Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/dlang-openssl-2.0.0+1.1.0h/C/aes.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/asn1.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/asn1_mac.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/asn1t.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/async.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/bio.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/blowfish.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/bn.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/buffer.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/camellia.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/cast.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/cmac.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/cms.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/comp.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/conf.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/conf_api.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/crypto.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ct.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/des.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/des_old.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/dh.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/dsa.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/dso.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/dtls1.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/e_os2.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ebcdic.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ec.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ecdh.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ecdsa.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/engine.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/err.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/evp.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/hmac.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/idea.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/kdf.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/krb5_asn.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/kssl.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/lhash.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/md2.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/md4.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/md5.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/mdc2.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/modes.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/obj_mac.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/objects.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ocsp.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/opensslconf.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/opensslv.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ossl_typ.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/pem.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/pem2.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/pkcs12.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/pkcs7.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/pqueue.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/rand.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/rc2.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/rc4.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/rc5.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ripemd.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/rsa.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/safestack.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/seed.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/sha.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/srp.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/srtp.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ssl.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ssl2.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ssl23.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ssl3.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/stack.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/symhacks.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/tls1.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ts.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/txt_db.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ui.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/ui_compat.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/whrlpool.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/x509.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/x509_vfy.h
Examining data/dlang-openssl-2.0.0+1.1.0h/C/x509v3.h

FINAL RESULTS:

data/dlang-openssl-2.0.0+1.1.0h/C/bio.h:744:29:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
                      int (*gets) (BIO *, char *, int));
data/dlang-openssl-2.0.0+1.1.0h/C/des_old.h:182:9:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
#define crypt(b,s)\
data/dlang-openssl-2.0.0+1.1.0h/C/des_old.h:284:9:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
#define crypt(b,s)\
data/dlang-openssl-2.0.0+1.1.0h/C/evp.h:676:19:  [4] (crypto) EVP_des_ecb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_ecb(void);
data/dlang-openssl-2.0.0+1.1.0h/C/evp.h:682:11:  [4] (crypto) EVP_des_cfb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
#  define EVP_des_cfb EVP_des_cfb64
data/dlang-openssl-2.0.0+1.1.0h/C/evp.h:691:19:  [4] (crypto) EVP_des_ofb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_ofb(void);
data/dlang-openssl-2.0.0+1.1.0h/C/evp.h:694:19:  [4] (crypto) EVP_des_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_cbc(void);
data/dlang-openssl-2.0.0+1.1.0h/C/evp.h:697:19:  [4] (crypto) EVP_desx_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_desx_cbc(void);
data/dlang-openssl-2.0.0+1.1.0h/C/evp.h:707:19:  [4] (crypto) EVP_rc4_40:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc4_40(void);
data/dlang-openssl-2.0.0+1.1.0h/C/evp.h:722:19:  [4] (crypto) EVP_rc2_40_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc2_40_cbc(void);
data/dlang-openssl-2.0.0+1.1.0h/C/evp.h:723:19:  [4] (crypto) EVP_rc2_64_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc2_64_cbc(void);
data/dlang-openssl-2.0.0+1.1.0h/C/camellia.h:72:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Camellia_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/camellia.h:72:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Camellia_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/camellia.h:74:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[CAMELLIA_BLOCK_SIZE],
data/dlang-openssl-2.0.0+1.1.0h/C/camellia.h:75:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ecount_buf[CAMELLIA_BLOCK_SIZE],
data/dlang-openssl-2.0.0+1.1.0h/C/des.h:28:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char DES_cblock[8];
data/dlang-openssl-2.0.0+1.1.0h/C/des.h:29:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef /* const */ unsigned char const_DES_cblock[8];
data/dlang-openssl-2.0.0+1.1.0h/C/des_old.h:123:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char _ossl_old_des_cblock[8];
data/dlang-openssl-2.0.0+1.1.0h/C/ebcdic.h:25:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char os_toascii[256];
data/dlang-openssl-2.0.0+1.1.0h/C/ebcdic.h:26:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char os_toebcdic[256];
data/dlang-openssl-2.0.0+1.1.0h/C/err.h:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *err_data[ERR_NUM_ERRORS];
data/dlang-openssl-2.0.0+1.1.0h/C/err.h:47:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *err_file[ERR_NUM_ERRORS];
data/dlang-openssl-2.0.0+1.1.0h/C/evp.h:370:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH];
data/dlang-openssl-2.0.0+1.1.0h/C/kssl.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[KSSL_ERR_MAX+1];
data/dlang-openssl-2.0.0+1.1.0h/C/md2.h:28:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MD2_BLOCK];
data/dlang-openssl-2.0.0+1.1.0h/C/mdc2.h:27:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MDC2_BLOCK];
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:15:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*block128_f) (const unsigned char in[16],
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:16:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            unsigned char out[16], const void *key);
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:18:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*cbc128_f) (const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:18:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*cbc128_f) (const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:20:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          unsigned char ivec[16], int enc);
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:22:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ctr128_f) (const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:22:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ctr128_f) (const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:24:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          const unsigned char ivec[16]);
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:26:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ccm128_f) (const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:26:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ccm128_f) (const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:28:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          const unsigned char ivec[16],
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:29:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          unsigned char cmac[16]);
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:31:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:31:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:33:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], block128_f block);
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:34:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:34:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:36:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], block128_f block);
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:38:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:38:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:40:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16],
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:41:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ecount_buf[16], unsigned int *num,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:44:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt_ctr32(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:44:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt_ctr32(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:46:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16],
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:47:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ecount_buf[16],
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:50:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:50:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:52:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], int *num,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:55:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:55:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:57:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], int *num,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:59:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:59:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:61:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], int *num,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:63:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_1_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:63:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_1_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:65:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], int *num,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:68:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt_block(const unsigned char *in,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:69:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   unsigned char *out, size_t len,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:70:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   const void *key, unsigned char ivec[16],
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:72:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:72:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:74:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], cbc128_f cbc);
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:75:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt_block(const unsigned char *in,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:76:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   unsigned char *out, size_t len,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:77:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   const void *key, unsigned char ivec[16],
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:79:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:79:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:81:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], cbc128_f cbc);
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:83:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt_block(const unsigned char *in,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:84:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char *out, size_t len,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:86:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char ivec[16],
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:88:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:88:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:90:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16], cbc128_f cbc);
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:91:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt_block(const unsigned char *in,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:92:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char *out, size_t len,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:94:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char ivec[16],
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:96:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:96:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:98:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16], cbc128_f cbc);
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:149:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          const unsigned char iv[16],
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:172:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ocb128_f) (const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:172:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ocb128_f) (const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:175:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          unsigned char offset_i[16],
data/dlang-openssl-2.0.0+1.1.0h/C/modes.h:177:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          unsigned char checksum[16]);
data/dlang-openssl-2.0.0+1.1.0h/C/pqueue.h:71:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char priority[8]; /* 64-bit value in big-endian encoding */
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:68:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_set_key(const unsigned char rawkey[SEED_KEY_LENGTH],
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:71:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_encrypt(const unsigned char s[SEED_BLOCK_SIZE],
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:72:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  unsigned char d[SEED_BLOCK_SIZE],
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:74:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_decrypt(const unsigned char s[SEED_BLOCK_SIZE],
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:75:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  unsigned char d[SEED_BLOCK_SIZE],
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:80:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cbc_encrypt(const unsigned char *in, unsigned char *out, size_t len,
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:80:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cbc_encrypt(const unsigned char *in, unsigned char *out, size_t len,
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:82:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                      unsigned char ivec[SEED_BLOCK_SIZE], int enc);
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:83:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:83:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:85:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         unsigned char ivec[SEED_BLOCK_SIZE], int *num,
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:87:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:87:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/dlang-openssl-2.0.0+1.1.0h/C/seed.h:89:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         unsigned char ivec[SEED_BLOCK_SIZE], int *num);
data/dlang-openssl-2.0.0+1.1.0h/C/sha.h:100:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char p[SHA512_CBLOCK];
data/dlang-openssl-2.0.0+1.1.0h/C/whrlpool.h:28:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[WHIRLPOOL_DIGEST_LENGTH];
data/dlang-openssl-2.0.0+1.1.0h/C/whrlpool.h:32:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[WHIRLPOOL_BBLOCK / 8];
data/dlang-openssl-2.0.0+1.1.0h/C/bio.h:738:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      int (*read) (BIO *, char *, int));

ANALYSIS SUMMARY:

Hits = 112
Lines analyzed = 30648 in approximately 0.87 seconds (35260 lines/second)
Physical Source Lines of Code (SLOC) = 20713
Hits@level = [0]   0 [1]   1 [2] 100 [3]   0 [4]  10 [5]   1
Hits@level+ = [0+] 112 [1+] 112 [2+] 111 [3+]  11 [4+]  11 [5+]   1
Hits/KSLOC@level+ = [0+] 5.40723 [1+] 5.40723 [2+] 5.35895 [3+] 0.531067 [4+] 0.531067 [5+] 0.0482789
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.