, errlist);
data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:1722:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, errstr, errlist);
data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2398:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename,
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:127:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(line, "%s", temp);
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:138:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(line, temp);
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:141:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(line, "%s", temp);
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:152:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(line, temp);
data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.c:280:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(buffer, name);
data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.c:285:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(buffer, csca);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:236:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(postlabel, "%s.Error", field->name);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:248:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(postlabel, "%s.RefSol", field->name);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:311:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "Resume-%s-t%.f.log", eqname, time_step->t_cur);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:318:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "Resume-%s.log", eqname);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-time_moments.c:415:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mean_name, f->name); /* copy field name into the new var */
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-time_moments.c:416:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(mean_name, extension); /* add the extension */
data/code-saturne-6.2.0+repack/tests/bft_error_test.c:47:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, arg_ptr);
data/code-saturne-6.2.0+repack/tests/bft_printf_test.c:41:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  ret = vfprintf(stdout, format, arg_ptr);
data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:70:10:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  return vfprintf(f, format, arg_ptr);
data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:98:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, arg_ptr);
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:121:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const cs_file_access_t access[5] = {CS_FILE_STDIO_SERIAL,
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:131:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const int access[1] = {CS_FILE_STDIO_SERIAL};
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:183:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access[a_id] >= CS_FILE_MPI_INDEPENDENT) {
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:210:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                       access[a_id],
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:219:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                       access[a_id]);
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:325:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                       access[a_id],
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:334:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                       access[a_id]);
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:380:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access[a_id] < CS_FILE_MPI_INDEPENDENT)
data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:245:10:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  return vfprintf(f, format, arg_ptr);
data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:268:10:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  return vfprintf(f, format, arg_ptr);
data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:290:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, arg_ptr);
data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:72:10:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  return vfprintf(f, format, arg_ptr);
data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:94:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, arg_ptr);
data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:100:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand(static_cast<unsigned int>(time(&t)));
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_main.c:384:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("LANG") != NULL)
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_main.c:399:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  ecs_mem_init(getenv("CS_PREPROCESS_MEM_LOG"));
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_def.c:2592:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("CS_PREPROCESS_FOAM_2_VTK_SOURCE") != NULL)
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_def.c:2842:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("CS_PREPROCESS_MIN_EDGE_LEN") != NULL) {
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_def.c:2843:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    lng_are_min = atof(getenv("CS_PREPROCESS_MIN_EDGE_LEN"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:245:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("CS_ROOT_DIR") != NULL) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:246:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      cs_root_dir = getenv("CS_ROOT_DIR");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:252:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    else if (getenv("CFDSTUDY_ROOT_DIR") != NULL) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:253:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      cs_root_dir = getenv("CFDSTUDY_ROOT_DIR");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:763:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("CS_PREPROCESS_IGNORE_IDEAS_COO_SYS") != NULL) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:764:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (atoi(getenv("CS_PREPROCESS_IGNORE_IDEAS_COO_SYS")) > 0) {
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.c:182:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *lang = getenv("LANG");
data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:3594:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *s = getenv("CS_THREAD_DEBUG");
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:206:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *p = getenv("CS_PETSC_SYSTEM_VIEWER");
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:1410:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("CS_PETSC_SYSTEM_VIEWER") != NULL)
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2643:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("LANG") != NULL)
data/code-saturne-6.2.0+repack/src/apps/cs_solver.c:611:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("LANG") != NULL)
data/code-saturne-6.2.0+repack/src/base/cs_ast_coupling.c:1093:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *calcium_verbosity = getenv("CS_CALCIUM_VERBOSITY");
data/code-saturne-6.2.0+repack/src/base/cs_base.c:755:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("CS_ROOT_DIR") != NULL) {
data/code-saturne-6.2.0+repack/src/base/cs_base.c:756:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      cs_root_dir = getenv("CS_ROOT_DIR");
data/code-saturne-6.2.0+repack/src/base/cs_base.c:762:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    else if (getenv("CFDSTUDY_ROOT_DIR") != NULL) {
data/code-saturne-6.2.0+repack/src/base/cs_base.c:763:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      cs_root_dir = getenv("CFDSTUDY_ROOT_DIR");
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1319:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("PMI_RANK") != NULL)
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1322:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  else if (getenv("PCMPI") != NULL) /* Platform MPI */
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1326:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("OMPI_MCA_ns_nds_vpid") != NULL)         /* OpenMPI 1.2 */
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1328:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  else if (getenv("OMPI_COMM_WORLD_RANK") != NULL)    /* OpenMPI 1.3 + */
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1335:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("SLURM_SRUN_COMM_HOST") != NULL)
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1595:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((base_name = getenv("CS_MEM_LOG")) != NULL) {
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1972:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *p = getenv("CS_LOG_TO_STDOUT");
data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:476:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *p = getenv("CS_LOG_TO_STDOUT");
data/code-saturne-6.2.0+repack/src/base/cs_log.c:167:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *lang = getenv("LANG");
data/code-saturne-6.2.0+repack/src/base/cs_log.c:303:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *lang = getenv("LANG");
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:5574:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = getenv("CS_RENUMBER");
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:5928:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = getenv("CS_RENUMBER");
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:5978:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = getenv("CS_RENUMBER");
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:6060:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = getenv("CS_RENUMBER");
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:6296:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = getenv("CS_RENUMBER");
data/code-saturne-6.2.0+repack/src/base/cs_resource.c:164:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *cs_maxtime = getenv("CS_MAXTIME");
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1255:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("FVM_SELECTOR_DEBUG")) {
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:879:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          cs_real_t random;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:880:33:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:881:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          if (random >= 0.5)
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:921:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          double    random;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:922:32:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          cs_random_normal(1, &random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:925:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                           + random * zis->diameter_variance;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1080:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        cs_real_t random;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1081:31:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1083:64:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                                  CS_LAGR_INTERF, 5.0 + 15.0 * random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_new.c:830:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        cs_real_t random;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_new.c:831:31:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_new.c:833:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        if (random < 0.25)
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_new.c:839:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        else if (random > 0.625)
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c:1004:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c:1006:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                             random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_precipitation_model.c:444:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        cs_real_t random;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_precipitation_model.c:445:31:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_precipitation_model.c:447:64:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                                  CS_LAGR_INTERF, 5.0 + 15.0 * random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c:229:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  cs_real_t random;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c:301:31:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c:303:61:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        posasp1[i + nasptot] = pow(seff[iclas] /_pi, 0.5) * random;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c:304:42:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        posasp2[i + nasptot] = 2 * _pi * random;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c:327:31:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_roughness.c:330:42:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        posasp2[i + nasptot] = 2 * _pi * random;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde.c:2008:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
              cs_real_t random;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde.c:2012:39:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde.c:2029:37:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
              cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_sde.c:2030:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
              height_reent = random * (p_height - clust_consol_height);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:1415:33:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:1416:35:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          cs_real_t scov_rand =  (random * (*surface_coverage));
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:1686:31:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:1691:42:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          || (viscp >= visref_icoal  &&  random >= trap)) {
data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:221:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  double    random[3];
data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:224:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    cs_random_normal(3, random);
data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:226:43:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      fluctuations[point_id*3 + coo_id] = random[coo_id];
data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2005:33:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2007:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            = (random < 0.5) ? -1. : 1.;
data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2015:33:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2017:37:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            box_min_coord[coo_id] + random*box_length[coo_id];
data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2146:35:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2148:41:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
              = box_min_coord[coo_id] + random*box_length[coo_id];
data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2157:33:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          cs_random_uniform(1, &random);
data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:2159:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            = (random < 0.5) ? -1. : 1.;
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-linear_solvers.c:182:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *p = getenv("CS_USER_PETSC_MAT_VIEW");
data/code-saturne-6.2.0+repack/tests/cs_blas_test.c:129:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("PMI_RANK") != NULL)
data/code-saturne-6.2.0+repack/tests/cs_blas_test.c:134:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("GMPI_ID") != NULL) /* In case we are using MPICH-GM */
data/code-saturne-6.2.0+repack/tests/cs_blas_test.c:138:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("OMPI_MCA_ns_nds_vpid") != NULL)         /* OpenMPI 1.2 */
data/code-saturne-6.2.0+repack/tests/cs_blas_test.c:140:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  else if (getenv("OMPI_COMM_WORLD_RANK") != NULL)    /* OpenMPI 1.3 and above */
data/code-saturne-6.2.0+repack/tests/cs_map_test.c:181:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  bft_mem_init(getenv("CS_MEM_LOG"));
data/code-saturne-6.2.0+repack/tests/cs_matrix_test.c:91:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("PMI_RANK") != NULL)
data/code-saturne-6.2.0+repack/tests/cs_matrix_test.c:95:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("OMPI_COMM_WORLD_RANK") != NULL)    /* OpenMPI 1.3 and above */
data/code-saturne-6.2.0+repack/tests/cs_matrix_test.c:548:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("CS_MEM_LOG") != NULL) {
data/code-saturne-6.2.0+repack/tests/cs_matrix_test.c:552:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             getenv("CS_MEM_LOG"), r_id);
data/code-saturne-6.2.0+repack/tests/cs_moment_test.c:83:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand(2);
data/code-saturne-6.2.0+repack/tests/fvm_selector_postfix_test.c:89:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  bft_mem_init(getenv("CS_MEM_LOG"));
data/code-saturne-6.2.0+repack/tests/fvm_selector_test.c:472:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  bft_mem_init(getenv("CS_MEM_LOG"));
data/code-saturne-6.2.0+repack/build-aux/catalyst-5.6/CoProcessingTest.cxx:57:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int nSteps = atoi(argv[2]);
data/code-saturne-6.2.0+repack/build-aux/catalyst/CoProcessingTest.cxx:57:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int nSteps = atoi(argv[2]);
data/code-saturne-6.2.0+repack/examples/2-full_domain/case3/cs_user_extra_operations.c:153:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen("moy.dat", "a");
data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:176:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf_rcv[13];
data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:327:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf_rcv[13];
data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:350:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf_rcv[2];
data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:376:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf_rcv[20];
data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:409:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[13] = "disconnect ";
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  chaine[LNG_MAX_CHAINE_IDEAS + 2];
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:101:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fic_lec = fopen(argv[1], "rb");
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:107:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fic_ecr = fopen(argv[2], "wb");
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char   ch_coord[3][LNG_MAX_CHAINE_IDEAS];
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:194:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(chaine, " %24.16E %24.16E %24.16E\n",
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:498:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fic_maillage = fopen(nom_fic_maillage, "rb");
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1120:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fic_maillage = fopen(nom_fic_maillage, "wb");
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   bufdh[5];
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1175:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(bufdh, "%02d", dh->tm_mday);
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1177:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(bufdh, "%02d", dh->tm_mon + 1);
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1179:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(bufdh, "%04d", (dh->tm_year) % 100 + 2000);
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str_user[L_cuserid];
data/code-saturne-6.2.0+repack/libple/src/ple_locator.c:2673:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(local_var, distant_var, n_points_loc*nbytes);
data/code-saturne-6.2.0+repack/libple/src/ple_locator.c:2689:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(distant_var, local_var, n_points_loc*nbytes);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:107:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _sys_info_cpu_string[81] = "";
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[81] ; /* Should be large enough for the
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:132:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen("/proc/cpuinfo", "r");
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:194:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str_date [ECS_STR_SIZE];
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:200:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char nom_mois[12][4]
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:355:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char opt_str[81];
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:534:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char   post_type[8],
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:541:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(post_type, "ens"); /* default */
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:550:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(post_type, "cgns");
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:560:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(post_type, "med");
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:592:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(cmd->nom_cas, "preprocess");
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:611:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(cmd->post_err, "ens"); /* default */
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:631:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             str_date     [ECS_STR_SIZE]  = "";
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:632:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             str_system   [ECS_STR_SIZE]  = "";
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:633:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             str_machine  [ECS_STR_SIZE]  = "";
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:634:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             str_ram      [ECS_STR_SIZE]  = "";
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:635:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             str_user     [ECS_STR_SIZE]  = "";
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:636:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             str_directory[PATH_MAX] = "";
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:695:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str_user, " (");
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:714:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(str_ram, "%lu", (unsigned long)ram);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:857:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fic = fopen(fic_name, "r")) == NULL) {
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:940:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        cmd->nbr_dump = (ecs_int_t) atoi(argv[++iarg]);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1049:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (! (isdigit(argv[iarg_num][0]) && atoi(argv[iarg + 1]) > 0))
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1064:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        cmd->num_maillage[iarg_num] = atoi(argv[++iarg]);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1140:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(cmd->nom_out, "mesh_input.csm");
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.h:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                    post_err[8];
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.h:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                    post_vol[8];
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr.c:111:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(descr_loc->nom, "%d", ide);
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:472:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(maillage->vertex_coords + (n_vertices_ini*3),
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:922:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *nom_typ_c[2] = {
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:927:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *nom_table_def[2] = {
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:932:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *nom_table_att[2] = {
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:937:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *nom_elt_fam[2] = {
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:942:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *nom_connect[2] = {
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:947:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *nom_fam[2] = {
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_maillage.c:967:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen("preprocessor_dump.txt", "w");
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.c:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pos_str[32]; /* Largement surdimensionné pour contenir une
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.c:128:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(pos_str, "[%d]", (int)(pos_pas*ient + 1));
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.c:369:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(((ecs_int_t *)table_recept->val) + nbr_val_recept,
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.c:746:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(this_table->pos,
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table.c:756:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(this_table->val,
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_table_att.c:1228:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(fam_ref, elt_fam, n_elts*sizeof(int));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:180:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   str_num_coul[ECS_STR_SIZE];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:183:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *const ent_msg_info_var_nbr_c[2]
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:204:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(str_num_coul, "%d", max_coul_val);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:251:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        str_num_fam [ECS_STR_SIZE];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:254:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *const ent_msg_info_var_nbr_c[ECS_N_ENTMAIL]
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:295:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(str_num_fam, "%d", ECS_MAX(10, max_fam_val));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_med_priv.h:144:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                nom_maillage_med[MED_NAME_SIZE + 1];  /* Nom MED */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:213:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               nom_maillage_cgns[ECS_CGNS_TAILLE_NOM + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:92:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(nom_base, ".ensight");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:119:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(cas_ens->prefixe_fic, "mesh");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:135:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(cas_ens->nom_fic_case, ".case");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:167:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(cas_ens->nom_fic_case, ".case");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:331:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ligne[83];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:361:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   ligne_cas[81];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:390:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(nom_fic_geo, ".geo");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:416:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(ligne_cas, "Case name: ");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:105:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(cas_med->nom_fic, ".med");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  desc_maillage_med[MED_COMMENT_SIZE + 1] = "";
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  dtunit[MED_LNAME_SIZE + 1] = "s";
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:185:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  axisname[MED_SNAME_SIZE*3 + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  axisunit[MED_SNAME_SIZE*3 + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char              nom[32];       /* Nom (et version) du format */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char              extension[8];  /* Extension de fichier */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char              cle[8];        /* Nom du type pour ligne de commande */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ccm.c:940:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[kCCMIOMaxStringLength + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:163:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           nom[ECS_CGNS_TAILLE_NOM + 1];      /* Nom de la section      */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            nom[ECS_CGNS_TAILLE_NOM + 1];   /* Nom de la zone          */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:230:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  nom_tmp[ECS_CGNS_TAILLE_NOM + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:334:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  nom_tmp[ECS_CGNS_TAILLE_NOM + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:420:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          nom_tmp [ECS_CGNS_TAILLE_NOM + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:619:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char nom_tmp_aux [ECS_CGNS_TAILLE_NOM + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:767:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    nom_tmp [ECS_CGNS_TAILLE_NOM + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:768:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    nom_fam [ECS_CGNS_TAILLE_NOM + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:3584:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   nom_tmp[ECS_CGNS_TAILLE_NOM + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:132:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  chaine[ECS_LOC_LNG_MAX_CHAINE_ENS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:216:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            char   ligne[ECS_LOC_LNG_MAX_CHAINE_ENS],
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:250:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:252:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                  char ligne[ECS_LOC_LNG_MAX_CHAINE_ENS] ,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:303:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         ligne[ECS_LOC_LNG_MAX_CHAINE_ENS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:304:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         sub[11];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:346:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          val_lue = atoi(sub);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:375:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         ligne[ECS_LOC_LNG_MAX_CHAINE_ENS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:376:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         sub[13];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:445:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         ligne[ECS_LOC_LNG_MAX_CHAINE_ENS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:446:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         sub[13];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:483:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        val_id[cpt_lignes_lues] = (int32_t)(atoi(sub));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:514:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         ligne[ECS_LOC_LNG_MAX_CHAINE_ENS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:515:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         sub[9];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:570:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          val_lue = atoi(sub);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:803:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    *nbr_som_elt     = atoi(chaine+strlen("bar"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:807:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    *nbr_som_elt     = atoi(chaine+strlen("tria"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:811:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    *nbr_som_elt     = atoi(chaine+strlen("quad"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:815:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    *nbr_som_elt     = atoi(chaine+strlen("tetra"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:819:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    *nbr_som_elt     = atoi(chaine+strlen("pyramid"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:823:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    *nbr_som_elt     = atoi(chaine+strlen("penta"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:827:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    *nbr_som_elt     = atoi(chaine+strlen("hexa"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1746:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          chaine[ECS_LOC_LNG_MAX_CHAINE_ENS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1865:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   chaine[ECS_LOC_LNG_MAX_CHAINE_ENS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1866:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   chaine_aux[ECS_LOC_LNG_MAX_CHAINE_ENS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2178:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char              chaine[ECS_LOC_LNG_MAX_CHAINE_ENS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char              chaine_aux[ECS_LOC_LNG_MAX_CHAINE_ENS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2314:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    num_part_lu = atoi(chaine+strlen("part"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2438:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char              ligne[ECS_LOC_LNG_MAX_CHAINE_ENS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2439:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char              nom_fic_geo_base[ECS_LOC_LNG_MAX_CHAINE_ENS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:297:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:324:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:352:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT];           /* Ligne lue   */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:353:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       sch1[ECS_LOC_LNG_MAX_CHAINE_GAMBIT];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:354:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       sch2[ECS_LOC_LNG_MAX_CHAINE_GAMBIT];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:483:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:560:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT];          /* Ligne lue  */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:566:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         str_som_lus[27][9];   /* Sommets lus                          */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:676:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(str_som_lus[inod], chaine + 15 + (inod_ligne*8), 8);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:695:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      som_elt[isom] = atoi(str_som_lus[ind_som_elt[isom]]);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:817:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:818:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     ch_num_elt[9];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:820:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *mtyp_name[6] = { "Undefined",
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:912:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ch_num_elt, chaine + (ielgp_ligne*8), 8);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:913:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      (*num_elt_grp)[ielgp] = atoi(ch_num_elt);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:949:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:950:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  ch_num_elt[11];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:951:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  ch_num_fac[6];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:952:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  ch_nom_cl[33];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:955:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *nom_type[3] = { "node",
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:959:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *nom_ibcode[54] = { "UNSPECIFIED",           /*  0 */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1030:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ch_nom_cl, chaine, 32);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1124:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ch_num_elt, chaine,     10);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1125:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ch_num_fac, chaine + 15, 5);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1127:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    (*num_elt_cl)[ind] = atoi(ch_num_elt);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1128:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    (*num_fac_cl)[ind] = atoi(ch_num_fac);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1684:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         chaine[ECS_LOC_LNG_MAX_CHAINE_GAMBIT]; /* Ligne lue */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:342:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  chaine[ECS_LOC_LNG_MAX_CHAINE_GMSH];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:405:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   chaine[ECS_LOC_LNG_MAX_CHAINE_GMSH];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:431:25:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  nbr_nod = (ecs_int_t)(atol(chaine));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:528:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   line[ECS_LOC_LNG_MAX_CHAINE_GMSH];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:529:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   name[ECS_LOC_LNG_MAX_CHAINE_GMSH];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:625:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               const char  *const *phys_name,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:633:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   line[ECS_LOC_LNG_MAX_CHAINE_GMSH];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:711:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int tag = atoi(ssch);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:730:32:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        unsigned long n_phys = atol(ssch);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:740:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          int phys_tag = atoi(ssch);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:768:35:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          unsigned long n_bound = atol(ssch);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:886:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   chaine[ECS_LOC_LNG_MAX_CHAINE_GMSH];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1148:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        chaine[ECS_LOC_LNG_MAX_CHAINE_GMSH];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1206:25:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  nbr_elt = (ecs_int_t)(atol(chaine));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1275:15:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      label = atol(ssch);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1283:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      type_gmsh = atoi(ssch);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1318:35:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nbr_tag_elt = (ecs_int_t)(atol(ssch));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1332:36:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            coul_elt = (ecs_int_t)(atol(ssch));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1349:32:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        coul_elt = (ecs_int_t)(atol(ssch));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1373:53:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        num_nod_elt_gmsh[ind_nod_elt] = (ecs_int_t)(atol(ssch));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1640:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        chaine[ECS_LOC_LNG_MAX_CHAINE_GMSH];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1831:55:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          num_nod_elt_gmsh[ind_nod_elt] = (ecs_int_t)(atol(ssch));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2094:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          chaine[ECS_LOC_LNG_MAX_CHAINE_GMSH]; /* Ligne lue  */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:466:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         s_atof[ECS_LOC_LNG_MAX_CHAINE_IDEAS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:541:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         chaine[ECS_LOC_LNG_MAX_CHAINE_IDEAS];          /* Ligne lue   */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:549:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         ideas_ch_val[3][ECS_LOC_LNG_MAX_CHAINE_IDEAS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:764:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (atoi(getenv("CS_PREPROCESS_IGNORE_IDEAS_COO_SYS")) > 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:800:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       chaine[ECS_LOC_LNG_MAX_CHAINE_IDEAS];             /* Ligne lue   */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:806:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       ideas_ch_coord[3][ECS_LOC_LNG_MAX_CHAINE_IDEAS];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:979:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       chaine[ECS_LOC_LNG_MAX_CHAINE_IDEAS];             /* Ligne lue   */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1387:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       chaine[ECS_LOC_LNG_MAX_CHAINE_IDEAS];             /* Ligne lue   */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1393:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         ideas_grp_name[ECS_IDEAS_LEN_GROUP_NAME]; /* Nom du groupe     */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1836:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         chaine[ECS_LOC_LNG_MAX_CHAINE_IDEAS];           /* Ligne lue   */
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:318:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         nom_maillage_med[MED_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:453:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               nom_maillage_med[MED_NAME_SIZE + 1] = "";
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:454:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               nom_equiv[MED_NAME_SIZE+1] = "";
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:576:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nom_equiv_cmp[MED_NAME_SIZE+1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:577:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char desc_equiv[MED_COMMENT_SIZE+1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1211:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       nom_maillage_med[MED_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1214:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       nom_fam_med[MED_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1215:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       un_att_des_med[MED_COMMENT_SIZE + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       un_grp_des_med[MED_LNAME_SIZE + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1526:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           nom_maillage_med[MED_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1527:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           desc_maillage_med[MED_COMMENT_SIZE + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1536:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char              dtunit[MED_LNAME_SIZE + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1537:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char              axisname[MED_SNAME_SIZE*3 + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1538:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char              axisunit[MED_SNAME_SIZE*3 + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_nopo.c:1128:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nopo_e_0, &(nopo_e[0]), 8);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_cgns.c:207:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        nom_section[32 + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_cgns.c:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char const  *nom_coord[3] = {"CoordinateX",
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_cgns.c:402:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(nom_section, "Section %2d", cpt_section);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c:287:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(this_part->nom_typ_ele[this_part->nbr_typ_ele - 1],
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c:292:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(this_part->nom_typ_ele[this_part->nbr_typ_ele - 1],
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:221:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        nom_fam_med[MED_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        str_num_fam_med[MED_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:243:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(str_num_fam_med, "%d", (int)num_fam_med);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:325:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        nom_fam_med[MED_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:326:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        str_num_fam_med[MED_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:355:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(str_num_fam_med, "%d", (int)num_fam_med);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:359:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(nom_fam_med, "FAMILLE_");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:377:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_func_buf[67];
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char padding[128] = "";
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[64] = "";
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:229:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name_pad[33] = "";
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:230:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char type_pad[3] = "";
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:378:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   datatype_name[8];
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:379:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   name_pad[8];
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:408:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(datatype_name, "i4");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:411:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(datatype_name, "i8");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:422:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(datatype_name, "r4");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:425:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(datatype_name, "r8");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:436:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(datatype_name, "u4");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:439:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(datatype_name, "u8");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:448:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(datatype_name, "u8");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:453:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(datatype_name, "c ");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:514:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char   header_pad[64];
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_elt_typ_liste.h:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            nom[11]; /* Nom le plus long: polyhedron */
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:700:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f->ptr = fopen(f->name, "a");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:703:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f->ptr = fopen(f->name, "w");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:719:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f->ptr = fopen(f->name, "r");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:728:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f->ptr = fopen(f->name, "ab");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:731:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f->ptr = fopen(f->name, "wb");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:747:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f->ptr = fopen(f->name, "rb");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:1586:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, src, ni);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:1713:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen(fic_name, "r")) != NULL) {
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem.c:470:28:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _ecs_mem_global_file = fopen(log_file_name, "w");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buf[512]; /* should be large enough for "/proc/%lu/status"
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:158:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "/proc/%lu/status", (unsigned long) pid);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:160:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(buf, O_RDONLY);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:296:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char  buf[81]; /* should be large enough for "/proc/%lu/status" */
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:303:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf, "/proc/%lu/status", (unsigned long) pid);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:304:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(buf, "r");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:352:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   buf[81];     /* should be large enough for "/proc/%lu/status" */
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:361:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (buf, "/proc/%lu/psinfo", pid);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:363:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen (buf, "r");
data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.c:2361:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_surface_balance(const char       *selection_crit,
data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.c:2362:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                   const char       *scalar_name,
data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.c:2484:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_flux_through_surface(const char         *scalar_name,
data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.h:208:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_surface_balance(const char       *selection_crit,
data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.h:209:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                   const char       *scalar_name,
data/code-saturne-6.2.0+repack/src/alge/cs_balance_by_zone.h:240:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_flux_through_surface(const char         *scalar_name,
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark.c:121:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *_matrix_operation_name[CS_MATRIX_N_FILL_TYPES][2]
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                   name[32];            /* Variant name */
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char vector_multiply_name[CS_MATRIX_N_FILL_TYPES][2][64];
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:127:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *_matrix_fill_name[CS_MATRIX_N_FILL_TYPES]
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:135:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *_matrix_operation_name[CS_MATRIX_N_FILL_TYPES][2]
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:675:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(yr0, y, n_rows*_block_mult*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1014:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char title[81] = "";
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1046:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_s[4][24] =  {"", "", "", ""};
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1063:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_s[24] =  {""};
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1090:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char title[32];
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1141:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char title[81] = "";
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_s[12][24] =  {"", "", "", "", "", "", "", "", "", "", "", ""};
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char title[32];
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1293:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_s[12][24] =  {"", "", "", "", "", "", "", "", "", "", "", ""};
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1311:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_s[1][24] =  {""};
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1340:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char title[32];
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:1677:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:3114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:4246:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:5922:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:6890:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:8218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:8985:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:9534:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:10233:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:10843:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:11207:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:11688:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:12081:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_divergence.c:447:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_divergence.c:984:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:8617:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[32];
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:8623:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(var_name, "Work array");
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:8696:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[32];
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:8702:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(var_name, "Work array");
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:8776:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[32];
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:8782:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(var_name, "Work array");
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:9039:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[32];
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:9051:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(var_name, "Work array");
data/code-saturne-6.2.0+repack/src/alge/cs_grid.c:1744:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(h->perio_lst,
data/code-saturne-6.2.0+repack/src/alge/cs_grid.c:1838:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(h->perio_lst,
data/code-saturne-6.2.0+repack/src/alge/cs_grid.c:6321:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(c_row_num, tmp_num_1, n_base_rows*sizeof(int));
data/code-saturne-6.2.0+repack/src/alge/cs_grid.c:6389:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(f_row_rank, tmp_rank_1, n_base_rows*sizeof(int));
data/code-saturne-6.2.0+repack/src/alge/cs_grid.c:6429:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(tmp_var_1, c_var, g->n_rows*db_size[1]*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/alge/cs_grid.c:6462:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(f_var, tmp_var_1, n_base_rows*db_size[1]*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:781:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(mc->_da, da, matrix->db_size[3]*sizeof(cs_real_t) * ms->n_rows);
data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:803:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(mc->_xa, xa, matrix->eb_size[3]*xa_n_vals*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:1803:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp_row_index, ms->_row_index, (ms->n_rows+1)*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:2785:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp_row_index, ms->row_index, (ms->n_rows+1)*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:4400:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               const char                  *func_name,
data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:5364:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(m, src, sizeof(cs_matrix_t));
data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:5417:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(m, src, sizeof(cs_matrix_t));
data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:5449:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(m_row, s_row, sizeof(cs_real_t)*eb_size[3]*n_cols);
data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.c:263:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmpr_idx, ma->_r_idx, (n_rows+1)*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.c:409:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmpr_idx, ma->d_r_idx, (n_rows+1)*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.c:3014:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ul[120];
data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.c:3096:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mav->db_size, db_size, 4*sizeof(int));
data/code-saturne-6.2.0+repack/src/alge/cs_matrix_assembler.c:3098:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mav->eb_size, eb_size, 4*sizeof(int));
data/code-saturne-6.2.0+repack/src/alge/cs_matrix_priv.h:333:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                   name[2][32]; /* Variant names */
data/code-saturne-6.2.0+repack/src/alge/cs_matrix_tuning.c:189:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&m_t, m, sizeof(cs_matrix_t));
data/code-saturne-6.2.0+repack/src/alge/cs_matrix_util.c:1249:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char flags[3] = {(unsigned char) sizeof(cs_gnum_t),
data/code-saturne-6.2.0+repack/src/alge/cs_matrix_util.c:1294:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(m_coords, _m_coords, n_entries*2*sizeof(cs_gnum_t));
data/code-saturne-6.2.0+repack/src/alge/cs_matrix_util.c:1303:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(m_vals, _m_vals, n_entries*sizeof(double));
data/code-saturne-6.2.0+repack/src/alge/cs_matrix_util.c:1976:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[64];
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:563:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp_s[7][64] =  {"", "", "", "", "", "", ""};
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:564:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *stage_name[2] = {N_("Construction:"), N_("Resolution:")};
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:565:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *lv_stage_name[7] = {N_("build:"), N_("solve:"),
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:3957:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(d->info), &(c->info),
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:3960:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(d, c, offsetof(cs_multigrid_t, n_levels_post));
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:4565:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char var_name[32];
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:4611:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(var_name, "Diag_%04d", lv_id);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:4621:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(var_name, "Diag_Dom_%04d", lv_id);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:4655:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(var_name, "RHS_%04d", level);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:4665:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(var_name, "X_%04d", level);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:4696:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(var_name, "Residual_%04d", level);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid_smoother.c:837:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rk, vx, n_rows * sizeof(cs_real_t));   /* rk <- vx */
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid_smoother.c:929:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rk, vx, n_rows * sizeof(cs_real_t));  /* rk <- vx */
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid_smoother.c:1020:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rk, vx, n_rows * sizeof(cs_real_t));  /* rk <- vx */
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:589:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(s_old, s, sizeof(cs_sles_t));
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:830:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char base_name[32], val_name[32];
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:850:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(base_name, "Residual");
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:995:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ul[128];
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1873:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char base_name[32], val_name[32];
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1906:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(base_name, "Diag");
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1911:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(base_name, "RHS");
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1912:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(val, rhs, n_rows*diag_block_size[1]*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1917:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(val, vx, n_rows*diag_block_size[1]*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1921:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(base_name, "Residual");
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1931:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(base_name, "Diag_Dom");
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:2040:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char type_name[32];
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:2046:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(type_name, "_fp_type");
data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:340:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dk, gk, n_rows * sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:717:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dk, gk, n_rows * sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:923:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dk, gk, n_rows * sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:1113:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dk, rk, n_rows * sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:1301:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dk, rk, n_rows * sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:1656:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rk, vx, n_rows * sizeof(cs_real_t));   /* rk <- vx */
data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:1776:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rk, vx, n_rows * sizeof(cs_real_t));  /* rk <- vx */
data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:1899:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rk, vx, n_rows * sizeof(cs_real_t));  /* rk <- vx */
data/code-saturne-6.2.0+repack/src/alge/cs_sles_it.c:3596:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (atoi(s) > 0)
data/code-saturne-6.2.0+repack/src/alge/cs_sles_it_priv.h:465:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(s, _sum, 5*sizeof(double));
data/code-saturne-6.2.0+repack/src/alge/cs_sles_it_priv.h:515:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(s, _sum, 4*sizeof(double));
data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.c:709:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(vx, rhs, n_rows*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.c:785:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sym_type_name[32];
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:156:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 *mat_type[2];       /* PETSc matrix type string
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:1572:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char norm_type_name[32];
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:638:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header_buf[65];
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:678:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  inp.f = fopen(inp.filename, "rb");
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:842:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
           char       **argv,
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1110:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char format[64] = "    %10lu : %";
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1129:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char format[64] = "    %10lu : %";
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1447:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(_data, data, n_vals);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1563:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char format[64] = "%";
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1578:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char format[64] = "%";
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1744:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idx->data + idx->data_size,
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1937:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, buffer, n_values);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2220:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                const char       *f_fmt,
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2249:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fmt[128] = "    %12llu:  %22.15e  | %22.15e\n";
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2252:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(fmt, "    %12llu:  %");
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2254:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(fmt, "  |  %");
data/code-saturne-6.2.0+repack/src/atmo/cs_at_data_assim.c:189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[50];
data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:715:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_at_opt_interp_read_file(char const           filename[50],
data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:721:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[MAX_LINE_SIZE];
data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:740:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fichier = fopen(filename, "r");
data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:748:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fichier = fopen(filename, "r");
data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:843:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fichier = fopen(filename, "r");
data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:881:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fichier = fopen(filename, "r");
data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.h:165:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_at_opt_interp_read_file(char const           filename[50],
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:670:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[512] = "";
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:676:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *file = fopen(_atmo_chem.spack_file_name, "rt");
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:719:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[512] = "";
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:720:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char label[512] = "";
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:735:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(name, "species_");
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char namelist_ssh[41];
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:376:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(namelist_ssh, "namelist.ssh");
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:464:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[512] = "";
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:478:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(name, "aerosol_layer_%04d", ilr);
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:480:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(name, "aerosol_num");
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:488:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char suffix[5];
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo_aerosol_ssh.c:489:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(suffix, "_%03d", isize);
data/code-saturne-6.2.0+repack/src/base/cs_ale.c:1692:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_vtx_coord0, m->vtx_coord, m->n_vertices * sizeof(cs_real_3_t));
data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.c:500:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dc->recv_count_save, dc->recv_count, sizeof(int)*(dc->n_ranks));
data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.c:526:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dc->recv_count, dc->recv_count_save, sizeof(int)*(dc->n_ranks));
data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.c:914:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(d->recv_id + i,
data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.c:2115:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(src_rank, d->src_rank, d->n_elts_dest*sizeof(int));
data/code-saturne-6.2.0+repack/src/base/cs_all_to_all.c:2203:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmp_s[64];
data/code-saturne-6.2.0+repack/src/base/cs_ast_coupling.c:1095:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    cs_calcium_set_verbosity(atoi(calcium_verbosity));
data/code-saturne-6.2.0+repack/src/base/cs_base.c:145:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char  cs_glob_base_str[CS_BASE_N_STRINGS][CS_BASE_STRING_LEN + 1];
data/code-saturne-6.2.0+repack/src/base/cs_base.c:303:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char err_file_name[81];
data/code-saturne-6.2.0+repack/src/base/cs_base.c:308:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(err_file_name, "error");
data/code-saturne-6.2.0+repack/src/base/cs_base.c:330:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(err_file_name, "error_r%0*d", n_dec, cs_glob_rank_id);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:380:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sig_name[32] = "";
data/code-saturne-6.2.0+repack/src/base/cs_base.c:625:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_func_buf[67];
data/code-saturne-6.2.0+repack/src/base/cs_base.c:865:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char err_string[MPI_MAX_ERROR_STRING + 1];
data/code-saturne-6.2.0+repack/src/base/cs_base.c:869:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char comm_name[MPI_MAX_OBJECT_NAME + 1];
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[81];
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1123:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char mon_name[12][4]
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1132:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mpi_vendor_lib[32] = "";
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mpi_lib[32] = "";
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1651:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char  unit[8] = {'K', 'M', 'G', 'T', 'P', 'E', 'Z', 'Y'};
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1904:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        _status_file = fopen(_status_file_name, "w");
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1914:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[64];
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1974:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (atoi(p) > 0)
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2072:28:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        _bft_printf_file = fopen(_bft_printf_file_name, "w");
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2384:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen(file_name, "r");
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2586:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_func_buf[67];
data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:161:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char cs_buf_print_f[CS_BUF_PRINT_F_SIZE];
data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:388:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dir, name, name_l);
data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:428:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dir, datadir, datadir_l);
data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:478:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(p) > 0)
data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:486:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      _bft_printf_file = fopen(name, "w");
data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:549:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      _bft_printf_file = fopen(name, "a");
data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:677:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char descr[128];
data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:320:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _var_name[CS_CALCIUM_VARIABLE_LEN + 1];
data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:331:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_cmp[CS_CALCIUM_VARIABLE_LEN + 1];
data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:394:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _var_name[CS_CALCIUM_VARIABLE_LEN + 1];
data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:404:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_cmp[CS_CALCIUM_VARIABLE_LEN + 1];
data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:464:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _var_name[CS_CALCIUM_VARIABLE_LEN + 1];
data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:476:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_val, val, n_val * sizeof(int));
data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:518:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   _var_name[CS_CALCIUM_VARIABLE_LEN + 1];
data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:529:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_val, val, n_val * sizeof(double));
data/code-saturne-6.2.0+repack/src/base/cs_control.c:252:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, src, ni);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:526:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  port_num = atoi(comm->port_name + id + 1);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:563:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&sock_addr.sin_addr, host_ent->h_addr_list[0], host_ent->h_length);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:1007:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char reply[20] = "\0";
data/code-saturne-6.2.0+repack/src/base/cs_control.c:1008:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(reply, "get: %.3f", val);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:1266:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char reply[5] = "0\0";
data/code-saturne-6.2.0+repack/src/base/cs_control.c:1287:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char reply[5];
data/code-saturne-6.2.0+repack/src/base/cs_control.c:1288:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(reply, "%d", retcode);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:1395:28:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE *control_file = fopen("control_file", "r");
data/code-saturne-6.2.0+repack/src/base/cs_control.c:1433:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char reply[13] = "Iteration OK";
data/code-saturne-6.2.0+repack/src/base/cs_coupling.c:201:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *sync_name[2] = {N_("point-to-point or not synchronized"),
data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.c:133:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char  *buffer[2];
data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.c:734:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dest, src, comp_size);
data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.c:739:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dest, src, comp_size);
data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.c:1823:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char comment[80];
data/code-saturne-6.2.0+repack/src/base/cs_crystal_router.c:1845:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char comment[80];
data/code-saturne-6.2.0+repack/src/base/cs_field.c:2420:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char _name0[128];
data/code-saturne-6.2.0+repack/src/base/cs_field.c:2457:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char c_str[64], c_ref[64];
data/code-saturne-6.2.0+repack/src/base/cs_field.c:2461:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(c_ref, "%d", _c_id);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:2696:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(kd->def_val.v_p, default_value, size);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:3384:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(kv->val.v_p, s, kd->type_size);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:3438:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(s, p, kd->type_size);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:3673:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_s[4][64] =  {"", "", "", ""};
data/code-saturne-6.2.0+repack/src/base/cs_field.c:3958:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp_s[4][64] =  {"", "", "", ""};
data/code-saturne-6.2.0+repack/src/base/cs_field.c:4055:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp_str[2][64] =  {"", ""};
data/code-saturne-6.2.0+repack/src/base/cs_field.c:4162:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name_s[64] =  "";
data/code-saturne-6.2.0+repack/src/base/cs_field_pointer.c:402:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[64];
data/code-saturne-6.2.0+repack/src/base/cs_file.c:513:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, src, ni);
data/code-saturne-6.2.0+repack/src/base/cs_file.c:541:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f->sh = fopen(f->name, "ab");
data/code-saturne-6.2.0+repack/src/base/cs_file.c:543:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f->sh = fopen(f->name, "a+b");
data/code-saturne-6.2.0+repack/src/base/cs_file.c:547:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f->sh = fopen(f->name, "wb");
data/code-saturne-6.2.0+repack/src/base/cs_file.c:549:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f->sh = fopen(f->name, "a+b");
data/code-saturne-6.2.0+repack/src/base/cs_file.c:553:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f->sh = fopen(f->name, "rb");
data/code-saturne-6.2.0+repack/src/base/cs_file.c:1198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[MPI_MAX_ERROR_STRING];
data/code-saturne-6.2.0+repack/src/base/cs_file.c:2235:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char _copybuf[1024];
data/code-saturne-6.2.0+repack/src/base/cs_file.c:2247:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(copybuf, buf, size*ni);
data/code-saturne-6.2.0+repack/src/base/cs_file.c:2495:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(copybuf, buf, bufsize);
data/code-saturne-6.2.0+repack/src/base/cs_file.c:3297:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *fmt[4] = {N_("  I/O read method:     %s\n"),
data/code-saturne-6.2.0+repack/src/base/cs_file.c:3334:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char key[MPI_MAX_INFO_KEY + 1];
data/code-saturne-6.2.0+repack/src/base/cs_file.c:3696:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen(fic_path, "r")) != NULL) {
data/code-saturne-6.2.0+repack/src/base/cs_file.c:3846:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen(fic_path, "r")) != NULL) {
data/code-saturne-6.2.0+repack/src/base/cs_file.c:3906:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen(path, "w")) != NULL) {
data/code-saturne-6.2.0+repack/src/base/cs_flag_check.c:402:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char var_name[32];
data/code-saturne-6.2.0+repack/src/base/cs_interface.c:387:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(tuples, tuples_tmp, sizeof(cs_gnum_t)*n_tuples*3);
data/code-saturne-6.2.0+repack/src/base/cs_interface.c:1253:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(_block_tuples + _n_block_tuples*3,
data/code-saturne-6.2.0+repack/src/base/cs_interface.c:2734:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(itf->elt_id + start_id, tmp, l*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/base/cs_interface.c:2741:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(itf->match_id + start_id, tmp, l*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/base/cs_interface.c:3142:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(_dest + j*stride_size,
data/code-saturne-6.2.0+repack/src/base/cs_interface.c:3799:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(_dest + j*stride_size,
data/code-saturne-6.2.0+repack/src/base/cs_interface.c:4012:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(_dest + r_buf_shift, send_buf + s_buf_shift, msg_size);
data/code-saturne-6.2.0+repack/src/base/cs_interface.c:5306:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(itf->match_id, send_buf + j, itf->size*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mesh_name[16] = "locator";
data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:652:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char group_name[64];
data/code-saturne-6.2.0+repack/src/base/cs_io.c:141:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                contents[64];   /* String describing file contents */
data/code-saturne-6.2.0+repack/src/base/cs_io.c:572:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idx->data + idx->data_size,
data/code-saturne-6.2.0+repack/src/base/cs_io.c:614:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header_data[128 + 24];
data/code-saturne-6.2.0+repack/src/base/cs_io.c:801:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _tmpname[128];
data/code-saturne-6.2.0+repack/src/base/cs_io.c:1422:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_elts, _buf, n_vals*cs_datatype_size[header->type_read]);
data/code-saturne-6.2.0+repack/src/base/cs_io.c:1432:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    ((char *)_elts)[header->n_vals] = '\0';
data/code-saturne-6.2.0+repack/src/base/cs_io.c:1717:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, elts, data_size);
data/code-saturne-6.2.0+repack/src/base/cs_io.c:3159:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char  unit[8] = {'K', 'M', 'G', 'T', 'P', 'E', 'Z', 'Y'};
data/code-saturne-6.2.0+repack/src/base/cs_io.c:3190:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(_wtimes, log->wtimes, 3*sizeof(double));
data/code-saturne-6.2.0+repack/src/base/cs_log.c:121:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _cs_log[log] = fopen(_cs_log_name[log], "w");
data/code-saturne-6.2.0+repack/src/base/cs_log.c:413:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       char     buf[33])
data/code-saturne-6.2.0+repack/src/base/cs_log.c:594:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char separator[81];
data/code-saturne-6.2.0+repack/src/base/cs_log.c:623:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp_s[4][64] =  {"", "", "", ""};
data/code-saturne-6.2.0+repack/src/base/cs_log.c:682:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp_s[4][64] =  {"", "", "", ""};
data/code-saturne-6.2.0+repack/src/base/cs_log.h:169:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       char     buf[33]);
data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:361:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp_s[2][64] =  {"", ""};
data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:438:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp_s[2][64] =  {"", ""};
data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:524:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp_s[5][64] =  {"", "", "", "", ""};
data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:866:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp_s[5][64] =  {"", "", "", "", ""};
data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:880:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vmin, _sstats_vmin, _sstats_val_size*sizeof(double));
data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:881:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vmax, _sstats_vmax, _sstats_val_size*sizeof(double));
data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:882:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vsum, _sstats_vsum, _sstats_val_size*sizeof(double));
data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:883:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(wsum, _sstats_wsum, _sstats_val_size*sizeof(double));
data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:1211:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp_s[5][64] =  {"", "", "", "", ""};
data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:1222:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vmin, _clips_vmin, _clips_val_size*sizeof(double));
data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:1223:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vmax, _clips_vmax, _clips_val_size*sizeof(double));
data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:1224:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vcount, _clips_count, _clips_val_size*sizeof(cs_gnum_t)*2);
data/code-saturne-6.2.0+repack/src/base/cs_notebook.c:527:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file = fopen("cs_uncertain_output.dat", "w");
data/code-saturne-6.2.0+repack/src/base/cs_numbering.c:618:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(numbering->group_index,
data/code-saturne-6.2.0+repack/src/base/cs_order.c:1400:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(data, tmp, n_elts*elt_size);
data/code-saturne-6.2.0+repack/src/base/cs_parall.c:249:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char  _locval[256];
data/code-saturne-6.2.0+repack/src/base/cs_parall.c:256:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(locval, val, data_size);
data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:65:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char cs_sep_h1[80] =
data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:67:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char cs_sep_h2[80] =
data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:69:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char cs_sepline[80] =
data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:71:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char cs_med_sepline[50] =
data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:78:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:90:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:99:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/base/cs_param_types.c:109:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/base/cs_param_types.h:702:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char cs_sep_h1[80];
data/code-saturne-6.2.0+repack/src/base/cs_param_types.h:703:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char cs_sep_h2[80];
data/code-saturne-6.2.0+repack/src/base/cs_param_types.h:704:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char cs_sepline[80];
data/code-saturne-6.2.0+repack/src/base/cs_param_types.h:705:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char cs_med_sepline[50];
data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx:505:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_paramedmem_remapper_create(char       *name,
data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx:506:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                              const char *sel_criteria,
data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx:507:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                              char       *file_name,
data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx:508:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                              char       *mesh_name,
data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:903:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&eqp, &_equation_param_default, sizeof(cs_equation_param_t));
data/code-saturne-6.2.0+repack/src/base/cs_parameters_check.c:213:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char underline[81];
data/code-saturne-6.2.0+repack/src/base/cs_part_to_block.c:294:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(send_buf, part_values, d->n_part_ents*stride_size);
data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:251:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(cs_glob_thermal_table->method, "EOS_");
data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:154:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[512];
data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:179:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen(_porosity_from_scan_opt.file_name, "rt");
data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:302:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char suffix[13];
data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:303:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(suffix, "_%02d", n_scan);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:279:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                   *criteria[5];   /* Base selection criteria for
data/code-saturne-6.2.0+repack/src/base/cs_post.c:503:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char frequency_s[80] = "";
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2413:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(fam_flag, _fam_flag, (mesh->n_families + 1)*sizeof(int));
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2474:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char part_name[81];
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2550:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(part_name, "vol: ");
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2633:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(part_name, "surf: ");
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2882:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         const char        *name,
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2883:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         char               name_buf[96])
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3070:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char interpolate_input[96];
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3173:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char interpolate_input[96];
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3274:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name_buf[96];
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3360:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char interpolate_input[96];
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4462:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(post_mesh->name, _(" edges"));
data/code-saturne-6.2.0+repack/src/base/cs_post.c:7181:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char part_name[81];
data/code-saturne-6.2.0+repack/src/base/cs_post.c:7221:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(part_name, "isolated: ");
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:451:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(saved_names,
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:556:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(mesh->group + group_end, "%d", color_id);
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1148:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_matrix, matrix, 12*sizeof(double));
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1190:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_a, a, sizeof(double)*12);
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1327:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_m, matrix, 12*sizeof(double));
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1771:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          perio_num = atoi(header.sec_name + strlen("periodicity_type_"));
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1786:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                 == atoi(header.sec_name + strlen("periodicity_matrix_")));
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1806:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        perio_id = atoi(header.sec_name
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1927:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_preprocessor_data_add_file(const char     *file_name,
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1929:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                              const char    **group_rename,
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1981:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(f->data, file_name, l);
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1988:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(f->data + data_size, transf_matrix, l);
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:2014:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_old_group_names[i], group_rename[i*2], l);
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:2019:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(_new_group_names[i], group_rename[i*2+1], l);
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:2158:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&cell_bi_ref,
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:2170:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&(mesh_builder->cell_bi),
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.h:87:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_preprocessor_data_add_file(const char     *file_name,
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.h:89:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                              const char    **group_rename,
data/code-saturne-6.2.0+repack/src/base/cs_probe.c:963:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_probe_set_create_from_segment(const char        *name,
data/code-saturne-6.2.0+repack/src/base/cs_probe.c:1373:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    pset->interpolation = atoi(keyval);
data/code-saturne-6.2.0+repack/src/base/cs_probe.c:1421:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pset->coords,
data/code-saturne-6.2.0+repack/src/base/cs_probe.c:1616:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char label[16];
data/code-saturne-6.2.0+repack/src/base/cs_probe.c:1716:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pset->coords_ini,
data/code-saturne-6.2.0+repack/src/base/cs_probe.h:311:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_probe_set_create_from_segment(const char        *name,
data/code-saturne-6.2.0+repack/src/base/cs_prototypes.h:906:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 const char  *object_name,
data/code-saturne-6.2.0+repack/src/base/cs_range_set.c:843:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest, src, d_size);
data/code-saturne-6.2.0+repack/src/base/cs_range_set.c:861:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest, src, d_size);
data/code-saturne-6.2.0+repack/src/base/cs_range_set.c:945:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest, src, d_size);
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:299:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(old_family, family, n_elts*sizeof(int));
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:328:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(old_r_gen, r_gen, n_elts);
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:367:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp_global, _global_num, n_elts*sizeof(cs_gnum_t));
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:547:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(face_cells_tmp,
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:560:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(face_cells_tmp,
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:580:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cell_cells_idx_old,
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:583:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cell_cells_lst_old,
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:620:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(gcell_vtx_idx_old,
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:623:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(gcell_vtx_lst_old,
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:696:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(face_vtx_idx_old, face_vtx_idx, (n_faces+1)*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:697:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(face_vtx_old, face_vtx, connect_size*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:746:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(i_face_cells_old, mesh->i_face_cells, n_i_faces*sizeof(cs_lnum_2_t));
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:807:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(b_face_cells_old, mesh->b_face_cells, n_b_faces*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:865:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(face_vtx_old, face_vtx, connect_size*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:898:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vtx_coord_old, mesh->vtx_coord, 3*n_vertices*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:1161:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp_idx, a->idx, (a->n_elts+1)*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:1989:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(t_cell_index_prev,
data/code-saturne-6.2.0+repack/src/base/cs_renumber.c:2107:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(t_cell_index,
data/code-saturne-6.2.0+repack/src/base/cs_resource.c:362:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE *_f = fopen("run_status.exceeded_time_limit", "w");
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2204:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char _subdir[19];
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2205:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(_subdir, "previous_dump_%04d", mw->n_prev_files_tot);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:339:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _sec_name[128];
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:430:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128] = "";
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:431:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char old_name_x[96] = "", old_name_y[96] = "", old_name_z[96] = "";
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:432:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char old_name_xx[96] = "", old_name_yy[96] = "", old_name_zz[96] = "";
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:433:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char old_name_xy[96] = "", old_name_yz[96] = "", old_name_xz[96] = "";
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:439:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char old_name[96] = "";
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:450:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      scalar_id = atoi(name) - 1;
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:688:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128] = "";
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:690:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *prefix[2] = {"fm_", "fm_a_"};
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:796:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sec_name[128];
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:880:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(sec_name, "fields:");
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:979:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char sec_name[128];
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:1096:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128];
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:1103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char old_sec_name[128];
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:1850:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(name_buf + sizes[1], f->name, l);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2247:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(sec_name, "fields:");
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2399:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(sec_name, "fields:");
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2474:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char old_name_xx[128] = "", old_name_yy[128] = "", old_name_zz[128] = "";
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2475:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char old_name_xy[128] = "", old_name_yz[128] = "", old_name_xz[128] = "";
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2742:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128], ref_sec_name[128];
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2907:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128];
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:889:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char coupled_mesh_name[64];
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:952:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(coupled_mesh_name, _("coupled_cells_%d"), *numcpl);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:964:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(coupled_mesh_name, _("coupled_faces_%d"), *numcpl);
data/code-saturne-6.2.0+repack/src/base/cs_sort_partition.c:165:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char  _sample_buffer[1024];
data/code-saturne-6.2.0+repack/src/base/cs_sort_partition.c:267:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(rfilename, "DistribOutput_l%02d.dat", loop_id1);
data/code-saturne-6.2.0+repack/src/base/cs_sort_partition.c:271:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dbg_file = fopen(rfilename, "w");
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:278:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char _op_name_send[33];
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:483:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  op_name_send[32 + 1];
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:484:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  op_name_recv[32 + 1];
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:489:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(op_name_send, "coupling:location:incomplete");
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:493:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(op_name_send, "coupling:location:ok");
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1251:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char op_name_send[32 + 1];
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1252:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char op_name_recv[32 + 1];
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1259:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(op_name_send, "coupling:start");
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1537:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  op_name_send[32 + 1];
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1538:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  op_name_recv[32 + 1];
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:147:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen("/proc/cpuinfo", "r");
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:207:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen("/etc/issue", "r");
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:319:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  str_date[81];
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:320:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  str_cpu[81];
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:321:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  str_issue[81];
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:322:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  str_directory[PATH_MAX] = "";
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:731:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sd_desc[256];
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:1716:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char s[64];
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[64];
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2191:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_s[4][64] =  {"", "", "", ""};
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2248:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[64];
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2249:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_s[8][64] =  {"", "", "", "", "", "", "", ""};
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2380:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_s[3][64] =  {"", "", ""};
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2420:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_s[6][64] =  {"", "", "", "", "", ""};
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2581:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char s[64];
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2792:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char s[64];
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:177:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _f = fopen(p->file_name, "w");
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:306:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _f = fopen(file_name, "w");
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:361:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _f = fopen(p->file_name, "w");
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:437:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _f = fopen(p->file_name, "w");
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:542:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _f = fopen(p->file_name, "w");
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:705:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    p->f = fopen(p->file_name, "a");
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1191:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      p->buffer_end += sprintf(p->buffer + p->buffer_end, " %8d", tn);
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1193:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      p->buffer_end += sprintf(p->buffer + p->buffer_end, " %14.7e", t);
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1197:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      p->buffer_end += sprintf(p->buffer + p->buffer_end, " %14.7e",
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1208:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      p->buffer_end += sprintf(p->buffer + p->buffer_end, "%8d", tn);
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1210:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      p->buffer_end += sprintf(p->buffer + p->buffer_end, "%14.7e", t);
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1214:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      p->buffer_end += sprintf(p->buffer + p->buffer_end, ", %14.7e",
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  _name[128];
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:784:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(node->value, val, node->size*sizeof(bool));
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:887:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(node->value, val, node->size*sizeof(int));
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:990:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(node->value, val, node->size*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  _shift[65] = "";
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1204:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(shift, "  ");
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:452:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mesh_copy->vtx_coord,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:460:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mesh_copy->i_face_cells,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:466:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mesh_copy->b_face_cells,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:472:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mesh_copy->i_face_vtx_idx,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:479:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mesh_copy->i_face_vtx_lst, mesh->i_face_vtx_lst,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:483:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mesh_copy->b_face_vtx_idx,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:491:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mesh_copy->b_face_vtx_lst,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:507:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mesh_copy->global_cell_num,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:514:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mesh_copy->global_i_face_num,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:521:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mesh_copy->global_b_face_num,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:528:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mesh_copy->global_vtx_num,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:556:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mesh_copy->b_cells, mesh->b_cells, mesh->n_b_cells*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:565:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mesh_copy->group_idx, mesh->group_idx,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:568:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mesh_copy->group, mesh->group,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:578:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mesh_copy->family_item, mesh->family_item, n_elts*sizeof(int));
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:582:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mesh_copy->cell_family, mesh->cell_family,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:586:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mesh_copy->i_face_family, mesh->i_face_family,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:591:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mesh_copy->b_face_family, mesh->b_face_family,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:597:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mesh_copy->i_face_r_gen, mesh->i_face_r_gen,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:1240:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_turbomachinery_add_rotor(const char    *cell_criteria,
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.h:97:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_turbomachinery_add_rotor(const char    *cell_criteria,
data/code-saturne-6.2.0+repack/src/bft/bft_mem.c:622:28:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _bft_mem_global_file = fopen(log_file_name, "w");
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:375:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buf[81]; /* should be large enough for "/proc/%lu/status"
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:393:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "/proc/%lu/status", (unsigned long) pid);
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:394:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = fopen(buf, "r");
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:530:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  buf[81]; /* should be large enough for "/proc/%lu/status" */
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:535:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "/proc/%lu/status", (unsigned long) pid);
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:536:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *fp = fopen(buf, "r");
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:592:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        buf[81];  /* should be large enough for "/proc/%lu/status" */
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:598:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (buf, "/proc/%05lu", (unsigned long) pid);
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:600:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    procfile = open(buf, O_RDONLY);
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:630:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   buf[81];     /* should be large enough for "/proc/%lu/status" */
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:639:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (buf, "/proc/%lu/psinfo", pid);
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:641:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen (buf, "r");
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:669:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   buf[81];     /* should be large enough for "/proc/%lu/status" */
data/code-saturne-6.2.0+repack/src/bft/bft_mem_usage.c:674:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (buf, "/proc/%05lu", (unsigned long) pid);
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:477:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  prefix[256];
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:542:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(prefix, "        Definition");
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:552:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(prefix, "        Definition %2d", ib);
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1391:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cell_values, ai->values,
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1410:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(cell_values, field->val, 3*cdoq->n_cells*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1603:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(vtx_values, ai->values, 3*cdoq->n_vertices*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1633:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(vtx_values, field->val,
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1837:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(flx_values, ai->values + n_i_faces, sizeof(cs_real_t)*n_b_faces);
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1883:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(flx_values, val, sizeof(cs_real_t)*n_b_faces);
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:1912:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(flx_values, field->val, sizeof(cs_real_t)*n_b_faces);
data/code-saturne-6.2.0+repack/src/cdo/cs_basis_func.c:1460:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char  *labels[20] = {"0", "x", "y", "z",
data/code-saturne-6.2.0+repack/src/cdo/cs_basis_func.c:2305:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char  *labels[15] = {"0" , "x"  , "y"   ,
data/code-saturne-6.2.0+repack/src/cdo/cs_basis_func.c:2779:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fout = fopen(fname, "w");
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c:756:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(edge_gnum, _g_num, n_edges*sizeof(cs_gnum_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c:993:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(face_gnum, mesh->global_i_face_num,
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c:1461:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fname, "DumpConnect.%05d.dat", cs_glob_rank_id);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c:1465:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fname, "DumpConnect.dat");
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c:1467:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE  *fdump = fopen(fname, "w");
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_diffusion.c:1414:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dir_val, csys->dir_values, n_f*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_field_interpolation.c:207:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vtx_values, f->val, mesh->n_vertices*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_field_interpolation.c:258:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(face_values, _face_values,
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.c:1184:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fname, "DumpQuantities.%05d.dat", cs_glob_rank_id);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.c:1188:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fname, "DumpQuantities.dat");
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.c:1190:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE  *fdump = fopen(fname, "w");
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.c:1328:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pvol_ec, cdoq->pvol_ec, c2e->idx[n_cells]*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdoeb_vecteq.c:1068:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->edge_values_pre, eqc->edge_values, sizeof(cs_real_t)*n_edges);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdoeb_vecteq.c:1123:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->edge_values_pre, eqc->edge_values,
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_ac.c:276:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->face_values_pre, eqc->face_values,
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_ac.c:280:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cc->mass_flux_array_pre, cc->mass_flux_array,
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_ac.c:1428:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cc->mass_flux_array_pre, cc->mass_flux_array,
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.c:161:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mom_eqc->face_values_pre, mom_eqc->face_values,
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.c:165:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cc->mass_flux_array_pre, cc->mass_flux_array,
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.c:850:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_div, div_op, 3*cm->n_fc*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.c:899:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_div, div_op, 3*n_f*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic.c:2350:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cc->mass_flux_array_pre, cc->mass_flux_array,
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:1583:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(gkb->b_tilda, b_f, gkb->n_u_dofs*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:1697:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(gkb->b_tilda, gkb->v, gkb->n_u_dofs*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:1906:38:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    uza->info->tol = fmax(uza->info->atol, uza->info->rtol*uza->info->res0);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2360:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(xsol + 3*n_faces, msles->p_c, n_cells*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2361:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(b + 3*n_faces, msles->b_c, n_cells*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2434:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(msles->p_c, xsol + 3*n_faces, n_cells*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_navsto.c:881:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char descr[32];
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:1368:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(fld->val_pre, c_vals, quant->n_cells*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:1384:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->face_values_pre, eqc->face_values,
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:1610:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(fld->val, cell_values, quant->n_cells*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:1807:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->face_values_pre, eqc->face_values, sizeof(cs_real_t)*n_faces);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:2088:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->face_values_pre, eqc->face_values, sizeof(cs_real_t)*n_faces);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:2164:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(eqc->face_values_pre, eqc->face_values,
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:2420:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->face_values_pre, eqc->face_values, sizeof(cs_real_t)*n_faces);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:2906:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->face_values_pre, eqc->face_values,
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:3053:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128];
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:3131:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128];
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:928:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->face_values_pre, eqc->face_values, sizeof(cs_real_t)*3*n_faces);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:1158:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->face_values_pre, eqc->face_values, sizeof(cs_real_t)*3*n_faces);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:1430:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->face_values_pre, eqc->face_values, sizeof(cs_real_t)*3*n_faces);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:2175:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->face_values_pre, eqc->face_values,
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:2323:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128];
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:2401:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128];
data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.c:745:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->cell_values_pre, eqc->cell_values, bsize);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.c:1566:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(eqc->cell_values, cell_values, quant->n_cells*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.c:3256:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128];
data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.c:3302:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128];
data/code-saturne-6.2.0+repack/src/cdo/cs_cdovcb_scaleq.c:3339:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqc->cell_values_pre, eqc->cell_values,
data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.c:156:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fout = fopen(fname, "w");
data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:204:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(b, eq->rhs, eq->n_sles_scatter_elts * sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:227:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(x, f_values, eq->n_sles_scatter_elts * sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_bc.c:860:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(values, array_input->values,
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_common.c:564:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(xsol, x, n_scatter_dofs*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:1532:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    eqp->sles_param.n_max_iter = atoi(keyval);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:1670:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    eqp->sles_param.verbosity = atoi(keyval);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:1782:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    eqp->verbosity = atoi(keyval);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2114:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst->enforcement_ref_value, ref->enforcement_ref_value,
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2121:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst->enforced_cell_ids, ref->enforced_cell_ids,
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2128:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dst->enforced_dof_values, ref->enforced_dof_values,
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2138:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst->enforced_dof_ids, ref->enforced_dof_ids,
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2145:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dst->enforced_dof_values, ref->enforced_dof_values,
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2301:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char val[CS_BASE_STRING_LEN];
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2478:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  prefix[256];
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2579:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  desc[128];
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2584:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(prefix, "        Definition %3d", id);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2599:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(prefix, "        Definition %3d", i);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2620:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(prefix, "        Time Hodge op. ");
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2631:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(prefix, "        Diffusion Hodge op. ");
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2642:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(prefix, "        Curl-curl Hodge op. ");
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2653:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(prefix, "        Grad-Div Hodge op. ");
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2723:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(prefix, "        Reaction Hodge op. ");
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2735:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(prefix, "        Definition %3d", s_id);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:3856:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(eqp->enforced_dof_ids, elt_ids, n_elts*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:3870:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqp->enforced_dof_values, elt_values, size*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:3930:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(eqp->enforced_cell_ids, elt_ids, n_elts*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:3944:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eqp->enforced_cell_values, elt_values, size*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:1248:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(values + 3*c_id, const_vec, 3*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:1256:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(values+3*c_id, const_vec, 3*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2427:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(retval + 3*v_id, input, _3real);
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2436:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(retval + 3*selected_lst[i], input, _3real);
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2501:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(retval + 3*f_id, input, _3real);
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2510:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(retval + 3*selected_lst[f], input, _3real);
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2523:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(retval + def->dim*f_id, input, s);
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2532:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(retval + def->dim*selected_lst[f], input, s);
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2591:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(retval + 3*c_id, input, _3real);
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2598:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(retval + 3*z->elt_ids[i], input, _3real);
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2610:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(retval + def->dim*c_id, input, s);
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2617:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(retval + def->dim*z->elt_ids[i], input, s);
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2977:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(retval + def->dim*f_id, input, s);
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:2998:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(retval + def->dim*selected_lst[f], input, s);
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:3135:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(retval, val, stride*sizeof(cs_real_t)*cs_cdo_quant->n_cells);
data/code-saturne-6.2.0+repack/src/cdo/cs_evaluate.c:3154:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(retval + stride*c_id, val + stride*c_id,
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf.c:416:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(gw->head_in_law, hydraulic_head_cells,
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_soil.c:964:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  meta[64];
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_soil.c:972:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(meta, "        Soil.%d | Model |", soil->id);
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:396:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(c_w_save, c_w, quant->n_vertices*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_hho_scaleq.c:1424:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(eqc->face_values, solu, sizeof(cs_real_t)*eqc->n_dofs);
data/code-saturne-6.2.0+repack/src/cdo/cs_hho_scaleq.c:1521:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128];
data/code-saturne-6.2.0+repack/src/cdo/cs_hho_scaleq.c:1600:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128];
data/code-saturne-6.2.0+repack/src/cdo/cs_hho_vecteq.c:1542:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(eqc->face_values, solu, sizeof(cs_real_t)*eqc->n_dofs);
data/code-saturne-6.2.0+repack/src/cdo/cs_hho_vecteq.c:1639:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128];
data/code-saturne-6.2.0+repack/src/cdo/cs_hho_vecteq.c:1718:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128];
data/code-saturne-6.2.0+repack/src/cdo/cs_hodge.c:99:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/cdo/cs_hodge.c:107:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/cdo/cs_hodge.c:1531:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char _empty_prefix[2] = "";
data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.c:110:34:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    double       atol,
data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.c:119:16:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  info->atol = atol;
data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.c:164:59:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    a_info->tol = fmax(a_info->rtol*a_info->res0, a_info->atol);
data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.h:98:36:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  double                           atol;
data/code-saturne-6.2.0+repack/src/cdo/cs_iter_algo.h:204:34:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    double       atol,
data/code-saturne-6.2.0+repack/src/cdo/cs_mesh_deform.c:244:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_b_zone_ids, boundary_zone_ids, sizeof(int)*_n_b_zones);
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:83:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:94:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:106:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:115:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:121:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:130:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:138:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:471:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char val[CS_BASE_STRING_LEN];
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:583:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nsp->sles_param.il_algo_verbosity = atoi(val);
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:587:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nsp->sles_param.n_max_il_algo_iter = atoi(val);
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:591:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nsp->sles_param.n_max_nl_algo_iter = atoi(val);
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:639:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nsp->sles_param.nl_algo_verbosity = atoi(val);
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:786:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nsp->verbosity = atoi(val);
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:824:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  cvalue[36]; /* include '\0' */
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1011:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  prefix[256];
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1018:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(prefix, "  * NavSto | Velocity.Init.Cond | Definition %2d", i);
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1027:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(prefix, "  * NavSto | Pressure.Init.Cond | Definition %2d", i);
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_system.c:1122:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(nsp->solid_cell_ids, solid_cell_ids, n_solid_cells*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_property.c:1190:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                               const char       *zname,
data/code-saturne-6.2.0+repack/src/cdo/cs_property.c:2000:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  prefix[256];
data/code-saturne-6.2.0+repack/src/cdo/cs_property.c:2038:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(prefix, "        Definition %3d", j);
data/code-saturne-6.2.0+repack/src/cdo/cs_property.h:490:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                               const char       *zname,
data/code-saturne-6.2.0+repack/src/cdo/cs_quadrature.c:84:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char
data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.c:180:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(c->val, m->val, sizeof(cs_real_t)*m->n_rows*m->n_cols);
data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.c:531:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(m->val, mref->val, sizeof(cs_real_t)*m->n_max_rows*m->n_max_cols);
data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.c:1438:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(facto, m->val, n*n*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.c:2207:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fout = fopen(fname, "w");
data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.c:2326:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fout = fopen(fname, "w");
data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.h:488:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(recv->val, send->val, sizeof(cs_real_t)*send->n_rows*send->n_cols);
data/code-saturne-6.2.0+repack/src/cdo/cs_sdm.h:588:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(b->val + i*nc, _start, sizeof(cs_real_t)*nc);
data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:65:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char _state_names[CS_SOLIDIFICATION_N_STATES][32] = {
data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:1915:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(alloy->tk_bulk, temp, csize);
data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:1916:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(alloy->ck_bulk, conc, csize);
data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:3431:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(alloy->c_l_cells, alloy->c_bulk->val, n_cells*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:3434:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(alloy->tk_bulk, solid->temperature->val, n_cells*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:3435:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(alloy->ck_bulk, alloy->c_bulk->val, n_cells*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:3440:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(alloy->c_l_faces, c_bulk_faces, quant->n_faces*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_xdef.c:682:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char _empty_prefix[2] = "";
data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_cw_eval.h:466:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(eval, (const cs_real_t *)input, 3*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_cw_eval.h:506:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(eval, array_input->values + 3*cm->f_ids[f], 3*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_cw_eval.h:586:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(eval, array_input->values + 9*cm->f_ids[f], 9*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_eval.c:738:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(eval, array_input->values, n_elts * sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_eval.c:845:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(eval, array_input->values, stride*n_elts * sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_eval.c:977:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(eval, array_input->values, n_elts*stride * sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/cdo/cs_xdef_eval.c:1177:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(eval, values, field->dim*n_elts * sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:405:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(ct->name, "cooling_towers_%02d", ct->num);
data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:471:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(ct->file_name, "cooling_towers_balance.%02d", ct->num);
data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:473:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(ct->file_name, "a");
data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:645:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char model_type[16];
data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:848:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f = fopen(ct->file_name, "a");
data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:415:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[64];
data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:763:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[LG_MAX];
data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1827:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(name, "esl_fraction_");
data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1828:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(label, "YM_ESL");
data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1829:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(suf, "%02d", igaz + 1);
data/code-saturne-6.2.0+repack/src/fvm/fvm_box.c:656:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char  XYZ[3] = "XYZ";
data/code-saturne-6.2.0+repack/src/fvm/fvm_box_tree.c:794:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, src, sizeof(fvm_box_tree_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_box_tree.c:800:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest->nodes, src->nodes, dest->n_nodes * sizeof(_node_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_box_tree.c:801:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest->child_ids,
data/code-saturne-6.2.0+repack/src/fvm/fvm_box_tree.c:806:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest->box_ids,
data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c:1275:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(send_global_num,
data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c:2018:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(this_io_num->_global_num, tmp_num, n_entities*sizeof(cs_gnum_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c:2047:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(this_io_num->_global_num, tmp_num, n_entities*sizeof(cs_gnum_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c:2220:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(_adjacency, adjacency, n_entities*stride*sizeof(cs_gnum_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c:2347:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(_index, index, (n_entities+1)*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_io_num.c:2348:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(_adjacency, adjacency, index[n_entities]*sizeof(cs_gnum_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_morton.c:548:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(rfilename, "DistribOutput_l%02d.dat", loop_id1);
data/code-saturne-6.2.0+repack/src/fvm/fvm_morton.c:552:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dbg_file = fopen(rfilename, "w");
data/code-saturne-6.2.0+repack/src/fvm/fvm_neighborhood.c:386:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(old_e_num, n->elt_num, n_elts*sizeof(cs_gnum_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_neighborhood.c:387:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(old_index, n->neighbor_index, (n_elts + 1)*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_neighborhood.c:388:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(old_n_num, n->neighbor_num, n_neighbors*sizeof(cs_gnum_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_neighborhood.c:948:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(n->elt_num,
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:1789:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(_vertex_coords, vertex_coords, n_vertices*dim*sizeof(cs_coord_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extract.c:878:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(g_vtx_num, fvm_io_num_get_global_num(global_io_num), size);
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extract.c:936:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy((char *)g_elt_num,
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_extract.c:986:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(vertex_coords, coords, sizeof(cs_coord_t) * n_vertices * dim);
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_from_desc.c:1496:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(section->gc_id, cell_gc_id, section->n_elements*sizeof(int));
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_order.c:157:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(connect, tmp_connect, stride * nb_ent * sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_order.c:201:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(connect_num, tmp_connect,
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_order.c:218:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(connect_idx, tmp_connect, (size_t)(nb_ent + 1) * sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal_order.c:254:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(gc_id, tmp_gc_id, nb_ent * sizeof(int));
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               name[16];    /* Operator name string */
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:367:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(this_parser->keywords + this_parser->keywords_size,
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:881:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(stack->elements, stack->_elements, stack->size*sizeof(_stack_entry_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1453:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             const char  *token[2],
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1526:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 const char  *token[2],
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1923:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *t[3] = {NULL, NULL, NULL};
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:3140:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(eval_stack, _eval_stack, BASE_STACK_SIZE*sizeof(bool));
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:216:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = fopen(path, "r");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1709:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _name[128];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:213:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _ccm_version_string[32] = {"CCM"};
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:574:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char state_number[20];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:578:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(state_number, "%lu", w->state_counter);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:841:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char solver_info[128];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:842:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(solver_info,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char vect_short_name[7]="";
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3111:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char vector_char1[2] = "X";
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char vector_char2[2] = "X";
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3238:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(full_name, "CS_");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3390:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char short_name[15];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3449:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(full_name, "CS_");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3708:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(writer->mesh_filename, ".ccmg");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3713:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(writer->mesh_basename, ".ccmg");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3875:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char s_time_step[16] ="";
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3876:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(s_time_step, "%d", w->mesh_time.last_time_step);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4085:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char s_time_step[16] ="";
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4086:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(s_time_step, "%d", time_step);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:239:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _cgns_version_string[32] = "";
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:315:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(w->filename, ".cgns");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:717:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sol_name[FVM_CGNS_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1052:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char section_name[FVM_CGNS_NAME_SIZE + 1],
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1060:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(section_name, "Edges_%d", section_id);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1065:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(section_name, "Triangles_%d", section_id);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1070:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(section_name, "Quadrangles_%d", section_id);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1075:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(section_name, "Polygons_%d", section_id);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1084:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(section_name, "Tetrahedra_%d", section_id);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1089:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(section_name, "Pyramids_%d", section_id);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1094:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(section_name, "Prisms_%d", section_id);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1099:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(section_name, "Hexahedra_%d", section_id);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1104:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(section_name, "Null_section_%d", section_id);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1718:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *const coord_name[3] = {"CoordinateX",
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1878:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *const coord_name[3] = {"CoordinateX",
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:1973:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char section_name[FVM_CGNS_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:2177:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char section_name[FVM_CGNS_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:2425:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  section_name[FVM_CGNS_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:2576:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char section_name[FVM_CGNS_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:2891:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  section_name[FVM_CGNS_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:3812:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  base_name[FVM_CGNS_NAME_SIZE+1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:3960:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char section_name[FVM_CGNS_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:4097:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   base_name[FVM_CGNS_NAME_SIZE+1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:4098:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   field_name[FVM_CGNS_NAME_SIZE+1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:134:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char  *_ensight_type_name[FVM_N_ELEMENT_TYPES] = {"bar2",
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:172:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f.tf = fopen(filename, "a");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:174:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f.tf = fopen(filename, "w");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:246:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buf[82];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:301:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[81] = "";
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:3088:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[81] = "";
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:278:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[1024], description[50];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:340:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(line, "constant per case file: ");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:343:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(line, "scalar per ");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:346:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(line, "vector per ");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:349:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(line, "tensor symm per ");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:352:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(line, "tensor asym per ");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:359:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(line, "node:    ");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:362:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(line, "element: ");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:365:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(line, "measured node: ");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:373:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(line + l, "%d ", var->time_set + 1);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:375:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(line, "  ");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:430:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(var->file_name + strlen(var->file_name),
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:447:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(var->case_line + strlen(var->case_line) -5, "*****");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:514:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char extension[16] = ".geo";
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:520:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(extension, ".geo.%05d", geom_index);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:537:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(this_case->geom_file_name + strlen(this_case->geom_file_name) - 5,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:612:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(this_case->case_file_name, ".case");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:896:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _lw_name[128], _clw_name[128];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:984:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(var->file_name + strlen(var->file_name) - 5, "%05d", var_index);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:1035:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen(this_case->case_file_name, "w");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:1111:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp[64];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:162:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  w->f = fopen(w->file_name, "w");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:230:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    w->f = fopen(w->file_name, "w");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:462:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpn[128], tmpe[6];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:483:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char t_stamp[141];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:634:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (atoi(n_sub_opt) > 0) {
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:635:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          w->n_sub = atoi(n_sub_opt);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    name[MED_NAME_SIZE + 1];  /* Med_Mesh name */
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    name[MED_NAME_SIZE + 1];      /* MED field name */
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    basename[MED_NAME_SIZE + 1];  /* MED field base name */
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:190:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _med_version_string_[2][32] = {"", ""};
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:191:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _hdf5_version_string_[2][32] = {"", ""};
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:411:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char med_info[MED_COMMENT_SIZE + 1] = "Generated by Code_Saturne.";
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:412:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char family_name[MED_NAME_SIZE + 1] = "";
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:414:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  dtunit[MED_LNAME_SIZE + 1] = "s";
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:415:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  axisname[MED_SNAME_SIZE*3 + 1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:416:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  axisunit[MED_SNAME_SIZE*3 + 1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1169:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  dt_unit[MED_LNAME_SIZE + 1] = "s";
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1221:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(writer->fields[n_fields]->basename,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1231:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(writer->fields[n_fields]->name,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1262:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(&component_name[0], "Scalar");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1265:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        const char  *const xyz[3] = {"X", "Y", "Z"};
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1272:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        const char  *const ij_sym[6] = {"11", "22", "33", "12", "13", "23"};
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1279:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        const char  *const ij_asym[9] = {"11", "12", "13",
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1334:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(med_fieldname,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4288:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(writer->filename, ".med");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4494:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  med_mesh_name[MED_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4539:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  med_mesh_name[MED_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4770:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  med_mesh_name[MED_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4771:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  med_fieldname[MED_NAME_SIZE + 1];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.cxx:597:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(block_coords, vertex_coords, 3*mesh->n_vertices*sizeof(double));
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:172:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpn[128], tmpe[6];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:312:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char options_c[32];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:315:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          rank_step = atoi(options_c);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:401:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(tracefile_path, ".log");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:403:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    w->tracefile = fopen(tracefile_path, "w");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char t_stamp[32];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:193:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(t_stamp, "_%.4i", w->nt);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:203:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    w->f = fopen(w->file_name, "w");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name_buf[64];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char t_stamp[32];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:177:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(t_stamp, "_%.4i", w->nt);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:190:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _f = fopen(file_name, "w");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:324:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpn[128], tmpe[6];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_vtk_histogram.cxx:153:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[128];
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_vtk_histogram.cxx:155:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer, "%.4e",var_min + (i+0.5)*var_step);
data/code-saturne-6.2.0+repack/src/fvm/fvm_trace.h:45:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  {char str[256]; sprintf(str, "%s:%d", __FILE__, __LINE__); \
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:810:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  tmp_name[32], closest_name[32];
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:831:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(closest_name, "EnSight Gold");
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:833:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(closest_name, "MEDCoupling");
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:835:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(closest_name, "MED");
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:837:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(closest_name, "CGNS");
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:839:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(closest_name, "Catalyst");
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:841:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(closest_name, "CCM-IO");
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:843:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(closest_name, "Melissa");
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c:156:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char swap_buf[72];
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c:1498:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_g_num, g_num, n_vertices*sizeof(cs_gnum_t));
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_priv.h:138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                     name[32];     /* Format name */
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_priv.h:139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                     version[16];  /* Format version (if defined) */
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:188:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(path0, "numerical_parameters/");
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:799:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z_id_str[32];
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:1026:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    z_t_id = atoi(id_s);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:1171:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int z_t_id = atoi(id_s);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:1200:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        z_ids[id] = atoi(id_s);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:1491:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(vars->model, "thermal_scalar");
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:2431:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char z_id_str[32];
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:2517:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char z_id_str[32];
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:2585:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char z_id_str[32];
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3091:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(tmp, "_diffusivity");
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3251:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char z_id_str[32];
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3402:11:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
          strcat(kdname, "_kd");
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3657:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z_id_str[32];
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3867:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *op_name[2] = {"read_method", "write_method"};
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3991:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int np = atoi(p);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:4408:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int verbosity = (verbosity_s != NULL) ? atoi(verbosity_s) : 0;
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:4409:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int visualization = (visu_s != NULL) ? atoi(visu_s) : 0;
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:4662:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int z_t_id = atoi(id_s);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_boundary_conditions.c:548:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char classname[32];
data/code-saturne-6.2.0+repack/src/gui/cs_gui_mobile_mesh.c:381:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                  const char      *name,
data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:105:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _rij_c_names[6][4] = {"r11", "r22", "r33", "r12", "r23", "r13"};
data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:388:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[128];
data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:515:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char format_options[64];
data/code-saturne-6.2.0+repack/src/gui/cs_gui_particles.c:308:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    cs_glob_lagr_time_scheme->t_order = atoi(choice);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_particles.c:329:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    cs_glob_lagr_model->idirla = atoi(choice);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.c:364:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char  *b_rad_names[8] = {
data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:421:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          const char      *species_key,
data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:1478:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char crit[128] = "";
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr.c:2376:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(deleted_buffer + p_set->p_am->extents * count_del,
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr.c:2382:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(swap_buffer + p_set->p_am->extents * count_swap,
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr.c:2389:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(p_set->p_buffer + p_set->p_am->extents * start_part,
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr.c:2391:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(  p_set->p_buffer
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:324:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z_type_name[32] = "unknown";
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1140:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char z_type_name[32] = "unknown";
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1181:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z_type_name[32] = "unknown";
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:102:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  typedef char cs_char_64_t[64];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:504:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char car8[9], kar8[9];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:506:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(car8, "k-eps");
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:508:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(car8, "Rij-eps");
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:510:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(car8, "v2f");
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:512:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(car8, "k-omega");
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:514:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(kar8, "k-eps");
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:516:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(kar8, "Rij-eps");
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:518:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(kar8, "v2f");
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:520:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(kar8, "k-omega");
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:578:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(nomtsl[cs_glob_lagr_source_terms->itsli],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:582:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(nomtsl[cs_glob_lagr_source_terms->itske],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:588:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(nomtsl[cs_glob_lagr_source_terms->itsmas], "terme_source_masse");
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:595:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(nomtsl[cs_glob_lagr_source_terms->itste],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:597:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(nomtsl[cs_glob_lagr_source_terms->itsti],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:603:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(nomtsl[cs_glob_lagr_source_terms->itste],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:605:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(nomtsl[cs_glob_lagr_source_terms->itsti],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:610:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
              sprintf(nomtsl[cs_glob_lagr_source_terms->itsmv1[icha]],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:612:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
              sprintf(nomtsl[cs_glob_lagr_source_terms->itsmv2[icha]],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:617:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(nomtsl[cs_glob_lagr_source_terms->itsco],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:619:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(nomtsl[cs_glob_lagr_source_terms->itsfp4],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1089:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  typedef char cs_char_64_t[64];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1317:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char rubriq[32];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1367:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(nomtsl[cs_glob_lagr_source_terms->itsli],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1370:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(nomtsl[cs_glob_lagr_source_terms->itske],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1375:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(nomtsl[cs_glob_lagr_source_terms->itsmas],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1381:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(nomtsl[cs_glob_lagr_source_terms->itste],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1383:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(nomtsl[cs_glob_lagr_source_terms->itsti],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1387:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(nomtsl[cs_glob_lagr_source_terms->itste],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1389:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(nomtsl[cs_glob_lagr_source_terms->itsti],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1392:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(nomtsl[cs_glob_lagr_source_terms->itsmv1[icha]],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1394:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(nomtsl[cs_glob_lagr_source_terms->itsmv2[icha]],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1397:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(nomtsl[cs_glob_lagr_source_terms->itsco],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_lec.c:1399:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(nomtsl[cs_glob_lagr_source_terms->itsfp4],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_log.c:93:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *_astat[2] = {N_("off"), N_("on")};
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c:1000:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(particles->p_buffer + particles->p_am->extents*(dest),
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c:1087:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char attr_name[128];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c:1261:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p_buf + p_am->displ[1][attr],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_post.c:183:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name[64];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_post.c:185:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char var_name_component[96];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_print.c:110:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    flal = fopen("lagrangian.log","w");
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:115:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                   char                 sec_name[128])
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:135:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     char                 sec_name[128])
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:141:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(sec_name, "random_value");
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:258:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char attr_name[128] = "";
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:430:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128], old_name[128];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:711:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sec_name[128];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:348:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
_class_name(const char  *name,
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:350:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char         class_name[64])
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:352:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _class_ext[12];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:377:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                  group_name[64])
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:786:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _name[64];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1117:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         char                  name[64])
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _class_name[12];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1166:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char                   name[64])
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1170:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _class_name[12];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1171:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _comp_name[12];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1173:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *type_name[2] = {"mean", "var"};
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1213:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
_moment_name(const char            *base_name,
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1217:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char                   name[64])
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1221:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _class_name[12];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _comp_name[12];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1224:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *type_name[2] = {"mean", "var"};
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1525:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _r_name[64];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1943:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char s[64];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:2132:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[64];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3282:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _name[96];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3419:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char m_name[128];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3454:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char s[64];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3487:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[64];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3502:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              b_stat_name[3][64]; /* mapped to function inputs */
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3914:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char _name[64];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:4414:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[64];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5088:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char group_name[64];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5230:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp_s[5][64] =  {"", "", "", "", ""};
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5540:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char s[64];
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:2461:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(particles->p_buffer + tot_extents*(recv_shift + i),
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:2758:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(lag_halo->send_buf + extents*shift,
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:2778:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(particles->p_buffer + p_am->extents*particle_count,
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:2966:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(swap_buffer + p_am->extents*i,
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_tracking.c:2997:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(particles->p_buffer + p_am->extents*particle_id,
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:109:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  dbg_file = fopen(filename, "w");
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:141:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  dbg_file = fopen(filename, "w");
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:1254:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(m, join_param.perio_matrix, sizeof(double)*12);
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:1433:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[80];
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:1785:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      cs_glob_join_log = fopen(this_join->log_name, "w");
data/code-saturne-6.2.0+repack/src/mesh/cs_join_intersect.c:3768:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(filename, "Join%02dDBG_FaceVis%04d.dat",
data/code-saturne-6.2.0+repack/src/mesh/cs_join_intersect.c:3770:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dbg_file = fopen(filename, "w");
data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1131:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(filename, "Join%02dDBG_InitMergeSet%04d.dat",
data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1133:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dbg_file = fopen(filename, "w");
data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1844:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(filename, "Join%02dDBG_MergeSet%04d.dat",
data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1846:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dbg_file = fopen(filename, "w");
data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1993:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(filename, "Join%02dDBG_EquivMerge%04d.dat",
data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1995:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      dbg_file = fopen(filename, "w");
data/code-saturne-6.2.0+repack/src/mesh/cs_join_mesh.c:1963:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_mesh->vertices,
data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.c:342:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_join_perio_add_translation(const char    *sel_criteria,
data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.c:394:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_join_perio_add_rotation(const char    *sel_criteria,
data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.c:454:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_join_perio_add_mixed(const char    *sel_criteria,
data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.h:95:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_join_perio_add_translation(const char    *sel_criteria,
data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.h:120:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_join_perio_add_rotation(const char    *sel_criteria,
data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.h:145:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
cs_join_perio_add_mixed(const char    *sel_criteria,
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:708:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dbg_file = fopen(fullname, "w");
data/code-saturne-6.2.0+repack/src/mesh/cs_join_update.c:2546:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fullname, "JoinDBG_ErrorOrient%04d.dat", rank_id);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_update.c:2548:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dbg_file = fopen(fullname, "w");
data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:136:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(param.perio_matrix, perio_matrix, sizeof(double)*12);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2099:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               const char              *sel_criteria,
data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2156:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char logname[80];
data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2158:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rank_add[16] = "";
data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char perio_add[16] = "";
data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2171:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(perio_add, "_perio");
data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2173:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(rank_add, "_r%04d", cs_glob_rank_id);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.h:348:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               const char              *sel_criteria,
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh.c:1511:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(mesh->global_vtx_num,
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh.c:1693:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(count, _count, sizeof(cs_gnum_t)*count_size);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh.c:2333:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(elt_gnum,
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_adjacencies.c:172:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp_c2c_idx, c2c_idx, (n_cells+1)*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_adjacencies.c:1221:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f = fopen(name,"w");
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_boundary_layer.c:136:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*elt_ids,
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_coherency.c:304:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(smin, emin, n_cells_with_ghosts*sizeof(cs_real_3_t));
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_coherency.c:305:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(smax, emax, n_cells_with_ghosts*sizeof(cs_real_3_t));
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_connect.c:903:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(tmp_v2c_idx, _v2c_idx, (n_vertices+1)*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_from_builder.c:458:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mesh->global_i_face_num,
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_from_builder.c:476:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mesh->global_b_face_num,
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:155:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_family_idx, *family_idx, (_n_fam+1)*sizeof(int));
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:159:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_family, *family, _family_idx[_n_fam]*sizeof(int));
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:559:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(f_prv,
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:770:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mesh->group, g_lst, size_tot);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                        name[32];     /* Name */
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:363:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ml->elt_list, sub_ml->elt_list, ml->n_elts[0]*sizeof(cs_lnum_t));
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char section_name[32];
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1239:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(section_name, "periodicity_type_%02d", perio_num);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1244:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(section_name, "periodicity_matrix_%02d", perio_num);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1273:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char section_name[32];
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1323:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(section_name, "periodicity_faces_%02d", perio_num);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1372:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char section_name[32];
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_to_builder.c:1379:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(section_name, "periodicity_faces_%02d", perio_num);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_warping.c:948:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*p_global_face_num, global_num, size);
data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2144:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_g_face_cells, mb->face_cells, sizeof(cs_gnum_t)*_n_b_faces*2);
data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2162:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(per_face_couples_p,
data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2481:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_name[64]; /* more than enough for
data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2500:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(file_name,
data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:3063:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_part_extra_partitions_list,
data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:248:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(path, "rb");
data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:257:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(stl_mesh->header, buf, 80);
data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:282:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&stl_mesh->normals[3*i+dir],
data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:411:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(path,"wb");
data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:420:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, header, 80);
data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:436:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&n_temp[dir],
data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:449:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&v_temp[dir],
data/code-saturne-6.2.0+repack/src/mesh/cs_stl.h:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          name[10];      /*!< Name identifier of the STL file*/
data/code-saturne-6.2.0+repack/src/mesh/cs_stl.h:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          header[80];    /*!< Header of the STL file */
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_absorption.c:278:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char s[64];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_absorption.c:313:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char s[64];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_absorption.c:378:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char s[64];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_absorption.c:397:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char s[64];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[256];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp[256];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filepath[256];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:202:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *radfile = fopen(filepath, "r");
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:204:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[256];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:469:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filepath[256];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:471:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *radfile = fopen(filepath, "r");
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:473:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[256];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[256];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp[256];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:963:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filepath[256];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:977:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      radfile = fopen(filepath, "r");
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:978:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char line[256];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:1007:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      radfile = fopen(filepath, "r");
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:1021:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      radfile = fopen(filepath, "r");
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:1036:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      radfile = fopen(filepath, "r");
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_property_fields.c:144:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char suffix[16];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_property_fields.c:153:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char f_name[64], f_label[64];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_restart.c:213:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rubriq[64];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_restart.c:256:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rubriq[64];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_restart.c:259:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char old_name[64];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_solve.c:251:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char name[32];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_solve.c:252:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(name, "radiation_%03d", kdir);
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_solve.c:598:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char    cname[80];
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_solve.c:1004:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[80];
data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.c:277:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char csca[5];
data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.c:1801:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[32];
data/code-saturne-6.2.0+repack/src/turb/cs_les_inflow.c:1870:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      direction[3] = "xyz";
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_boundary_conditions-electric_arcs_ieljou_3_or_4.c:110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[8];
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_boundary_conditions-electric_arcs_ieljou_3_or_4.c:158:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(name, "%07d", transfo->ielecc[i]);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_boundary_conditions-electric_arcs_ieljou_3_or_4.c:304:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(name, "%07d", transfo->ielecc[i]);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-nusselt_and_friction_calculation.c:126:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       file = fopen("Surface_values.dat","w");
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-turbomachinery.c:262:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f1 = fopen("Wr_mean.dat","w");
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-turbomachinery.c:265:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f2 = fopen("Wt_mean.dat","w");
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:321:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  resume = fopen(filename, "w");
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-linear_solvers.c:437:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[16];
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-linear_solvers.c:438:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(name, "radiation_%03d", i+1);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-time_moments.c:383:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char vel_comp_input[3] = {'r', 't', 'a'};
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-probes-interpolate.c:123:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char f_name[128], p_name[128];
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:287:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char var_name[64];
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:458:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char var_name[64];
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_radiative_transfer.c:228:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f = fopen("zray.dat", "r");
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_radiative_transfer.c:234:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f = fopen("kup.dat", "r");
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_radiative_transfer.c:240:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f = fopen("kdown.dat", "r");
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_source_terms-richards.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char f_name[64];
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_zones.c:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[128], criteria[128];
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_zones.c:189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[128], criteria[128];
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_zones.c:209:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[128], criteria[128];
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_zones.c:211:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* file = fopen("turbines", "rt");
data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[64];
data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:65:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (filename, "cs_all_to_all_test_out.%d", rank);
data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:66:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(filename, "w");
data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mem_trace_name[32];
data/code-saturne-6.2.0+repack/tests/cs_all_to_all_test.c:132:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(mem_trace_name, "cs_all_to_all_test_mem.%d", rank);
data/code-saturne-6.2.0+repack/tests/cs_blas_test.c:1951:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(y, x, n*sizeof(cs_real_t));
data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:1416:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char  *cvv[3] = {"xc", "xv1", "xv2"}, *cdof[2] = {"unit", "px"};
data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:1417:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char  *c_tags[10] =
data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:1419:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char  *g_tags[60] = {"0:x",    "0:y",    "0:z",
data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:1531:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char  *fv[2] = {"xf", "xv"};
data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:1532:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char  *f_tags[6] = {"0", "x", "y", "xx", "xy", "yy"};
data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2132:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  hexa = fopen("CDO_tests_Hexa.log", "w");
data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2133:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  tetra = fopen("CDO_tests_Tetra.log", "w");
data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2134:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  hexa_hho0 = fopen("HHO0_Hexa_tests.log", "w");
data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2135:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  hexa_hho1 = fopen("HHO1_Hexa_tests.log", "w");
data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2136:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  hexa_hho2 = fopen("HHO2_Hexa_tests.log", "w");
data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2137:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  tetra_hho0 = fopen("HHO0_Tetra_tests.log", "w");
data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2138:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  tetra_hho1 = fopen("HHO1_Tetra_tests.log", "w");
data/code-saturne-6.2.0+repack/tests/cs_check_cdo.c:2139:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  tetra_hho2 = fopen("HHO2_Tetra_tests.log", "w");
data/code-saturne-6.2.0+repack/tests/cs_check_quadrature.c:1915:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  quadrature = fopen("Quadrature_tests.log", "w");
data/code-saturne-6.2.0+repack/tests/cs_check_sdm.c:304:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  sdm = fopen("SDM_tests.log", "w");
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[80];
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char footer[80];
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:57:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(header, "fvm test file");
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:61:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(footer, "fvm test file end");
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mem_trace_name[32];
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char output_file_name[32];
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[80];
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:170:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(mem_trace_name, "cs_file_test_mem.%d", rank);
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:172:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(mem_trace_name, "cs_file_test_mem");
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:191:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(output_file_name, "output_data_%d_%d", a_id+1, p_id+1);
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:200:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(output_file_name, "output_data_%d", a_id+1);
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:342:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf, "fvm test file");
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:369:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf, "fvm test file end");
data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:234:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[64];
data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:240:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (filename, "cs_interface_test_o_out.%d", rank);
data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:241:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(filename, "w");
data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:257:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[64];
data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:263:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (filename, "cs_interface_test_u_out.%d", rank);
data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:264:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(filename, "w");
data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:299:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mem_trace_name[32];
data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:325:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(mem_trace_name, "cs_interface_test_mem.%d", rank);
data/code-saturne-6.2.0+repack/tests/cs_interface_test.c:327:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(mem_trace_name, "cs_interface_test_mem");
data/code-saturne-6.2.0+repack/tests/cs_matrix_test.c:549:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mem_log_file_name[128];
data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[64];
data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:67:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (filename, "cs_rank_neighbors_test_out.%d", rank);
data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:68:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(filename, "w");
data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:355:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mem_trace_name[32];
data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:384:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(mem_trace_name, "cs_rank_neighbors_test_mem.%d", rank);
data/code-saturne-6.2.0+repack/tests/cs_rank_neighbors_test.c:386:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(mem_trace_name, "cs_rank_neighbors_test_mem");
data/code-saturne-6.2.0+repack/extras/FMI/code_saturne.cpp:115:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (send(sock, string, strlen(string)+1, 0) > 0) {
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:122:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  && strlen(chaine) < 8) {
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_ideas.c:166:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(chaine) < 8 && strncmp(chaine, "    -1", 6) == 0) {
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1162:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy((char *)(nop0 + 1), "Genere par mod_nopo", 80);
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1163:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (ind = strlen((char *)(nop0 + 1)) ; ind < 80 ; ind++)
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1176:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(((char *)(nop0 + 1 +20)),     bufdh, 2);
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1178:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(((char *)(nop0 + 1 +20)) + 2, bufdh, 2);
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1180:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(((char *)(nop0 + 1 +20)) + 4, bufdh, 4);
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1183:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(((char *)(nop0 + 1 +20)),     "00000000", 8);
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1193:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(str_user, "") ;
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1195:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy((char *)(nop0 + 1 +22), str_user, 24);
data/code-saturne-6.2.0+repack/extras/preprocessor/mod_nopo.c:1196:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (ind = strlen(str_user) ; ind < 24 ; ind++)
data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:332:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(group_name);
data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:536:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_rank_info[3] = strlen(app_type) + 1;
data/code-saturne-6.2.0+repack/libple/src/ple_coupling.c:538:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_rank_info[4] = strlen(app_name) + 1;
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:149:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = strlen(s) - 1;
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:170:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_sys_info_cpu_string, sys_config.machine, 80);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:173:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(_sys_info_cpu_string, "");
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:177:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(_sys_info_cpu_string, "");
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:310:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ltot += strlen(argv[iarg]) + 1;
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:314:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ltot = strlen(argv[iarg]) + 1;
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:340:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(opt);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:590:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lng = strlen("preprocess") + 1;
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:658:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(str_date, "");
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:665:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(str_system, " ");
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:684:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(str_user, pwd_user->pw_name, ECS_STR_SIZE - 1);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:688:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      l_user = strlen(str_user);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:696:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str_user + l_user + 2, pwd_user->pw_gecos, l_info);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:733:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(str_date) > 0) {
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:739:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(str_system) > 0) {
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:745:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(str_machine) > 0) {
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:761:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(str_user) > 0) {
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:767:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(str_directory) > 0) {
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:922:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        lng = strlen(argv[++iarg]) + 1;
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:973:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ECS_MALLOC(outfic_err, strlen(outfic) + strlen(".err") + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:973:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ECS_MALLOC(outfic_err, strlen(outfic) + strlen(".err") + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1009:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ECS_MALLOC(cmd->nom_out, strlen(outfic) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1113:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ECS_MALLOC(cmd->fic_maillage, strlen(argv[iarg]) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/appli/ecs_cmd.c:1138:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen("mesh_input.csm") + 1,
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_descr.c:98:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ECS_MALLOC(descr_loc->nom, strlen(nom) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/base/ecs_famille.c:261:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            (int)strlen(_("Family")) + 1);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:183:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ECS_MALLOC(noms_groupes->val[ind], strlen(tab_nom_cpct.val[ind]) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:207:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lng_var_nbr = strlen(_("Number of cells"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:208:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lng_var_nbr = ECS_MAX(lng_var_nbr, strlen(_("Number of internal faces")));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:209:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lng_var_nbr = ECS_MAX(lng_var_nbr, strlen(_("Number of boundary faces")));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:210:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lng_var_nbr = ECS_MAX(lng_var_nbr, strlen(_("Number of isolated faces")));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:432:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    printf("  %*s%s\n", (int)(strlen(_("Family")) + 1), "",
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:434:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    printf("  %*s%s\n", (int)(strlen(_("Family")) + 1), "",
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_ncs.c:727:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        = pos_nom_grp[ind_grp] + strlen(tab_noms_groupes.val[ind_grp]) + 1;
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:208:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      = (ecs_int_t)strlen(_("Color"))
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:209:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      + (ecs_int_t)strlen(str_num_coul)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:297:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    max_lng_str_fam = (ecs_int_t)(  strlen(_("Family"))
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:298:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  + strlen(str_num_fam)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:615:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  max_lng_var_nbr = ECS_MAX((int)strlen(_("Number of vertices")),
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:616:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            (int)strlen(_("Number of faces")) );
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_maillage_pre.c:618:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            (int)strlen(_("Number of cells")) );
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post.c:84:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(cas->nom_cas, strlen(nom_cas) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:114:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(cas_cgns->nom_cas, strlen(nom_cas) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:242:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lng_nom_maillage = strlen(nom_maillage);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:246:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(nom_maillage_cgns, nom_maillage, ECS_CGNS_TAILLE_NOM);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:269:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lng_nom_fic =   strlen(cas_cgns->nom_cas) + 1
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_cgns.c:270:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                + lng_nom_maillage + strlen(".cgns") + 1;
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:89:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(cas_ens->nom_cas) + 1 + strlen(".ensight") + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:89:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(cas_ens->nom_cas) + 1 + strlen(".ensight") + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:94:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (ind = 0; ind < strlen(cas_ens->nom_cas); ind++) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:109:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(nom_base) + strlen("/") + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:109:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(nom_base) + strlen("/") + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:113:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(cas_ens->prefixe_rep, "/");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:117:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ECS_MALLOC(cas_ens->prefixe_fic, strlen("mesh") + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:124:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(cas_ens->prefixe_rep) + strlen(cas_ens->prefixe_fic)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:124:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(cas_ens->prefixe_rep) + strlen(cas_ens->prefixe_fic)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:125:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   + strlen(".case") + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:130:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        for (ind = strlen(cas_ens->prefixe_rep);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:144:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(cas_ens->prefixe_rep, "");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:149:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(nom_base) + strlen("_") + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:149:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(nom_base) + strlen("_") + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:153:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(cas_ens->prefixe_fic, "_");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:158:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(nom_base) + strlen(".case") + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:158:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(nom_base) + strlen(".case") + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:165:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(cas_ens->nom_fic_case, "_");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:266:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(cas_ens->nom_cas, strlen(nom_cas) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:334:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(ligne, chaine, 80);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:336:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (ind = strlen(chaine); ind < 80; ind++)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:384:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(cas_ens->prefixe_rep) + strlen(cas_ens->prefixe_fic)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:384:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(cas_ens->prefixe_rep) + strlen(cas_ens->prefixe_fic)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:385:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             + strlen(".geo") + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:409:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(nom_cas, strlen(cas_ens->prefixe_rep) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:417:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(ligne_cas + strlen(ligne_cas), nom_cas, 80 - strlen(ligne_cas));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:417:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncpy(ligne_cas + strlen(ligne_cas), nom_cas, 80 - strlen(ligne_cas));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_ens.c:417:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncpy(ligne_cas + strlen(ligne_cas), nom_cas, 80 - strlen(ligne_cas));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:98:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(cas_med->nom_cas, strlen(nom_cas) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:101:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lng_nom_fic = strlen(nom_cas) + strlen(".med") + 1;
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:101:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lng_nom_fic = strlen(nom_cas) + strlen(".med") + 1;
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:107:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (ind = 0; ind < (ecs_int_t)strlen(nom_cas); ind++) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:244:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lng_nom_maillage = strlen(nom_maillage);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_post_med.c:248:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(maillage_med->nom_maillage_med, nom_maillage, MED_NAME_SIZE);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:284:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(cs_root_dir) + strlen(rel_path) + strlen(dir_path) + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:284:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(cs_root_dir) + strlen(rel_path) + strlen(dir_path) + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:284:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(cs_root_dir) + strlen(rel_path) + strlen(dir_path) + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:321:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(pkglibdir) + 1 + 3 + strlen(dl_name) + 3 + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:321:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(pkglibdir) + 1 + 3 + strlen(dl_name) + 3 + 1,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:399:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  extension_lng = (extension_fic != NULL) ? strlen(extension_fic) : 0;
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:416:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          extension_lng = strlen(extension_fic) - 3;
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre.c:444:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t  mot_cle_lng = strlen(mot_cle);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:241:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(base->nom_fic, strlen(nom_fichier) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:360:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          l_dec = strlen(nom_rub);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:361:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          ind_fin = strlen(text);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_cgns.c:947:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          ECS_MALLOC(nom_boco_loc[ind_nom], strlen(nom_tmp) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:165:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen("Fortran Binary")) == 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:197:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strncmp(chaine, "C Binary", strlen("C Binary")) != 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:231:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (ind = strlen(ligne) - 1;
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:275:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for (ind = strlen(ligne) - 1;
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:628:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(chaine, "coordinates", strlen("coordinates")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:721:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(chaine, "coordinates", strlen("coordinates")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:794:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(chaine, "g_", strlen("g_")) == 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:801:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strncmp(chaine, "bar", strlen("bar")) == 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:803:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *nbr_som_elt     = atoi(chaine+strlen("bar"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:805:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strncmp(chaine, "tria", strlen("tria")) == 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:807:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *nbr_som_elt     = atoi(chaine+strlen("tria"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:809:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strncmp(chaine, "quad", strlen("quad")) == 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:811:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *nbr_som_elt     = atoi(chaine+strlen("quad"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:813:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strncmp(chaine, "tetra", strlen("tetra")) == 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:815:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *nbr_som_elt     = atoi(chaine+strlen("tetra"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:817:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strncmp(chaine, "pyramid", strlen("pyramid")) == 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:819:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *nbr_som_elt     = atoi(chaine+strlen("pyramid"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:821:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strncmp(chaine, "penta", strlen("penta")) == 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:823:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *nbr_som_elt     = atoi(chaine+strlen("penta"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:825:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strncmp(chaine, "hexa", strlen("hexa")) == 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:827:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *nbr_som_elt     = atoi(chaine+strlen("hexa"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:829:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strncmp(chaine, "nsided", strlen("nsided")) == 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:833:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strncmp(chaine, "nfaced", strlen("nfaced")) == 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:919:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(chaine, "part", strlen("part")) == 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1094:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(chaine, "part", strlen("part")) == 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1762:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(chaine, "coordinates", strlen("coordinates")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1811:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strncmp(chaine, "part", strlen("part")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1921:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(chaine, "node id", strlen("node id")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1932:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (   (strncmp(chaine_aux, "given",  strlen("given"))   == 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1933:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || (strncmp(chaine_aux, "ignore", strlen("ignore"))  == 0))
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1944:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(chaine, "element id", strlen("element id")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1955:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (   (strncmp(chaine_aux, "given",  strlen("given"))   == 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1956:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || (strncmp(chaine_aux, "ignore", strlen("ignore"))  == 0))
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1965:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ret != NULL && strncmp(chaine, "extents", strlen("extents")) == 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:1978:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (ret != NULL && strncmp(chaine, "part", strlen("part")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2231:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(chaine, "node id", strlen("node id")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2242:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (   (strncmp(chaine_aux, "given",  strlen("given"))   == 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2243:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || (strncmp(chaine_aux, "ignore", strlen("ignore"))  == 0))
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2255:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(chaine, "element id", strlen("element id")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2266:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (   (strncmp(chaine_aux, "given",  strlen("given"))   == 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2267:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || (strncmp(chaine_aux, "ignore", strlen("ignore"))  == 0))
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2298:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (ret != NULL && strncmp(chaine, "part", strlen("part")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2314:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    num_part_lu = atoi(chaine+strlen("part"));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2468:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  } while (ret != NULL && strncmp(ligne, "FORMAT", strlen("FORMAT")) != 0);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2475:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } while (ret != NULL && strncmp(ligne, "type:", strlen("type:")) != 0);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2481:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (ind = strlen("type:");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2485:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(ligne + ind, "ensight", strlen("ensight")) == 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2489:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ind += strlen("ensight");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2493:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strncmp(ligne + ind, "gold", strlen("gold")) == 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2512:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  } while (ret != NULL && strncmp(ligne, "GEOMETRY", strlen("GEOMETRY")) != 0);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2519:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } while (ret != NULL && strncmp(ligne, "model:", strlen("model:")) != 0);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2561:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (ind = strlen(nom_fic_case) - 1;
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2568:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(nom_fic_geo, ind + strlen(nom_fic_geo_base) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ens.c:2569:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(nom_fic_geo, nom_fic_case, ind);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:860:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(*nom_grp, strlen(chaine + ind) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gambit.c:1100:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(*nom_cl, strlen(ch_nom_cl) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:388:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(chaine, "$EndMeshFormat", strlen("$EndMeshFormat")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:501:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (   (strncmp(chaine, "$EndNodes", strlen("$EndNodes")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:502:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && (strncmp(chaine, "$ENDNOD", strlen("$ENDNOD")) != 0))
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:583:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t s_id = 0, e_id = strlen(name);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:604:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(line, "$EndPhysicalNames", strlen("$EndPhysicalNames")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:867:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(line, "$EndEntities", strlen("$EndEntities")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1120:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (   (strncmp(chaine, "$EndNodes", strlen("$EndNodes")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1121:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && (strncmp(chaine, "$ENDNOD", strlen("$ENDNOD")) != 0))
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1579:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (   (strncmp(chaine, "$EndElements", strlen("$EndElements")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:1580:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && (strncmp(chaine, "$ENDELM", strlen("$ENDELM")) != 0))
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2036:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (   (strncmp(chaine, "$EndElements", strlen("$EndElements")) != 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2037:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && (strncmp(chaine, "$ENDELM", strlen("$ENDELM")) != 0))
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2155:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(chaine, "$MeshFormat", strlen("$MeshFormat")) == 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2164:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     strlen("$PhysicalNames")) == 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2174:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     strlen("$Entities")) == 0) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2194:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     strlen("$ParametricNodes")) == 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2204:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    else if (   (strncmp(chaine, "$Nodes", strlen("$Nodes")) == 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2205:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             || (strncmp(chaine, "$NOD", strlen("$NOD")) == 0)) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2227:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    else if (   (strncmp(chaine, "$Elements", strlen("$Elements")) == 0)
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_gmsh.c:2228:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             || (strncmp(chaine, "$ELM", strlen("$ELM")) == 0)) {
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1626:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(ideas_grp_name, "\0");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_ideas.c:1630:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(ideas_grp_name, " ");
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:110:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(fic->nom_fic, strlen(nom_fichier) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:599:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nom_equiv_cmp[strlen(nom_equiv)] = '\0';
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1361:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(un_att_des_med,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1412:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(un_grp_des_med,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_pre_med.c:1637:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(nom_maillage, strlen(nom_maillage_med) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c:186:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(this_part->nom_part, strlen(nom_maillage) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_ens.c:281:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(ecs_fic_elt_typ_liste_c[elt_typ_ref].nom) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:247:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(nom_fam_med, prefixe_nom_fam, MED_NAME_SIZE - 3);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:248:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(nom_fam_med, str_num_fam_med,
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:249:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          MED_NAME_SIZE - strlen(prefixe_nom_fam));
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:357:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen("FAMILLE_") + strlen(str_num_fam_med) <= MED_NAME_SIZE);
data/code-saturne-6.2.0+repack/preprocessor/pre-post/ecs_table_post_med.c:357:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen("FAMILLE_") + strlen(str_num_fam_med) <= MED_NAME_SIZE);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:187:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          bt->s_addr[i] = malloc((strlen(s_addr)+1) * sizeof(char));
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:206:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          bt->s_func[i] = malloc((strlen(s_func)+1) * sizeof(char));
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:226:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        bt->s_file[i] = malloc((strlen(s_file)+1) * sizeof(char));
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:401:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(s_func_buf, "?");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:404:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(s_func_buf + 1, s_func, 64);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_backtrace.c:405:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(s_func_buf, ">");
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:198:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(header, "Code_Saturne I/O, BE, R0", 63);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:213:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(header, "Face-based mesh definition, R0", 63);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:232:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(name) < 32) {
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:234:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    name_pad[32 - strlen(name)] = '\0';
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:236:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(datatype_name) < 2) {
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:238:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    type_pad[2 - strlen(datatype_name)] = '\0';
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:266:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(comm->name, strlen(file_name) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_comm.c:391:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  name_size = strlen(name);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.c:185:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (   strcmp(lang + strlen(lang) - 5, "UTF-8") == 0
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.c:186:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          || strcmp(lang + strlen(lang) - 4, "utf8") == 0)
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_def.c:193:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    lng = strlen(chaine);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_fic.c:127:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((int)strlen(nom) < ECS_LOC_IMP_INDENT)
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:360:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int i = strlen(s) - 2;
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:591:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ECS_MALLOC(f->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:709:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(f->name) > 3 &&
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:710:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          (! strncmp((f->name + strlen(f->name) - 3), ".gz", 3))) {
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:737:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(f->name) > 3 &&
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_file.c:738:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          (! strncmp((f->name + strlen(f->name) - 3), ".gz", 3))) {
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem.c:159:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i = strlen(file_name) - 1;
data/code-saturne-6.2.0+repack/preprocessor/util/ecs_mem_usage.c:164:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    r_size = read(fd, buf, 512);
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:239:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(v->vector_multiply_name[mft][0], vector_multiply, 63);
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:241:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(v->vector_multiply_name[mft][1], vector_multiply, 63);
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:250:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(v->vector_multiply_name[mft][0], b_vector_multiply, 63);
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:252:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(v->vector_multiply_name[mft][1], b_vector_multiply, 63);
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:259:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(v->vector_multiply_name[mft][0], bb_vector_multiply, 63);
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:261:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(v->vector_multiply_name[mft][1], bb_vector_multiply, 63);
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:629:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (   strlen(v->vector_multiply_name[f_id][0]) < 1
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:630:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            && strlen(v->vector_multiply_name[f_id][1]) < 1)
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:655:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(v->vector_multiply_name[f_id][ed_flag]) > 0)
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:839:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (   strlen(v->vector_multiply_name[f_id][0]) < 1
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:840:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          && strlen(v->vector_multiply_name[f_id][1]) < 1)
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:884:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(v->vector_multiply_name[f_id][ed_flag]) > 0)
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1022:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(title);
data/code-saturne-6.2.0+repack/src/alge/cs_benchmark_matrix.c:1026:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
    strncat(title + i, "matrix structure creation/destruction", l);
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:1779:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[scalar convection-diffusion]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:3208:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[scalar face flux from convection]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:4259:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[convection-diffusion, vector]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:5981:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[convection-diffusion, tensor]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:6983:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[convection-diffusion, thermal]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:8283:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[anisotropic diffusion, scalar]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:9033:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[anisotropic left diffusion, vector]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:9584:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[anisotropic right diffusion, vector]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:10284:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[anisotropic diffusion, tensor]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:10893:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[face mass flux update]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:11260:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[face mass flux update]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:11737:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[cell mass flux divergence update]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_convection_diffusion.c:12137:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[cell mass flux divergence update]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_divergence.c:476:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[momentum]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_divergence.c:1012:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(var_name, "[tensor face flux]", 63);
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:424:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(new_info->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:2163:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   (int)(strlen(__func__)), " ", l2_residual/rnorm, rnorm);
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:2175:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               (int)(strlen(__func__)), " ", l2_residual/rnorm, rnorm);
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:5692:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   (int)(strlen(__func__)), " ", l2_residual/l2_norm, l2_norm);
data/code-saturne-6.2.0+repack/src/alge/cs_gradient.c:5965:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   (int)(strlen(__func__)), " ", l2_residual/l2_norm, l2_norm);
data/code-saturne-6.2.0+repack/src/alge/cs_gradient_perio.c:353:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(f->name) == 3) {
data/code-saturne-6.2.0+repack/src/alge/cs_gradient_perio.c:566:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(f->name) == 3) {
data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:4338:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(v->name[j], name, 31);
data/code-saturne-6.2.0+repack/src/alge/cs_matrix.c:7079:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(mv->name[j], "default", 31);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:997:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_REALLOC(mg->post_name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1072:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  name_len = 3 + strlen(base_name) + 1 + 3 + 1 + 4 + 1;
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1199:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_REALLOC(mgd->pc_name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1237:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_REALLOC(mgd->pc_name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1262:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_REALLOC(mgd->pc_name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1721:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(name) + 32;
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:1867:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(name) + 32;
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2769:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buf_size =   (strlen(name) + strlen(":descent:") + w + 1)
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2769:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buf_size =   (strlen(name) + strlen(":descent:") + w + 1)
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2804:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t name_len = strlen(name) + strlen(":descent:") + w + 1;
data/code-saturne-6.2.0+repack/src/alge/cs_multigrid.c:2804:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t name_len = strlen(name) + strlen(":descent:") + w + 1;
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:397:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(sles->_name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:854:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(name) + strlen(base_name) < 31) {
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:854:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(name) + strlen(base_name) < 31) {
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:856:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(val_name, "_");
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:860:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(val_name, base_name, 31);
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1223:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(retval->_name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1916:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(base_name, "X");
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1937:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(name) + strlen(base_name) < 31) {
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1937:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(name) + strlen(base_name) < 31) {
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1939:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(val_name, "_");
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:1943:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(val_name, base_name, 31);
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:2041:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t l = 31 - strlen("_fp_type");
data/code-saturne-6.2.0+repack/src/alge/cs_sles.c:2043:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(type_name, name, l);
data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.c:789:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(sym_type_name, "unsymmetric", 31);
data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.c:792:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(sym_type_name, "spd", 31);
data/code-saturne-6.2.0+repack/src/alge/cs_sles_mumps.c:795:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(sym_type_name, "symmetric", 31);
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:217:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen(name) + strlen("_matrix.dat") + 1;
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:217:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen(name) + strlen("_matrix.dat") + 1;
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:1576:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(norm_type_name, "none", 31);
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:1579:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(norm_type_name, "preconditioned", 31);
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:1582:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(norm_type_name, "unpreconditioned", 31);
data/code-saturne-6.2.0+repack/src/alge/cs_sles_petsc.c:1585:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(norm_type_name, "natural", 31);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:785:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    end = start + strlen(start);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:787:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (end != start + strlen(start))
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:809:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    end = start + strlen(start);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:811:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (end != start + strlen(start))
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:917:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *end = argv[i] + strlen(argv[i]);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1111:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(format, f_fmt, 48);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1112:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(format, "\n");
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1130:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(format, f_fmt, 48);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1131:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(format, "\n");
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1564:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(format, f_fmt, 48);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1565:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(format, "\n");
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1579:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(format, f_fmt, 48);
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1580:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(format, "\n");
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1681:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  new_names_size = idx->names_size + strlen(inp->name) + 1;
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:1682:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  new_types_size = idx->types_size + strlen(inp->type_name) + 1;
data/code-saturne-6.2.0+repack/src/apps/cs_io_dump.c:2256:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(fmt, "\n");
data/code-saturne-6.2.0+repack/src/atmo/cs_at_data_assim.c:159:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t fn_size = strlen(f->name);
data/code-saturne-6.2.0+repack/src/atmo/cs_at_opt_interp.c:538:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(name) == 0)
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:623:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(file_name) + 1,
data/code-saturne-6.2.0+repack/src/atmo/cs_atmo.c:648:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(file_name) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_base.c:649:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(s_func_buf, "?");
data/code-saturne-6.2.0+repack/src/base/cs_base.c:652:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(s_func_buf + 1, s_func, 64);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:653:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(s_func_buf, ">");
data/code-saturne-6.2.0+repack/src/base/cs_base.c:794:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(cs_root_dir) + strlen(rel_path) + strlen(dir_path) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_base.c:794:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(cs_root_dir) + strlen(rel_path) + strlen(dir_path) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_base.c:794:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(cs_root_dir) + strlen(rel_path) + strlen(dir_path) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1071:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        BFT_MALLOC(app_name, strlen(argv[arg_id + 1]) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1096:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = strlen(buf) - 1; i > 0 && buf[i-1] != '/'; i--);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1097:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(app_name, strlen(buf + i) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1242:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(CS_REVISION) > 0)
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1607:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          file_name = malloc((strlen(base_name) + n_dec + 2) * sizeof (char));
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1611:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          file_name = malloc((strlen(base_name) + 1) * sizeof (char));
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1985:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(log_name) + strlen(ext) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_base.c:1985:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(log_name) + strlen(ext) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2002:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(log_name) + n_dec + 3 + strlen(ext), char);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2002:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(log_name) + n_dec + 3 + strlen(ext), char);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2260:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l = strlen(s);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2378:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(datadir) + strlen(subdir) + strlen(base_name) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2378:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(datadir) + strlen(subdir) + strlen(base_name) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2378:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(datadir) + strlen(subdir) + strlen(base_name) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2458:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(pkglibdir) + 1 + 3 + strlen(name) + 3 + 1,
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2458:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(pkglibdir) + 1 + 3 + strlen(name) + 3 + 1,
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2610:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(s_func_buf, "?");
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2613:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(s_func_buf + 1, s_func, 64);
data/code-saturne-6.2.0+repack/src/base/cs_base.c:2614:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(s_func_buf, ">");
data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:385:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  name_l = strlen(name);
data/code-saturne-6.2.0+repack/src/base/cs_base_fortran.c:425:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  datadir_l = strlen(datadir);
data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:227:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(descr, descr_add, name_len_max-1);
data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:229:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l = strlen(descr);
data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:230:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
    strncat(descr, ", ", name_len_max-l-1);
data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:232:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(descr);
data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:233:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(descr, descr_add, name_len_max-l-1);
data/code-saturne-6.2.0+repack/src/base/cs_boundary.c:658:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(descr, _("undefined"), descr_len_max-1);
data/code-saturne-6.2.0+repack/src/base/cs_boundary_zone.c:191:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(name);
data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:323:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_var_name, var_name, CS_CALCIUM_VARIABLE_LEN);
data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:397:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_var_name, var_name, CS_CALCIUM_VARIABLE_LEN);
data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:470:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_var_name, var_name, CS_CALCIUM_VARIABLE_LEN);
data/code-saturne-6.2.0+repack/src/base/cs_calcium.c:523:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_var_name, var_name, CS_CALCIUM_VARIABLE_LEN);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:309:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ret = read(comm->socket, _rec + start_id, n_loc);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:451:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ret = read(comm->socket, queue->buf + start_id, n_loc);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:523:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (id = strlen(comm->port_name) - 1;
data/code-saturne-6.2.0+repack/src/base/cs_control.c:529:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(host_name, comm->port_name, id);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:594:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int   len = strlen(magic_string);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:599:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _comm_write_sock(comm, key, 1, strlen(key));
data/code-saturne-6.2.0+repack/src/base/cs_control.c:647:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(comm->port_name, strlen(port_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:1009:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        _comm_write_sock(_cs_glob_control_comm, reply, 1, strlen(reply) + 1);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:1140:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t l = strlen(cur_line);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:1290:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      _comm_write_sock(control_comm, reply, 1, strlen(reply) + 1);
data/code-saturne-6.2.0+repack/src/base/cs_control.c:1435:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      _comm_write_sock(_cs_glob_control_comm, reply, 1, strlen(reply)+1);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:399:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(name);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:847:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *name_len = strlen(*name);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:1408:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *str_len = strlen(*str);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:1498:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *str_len = strlen(*str);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:2410:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(name);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:2458:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(c_str, name0 + l0 + 1, 63);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:2639:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(kd->def_val.v_p, strlen(default_value) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:3263:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        BFT_REALLOC(kv->val.v_p, strlen(str) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:3652:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t l = strlen(f->name);
data/code-saturne-6.2.0+repack/src/base/cs_field.c:4130:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t l = strlen(f->name);
data/code-saturne-6.2.0+repack/src/base/cs_field_default.c:156:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(label) > 0)
data/code-saturne-6.2.0+repack/src/base/cs_field_default.c:205:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(label) > 0)
data/code-saturne-6.2.0+repack/src/base/cs_file.c:1841:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(f->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_file.c:3792:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(dirnames[n_ent], strlen(ent->d_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_file.c:3947:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const int lpath = strlen(path);
data/code-saturne-6.2.0+repack/src/base/cs_file.c:3948:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const int lext  = strlen(end);
data/code-saturne-6.2.0+repack/src/base/cs_flag_check.c:403:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(var_name, flag_label, 31);
data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:631:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(cpl->cells_criteria, strlen(criteria_cells)+1, char);
data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:635:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(cpl->faces_criteria, strlen(criteria_faces)+1, char);
data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:656:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              strlen(group_name)+1,
data/code-saturne-6.2.0+repack/src/base/cs_internal_coupling.c:2663:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          BFT_MALLOC(cpl->namesca, strlen(f->name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_io.c:520:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  new_names_size = idx->names_size + strlen(inp->sec_name) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_io.c:714:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(cs_io->contents, header_data + 64, 64);
data/code-saturne-6.2.0+repack/src/base/cs_io.c:747:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(header_data + 64, magic_string, 64);
data/code-saturne-6.2.0+repack/src/base/cs_io.c:811:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(filename) >= 128)
data/code-saturne-6.2.0+repack/src/base/cs_io.c:812:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(tmpname, strlen(filename) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_io.c:1625:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  name_size = strlen(sec_name);
data/code-saturne-6.2.0+repack/src/base/cs_log.c:170:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (   strcmp(lang + strlen(lang) - 5, "UTF-8") == 0
data/code-saturne-6.2.0+repack/src/base/cs_log.c:171:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          || strcmp(lang + strlen(lang) - 4, "utf8") == 0)
data/code-saturne-6.2.0+repack/src/base/cs_log.c:178:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      p_len = strlen(src);
data/code-saturne-6.2.0+repack/src/base/cs_log.c:306:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (   strcmp(lang + strlen(lang) - 5, "UTF-8") == 0
data/code-saturne-6.2.0+repack/src/base/cs_log.c:307:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          || strcmp(lang + strlen(lang) - 4, "utf8") == 0)
data/code-saturne-6.2.0+repack/src/base/cs_log.c:314:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(str);
data/code-saturne-6.2.0+repack/src/base/cs_log.c:634:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(header_title) > 0)
data/code-saturne-6.2.0+repack/src/base/cs_log_iteration.c:989:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t name_width = strlen(stat_name);
data/code-saturne-6.2.0+repack/src/base/cs_map.c:114:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t key_size = CS_ALIGN_SIZE(strlen(key) + 1);
data/code-saturne-6.2.0+repack/src/base/cs_measures_util.c:327:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(name) == 0)
data/code-saturne-6.2.0+repack/src/base/cs_measures_util.c:463:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(name) == 0)
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:172:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(mi->name, strlen(name)+1, char);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:175:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(mi->medfile_path, strlen(medfile_path)+1, char);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:178:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(mi->interp_method, strlen(interp_method)+1, char);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:315:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(subdir) == 0)
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:324:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t lsdir = strlen(subdir);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:325:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t lname = strlen(filename);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_intersector.cxx:329:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      lext = strlen(_ext);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx:222:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(r->name, strlen(name)+1, char);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx:227:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(r->medfile_path, strlen(medfile_path)+1, char);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_remapper.cxx:232:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(r->field_names[i], strlen(field_names[i])+1, char);
data/code-saturne-6.2.0+repack/src/base/cs_medcoupling_utils.cxx:577:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(m->sel_criteria, strlen(selection_criteria)+1, char);
data/code-saturne-6.2.0+repack/src/base/cs_notebook.c:157:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(name);
data/code-saturne-6.2.0+repack/src/base/cs_notebook.c:253:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int l = strlen(description);
data/code-saturne-6.2.0+repack/src/base/cs_notebook.c:256:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(e->description, "");
data/code-saturne-6.2.0+repack/src/base/cs_notebook.c:349:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    else if (strlen(d) == 0)
data/code-saturne-6.2.0+repack/src/base/cs_opts.c:218:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        BFT_MALLOC(opts->app_name, strlen(argv[arg_id + 1]) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_coupling.cxx:312:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(c->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_coupling.cxx:505:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(mesh->sel_criteria, strlen(select_criteria) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_paramedmem_remapper.cxx:320:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(r->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1182:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(name) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1222:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(name) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1225:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(variable_name) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1260:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(name) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1470:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen("boundary_") + strlen(f->name) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_parameters.c:1470:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen("boundary_") + strlen(f->name) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:211:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(cs_glob_thermal_table->material,  strlen(material) +1,  char);
data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:216:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(cs_glob_thermal_table->method,    strlen(method) +1,    char);
data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:223:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(cs_glob_thermal_table->method,    strlen(method) +1,    char);
data/code-saturne-6.2.0+repack/src/base/cs_physical_properties.c:250:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(cs_glob_thermal_table->method,    strlen(method) +5,    char);
data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:293:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(_porosity_from_scan_opt.file_name) + 3 + 1,
data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:298:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(_porosity_from_scan_opt.output_name) + 3 + 1,
data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:534:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(file_name) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_porosity_from_scan.c:559:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(output_name) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_post.c:1493:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      BFT_MALLOC(mesh_name, strlen(post_mesh->name) + 32, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2551:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(part_name, g_name, 80 - strlen(part_name));
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2551:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strncat(part_name, g_name, 80 - strlen(part_name));
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2634:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(part_name, g_name, 80 - strlen(part_name));
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2634:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strncat(part_name, g_name, 80 - strlen(part_name));
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2885:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(name_buf, name, 90);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2889:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(name_buf, cs_glob_field_comp_name_3[comp_id], 5);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2892:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(name_buf, cs_glob_field_comp_name_6[comp_id], 5);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2895:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(name_buf, cs_glob_field_comp_name_9[comp_id], 5);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:2898:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    snprintf(name_buf + strlen(name_buf), 5, "[%ld]", (long)comp_id);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3071:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(interpolate_input, f->name, 95); interpolate_input[95] = '\0';
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3174:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(interpolate_input, f->name, 95); interpolate_input[95] = '\0';
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3361:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(interpolate_input, f->name, 95); interpolate_input[95] = '\0';
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3494:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3868:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(wd->case_name, strlen(case_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3871:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(wd->dir_name, strlen(dir_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3877:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(wd->fmt_opts, strlen(fmt_opts) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3893:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  strlen(wd->fmt_opts)+ 1,
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3938:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:3942:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(post_mesh->criteria[0], strlen(cell_criteria) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4003:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4052:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4056:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(post_mesh->criteria[1], strlen(i_face_criteria) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4062:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(post_mesh->criteria[2], strlen(b_face_criteria) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4133:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4202:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4206:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(post_mesh->criteria[3], strlen(cell_criteria) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4270:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(post_mesh->name, strlen(mesh_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4459:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(post_base->name) + strlen(_(" edges")) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_post.c:4459:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(post_base->name) + strlen(_(" edges")) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_post.c:7222:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(part_name, g_name, 80 - strlen(part_name));
data/code-saturne-6.2.0+repack/src/base/cs_post.c:7222:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(part_name, g_name, 80 - strlen(part_name));
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:201:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(input_default_noext) + 1 + strlen(dir_files[i]) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:201:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(input_default_noext) + 1 + strlen(dir_files[i]) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:465:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        new_size += strlen(new_src);
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:482:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(new_dest, "");
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1765:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen("periodicity_type_")) == 0) {
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1771:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          perio_num = atoi(header.sec_name + strlen("periodicity_type_"));
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1778:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen("periodicity_matrix_")) == 0) {
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1786:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 == atoi(header.sec_name + strlen("periodicity_matrix_")));
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1804:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen("periodicity_faces_")) == 0) {
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1807:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        + strlen("periodicity_faces_")) - 1
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1939:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  data_size = _align_size(strlen(file_name) + 1);
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1949:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    data_size += _align_size(strlen(group_rename[i*2]) + 1);
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1951:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      data_size += _align_size(strlen(group_rename[i*2+1]) + 1);
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:1980:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = strlen(file_name) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:2012:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(group_rename[i*2]) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_preprocessor_data.c:2017:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      l = strlen(group_rename[i*2+1]) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_probe.c:275:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t  len = strlen(name) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_probe.c:363:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(name) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_probe.c:365:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pset->name, name, len);
data/code-saturne-6.2.0+repack/src/base/cs_probe.c:421:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  reflen = strlen(ref_name);
data/code-saturne-6.2.0+repack/src/base/cs_probe.c:422:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(pset->name);
data/code-saturne-6.2.0+repack/src/base/cs_probe.c:1351:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int  len = strlen(keyval) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_probe.c:1353:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(pset->sel_criter, keyval, len);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:306:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      BFT_MALLOC(loc->name, strlen(h.sec_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:864:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t sec_name_l = strlen(name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:867:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sec_name_l += strlen(prefix);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:869:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sec_name_l += strlen(postfix);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1675:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strlen(name) == 0)
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1696:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t lname = strlen(name) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1703:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(_path) == 0)
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1708:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t lpath = strlen(_path) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:1746:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t lenf = strlen(fname) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2142:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(_path) == 0)
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2167:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ldir = strlen(_path);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2168:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lname = strlen(name);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2186:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      lext  = strlen(_extension);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2191:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(_name, name, lname-lext);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2206:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t lsdir = strlen(_subdir);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2241:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(restart->name, strlen(_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2462:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(location_name)+1,
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:2515:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(location_name)+1,
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3060:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen(name) + strlen(coords_postfix) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3060:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen(name) + strlen(coords_postfix) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3078:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen(name) + strlen(cell_num_postfix) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3078:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen(name) + strlen(cell_num_postfix) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3207:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen(name) + strlen(coords_postfix) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3207:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen(name) + strlen(coords_postfix) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3244:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen(name) + strlen(cell_num_postfix) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:3244:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen(name) + strlen(cell_num_postfix) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart.c:4069:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          for (int j = strlen(path)-1; j > -1; j--) {
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:342:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(r_name) > 96)
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:343:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(sec_name, strlen(r_name) + 64, char); /* wide margin */
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:465:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(old_name, "vitesse", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:467:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(sec_name, "velocity_prev", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:470:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "pression", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:472:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "R11", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:474:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "R22", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:476:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "R33", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:478:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "R12", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:480:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "R13", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:482:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "R23", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:484:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "Rij", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:486:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "eps", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:488:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "fb", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:494:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "alp", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:498:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(old_name, "al", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:503:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(old_name, "al", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:506:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "nusa", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:508:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "vit_maillage", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:511:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(old_name, "rho", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:513:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(old_name, "rho_old", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:516:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(sec_name, "rho_fb_phase01", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:519:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "cp", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:522:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "viscl", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:524:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "visct", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:527:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "tparoi_fb", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:529:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "qincid_fb", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:531:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "hfconv_fb", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:533:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "flconv_fb", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:536:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(sec_name, "dt_variable_espace_ce", 127);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:539:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(sec_name, "dt_variable_espace_ce", 127);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:544:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(sec_name, "vertex_displacement", 127);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:547:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(sec_name, "taux_vide_ce", 127);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:550:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(sec_name, "rayexp_ce", 127);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:552:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(sec_name, "rayimp_ce", 127);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:554:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(sec_name, "luminance", 127);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:557:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(sec_name, "tsource_sc_ce_joule", 127);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:559:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(old_name, "laplace_force", 96);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:879:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen("fields:") + strlen(key) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:879:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen("fields:") + strlen(key) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:1834:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sizes[1] += strlen(f->name) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:1849:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t l = strlen(f->name) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2246:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen("fields:") + strlen(key) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2246:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen("fields:") + strlen(key) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2398:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen("fields:") + strlen(key) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2398:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(sec_name, strlen("fields:") + strlen(key) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2543:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(name) + strlen(_coeff_name[c_id]) + 3,
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2543:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(name) + strlen(_coeff_name[c_id]) + 3,
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2691:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(f->name) + strlen(_coeff_name[c_id]) + 3,
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2691:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(f->name) + strlen(_coeff_name[c_id]) + 3,
data/code-saturne-6.2.0+repack/src/base/cs_restart_default.c:2786:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(ref_sec_name, sec_name, 128);
data/code-saturne-6.2.0+repack/src/base/cs_restart_map.c:285:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = strlen(mesh_path);
data/code-saturne-6.2.0+repack/src/base/cs_restart_map.c:288:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_mesh_input_path, mesh_path, n);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1910:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(scb->app_name, strlen(saturne_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1916:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(scb->face_cpl_sel_c, strlen(boundary_cpl_criteria) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1922:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(scb->cell_cpl_sel_c, strlen(volume_cpl_criteria) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1928:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(scb->face_loc_sel_c, strlen(boundary_loc_criteria) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:1934:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(scb->cell_loc_sel_c, strlen(volume_loc_criteria) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2044:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(sat_coupling->sat_name, strlen(sat_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2056:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(sat_coupling->face_cpl_sel, strlen(face_cpl_sel_c) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2060:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(sat_coupling->cell_cpl_sel, strlen(cell_cpl_sel_c) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2065:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(sat_coupling->face_loc_sel, strlen(face_loc_sel_c) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_sat_coupling.c:2069:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(sat_coupling->cell_loc_sel, strlen(cell_loc_sel_c) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_sort_partition.c:265:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen("DistribOutput_l.dat")+1+2;
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:279:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(_op_name_send, op_name_send, 32);
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:567:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(_("SYRTHES %s cells"))
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:568:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               + strlen(syr_coupling->syr_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:599:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen("SYRTHES  faces") + strlen(syr_coupling->syr_name) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:599:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen("SYRTHES  faces") + strlen(syr_coupling->syr_name) + 1,
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1369:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(syr_coupling->syr_name, strlen(syr_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1383:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(syr_coupling->face_sel, strlen(face_sel_criterion) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_syr4_coupling.c:1387:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(syr_coupling->cell_sel, strlen(cell_sel_criterion) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:342:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_REALLOC(_syr_coupling_builder->app_name, strlen(ai.app_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:516:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(scb->app_name, strlen(syrthes_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:522:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(scb->face_sel_c, strlen(boundary_criteria) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_syr_coupling.c:528:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(scb->cell_sel_c, strlen(volume_criteria) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:104:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int l = strlen(s);
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:136:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(cpu_str, "");
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:161:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        for (i = strlen(s) - 1;
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:177:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(cpu_str, sys_config.machine, cpu_str_max);
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:217:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int l = strlen(s);
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:224:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(issue_str);
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:332:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(str_date, "");
data/code-saturne-6.2.0+repack/src/base/cs_system_info.c:338:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(str_directory, "");
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:702:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c_size = strlen(desc);
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:1720:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      BFT_MALLOC(mt->name, strlen(s)+1, char);
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2259:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t l = strlen(f->name);
data/code-saturne-6.2.0+repack/src/base/cs_time_moment.c:2698:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t l = strlen(name) + 1;
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:300:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(file_prefix) + strlen(plot_name) + strlen("_coords") + 4 + 1,
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:300:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(file_prefix) + strlen(plot_name) + strlen("_coords") + 4 + 1,
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:300:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(file_prefix) + strlen(plot_name) + strlen("_coords") + 4 + 1,
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:639:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(p->plot_name, strlen(plot_name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:641:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(file_prefix) + strlen(plot_name) + 4 + 1,
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:641:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(file_prefix) + strlen(plot_name) + 4 + 1,
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:656:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i = strlen(file_prefix); p->file_name[i] != '\0'; i++) {
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1201:22:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
    p->buffer_end += sprintf(p->buffer + p->buffer_end, "\n");
data/code-saturne-6.2.0+repack/src/base/cs_time_plot.c:1218:22:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
    p->buffer_end += sprintf(p->buffer + p->buffer_end, "\n");
data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.c:467:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(parent_name) > 0)
data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.c:518:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t l_len = strlen(label);
data/code-saturne-6.2.0+repack/src/base/cs_timer_stats.c:525:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(s->label, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:104:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(s);
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:151:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t  path_len = strlen(path);
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:169:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(name, p, level_len);
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:172:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(_name, p, level_len);
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:243:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(_node->name) == level_len)
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:379:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t  len = strlen(name);
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:447:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_REALLOC(node->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:676:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_REALLOC(node->value, strlen(val) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1365:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(path) == 0)
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1391:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(path) != 0)
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1506:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(sub_path) == 0)
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1539:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(sub_path) == 0)
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1571:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strlen(tn->name) == l) {
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1622:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(name) == 0)
data/code-saturne-6.2.0+repack/src/base/cs_tree.c:1656:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(name) == 0)
data/code-saturne-6.2.0+repack/src/base/cs_turbomachinery.c:1265:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(tbm->rotor_cells_c[r_id], strlen(cell_criteria) + 1, char);
data/code-saturne-6.2.0+repack/src/base/cs_volume_zone.c:205:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(name);
data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:198:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          bt->s_addr[i] = malloc((strlen(s_addr)+1) * sizeof(char));
data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:217:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          bt->s_func[i] = malloc((strlen(s_func)+1) * sizeof(char));
data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:237:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        bt->s_file[i] = malloc((strlen(s_file)+1) * sizeof(char));
data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:325:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l2 = strlen(bt->s_func[i] + j);
data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:335:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      l = strlen(s_cplus_func_p);
data/code-saturne-6.2.0+repack/src/bft/bft_backtrace.c:343:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(s_cplus_func, s_cplus_func_p, l + 1);
data/code-saturne-6.2.0+repack/src/bft/bft_mem.c:237:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i = strlen(file_name) - 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:354:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(name) + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:356:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(adv->name, name, len);
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:452:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  reflen = strlen(ref_name);
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:453:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(adv->name);
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:488:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(adv->name) < 200);
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:941:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(adv->name) + strlen("_cells") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:941:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(adv->name) + strlen("_cells") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:966:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(adv->name) + strlen("_vertices") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:966:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(adv->name) + strlen("_vertices") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:990:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(adv->name) + strlen("_boundary_flux") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_advection_field.c:990:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(adv->name) + strlen("_boundary_flux") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_connect.c:1454:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  lname = strlen("DumpConnect.dat") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_cdo_quantities.c:1177:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  lname = strlen("DumpQuantities.dat") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:1561:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(_eqp->name, strlen(eqp->name) + strlen(":gkb_transfo") + 1, char);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:1561:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(_eqp->name, strlen(eqp->name) + strlen(":gkb_transfo") + 1, char);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2696:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(_eqp->name, strlen(eqp->name)+1, char);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2862:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(_eqp->name, strlen(eqp->name) + strlen(":alu0") + 1, char);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_monolithic_sles.c:2862:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(_eqp->name, strlen(eqp->name) + strlen(":alu0") + 1, char);
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_scaleq.c:2940:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(field->name) + 8 + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_cdofb_vecteq.c:2210:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(field->name) + 8 + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_cdovb_scaleq.c:3355:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int  len = strlen(eqp->name) + 8 + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.c:213:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(eqname) + strlen("-sol-.log") + 4 + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_dbg.c:213:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(eqname) + strlen("-sol-.log") + 4 + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c:195:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(adv->name) + 8 + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c:246:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(eqp->name) + 8 + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_domain_op.c:296:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(pty->name) + 8 + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:359:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t  len_in = strlen(eqname);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:366:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(eqp->name) == len_in)
data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:1151:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(varname)+1;
data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:1153:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(eq->varname, varname, len);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:2315:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int  len = strlen(eq->varname) + strlen("_normal_boundary_flux") + 2;
data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:2315:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int  len = strlen(eq->varname) + strlen("_normal_boundary_flux") + 2;
data/code-saturne-6.2.0+repack/src/cdo/cs_equation.c:3318:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(eqp->name) + 13 + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_common.c:653:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = 1 + strlen("<CDO/> Monitoring") + strlen(eqname);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_common.c:653:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = 1 + strlen("<CDO/> Monitoring") + strlen(eqname);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:1823:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(name)+1;
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:1825:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(eqp->name, name, len);
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2302:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (size_t i = 0; i < strlen(keyval); i++)
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2304:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  val[strlen(keyval)] = '\0';
data/code-saturne-6.2.0+repack/src/cdo/cs_equation_param.c:2479:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(eqname) < 200); /* Check that prefix is large enough */
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:568:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(eq_name) + strlen("_time") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:568:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(eq_name) + strlen("_time") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:840:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int  len = strlen(eq_name) + strlen("_diffusivity") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:840:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int  len = strlen(eq_name) + strlen("_diffusivity") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:868:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int  len = strlen(eq_name) + strlen("_reaction") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:868:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int  len = strlen(eq_name) + strlen("_reaction") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:884:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int  len = strlen(eq_name) + strlen("_precip") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_gwf_tracer.c:884:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int  len = strlen(eq_name) + strlen("_precip") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:472:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (size_t i = 0; i < strlen(keyval); i++)
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:474:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  val[strlen(keyval)] = '\0';
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1156:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (z_name != NULL && strlen(z_name) > 0)
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1220:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (z_name != NULL && strlen(z_name) > 0)
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1277:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (z_name != NULL && strlen(z_name) > 0)
data/code-saturne-6.2.0+repack/src/cdo/cs_navsto_param.c:1327:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (z_name != NULL && strlen(z_name) > 0)
data/code-saturne-6.2.0+repack/src/cdo/cs_property.c:588:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(name) + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_property.c:590:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pty->name, name, len);
data/code-saturne-6.2.0+repack/src/cdo/cs_property.c:2009:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(pty->name) < 200); /* Check that prefix is large enough */
data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:2571:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(varname) + strlen("_diff_pty") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_solidification.c:2571:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(varname) + strlen("_diff_pty") + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_source_term.c:107:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(base_name) + 4; // 1 + 3 = "_00\n"
data/code-saturne-6.2.0+repack/src/cdo/cs_source_term.c:112:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int  len = strlen(name) + 1;
data/code-saturne-6.2.0+repack/src/cdo/cs_source_term.c:114:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(n, name, len);
data/code-saturne-6.2.0+repack/src/cdo/cs_xdef.h:305:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(z_name) > 0) {
data/code-saturne-6.2.0+repack/src/cdo/cs_xdef.h:329:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(z_name) > 0) {
data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:395:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(ct->criteria, strlen(zone_criteria)+1, char);
data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:403:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = strlen("cooling_towers_") + 3;
data/code-saturne-6.2.0+repack/src/ctwr/cs_ctwr.c:467:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = strlen("cooling_towers_balance.") + 2 + 1;
data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1824:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      BFT_MALLOC(name, strlen("esl_fraction_") + 2 + 1, char);
data/code-saturne-6.2.0+repack/src/elec/cs_elec_model.c:1825:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      BFT_MALLOC(label, strlen("YM_ESL") + 2 + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:141:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n_chars += strlen(gc->group_name[j]) + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:161:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n_chars += strlen(gc->group_name[j]);
data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:236:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t l = strlen(recv_chars + n_chars) + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:273:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      BFT_MALLOC(dest->group_name[i], strlen(src->group_name[i]) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_group.c:420:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      BFT_MALLOC(_class->group_name[i], strlen(group_names[i]) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_morton.c:546:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen("DistribOutput_l.dat")+1+2;
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:1151:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(this_nodal->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:1267:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(new_nodal->name, strlen(this_nodal->name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_nodal.c:2362:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(new_nodal->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.c:240:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(set_group_names[0]) + 1,
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.c:246:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      BFT_MALLOC(this_selector->group_name[j], strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector.c:332:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (int_len != (int)strlen(str))
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:333:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      keywords_size += (strlen(keywords[i]) + 1);
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:357:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(this_parser->operators[i].name, name, 15);
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:362:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t  l = strlen(keywords[i]) + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:462:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      = p->keyword[i-1] + strlen(p->keyword[i-1]) + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:581:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = strlen(infix);
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:972:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t size = strlen(infix);
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1156:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(pf->missing_operand[n], strlen(missing) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1183:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (int_len != (int)strlen(str))
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1215:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (flt_len != (int)strlen(str))
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1856:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (te->protected[i] == true || strlen(tok) != 1)
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:1867:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (te->protected[j] == false && strlen(tok) == 1) {
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:2023:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  t1_len = strlen(t1);
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:2047:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(t2) == 1) {
data/code-saturne-6.2.0+repack/src/fvm/fvm_selector_postfix.c:2116:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t      t3_len = strlen(t3);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:250:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t l = strlen(s);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:258:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (strncmp(s, check_strings[i], strlen(check_strings[i])) == 0) {
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:337:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:339:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_scripts[id], path, l);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:397:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:399:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_scripts[id], path, l);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:433:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (int j = strlen(file_name) - 1; j > -1; j--) {
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:447:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(dir_path) + 1 + strlen(file_name) + 1,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:447:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(dir_path) + 1 + strlen(file_name) + 1,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:460:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(dir_path) + 1 + strlen(file_name) + 1,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:460:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(dir_path) + 1 + strlen(file_name) + 1,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1413:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(w->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1418:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(w->name, strlen(_name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1427:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l_tot = strlen(options);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1444:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int l = strlen(options + i1 + 11);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1446:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(w->input_name, options + i1 + 11, l);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1459:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(w->input_name, strlen(n)+1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_catalyst.cxx:1718:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_name, name, 127);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:580:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(state_name) + strlen(state_number) + 1,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:580:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(state_name) + strlen(state_number) + 1,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3107:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(full_name, strlen("CS_") + strlen(name) + strlen("XX")  + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3107:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(full_name, strlen("CS_") + strlen(name) + strlen("XX")  + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3107:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(full_name, strlen("CS_") + strlen(name) + strlen("XX")  + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3250:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(vect_short_name, "E");      /* efforts */
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3252:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(vect_short_name, "M");      /* mesh velocity */
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3254:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(vect_short_name, "S");      /* velocity */
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3258:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(vect_short_name, "U");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3261:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(vect_short_name, "V");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3264:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(vect_short_name, "W");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3391:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(short_name, name, 4);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3448:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(full_name, strlen(name) + strlen("CS_") + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3448:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(full_name, strlen(name) + strlen("CS_") + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3679:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  name_length = strlen(name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3694:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path_length = strlen(path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3697:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  mesh_filename_length = path_length + name_length + strlen(".ccmg") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3710:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  mesh_basename_length = name_length + strlen(".ccmg") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3715:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(writer->path, strlen(path)+1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3877:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int path_length = strlen(w->path) + strlen(w->name) + 1
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3877:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int path_length = strlen(w->path) + strlen(w->name) + 1
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3878:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          + strlen(s_time_step) + strlen(".ccmg") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3878:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          + strlen(s_time_step) + strlen(".ccmg") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3882:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        path_length =   strlen(w->name) + 1
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3883:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      + strlen(s_time_step) + strlen(".ccmg") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3883:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      + strlen(s_time_step) + strlen(".ccmg") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3889:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int path_length = strlen(w->path) + strlen(w->name) + strlen(".ccmg") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3889:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int path_length = strlen(w->path) + strlen(w->name) + strlen(".ccmg") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3889:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int path_length = strlen(w->path) + strlen(w->name) + strlen(".ccmg") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3892:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        path_length = strlen(w->name) + strlen(".ccmg") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:3892:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        path_length = strlen(w->name) + strlen(".ccmg") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4087:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int path_length =   strlen(w->path) + strlen(w->name) + 1
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4087:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int path_length =   strlen(w->path) + strlen(w->name) + 1
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4088:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        + strlen(s_time_step) + strlen(".ccmp") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4088:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        + strlen(s_time_step) + strlen(".ccmp") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4094:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int path_length = strlen(w->path) + strlen(w->name) + strlen(".ccmp") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4094:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int path_length = strlen(w->path) + strlen(w->name) + strlen(".ccmp") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ccm.c:4094:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int path_length = strlen(w->path) + strlen(w->name) + strlen(".ccmp") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:277:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  name_length = strlen(name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:283:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    name_length += strlen(postfix);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:299:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path_length = strlen(path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:302:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  filename_length = path_length + name_length + strlen(".cgns") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:307:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    w->basename = w->filename + strlen(path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:575:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(writer->bases[i]->name, strlen(base_name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:674:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t l = strlen(base->name) + strlen("Zone 1") + strlen(nodename) + 4;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:674:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t l = strlen(base->name) + strlen("Zone 1") + strlen(nodename) + 4;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:674:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t l = strlen(base->name) + strlen("Zone 1") + strlen(nodename) + 4;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:754:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sol_length = strlen(sol_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:756:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(base->solutions[sol_id]->name, sol_name, sol_length + 1);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:3360:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(sol_names + sol_id * FVM_CGNS_NAME_SIZE,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:3536:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l_tot = strlen(options);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:3839:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(base_name, mesh->name, FVM_CGNS_NAME_SIZE);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:4171:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(base_name, mesh->name, FVM_CGNS_NAME_SIZE);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:4209:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(field_name, name, FVM_CGNS_NAME_SIZE);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:4215:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (pos = strlen(field_name) - 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_cgns.c:4223:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(tmp, field_name, shift);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:249:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, s, 80);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:255:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, s, 80);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:257:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = strlen(buf); i < 80; i++)
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:303:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, this_writer->name, 80);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:2566:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(this_writer->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:2611:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l_tot = strlen(options);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:3096:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, name, 80);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight.c:3098:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, name, 80);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:284:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = strlen(name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:297:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(description, name, l);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:370:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = strlen(line); /* At this stage, l = 31 at most */
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:377:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = strlen(line);  /* At this stage, l = 35 at most with
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:387:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (l = strlen(line); l < 61; l++)
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:394:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  prefix_len =   strlen(this_case->file_name_prefix)
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:396:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  base_len = strlen(name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:430:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sprintf(var->file_name + strlen(var->file_name),
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:437:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             (  strlen(line) + strlen(var->file_name)
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:437:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             (  strlen(line) + strlen(var->file_name)
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:447:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strcpy(var->case_line + strlen(var->case_line) -5, "*****");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:451:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(var->case_line) > 1024) {
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:524:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(this_case->file_name_prefix) + strlen(extension) + 1,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:524:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(this_case->file_name_prefix) + strlen(extension) + 1,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:537:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sprintf(this_case->geom_file_name + strlen(this_case->geom_file_name) - 5,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:577:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(this_case->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:579:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  name_len = strlen(name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:588:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    prefix_len = strlen(dir_prefix);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:605:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(this_case->case_file_name) + 1,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:809:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(this_case->part_name[i], strlen(part_name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:899:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l_n = strlen(name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:910:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t l_c = strlen(var->name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:984:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sprintf(var->file_name + strlen(var->file_name) - 5, "%05d", var_index);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_ensight_case.c:1114:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        for (int k = strlen(tmp)-1; k > 0; k--) {
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:468:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t lce = strlen(tmpe);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:469:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t lv =  strlen(c->name) + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:485:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l =   strlen(w->path) + strlen(w->name)
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:485:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l =   strlen(w->path) + strlen(w->name)
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:486:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             + strlen(t_stamp) + 4 + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:560:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(w->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:563:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(w->path, strlen(path) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_histogram.c:602:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l_tot = strlen(options);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:431:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(writer->med_meshes[id]->name, med_mesh_name, MED_NAME_SIZE);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:494:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for (i = strlen(family_name) + 1; i < MED_NAME_SIZE; i++)
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:512:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(group_p, group_names[i], MED_LNAME_SIZE - 1);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1094:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(med_fieldname, base_fieldname, MED_NAME_SIZE);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1095:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n_chars = strlen(med_fieldname);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1104:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(med_fieldname + n_chars + 2,
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1108:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(med_fieldname);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1135:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i = strlen(med_fieldname) + 1; i < MED_NAME_SIZE; i++)
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1177:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(med_fieldname, fieldname, MED_NAME_SIZE);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:1178:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n_chars = strlen(med_fieldname);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4218:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l_tot = strlen(options);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4262:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  name_length = strlen(name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4276:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path_length = strlen(path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4279:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  filename_length = path_length + name_length + strlen(".med");
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4504:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(med_mesh_name, mesh->name, MED_NAME_SIZE);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4505:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n_chars = strlen(med_mesh_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4564:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(med_mesh_name, mesh->name, MED_NAME_SIZE);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4565:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n_chars = strlen(med_mesh_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4796:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(med_mesh_name, mesh->name, MED_NAME_SIZE);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_med.c:4797:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n_chars = strlen(med_mesh_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.cxx:948:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(writer->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_medcoupling.cxx:953:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(writer->name, strlen(_name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:177:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t lce = strlen(tmpe);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:178:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l =  strlen(c->name) + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:291:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l_tot = strlen(options);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:294:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const int l_rs = strlen(rs);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:313:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(options_c, options+i1+l_rs, l_opt-l_rs);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:337:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(w->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:391:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      path_len = strlen(path) + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:393:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int tracefile_path_l = path_len + strlen(name) + strlen(".log") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_melissa.c:393:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int tracefile_path_l = path_len + strlen(name) + strlen(".log") + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:194:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t l =   strlen(w->path) + strlen(w->name)
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:194:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t l =   strlen(w->path) + strlen(w->name)
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:195:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               + strlen(t_stamp) + 4 + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:243:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(name_buf, c->name, 63);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:249:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t l = strlen(name_buf);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:330:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(w->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:333:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(w->path, strlen(path) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_plot.c:376:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l_tot = strlen(options);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:181:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(w->prefix) + strlen("coords") + strlen(t_stamp) + 4 + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:181:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(w->prefix) + strlen("coords") + strlen(t_stamp) + 4 + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:181:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(w->prefix) + strlen("coords") + strlen(t_stamp) + 4 + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:330:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t lce = strlen(tmpe);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:331:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t l =  strlen(c->name) + 1;
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:441:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(w->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:444:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(name) > 0) {
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:445:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(w->prefix, strlen(path) + 1 + strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:445:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(w->prefix, strlen(path) + 1 + strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:449:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(w->prefix, strlen(path) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_to_time_plot.c:492:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l_tot = strlen(options);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:473:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = strlen(option_list);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:524:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(_name, strlen(wf->dl_prefix) + strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:524:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(_name, strlen(wf->dl_prefix) + strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:658:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l = strlen(this_writer->path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:668:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(tmp_path);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:680:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t lw = strlen(this_writer->name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:684:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(mesh_name) > 0) {
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:685:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t l = lw + 1 + strlen(mesh_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:774:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      BFT_MALLOC(this_writer->mesh_names[i], strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:816:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = strlen(format_name);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:820:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp_name, format_name, 32);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1007:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(exclude_option);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1044:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i1 = strlen(tmp_options);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1149:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i1 = strlen(tmp_options);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1165:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(this_writer->name, strlen(name) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer.c:1178:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(this_writer->path, strlen(path) + 1, char);
data/code-saturne-6.2.0+repack/src/fvm/fvm_writer_helper.c:2451:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t l = strlen(s);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:187:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(path0, strlen("numerical_parameters/") + strlen(param) + 1, char);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:187:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(path0, strlen("numerical_parameters/") + strlen(param) + 1, char);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:1490:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_REALLOC(vars->model, strlen("thermal_scalar")+1, char);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3089:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        BFT_MALLOC(tmp, strlen(f->name) + 13, char);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3399:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          int len = strlen(f->name) + 4;
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:3987:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(buf, strlen(s_list)+1, char);
data/code-saturne-6.2.0+repack/src/gui/cs_gui.c:4123:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(prefix) + 1;
data/code-saturne-6.2.0+repack/src/gui/cs_gui_boundary_conditions.c:528:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (sscanf(name + strlen("coal"), "%d", &icoal) != 1)
data/code-saturne-6.2.0+repack/src/gui/cs_gui_mesh.c:205:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t coeff_id = strlen("matrix_");
data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:391:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(buffer) >= 127)
data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:516:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(format_options, format_name[output_format], 63);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:519:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t l = strlen(format_options);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_output.c:520:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
        strncat(format_options, ", no_time_step", 63-l);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.c:489:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      BFT_MALLOC(_boundary->label[izone], strlen(label)+1, char);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_radiative_transfer.c:492:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      BFT_MALLOC(_boundary->nature[izone], strlen(nature)+1, char);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:624:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int l = strlen(cstr);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:1113:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l = strlen(cstr);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:1591:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(vars->model, strlen(name)+1, char);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_specific_physics.c:1594:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(vars->model_value, strlen(model)+1, char);
data/code-saturne-6.2.0+repack/src/gui/cs_gui_util.c:207:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(s1) != strlen(s2)) return 0;
data/code-saturne-6.2.0+repack/src/gui/cs_gui_util.c:207:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(s1) != strlen(s2)) return 0;
data/code-saturne-6.2.0+repack/src/gui/cs_gui_util.c:208:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!strncmp(s1, s2, strlen(s1))) return 1;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:326:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(z_type_name, _("boundary"), 31);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:328:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(z_type_name, _("volume"), 31);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1142:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(z_type_name, _("boundary"), 31);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1144:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(z_type_name, _("volume"), 31);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1183:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(z_type_name, _("boundary"), 31);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_injection.c:1185:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(z_type_name, _("volume"), 31);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_options.c:140:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = strlen(varname);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_particle.c:1092:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t l = strlen(attr_name);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_restart.c:263:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t l = strlen(attr_name);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:358:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l0 = strlen(_class_ext);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:381:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(group_name, "CS_LAGR_STAT_GROUP_PARTICLE", 63);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:384:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(group_name, "CS_LAGR_STAT_TRACKING_EVENT", 63);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1126:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l0 =  strlen(_class_name);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1184:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l0 =   strlen(_comp_name) + strlen(_class_name)
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1184:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l0 =   strlen(_comp_name) + strlen(_class_name)
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1185:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              + strlen(type_name[moment_type]);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1235:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l0 =   strlen(_comp_name) + strlen(_class_name)
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1235:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l0 =   strlen(_comp_name) + strlen(_class_name)
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1236:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              + strlen(type_name[moment_type]);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:1526:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_r_name, name, 63);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:2141:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int l = strlen(name);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3458:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      BFT_MALLOC(mt->name, strlen(s)+1, char);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3513:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(b_stat_name[n_b_stat_types],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3524:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(b_stat_name[n_b_stat_types],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3535:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(b_stat_name[n_b_stat_types],
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3664:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(name, _lagr_stat_names[stat_type], 63);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3669:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(name, _lagr_stat_names[stat_type], 63);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3674:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(name, _lagr_stat_names[stat_type], 63);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:3680:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(name, _lagr_stat_names[stat_type], 63);
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:4353:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                strlen(cs_lagr_attribute_name[attr])) == 0)
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5437:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t l = strlen(name) + 1;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5459:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t l = strlen(name) + 1;
data/code-saturne-6.2.0+repack/src/lagr/cs_lagr_stat.c:5547:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 strlen(f->name),
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:104:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  base_len = strlen(basename);
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:105:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen("log/JoinDBG__.dat")+1+4+2+base_len;
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:136:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  base_len = strlen(basename);
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:137:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen("log/JoinDBG__.dat")+1+4+2+base_len;
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:294:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(mesh_name, strlen("WorkMesh_j_n") + 2 + 5 + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:301:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(mesh_name, strlen("WorkMesh_j") + 2 + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:379:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(mesh_name, strlen("LocalMesh_n") + 5 + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:383:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(mesh_name, strlen("LocalMesh") + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:1454:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(buf, _("                                   rank mean"), 79);
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:1456:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(buf, _("                                   call mean"), 79);
data/code-saturne-6.2.0+repack/src/mesh/cs_join.c:1458:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(buf, _("                              rank/call mean"), 79);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_intersect.c:3766:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen("JoinDBG_FaceVis.dat")+1+2+4;
data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1129:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen("JoinDBG_InitMergeSet.dat")+1+2+4;
data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1842:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen("JoinDBG_MergeSet.dat")+1+2+4;
data/code-saturne-6.2.0+repack/src/mesh/cs_join_merge.c:1991:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen("JoinDBG_EquivMerge.dat")+1+2+4;
data/code-saturne-6.2.0+repack/src/mesh/cs_join_mesh.c:1474:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int  len = strlen(name);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_mesh.c:1477:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(new_mesh->name, name, len);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_perio.c:173:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(mesh_name, strlen("WorkMesh_j_n") + 2 + 5 + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:454:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(mesh_name, strlen("AdjacentJoinFaces_j") + 2 + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:475:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_REALLOC(mesh_name, strlen("JoinFacesAfterMerge_j") + 2 + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:555:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(mesh_name, strlen("InteriorJoinedFaces_j") + 2 + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:579:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_REALLOC(mesh_name, strlen("BoundaryJoinedFaces_j") + 2 + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:644:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(name, strlen("CleanFaces_j") + 2 + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:700:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen("log/JoinDBG_.dat") + strlen(basename) + 4 + 2 + 1;
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:700:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen("log/JoinDBG_.dat") + strlen(basename) + 4 + 2 + 1;
data/code-saturne-6.2.0+repack/src/mesh/cs_join_post.c:726:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        BFT_MALLOC(mesh_name, strlen(basename) + 2 + 2 + 5 + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_set.c:1832:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!strncmp(type, "int", strlen("int"))) { /* "int" array  */
data/code-saturne-6.2.0+repack/src/mesh/cs_join_set.c:1840:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (!strncmp(type, "bool", strlen("bool"))) { /* "boolean" array  */
data/code-saturne-6.2.0+repack/src/mesh/cs_join_set.c:1852:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (!strncmp(type, "double", strlen("double"))) { /* "double" array */
data/code-saturne-6.2.0+repack/src/mesh/cs_join_set.c:1860:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (!strncmp(type, "gnum", strlen("gnum"))) { /* "gnum" array */
data/code-saturne-6.2.0+repack/src/mesh/cs_join_split.c:1664:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BFT_MALLOC(new_mesh_name, strlen("AfterSplitting_n") + 5 + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_update.c:2544:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen("JoinDBG_ErrorOrient.dat") + 4 + 1;
data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2149:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = strlen(sel_criteria);
data/code-saturne-6.2.0+repack/src/mesh/cs_join_util.c:2176:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(join->log_name, strlen(logname) + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:468:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mesh->group_idx[1] = strlen(name) + 1;
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:478:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t l = strlen(name) + 1;
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:748:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_tot += strlen(g_cur) + 1;
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:758:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_tot += strlen(g_cur) + 1;
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_group.c:774:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    j = strlen(mesh->group + mesh->group_idx[i]) + 1;
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:223:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  ml_id = -1, reflen = strlen(ref_name);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:228:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(ml->name);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:296:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(ml->name, name, 31);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_location.c:674:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    BFT_MALLOC(ml->select_str, strlen(criteria) + 1, char);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_save.c:164:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t  ldir = 0, lname = strlen(filename);
data/code-saturne-6.2.0+repack/src/mesh/cs_mesh_save.c:170:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ldir = strlen(path);
data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2395:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(dir) + strlen("domain_number_") + n_ranks_size + 2,
data/code-saturne-6.2.0+repack/src/mesh/cs_partition.c:2395:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen(dir) + strlen("domain_number_") + n_ranks_size + 2,
data/code-saturne-6.2.0+repack/src/mesh/cs_stl.c:150:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(stl_mesh->name, name, 9);
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:124:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  while (strlen(line) > 1) {
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_adf_models.c:133:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l = strlen(temp);
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:138:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  while (strlen(line) > 1) {
data/code-saturne-6.2.0+repack/src/rayt/cs_rad_transfer_fsck.c:147:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l = strlen(temp);
data/code-saturne-6.2.0+repack/src/turb/cs_les_balance.c:2702:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len = strlen(f_sca->name)+6;
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:234:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(field->name) + 7 + 1;
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:301:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen("Resume-.log")+strlen(eqname)+1;
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_extra_operations-verif_cdo_diffusion.c:301:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen("Resume-.log")+strlen(eqname)+1;
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_parameters-time_moments.c:413:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      BFT_MALLOC(mean_name, strlen(f->name) + 1 + 5, char);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-boundary_pressure_profile.c:172:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(name, "foil_profile", strlen("foil_profile")) == 0) {
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:282:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(name, "buicesat", strlen("buicesat")) == 0) {
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:353:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy(var_name, "U*10+x/h", 64);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:363:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy(var_name, "Y/H", 64);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:373:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy(var_name, "U/Uc", 64);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:383:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy(var_name, "uu/Uc^2", 64);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:392:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy(var_name, "uv/Uc^2", 64);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:401:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy(var_name, "vv/Uc^2", 64);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:410:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
            strncpy(var_name, "X", 64);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:492:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy(var_name, "X/H", 64);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:502:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy(var_name, "CP", 64);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:513:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy(var_name, "CF", 64);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:522:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy(var_name, "U/UREF", 64);
data/code-saturne-6.2.0+repack/src/user_examples/cs_user_postprocess-profiles.c:533:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy(var_name, "YPLUS", 64);
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:58:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i = strlen(header); i < 80; i++)
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:62:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i = strlen(footer); i < 80; i++)
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:343:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for (i = strlen(buf); i < 80; i++)
data/code-saturne-6.2.0+repack/tests/cs_file_test.c:370:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for (i = strlen(buf); i < 80; i++)
data/code-saturne-6.2.0+repack/tests/cs_map_test.c:189:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tot += strlen(k_base[n_keys]);
data/code-saturne-6.2.0+repack/tests/cs_map_test.c:191:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tot += strlen(f_base[n_fields]);

ANALYSIS SUMMARY:

Hits = 3004
Lines analyzed = 766862 in approximately 20.78 seconds (36901 lines/second)
Physical Source Lines of Code (SLOC) = 390120
Hits@level = [0] 1745 [1] 1049 [2] 1349 [3]  96 [4] 510 [5]   0
Hits@level+ = [0+] 4749 [1+] 3004 [2+] 1955 [3+] 606 [4+] 510 [5+]   0
Hits/KSLOC@level+ = [0+] 12.1732 [1+] 7.70019 [2+] 5.01128 [3+] 1.55337 [4+] 1.30729 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.