Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/dovecot-2.3.11.3+dfsg1/dovecot-version.h
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-command.h
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/client-export.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-stats.h
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/stats-carbon.h
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-command.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/fifo-input-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-user.h
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/client-reset.h
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-ip.h
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-ip.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-domain.h
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-session.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/client-export.h
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/stats-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/client-reset.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/fifo-input-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/global-memory.h
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-session.h
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/stats-carbon.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-user.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/global-memory.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-stats.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-domain.c
Examining data/dovecot-2.3.11.3+dfsg1/src/old-stats/stats-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-sql.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-ldap-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-sql-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-sql-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-cdb.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-sql-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-ldap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/test-dict-sql.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-sql.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-db.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-ldap-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/submission-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/submission-recipient.h
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/submission-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/submission-backend.h
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/submission-commands.h
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/submission-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/submission-backend-relay.c
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/submission-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/submission-commands.c
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/submission-backend.c
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/submission-backend-relay.h
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/submission-recipient.c
Examining data/dovecot-2.3.11.3+dfsg1/src/submission/submission-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/client-reader.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/client-reader.h
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/test-stats-metrics.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/test-stats-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/stats-metrics.h
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/event-exporter-fmt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/event-exporter-transport-drop.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/stats-service-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/test-client-writer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/event-exporter-fmt-json.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/stats-metrics.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/event-exporter-transport-http-post.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/event-exporter-transport-log.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/client-http.h
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/client-writer.h
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/stats-service.h
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/stats-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/stats-service.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/stats-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/event-exporter.h
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/client-writer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/test-stats-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/stats-event-category.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/client-http.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/event-exporter-fmt-none.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/stats-service-openmetrics.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/event-exporter-fmt-tab-text.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/stats-event-category.h
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/test-client-reader.c
Examining data/dovecot-2.3.11.3+dfsg1/src/stats/stats-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/dns/dns-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/dns/dns-client-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lda/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sql/sql-api.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-test.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-sqlite.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sql/sql-db-cache.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-pgsql.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-cassandra.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-sqlpool.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-test.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sql/sql-api-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sql/sql-db-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-mysql.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sql/sql-api.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-recipient.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-local.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-local.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-commands.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-proxy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-proxy.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-recipient.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-commands.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/test-oauth2-jwt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2-key-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/test-oauth2-json.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2-jwt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2-request.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2.c
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3-login/pop3-proxy.h
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3-login/pop3-login-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3-login/client-authenticate.c
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3-login/client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3-login/client-authenticate.h
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3-login/pop3-proxy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3-login/client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3-login/pop3-login-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-worker-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-login-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-worker-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-worker.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-login-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-login.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/imapc-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/imapc-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/test-imapc-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/imapc-client-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/imapc-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/imapc-msgmap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/imapc-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/imapc-msgmap.h
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3/pop3-commands.h
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3/pop3-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3/pop3-commands.c
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3/pop3-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3/pop3-capability.h
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3/pop3-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3/pop3-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/pop3/pop3-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-des.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-byteorder.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-message.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-flags.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-message.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-des.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-types.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-rawlog.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/file-create-locked.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/llist.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-hash.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-pkcs5.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/fdatasync-path.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/failures.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/home-expand.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/imem.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/safe-mkdir.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/net.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/backtrace-string.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/imem.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-lib.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-hash.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-base64-decoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/guid.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/str-find.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-base32.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/failures.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/bits.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-strescape.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-iso8601-date.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-tee.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-hash.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/time-util.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/eacces-error.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/str-table.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/module-context.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/lib-signals.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/base64.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-str-sanitize.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-crlf.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/json-tree.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/strescape.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-unix.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-malloc-overflow.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mkdir-parents.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hmac-cram-md5.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-buffer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-json-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-ioloop.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-pump.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-rawlog.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hostpid.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/sendfile-util.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/stats-dist.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/write-full.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-file-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-unix.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hash-format.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hash.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-chain.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-tee.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/child-wait.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-multiplex.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-iolist.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-iostream-temp.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/md4.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/printf-format-fix.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-bsearch-insert-pos.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-base64-decoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-base64-encoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hex-binary.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/json-tree.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-hash.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-sized.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/event-filter.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-try.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-failure-at.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/strnum.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/safe-mkstemp.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-event-flatten.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/sort.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-hmac.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/fd-util.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-iostream-pump.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/priorityq.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/file-lock.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-priorityq.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/event-log.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/unlink-directory.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/file-copy.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/wildcard-match.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/str.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/event-log.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/crc32.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-multiplex.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-process-size.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hash-method.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-lib.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mmap-util.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-data-stack.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-epoll.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/aqueue.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/pkcs5.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/sort.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-multiplex.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-failure-at.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/unichar.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/sleep.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hostpid.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/json-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/lib.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-crlf.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-concat.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-printf-format-fix.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-utc-mktime.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/randgen.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/process-title.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-concat.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/sha3.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/uri-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hook-build.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-rawlog.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mmap-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/eacces-error.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-rawlog.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-chain.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-byteorder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/log-throttle.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-lib-signals.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/sendfile-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-base64-encoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-multiplex.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/array.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/file-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-seekable.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/utc-mktime.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/base64.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-wrapper.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/askpass.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iostream.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-crc32.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-event-log.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-aqueue.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mountpoint.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hash-decl.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hex-dec.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-temp.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/path-util.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-rawlog-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iostream.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-llist.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-process-size.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/env-util.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-file-create-locked.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-hash.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-event-category-register.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-failure-at.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/buffer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-hex-binary.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/execv-const.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/lib-signals.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-sized.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-select.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-failure-at.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-jsonstr.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/crc32.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/base32.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/array.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/utc-offset.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hash.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mkdir-parents.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-timeout.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/fdpass.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/child-wait.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-sized.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-event-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-memarea.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/nfs-workarounds.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/read-full.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hash2.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/nfs-workarounds.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-failure-at.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-mmap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/safe-memset.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/sha-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hmac.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/file-dotlock.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/backtrace-string.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-notify-fd.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-notify-kqueue.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-buffer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/fdatasync-path.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/askpass.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/byteorder.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-path-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/data-stack.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/lib.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/file-lock.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/priorityq.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/primes.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-json-tree.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-rawlog.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-unix.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-uri.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-seekable.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/printf-format-fix.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-try.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand-if.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/sha3.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hex-binary.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/pkcs5.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/array-decl.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-iolist.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hash-format.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-log-throttle.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mempool-datastack.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hook-build.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-net.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/unix-socket-create.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-unix.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-chain.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-multiplex.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-proxy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-mempool-alloconly.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/lib-event.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/malloc-overflow.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/randgen.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/lib-event.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-unichar.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/home-expand.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-random.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/strescape.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-rawlog.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/base32.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-multiplex.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-limit.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/md4.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/log-throttle.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hmac.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ipwd.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/file-create-locked.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-fd-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mempool-allocfree.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-wildcard-match.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/md5.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/str-sanitize.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-str-find.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/read-full.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/unlink-directory.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-failures.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-file-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-access.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/path-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/compat.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/file-set-size.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/module-dir.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ipwd.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mempool.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/numpack.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iso8601-date.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/compat.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/file-set-size.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/str-table.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/buffer.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/rand.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-poll.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/env-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/module-dir.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-seekable.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hmac-cram-md5.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-bits.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/primes.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mempool.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hex-dec.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/str-find.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/str-sanitize.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/memarea.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-failure-at.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mempool-alloconly.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mempool-unsafe-datastack.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-concat.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-hash-format.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iso8601-date.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/unicodemap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hash-method.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/uri-util.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-base64.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-timeout.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-access.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/safe-mkdir.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-unix.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/strnum.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/stats-dist.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/safe-memset.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-notify-fd.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/event-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-null.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/hash2.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-callback.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-imem.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/macros.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mempool-system.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/safe-mkstemp.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/fdpass.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-callback.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-primes.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-pump.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/str.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-time-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-str-table.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-numpack.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/file-copy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/bsearch-insert-pos.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/unlink-old-files.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mmap-anon.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-jsonstr.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/fsync-mode.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-wrapper.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-hash-method.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-crlf.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-str.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-buffer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-data.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/sha1.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/seq-range-array.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/mountpoint.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-strnum.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-mempool.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/bits.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-iostream-proxy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/file-dotlock.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/time-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/wildcard-match.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-mempool-allocfree.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/lib-event-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/data-stack.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-multiplex.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/utc-mktime.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-jsonstr.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/process-title.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-try.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/fd-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/md5.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-stats-dist.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-notify-none.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-notify-inotify.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-var-expand.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-seq-range-array.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/seq-range-array.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-kqueue.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-temp.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/memarea.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/sleep.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/net.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/numpack.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/unlink-old-files.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/sha1.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-guid.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/unix-socket-create.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/guid.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/utc-offset.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-null.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/failures-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-array.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/bsearch-insert-pos.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/json-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-proxy.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-tee.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/write-full.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/istream-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-strfuncs.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/unichar.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/execv-const.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/aqueue.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/file-cache.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib/test-backtrace.c
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/aggregator/notify-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/aggregator/notify-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/aggregator/aggregator.c
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/aggregator/aggregator-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/aggregator/aggregator-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/aggregator/replicator-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/aggregator/replicator-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/doveadm-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/replicator.c
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/notify-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/notify-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/replicator-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/replicator-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/replicator-queue-auth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/dsync-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/dsync-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/replicator-brain.h
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/replicator-queue.c
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/replicator-brain.c
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/replicator-queue.h
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/doveadm-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/replication/replication-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/indexer-worker.c
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/indexer-worker-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/indexer-queue.h
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/indexer-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/indexer.h
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/indexer-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/indexer-queue.c
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/indexer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/worker-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/worker-pool.c
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/master-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/worker-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/master-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/worker-pool.h
Examining data/dovecot-2.3.11.3+dfsg1/src/indexer/indexer-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-util.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-cmd.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-rebuild.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-deduplicate.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-print.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-altmove.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-index.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-mailbox-status.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-sis.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-dcrypt-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-copymove.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-penalty.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-proxy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/client-connection-tcp.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-oldstats.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-replicator.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dict.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-instance.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-dbox.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/server-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-iter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-mailbox.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-save.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-print-formatted.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-auth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-master.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-mailbox-metadata.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-print-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-mailbox-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-log.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-index.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-fs.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/client-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dsync.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mailbox-list-iter.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-who.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-print-flow.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-import.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-who.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-log.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/client-connection-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-flags.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-server.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-director.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/client-connection-http.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-thread.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dsync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-pw.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-server.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-iter.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-print-table.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-zlib.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-batch.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-print-tab.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/test-doveadm-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/client-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-expunge.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/server-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-auth-server.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-kick.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-transaction-log-scan.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-brain.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-tree.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-brain-mails.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-ibc-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-ibc-stream.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-tree.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/test-dsync-mailbox-tree-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-tree-fill.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-brain-mailbox.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-import.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-state.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-serializer.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-ibc.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-export.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-deserializer.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-brain-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-serializer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mail.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-tree-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-tree-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-brain-mailbox-tree.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-brain-mailbox-tree-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-deserializer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-ibc.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-export.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-transaction-log-scan.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-brain.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-ibc-pipe.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-state.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-import.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-print-server.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-print-json.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-print-pager.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-dcrypt-key.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-print.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-search.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mailbox-list-iter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-cmd.h
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-mailboxlog.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-stats.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-fetch.c
Examining data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mutf7.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-transaction-memory.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-transaction-memory.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-fail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/test-dict.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-memcached-ascii.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-redis.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-memcached.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict/test-dict-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/dict/dict-commands.c
Examining data/dovecot-2.3.11.3+dfsg1/src/dict/dict-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/dict/main.h
Examining data/dovecot-2.3.11.3+dfsg1/src/dict/dict-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/dict/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/dict/dict-commands.h
Examining data/dovecot-2.3.11.3+dfsg1/src/dict/dict-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/dict/dict-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/submission-login/submission-proxy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/submission-login/submission-login-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/submission-login/client-authenticate.c
Examining data/dovecot-2.3.11.3+dfsg1/src/submission-login/submission-login-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/submission-login/client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/submission-login/client-authenticate.h
Examining data/dovecot-2.3.11.3+dfsg1/src/submission-login/submission-proxy.h
Examining data/dovecot-2.3.11.3+dfsg1/src/submission-login/client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/imap-master-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/imap-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/imap-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/imap-master-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/imap-hibernate-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/imap-hibernate-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/imap-hibernate-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/anvil/penalty.h
Examining data/dovecot-2.3.11.3+dfsg1/src/anvil/test-penalty.c
Examining data/dovecot-2.3.11.3+dfsg1/src/anvil/common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/anvil/connect-limit.h
Examining data/dovecot-2.3.11.3+dfsg1/src/anvil/connect-limit.c
Examining data/dovecot-2.3.11.3+dfsg1/src/anvil/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/anvil/anvil-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/anvil/anvil-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/anvil/anvil-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/anvil/penalty.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-bsdauth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-md5crypt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/test-username-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-login.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-lua.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-cache.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-cache.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-plain-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-sql.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-ntlm.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-plain-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-lua.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/test-auth.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-dict.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-master-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/test-libpassword.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-dovecot-token.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-penalty.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-crypt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-policy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-blocking.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/test-db-dict.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-template.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-blocking.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request-var-expand.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-vpopmail.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-passwd.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-checkpassword.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/crypt-blowfish.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-otp.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/checkpassword-reply.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-cram-md5.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-ldap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-dict.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-checkpassword.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-blocking.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/test-auth-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-policy.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-oauth2.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-fields.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-fields.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-passwd-file.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-otp-skey-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-sia.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-apop.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request-handler.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request-stats.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-static.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-imap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-penalty.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-skey.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-ldap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-passwd-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-stats.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/test-mock.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-sql.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-lua.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-worker-server.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mycrypt.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-sql.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-blocking.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-prefetch.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request-handler-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-dict.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request-var-expand.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-ldap.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request-stats.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-template.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-checkpassword.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-template.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-passwd.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-oauth2.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-external.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-template.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mycrypt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-passwd-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-otp-skey-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-otp.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-ldap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-client-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-sodium.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/test-lua.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-oauth2.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-vpopmail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-sql.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-worker-server.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-checkpassword.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-client-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-pam.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-dict.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request-handler.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-shadow.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-stats.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-master-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-oauth2.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/test-auth-request-var-expand.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/test-main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-passwd-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-vpopmail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-worker-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-pbkdf2.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/auth-worker-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-plain.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/crypt-blowfish.h
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-winbind.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/db-dict-cache-key.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-static.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-anonymous.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-lua.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-rpa.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/test-mech.c
Examining data/dovecot-2.3.11.3+dfsg1/src/auth/mech-gssapi.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-iostream.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/istream-decrypt.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-stream.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/istream-decrypt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/ostream-encrypt.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-crypto.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/ostream-encrypt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c
Examining data/dovecot-2.3.11.3+dfsg1/src/util/tcpwrap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/util/maildirlock.c
Examining data/dovecot-2.3.11.3+dfsg1/src/util/script-login.c
Examining data/dovecot-2.3.11.3+dfsg1/src/util/health-check-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c
Examining data/dovecot-2.3.11.3+dfsg1/src/util/tcpwrap-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/util/gdbhelper.c
Examining data/dovecot-2.3.11.3+dfsg1/src/util/script.c
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/sasl-server.c
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/login-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/client-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/client-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/sasl-server.h
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/login-proxy-state.c
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/login-proxy-state.h
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/access-lookup.h
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/login-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/login-proxy.h
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/client-common-auth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/access-lookup.c
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/login-proxy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/login-common/login-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-header-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-header.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-client-host.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-header-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-header.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-payload.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-server.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-date.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-transfer-chunked.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-request-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server-request.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-auth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-response-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-url.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-client-queue.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-transfer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-response.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-message-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-date.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-request-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server-ostream.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-url.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-client-request.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-response.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-auth.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server-resource.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-request.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-response-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-transfer.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-auth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-message-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-request-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-client-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-client-errors.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-client-request.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-url.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server-response.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-server-errors.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-response-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-date.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-client-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-client-peer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-header-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-request.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-old-stats/stats-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-old-stats/stats-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-old-stats/stats-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-old-stats/stats.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-old-stats/stats-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-old-stats/stats.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-lua/dlua-dovecot.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-lua/dlua-compat.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-lua/dlua-script.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-lua/dlua-script.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-lua/dlua-script-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-lua/test-lua.c
Examining data/dovecot-2.3.11.3+dfsg1/src/ipc/ipc-group.c
Examining data/dovecot-2.3.11.3+dfsg1/src/ipc/ipc-group.h
Examining data/dovecot-2.3.11.3+dfsg1/src/ipc/ipc-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/ipc/ipc-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/ipc/client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/ipc/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/ipc/client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/ipc/ipc-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-cmd-rset.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-submit.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-submit-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-cmd-vrfy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-cmd-helo.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-transaction.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-reply.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-cmd-data.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-reply.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-cmd-noop.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-payload.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-cmd-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-cmd-starttls.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-server-errors.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-params.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-address.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-reply.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-command.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-submit.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-params.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client-transaction.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-submit.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-submit-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-command-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client-command.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-client-errors.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-cmd-rcpt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-params.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-cmd-quit.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-cmd-auth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-syntax.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-command-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-address.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-reply-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-recipient.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-cmd-xclient.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client-command.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-command.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-syntax.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-address.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-reply-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-reply.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-command-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-syntax.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client-transaction.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp-dictionary.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp-parity.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp-parse.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp-hash.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp-parity.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp-dictionary.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp-hash.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp-parse.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dns/dns-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dns/dns-util.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dns/dns-lookup.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dns/test-dns-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dns/dns-lookup.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth-backend.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth-backend.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth-fetch.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth-fetch.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-wrapper.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/ostream-cmp.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-test.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-dict.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/istream-metawrap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-sis.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-test.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/ostream-cmp.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/ostream-metawrap.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/istream-fs-stats.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/istream-fs-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/istream-fs-stats.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-api.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/test-fs-posix.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-metawrap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/istream-fs-file.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-sis-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/istream-metawrap.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/ostream-metawrap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-posix.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-randomfail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-sis-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/test-fs-metawrap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-wrapper.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-api.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-test-async.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-sis-queue.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-api-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/director/mail-host.c
Examining data/dovecot-2.3.11.3+dfsg1/src/director/director-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/director/director-test.c
Examining data/dovecot-2.3.11.3+dfsg1/src/director/doveadm-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/director/mail-host.h
Examining data/dovecot-2.3.11.3+dfsg1/src/director/director-request.h
Examining data/dovecot-2.3.11.3+dfsg1/src/director/director.h
Examining data/dovecot-2.3.11.3+dfsg1/src/director/test-user-directory.c
Examining data/dovecot-2.3.11.3+dfsg1/src/director/notify-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/director/notify-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/director/login-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/director/user-directory.c
Examining data/dovecot-2.3.11.3+dfsg1/src/director/director-host.h
Examining data/dovecot-2.3.11.3+dfsg1/src/director/login-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/director/director-request.c
Examining data/dovecot-2.3.11.3+dfsg1/src/director/user-directory.h
Examining data/dovecot-2.3.11.3+dfsg1/src/director/auth-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/director/auth-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/director/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/director/director-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/director/doveadm-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/director/director-host.c
Examining data/dovecot-2.3.11.3+dfsg1/src/director/director-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/director/director.c
Examining data/dovecot-2.3.11.3+dfsg1/src/director/director-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-hash.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-search.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-parser-from-parts.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-header-decode.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/html-entities.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-header-decode.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-header-filter.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-decoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-dot.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-header-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-id.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/rfc2231-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-header-encode.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-search.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-header-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-qp-encoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-binary-converter.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/rfc822-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/quoted-printable.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-date.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-size.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/mbox-from.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/mbox-from.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-quoted-printable.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-header-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-mail-html2text.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/mail-html2text.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-dot.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-dot.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-binary-part.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/rfc2231-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-part-serialize.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-rfc822-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/ostream-dot.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-rfc2231-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-attachment.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-address.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-address.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-part.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-address.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-nonuls.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-attachment-connector.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-part.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-snippet.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/qp-encoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-mbox-from.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/rfc822-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-date.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-qp-decoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-part.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-nonuls.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-header-hash.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-attachment-connector.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-size.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/ostream-dot.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-encode.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-qp-decoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/qp-decoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/mail-user-hash.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/quoted-printable.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-binary-converter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-qp-encoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-attachment-extractor.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/mail-types.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/mail-html2text.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-decode.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-part-data.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-header-encode.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-ostream-dot.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-qp-decoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-id.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-search.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-part-data.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-snippet.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-header-hash.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-decoder.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-date.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-part-serialize.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-snippet.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-qp.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-binary-part.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-id.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-parser-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-attachment-extractor.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/qp-decoder.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/qp-encoder.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/mail-user-hash.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-decoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-binary-converter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-qp-encoder.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-save.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-search.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-transaction.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-config.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-transaction.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/old-stats/mail-stats.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/old-stats/mail-stats-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/old-stats/mail-stats-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/old-stats/stats-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/old-stats/mail-stats.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/old-stats/mail-stats-fill.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/old-stats/stats-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/notify-status/notify-status-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/zlib/zlib-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/zlib/zlib-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/trash/trash-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/trash/trash-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/apparmor/apparmor-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-status-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-fs.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-maildir.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-count.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-status.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-imapc.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-status-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-dict.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/doveadm-quota.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-dirsize.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-fs.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/test-quota-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/imap-zlib/imap-zlib-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/imap-zlib/imap-zlib-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/replication/replication-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/replication/replication-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/xml2text.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-user.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-indexer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-search-serialize.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-search-args.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/doveadm-fts.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-expunge-log.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-user.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-parser-html.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-search-serialize.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-build-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/doveadm-dump-fts-expunge-log.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-build-mail.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/doveadm-fts.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-api.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-expunge-log.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-search.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-indexer.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-parser-tika.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-api-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-search-args.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-api.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-parser-script.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/imap-acl/imap-acl-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/imap-acl/imap-acl-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/notify/notify-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/notify/notify-plugin-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/notify/notify-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/notify/notify-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/fts-solr-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/solr-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/solr-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/fts-backend-solr.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/fts-backend-solr-old.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/fts-solr-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/solr-response.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/test-solr-response.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/solr-response.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/welcome/welcome-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/var-expand-crypt/test-var-expand-crypt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/var-expand-crypt/var-expand-crypt-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-global-file.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-shared-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-api.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-cache.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-lookup-dict.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-global-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-api-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-api.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-mailbox-list.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-backend-vfile-update.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-backend.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-backend-vfile.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/doveadm-acl.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-shared-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-mailbox.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-backend-vfile-acllist.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-backend-vfile.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-attributes.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-lookup-dict.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/autocreate/autocreate-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/autocreate/autocreate-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-test.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/fts-squat-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-uidlist.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-uidlist.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/fts-squat-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/fts-backend-squat.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/imap-old-stats/imap-stats-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/imap-old-stats/imap-stats-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/charset-alias/charset-alias-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/charset-alias/charset-alias-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fs-compress/fs-compress.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/last-login/last-login-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/last-login/last-login-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/pop3-migration/pop3-migration-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/pop3-migration/test-pop3-migration-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/pop3-migration/pop3-migration-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/expire/expire-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/expire/expire-set.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/expire/doveadm-expire.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/expire/expire-set.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/expire/expire-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-mailboxdelete.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-txn-msg.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-drivers.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-events.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-mailboxrename.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-flagsclear.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-messagenew.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-flagsset.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-messagetrash.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-mailboxunsubscribe.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-txn-mbox.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-flagsset.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-mailboxsubscribe.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-message-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-txn-mbox.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-txn-msg.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-mailboxunsubscribe.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-driver-dlog.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-messageread.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-events-rfc5423.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-mailboxcreate.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-messageexpunge.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-message-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-triggers.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-events.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-mailboxdelete.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-drivers.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-messageread.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-messagetrash.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-mailboxcreate.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-messageappend.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-mailboxsubscribe.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-flagsclear.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-driver-ox.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-messageappend.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-triggers.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-events-rfc5423.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-messageexpunge.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-driver-lua.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-messagenew.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-mailboxrename.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/mail-crypt-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/fs-crypt-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/fs-crypt-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/mail-crypt-key.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/mail-crypt-global-key.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/doveadm-mail-crypt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/test-mail-global-key.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/mail-crypt-key.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/fs-crypt-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/mail-crypt-acl-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/mail-crypt-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/mail-crypt-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/test-mail-key.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/fs-crypt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/mail-crypt-pluginenv.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/fs-mail-crypt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/mail-crypt-userenv.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/mail-crypt-global-key.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/listescape/listescape-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/listescape/listescape-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-lua/mail-storage-lua.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-lua/mail-lua-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-lua/mail-lua-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-lua/mail-storage-lua.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-filter/ostream-ext-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-filter/istream-ext-filter.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-filter/mail-filter-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-filter/ostream-ext-filter.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-filter/istream-ext-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-filter/mail-filter-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mailbox-alias/mailbox-alias-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mailbox-alias/mailbox-alias-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/fts-backend-lucene.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/Snowball.cc
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/fts-lucene-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/fts-lucene-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/SnowballAnalyzer.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/doveadm-fts-lucene.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/SnowballFilter.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/lazy-expunge/lazy-expunge-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/lazy-expunge/lazy-expunge-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-log/mail-log-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-log/mail-log-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/snarf/snarf-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/snarf/snarf-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota-clone/quota-clone-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/quota-clone/quota-clone-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/imap-quota/imap-quota-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/src/plugins/imap-quota/imap-quota-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-tokenizer-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-icu.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter-normalizer-icu.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-tokenizer-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter-lowercase.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-language.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter-contractions.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-tokenizer-address.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter-english-possessive.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-tokenizer-generic.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-icu.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter-stemmer-snowball.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-tokenizer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-tokenizer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-tokenizer-generic-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-library.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-icu.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-language.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/word-boundary-data.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/word-break-data.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-tokenizer.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-tokenizer-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-library.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter-stopwords.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-language.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-search-result.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-copy.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-mime.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-mime-build.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-register.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list-register.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-duplicate.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/test-mail-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-duplicate.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-watch.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/fail-mailbox.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list-notify.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-mime-register.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-hooks.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-mime-register.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-mime.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-build.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-parser-cmdline.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-recent-flags.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/test-mail-search-args-imap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-user.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/fail-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-hooks.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-build.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-autoexpunge.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-namespace.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-copy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-delete.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-maildir-iter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-subscriptions.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-fs-flags.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-sync.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-iter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-iter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/subscription-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/subscription-file.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-none.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-delete.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-notify-tree.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-subscriptions.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-status.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-fs-iter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-fs.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-maildir.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-maildir.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-fs.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-backend.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-notify-tree.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-iter-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-notify.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-tree.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-copy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-save.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-sync.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-sync-rebuild.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-file.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-thread.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sync-changes.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sort-string.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sort.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-search-result.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mailbox-size.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sort.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sort-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/istream-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-pop3-uidl.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sync-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-search.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-search-mime.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-transaction.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sync-changes.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-search-result.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-pop3-uidl.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/raw/raw-sync.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/raw/raw-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/raw/raw-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/raw/raw-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/raw/raw-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sync-search.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-attachment.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-save.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-mail.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-attachment.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file-fix.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-save.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-thread-finish.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mailbox-size.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-thread-links.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-rebuild.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/shared/shared-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/shared/shared-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/shared/shared-list.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail-headers.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/pop3c/pop3c-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/pop3c/pop3c-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/pop3c/pop3c-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/pop3c/pop3c-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/pop3c/pop3c-sync.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/pop3c/pop3c-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/pop3c/pop3c-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/pop3c/pop3c-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/pop3c/pop3c-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-attachment.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-attachment.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail-binary.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/istream-raw-mbox.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/istream-raw-mbox.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-md5-apop3d.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-sync-update.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-md5-all.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-sync-rewrite.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-lock.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-file.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-md5.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-sync-parse.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-sync-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-lock.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-sync-list-index.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-save.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-thread-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/cydir/cydir-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/cydir/cydir-save.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/cydir/cydir-sync.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/cydir/cydir-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/cydir/cydir-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/cydir/cydir-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-mailbox.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-save.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-mail.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-search.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-list.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-list.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-search.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-mail-fetch.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-sync.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-deleted-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-map.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-storage-rebuild.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-sync.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-file.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-purge.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-storage-rebuild.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-map.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-save.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-map-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-rebuild.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-search-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-attribute.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-status.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/istream-mail.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-filename-flags.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-sync-index.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-filename.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-save.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-filename-flags.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-sync.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-copy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-filename.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-keywords.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-keywords.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sync-pvt.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-tree.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-parser-imap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list-iter.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-thread.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-parser-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-keywords.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-error.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-recent-flags.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/fail-mail-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/test-mailbox-get.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-args-cmdline.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-attribute-internal.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-guid-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/fail-mail-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-namespace.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/test-mail-search-args-simplify.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-watch.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-attribute-internal.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-args-imap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-user.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-register.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-guid-cache.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-autoexpunge.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-get.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list-notify.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-attribute.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-attribute.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-mime-build.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-header.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-attribute-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-register-human.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-register-imap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-search-result-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-register.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-thread.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-error.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-args-simplify.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-auth/auth-client-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-auth/auth-client-interface.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-auth/auth-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-auth/auth-master.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-auth/test-auth-master.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-auth/auth-client-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-auth/auth-master.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-auth/auth-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-auth/auth-client-request.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache-lookup.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-index-transaction-finish.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-transaction-log-view.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-dummy-view.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache-fields.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache-decisions.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-keywords.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-strmap.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-update.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-index-map.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-map.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-transaction-log-append.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-transaction-log-view-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-transaction-log-append.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-view.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-view-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-modseq.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mailbox-log.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-fsck.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-index-modseq.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache-sync-update.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-write.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-alloc-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-sort-appends.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-strmap.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-index.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache-transaction.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-view-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-util.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-index-sync-ext.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-transaction-log-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-view.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache-purge.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-alloc-cache.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-transaction-log-view.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mailbox-log.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-ext.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-update.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-transaction-log.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache-purge.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-map-read.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-export.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-transaction-log-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-lock.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-modseq.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-transaction-log.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-index.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-map-hdr.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-index-transaction-update.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-finish.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-transaction-log-file.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-create.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-enable.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-list.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-master-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-noop.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-capability.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-expunge.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-status.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-search-args.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-urlfetch.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-commands.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-notify.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-subscribe.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-notify.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-feature.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-id.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-fetch.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-x-cancel.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-search.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-examine.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-client-hibernate.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-fetch.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-resetkey.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-delete.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-store.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/mail-storage-callbacks.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-list.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-rename.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-expunge.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-select.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-status.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-unselect.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-copy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-idle.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-list.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-fetch.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-thread.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-lsub.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-fetch-body.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-feature.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-setmetadata.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-x-state.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-close.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-notify.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-append.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-commands.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-search.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-search.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-state.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-logout.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-genurlauth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-commands-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-cancelupdate.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-expunge.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-state.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-namespace.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-getmetadata.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-sort.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-unsubscribe.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-sync.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-commands-util.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-status.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-master-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-check.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-sync-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap/imap-search-args.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-test/test-istream.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-test/test-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-test/test-ostream.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-test/test-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-bodystructure.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-date.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-util.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-keepalive.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-utf7.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-envelope.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-arg.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-url.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-match.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-match.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-bodystructure.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-quote.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-url.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-url.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-resp-code.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-date.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-utf7.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-envelope.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-id.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-base-subject.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-match.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-seqset.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-bodystructure.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-base-subject.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-envelope.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-keepalive.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-quote.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-quote.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-utf7.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-id.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-seqset.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-arg.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-charset/test-charset.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-charset/charset-utf8.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-charset/charset-iconv.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-charset/charset-utf8.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-charset/charset-utf8-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-charset/charset-utf8-only.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-login-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-login-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-login/client-authenticate.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-login-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-proxy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-login-commands.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-login/client-authenticate.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-login-commands.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-login-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-proxy.h
Examining data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-login-cmd-id.c
Examining data/dovecot-2.3.11.3+dfsg1/src/config/sysinfo-get.h
Examining data/dovecot-2.3.11.3+dfsg1/src/config/config-filter.h
Examining data/dovecot-2.3.11.3+dfsg1/src/config/old-set-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/config/sysinfo-get.c
Examining data/dovecot-2.3.11.3+dfsg1/src/config/config-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/config/config-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/config/config-request.c
Examining data/dovecot-2.3.11.3+dfsg1/src/config/config-parser-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/config/config-request.h
Examining data/dovecot-2.3.11.3+dfsg1/src/config/config-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/config/config-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c
Examining data/dovecot-2.3.11.3+dfsg1/src/config/old-set-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/config/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/config/config-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/config/config-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/test-event-stats.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-settings-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-login-auth.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-ssl-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/anvil-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-ssl-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-haproxy.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-auth.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-login-auth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-login.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-ssl.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/ipc-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/stats-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/ipc-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/ipc-server.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/test-master-service-settings-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/service-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-auth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-settings-cache.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/syslog-util.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/anvil-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/syslog-util.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/stats-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-ssl.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-instance.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-interface.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/ipc-server.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-instance.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-login.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/dovecot-openssl-common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-ssl-context-cache.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/ostream-openssl.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl-context.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/dovecot-openssl-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-ssl-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-ssl.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-ssl.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/istream-openssl.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl-common.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-ssl-test.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/test-iostream-ssl.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-ssl-test.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sasl/mech-login.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sasl/mech-external.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sasl/dsasl-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sasl/mech-oauthbearer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sasl/dsasl-client-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sasl/mech-plain.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-sasl/dsasl-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-storage/imap-metadata.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-storage/imap-msgpart.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-storage/imap-msgpart-url.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-storage/imap-msgpart-url.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-storage/imap-msgpart.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-imap-storage/imap-metadata.c
Examining data/dovecot-2.3.11.3+dfsg1/src/log/log-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/log/doveadm-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/log/log-connection.h
Examining data/dovecot-2.3.11.3+dfsg1/src/log/log-error-buffer.h
Examining data/dovecot-2.3.11.3+dfsg1/src/log/log-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/log/log-error-buffer.c
Examining data/dovecot-2.3.11.3+dfsg1/src/log/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/log/doveadm-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-program-client/program-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-program-client/program-client-local.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-program-client/test-program-client-unix.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-program-client/program-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-program-client/program-client-remote.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-program-client/test-program-client-net.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-program-client/program-client-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-program-client/test-program-client-local.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ldap/ldap-iterator.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ldap/ldap-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ldap/ldap-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ldap/ldap-search.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ldap/ldap-connection-pool.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ldap/ldap-entry.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ldap/ldap-connection.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ldap/ldap-connection-pool.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ldap/ldap-private.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-ldap/ldap-compare.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-settings/test-settings-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict-extra/dict-fs.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-dict-extra/dict-register.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-lda/lda-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-lda/mail-deliver.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-lda/mail-send.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-lda/mail-deliver.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-lda/mail-send.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-lda/lda-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service-anvil.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service-listen.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/dup2-array.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service-log.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service-log.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/dup2-array.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service-monitor.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service-process.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/sd-daemon.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/master-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/capabilities.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/common.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/master-client.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service-anvil.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/test-master-login-auth.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/master-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/test-auth-client.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service-process-notify.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service-process.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service-process-notify.h
Examining data/dovecot-2.3.11.3+dfsg1/src/master/test-auth-master.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/capabilities-posix.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service-monitor.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/service-listen.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/master-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/sd-daemon.c
Examining data/dovecot-2.3.11.3+dfsg1/src/master/main.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/istream-zstd.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-zlib.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/bench-compression.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-bzlib.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-zlib.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/istream-bzlib.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-lzma.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/istream-zlib.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/istream-zlib.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-zstd.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/compression.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/compression.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/istream-lzma.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-lz4.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/iostream-lz4.h
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/istream-lz4.c
Examining data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-commands.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-validator.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-commands.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-script.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-address-parts.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-actions.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-ast.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/tst-header.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-code.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-limits.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/tst-allof.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/ext-envelope.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/tst-address.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/tst-exists.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-match-types.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-address.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-extensions.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-address-parts.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-match-types.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/cmp-i-octet.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-extensions.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-code.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/cmd-if.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-code-dumper.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-config.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/cmd-require.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-message.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-lexer.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/cmd-keep.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-types.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-smtp.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-script.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/cmd-discard.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-generator.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/ext-encoded-character.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-match.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-comparators.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/ext-reject.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-address-source.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/test-rfc2822.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/mail-raw.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/edit-mail.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/mail-raw.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/edit-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/rfc2822.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/test-edit-mail.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/rfc2822.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-result.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-objects.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-dump.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/mcht-contains.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-comparators.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/cmd-stop.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-objects.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-private.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/cmp-i-ascii-casemap.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-file.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-ast.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-error.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/tst-not.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-error.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-storage-private.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-debug.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-plugins.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-address-source.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-plugins.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/mcht-matches.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-validator.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/ext-fileinto.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/subaddress/ext-subaddress.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/include/ext-include-variables.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/include/ext-include-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/include/ext-include-binary.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/include/ext-include-binary.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/include/ext-include.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/include/ext-include-variables.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/include/cmd-return.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/include/ext-include-limits.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/include/cmd-include.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/include/cmd-global.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/include/ext-include-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mime/cmd-extracttext.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mime/ext-foreverypart.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mime/tag-mime.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mime/cmd-foreverypart.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mime/ext-extracttext.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mime/cmd-break.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mime/ext-mime-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mime/ext-mime-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mime/ext-mime.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/environment/ext-environment-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/environment/tst-environment.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/environment/ext-environment-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/environment/ext-environment.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/environment/sieve-ext-environment.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/tst-string.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-namespaces.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/cmd-set.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-limits.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-operands.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-namespaces.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-modifiers.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-name.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-arguments.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/sieve-ext-variables.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-modifiers.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-operands.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-dump.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-dump.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-arguments.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-name.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/metadata/tst-metadataexists.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/metadata/ext-metadata-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/metadata/tst-metadata.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/metadata/ext-metadata.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/ihave/ext-ihave.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/ihave/tst-ihave.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/ihave/ext-ihave-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/ihave/ext-ihave-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/ihave/ext-ihave-binary.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/ihave/ext-ihave-binary.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/ihave/cmd-error.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vacation/ext-vacation-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vacation/ext-vacation-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vacation/ext-vacation-seconds.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vacation/ext-vacation.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vacation/cmd-vacation.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/editheader/ext-editheader-limits.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/editheader/cmd-deleteheader.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/editheader/cmd-addheader.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/editheader/ext-editheader.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/editheader/ext-editheader-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/editheader/ext-editheader-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/relational/ext-relational-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/relational/ext-relational-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/relational/ext-relational.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/relational/mcht-value.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/relational/mcht-count.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/notify/ext-notify.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/notify/ext-notify-limits.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/notify/cmd-notify.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/notify/ext-notify-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/notify/cmd-denotify.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/notify/ext-notify-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vnd.dovecot/environment/ext-vnd-environment-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vnd.dovecot/environment/ext-vnd-environment-variables.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vnd.dovecot/environment/ext-vnd-environment-items.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vnd.dovecot/environment/ext-vnd-environment.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vnd.dovecot/report/ext-vnd-report.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vnd.dovecot/report/cmd-report.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vnd.dovecot/report/ext-vnd-report-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vnd.dovecot/report/ext-vnd-report-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vnd.dovecot/debug/cmd-debug-log.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vnd.dovecot/debug/ext-debug-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vnd.dovecot/debug/ext-debug.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/special-use/tag-specialuse.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/special-use/ext-special-use-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/special-use/ext-special-use-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/special-use/ext-special-use.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/special-use/tst-specialuse-exists.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/index/tag-index.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/index/ext-index-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/index/ext-index.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/index/ext-index-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mailbox/tag-mailbox-create.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mailbox/ext-mailbox-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mailbox/sieve-ext-mailbox.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mailbox/tst-mailboxexists.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mailbox/ext-mailbox.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/copy/sieve-ext-copy.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/copy/ext-copy.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/imap4flags/ext-imap4flags.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/imap4flags/cmd-flag.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/imap4flags/sieve-ext-imap4flags.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/imap4flags/ext-imap4flags-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/imap4flags/ext-imap4flags-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/imap4flags/tag-flags.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/imap4flags/tst-hasflag.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/imap4flags/ext-imapflags.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/date/ext-date-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/date/ext-date-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/date/ext-date.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/date/tst-date.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/comparator-i-ascii-numeric/ext-cmp-i-ascii-numeric.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/spamvirustest/ext-spamvirustest-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/spamvirustest/tst-spamvirustest.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/spamvirustest/ext-spamvirustest.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/spamvirustest/ext-spamvirustest-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/body/tst-body.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/body/ext-body.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/body/ext-body-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/body/ext-body-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/regex/ext-regex-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/regex/mcht-regex.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/regex/ext-regex-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/regex/ext-regex.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/duplicate/ext-duplicate.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/duplicate/tst-duplicate.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/duplicate/ext-duplicate-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/duplicate/ext-duplicate-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/cmd-notify.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/ext-enotify.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/ext-enotify-limits.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/ext-enotify-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/tst-valid-notify-method.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/ext-enotify-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/mailto/ntfy-mailto.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/mailto/uri-mailto.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/mailto/uri-mailto.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/tst-notify-method-capability.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/vmodf-encodeurl.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/sieve-ext-enotify.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-code-dumper.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/mcht-is.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-generator.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-lexer.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-smtp.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-runtime-trace.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-result.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/tst-truefalse.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-execute.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-runtime-trace.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-error-private.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-dumper.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/tst-anyof.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-storage-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/data/sieve-data-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/data/sieve-data-script.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/data/sieve-data-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/dict/sieve-dict-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/dict/sieve-dict-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/dict/sieve-dict-script.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/ldap/sieve-ldap-db.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/ldap/sieve-ldap-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/ldap/sieve-ldap-script.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/ldap/sieve-ldap-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/ldap/sieve-ldap-db.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/ldap/sieve-ldap-storage-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-storage-list.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-script-sequence.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-storage-quota.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-storage-save.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-script.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-storage-active.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/cmd-redirect.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-runtime.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/tst-size.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-stringlist.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-dumper.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-execute.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-interpreter.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-stringlist.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-actions.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-script-private.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-message.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-code.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-interpreter.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-match.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-address.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-managesieve/managesieve-quote.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-managesieve/managesieve-arg.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-managesieve/managesieve-parser.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-managesieve/managesieve-parser.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-managesieve/managesieve-arg.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-managesieve/managesieve-quote.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/tst-test-result-execute.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-script.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/cmd-test-result.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/ext-testsuite.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/cmd-test-message.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/tst-test-result-action.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-result.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/cmd-test-imap-metadata.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/cmd-test-mailbox.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-message.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-objects.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/cmd-test-fail.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/cmd-test-binary.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-binary.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/tst-test-error.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-binary.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/tst-test-script-compile.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-substitutions.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/cmd-test-set.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/cmd-test-config.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/tst-test-multiscript.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-smtp.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-arguments.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-variables.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-log.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/tst-test-script-run.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-smtp.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/cmd-test.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-mailstore.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-result.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-objects.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-mailstore.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-message.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-arguments.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-variables.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-script.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-substitutions.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-log.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/cmd-noop.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/cmd-capability.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/cmd-renamescript.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/managesieve-commands.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/managesieve-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/managesieve-quota.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/cmd-getscript.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/managesieve-commands.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/managesieve-capabilities.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/managesieve-capabilities.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/managesieve-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/managesieve-quota.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/managesieve-client.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/cmd-setactive.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/managesieve-client.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/cmd-listscripts.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/managesieve-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/main.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/cmd-logout.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/cmd-putscript.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/cmd-havespace.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/cmd-deletescript.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/sieve-tools/sieve-test.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/sieve-tools/sieve-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/sieve-tools/sieve-dump.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/sieve-tools/sievec.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-login-settings.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/client-authenticate.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/client.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/client-authenticate.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-login-settings-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-login-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-proxy.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/client.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-login-settings-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-proxy.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/sieve-extprograms/sieve-extprograms-common.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/sieve-extprograms/sieve-extprograms-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/sieve-extprograms/cmd-pipe.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/sieve-extprograms/ext-pipe.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/sieve-extprograms/sieve-extprograms-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/sieve-extprograms/ext-execute.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/sieve-extprograms/ext-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/sieve-extprograms/sieve-extprograms-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/sieve-extprograms/cmd-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/sieve-extprograms/cmd-execute.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/lda-sieve/lda-sieve-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/lda-sieve/lda-sieve-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-cmd-delete.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-cmd.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-cmd-activate.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-cmd-get.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-cmd-put.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-sync.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-cmd.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-cmd-rename.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-cmd-list.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/settings/pigeonhole-settings.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imap-filter-sieve/imap-filter-sieve-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imap-filter-sieve/imap-filter-sieve.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imap-filter-sieve/imap-filter-sieve.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imap-filter-sieve/cmd-filter-sieve.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imap-filter-sieve/imap-filter-sieve-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imap-filter-sieve/imap-filter.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imap-filter-sieve/cmd-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imap-filter-sieve/imap-filter.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imapsieve/imap-sieve-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imapsieve/ext-imapsieve.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imapsieve/imap-sieve-storage.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imapsieve/ext-imapsieve-common.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imapsieve/imap-sieve.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imapsieve/imap-sieve.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imapsieve/sieve-imapsieve-plugin.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imapsieve/imap-sieve-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imapsieve/imap-sieve-storage.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imapsieve/ext-imapsieve-environment.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imapsieve/sieve-imapsieve-plugin.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve-tool/sieve-tool.h
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve-tool/sieve-tool.c
Examining data/dovecot-2.3.11.3+dfsg1/pigeonhole/pigeonhole-version.h

FINAL RESULTS:

data/dovecot-2.3.11.3+dfsg1/src/lib/nfs-workarounds.c:152:6:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
	if (chown(path, uid, (gid_t)-1) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib/nfs-workarounds.c:182:6:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	if (chmod(path, st.st_mode & 07777) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib/path-util.c:167:15:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
					if ((ret=readlink(npath, npath_link, lsize)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib/path-util.c:346:16:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	while ((ret = readlink(path, dest, size)) >= (ssize_t)size) {
data/dovecot-2.3.11.3+dfsg1/src/lib/unix-socket-create.c:27:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
		if (chown(path, uid, gid) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/master/master-settings.c:784:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		if (chmod(set->base_dir, 0755) < 0)
data/dovecot-2.3.11.3+dfsg1/src/master/service-listen.c:45:6:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
	if (chown(l->set.fileset.set->path, uid, gid) < 0) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/mcht-matches.c:43:27:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define debug_printf(...) printf ("match debug: " __VA_ARGS__)
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-debug.c:15:27:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define debug_printf(...) printf ("lineinfo: " __VA_ARGS__)
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-storage.c:608:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access("/sieve", mode) == 0) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/main.c:192:20:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
		input.username = getlogin();
data/dovecot-2.3.11.3+dfsg1/src/auth/mycrypt.c:25:9:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
	return crypt(key, salt);
data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c:547:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    access(set->ssl_client_ca_dir, X_OK) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c:734:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    access(set->mail_plugin_dir, R_OK | X_OK) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:984:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    access(EXAMPLE_CONFIG_DIR, X_OK) == 0) {
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:1049:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(exec_args[0], exec_args);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-log.c:163:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf("%"PRIu64, n64);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-log.c:512:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(", modseq=%"PRIu64, *modseq);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm.c:94:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(out, USAGE_CMDNAME_FMT" %s\n", cmd, args);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm.c:100:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				fprintf(out, USAGE_CMDNAME_FMT" %s",
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm.c:192:8:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	(void)execv(argv[0], argv);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm.c:215:8:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	(void)execv(argv[0], argv);
data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-worker.c:940:17:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
		access_user = getlogin();
data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth.c:124:14:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
		username = getlogin();
data/dovecot-2.3.11.3+dfsg1/src/imap/main.c:314:20:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
		input.username = getlogin();
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-client.c:379:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(dns_set.dns_client_socket_path, R_OK|W_OK) == 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-lua/dlua-script.c:235:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(file, O_RDONLY) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-master/test-event-stats.c:167:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	while (access(exit_stats, F_OK) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-master/test-event-stats.c:169:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		while (access(test_done, F_OK) < 0 ||
data/dovecot-2.3.11.3+dfsg1/src/lib-master/test-event-stats.c:199:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	while (access(signal_file, F_OK) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-storage.c:98:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(path, R_OK|W_OK|X_OK) == 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-storage.c:68:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(path, R_OK|W_OK|X_OK) == 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-storage.c:109:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(path, R_OK|W_OK|X_OK) == 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-storage.c:119:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access("/cur", R_OK|W_OK|X_OK) == 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-storage.c:663:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(t_strconcat(box_path, "/cur", NULL), W_OK) < 0 &&
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-lock.c:288:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(fname, R_OK) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-storage.c:216:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(path, R_OK|W_OK) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-storage.c:247:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(path, R_OK|W_OK|X_OK) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-storage.c:300:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(path, R_OK|W_OK) == 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-storage.c:309:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(path, R_OK|W_OK) == 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-storage.c:811:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(mailbox_get_path(&mbox->box), R_OK|W_OK) < 0 &&
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-settings.c:528:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    access(set->ssl_client_ca_dir, X_OK) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-settings.c:715:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    access(set->mail_plugin_dir, R_OK | X_OK) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib/compat.c:206:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#undef vsnprintf
data/dovecot-2.3.11.3+dfsg1/src/lib/compat.c:214:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = vsnprintf(str, size, format, ap);
data/dovecot-2.3.11.3+dfsg1/src/lib/compat.c:222:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		ret = vsnprintf(tmp, tmp_size, format, ap);
data/dovecot-2.3.11.3+dfsg1/src/lib/compat.c:238:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		ret = vsnprintf(tmp, tmp_size, format, ap);
data/dovecot-2.3.11.3+dfsg1/src/lib/compat.h:231:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define vsnprintf i_my_vsnprintf
data/dovecot-2.3.11.3+dfsg1/src/lib/eacces-error.c:110:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(path, access_mode) == 0)
data/dovecot-2.3.11.3+dfsg1/src/lib/execv-const.c:23:8:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	(void)execv(path, argv_drop_const(argv));
data/dovecot-2.3.11.3+dfsg1/src/lib/execv-const.c:30:8:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	(void)execvp(file, argv_drop_const(argv));
data/dovecot-2.3.11.3+dfsg1/src/lib/macros.h:95:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, format_idx, arg_idx)))
data/dovecot-2.3.11.3+dfsg1/src/lib/macros.h:99:25:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	__attribute__((format (scanf, format_idx, arg_idx)))
data/dovecot-2.3.11.3+dfsg1/src/lib/path-util.c:386:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if (access(str_c(path), X_OK) == 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib/str.c:135:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = vsnprintf(tmp, init_size, fmt, args);
data/dovecot-2.3.11.3+dfsg1/src/lib/str.c:142:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		ret2 = vsnprintf(tmp, ret + 1, fmt, args2);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:35:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = vsnprintf(dest, max_chars, printf_format_fix_unsafe(format),
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:139:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = vsnprintf(tmp, init_size, format, args);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:147:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		ret = vsnprintf(tmp, *size_r, format, args2);
data/dovecot-2.3.11.3+dfsg1/src/login-common/main.c:34:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	struct access_lookup *access;
data/dovecot-2.3.11.3+dfsg1/src/login-common/main.c:190:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (lookup->access != NULL)
data/dovecot-2.3.11.3+dfsg1/src/login-common/main.c:191:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		access_lookup_destroy(&lookup->access);
data/dovecot-2.3.11.3+dfsg1/src/login-common/main.c:447:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    access(login_rawlog_dir, W_OK | X_OK) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:836:9:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		(void)execv(BINDIR"/doveadm", argv);
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:850:9:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		(void)execv(BINDIR"/doveadm", argv);
data/dovecot-2.3.11.3+dfsg1/src/master/sd-daemon.h:72:55:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define _sd_printf_attr_(a,b) __attribute__ ((format (printf, a, b)))
data/dovecot-2.3.11.3+dfsg1/src/master/service.c:354:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(t_strcut(service->executable, ' '), X_OK) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:577:3:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
		swprintf(id, N_ELEMENTS(id), L"%u", uid);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:580:4:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
			swprintf(id, N_ELEMENTS(id), L"%u", part_idx);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:959:3:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
		swprintf(wuid, N_ELEMENTS(wuid), L"%u", uid);
data/dovecot-2.3.11.3+dfsg1/src/pop3/main.c:233:20:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
		input.username = getlogin();
data/dovecot-2.3.11.3+dfsg1/src/submission/main.c:203:20:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
		input.username = getlogin();
data/dovecot-2.3.11.3+dfsg1/src/util/gdbhelper.c:25:9:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		(void)execvp(argv[1], argv+1);
data/dovecot-2.3.11.3+dfsg1/src/util/gdbhelper.c:45:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (system(cmd) < 0)
data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c:422:2:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execv(executable, argv);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve-tool/sieve-tool.c:109:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	user = getenv("USER");
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve-tool/sieve-tool.c:110:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	home = getenv("HOME");
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/ldap/sieve-ldap-storage-settings.c:129:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		str = getenv("LDAPRC");
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-login-settings-plugin.c:111:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ( getenv("DUMP_CAPABILITY") != NULL )
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/main.c:29:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        (getenv(MASTER_IS_PARENT_ENV) == NULL)
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/main.c:190:50:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	input.username =  username != NULL ? username : getenv("USER");
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/main.c:195:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((value = getenv("IP")) != NULL)
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/main.c:197:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((value = getenv("LOCAL_IP")) != NULL)
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/main.c:200:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	input_base64 = getenv("CLIENT_INPUT");
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/main.c:294:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (IS_STANDALONE() || getenv("DUMP_CAPABILITY") != NULL) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/main.c:300:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("DUMP_CAPABILITY") != NULL)
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/main.c:329:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("DUMP_CAPABILITY") != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/anvil/main.c:71:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	anvil_restarted = getenv("ANVIL_RESTARTED") != NULL;
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request-handler.c:919:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		j = random() % (count - i) + i;
data/dovecot-2.3.11.3+dfsg1/src/auth/checkpassword-reply.c:21:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	orig_uid_env = getenv("ORIG_UID");
data/dovecot-2.3.11.3+dfsg1/src/auth/checkpassword-reply.c:35:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("INSECURE_SETUID") == NULL &&
data/dovecot-2.3.11.3+dfsg1/src/auth/checkpassword-reply.c:49:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	user = getenv("USER");
data/dovecot-2.3.11.3+dfsg1/src/auth/checkpassword-reply.c:60:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	home = getenv("HOME");
data/dovecot-2.3.11.3+dfsg1/src/auth/checkpassword-reply.c:71:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	extra_env = getenv("EXTRA");
data/dovecot-2.3.11.3+dfsg1/src/auth/checkpassword-reply.c:74:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			value = getenv(*tmp);
data/dovecot-2.3.11.3+dfsg1/src/auth/checkpassword-reply.c:99:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	authorized = getenv("AUTHORIZED");
data/dovecot-2.3.11.3+dfsg1/src/auth/db-ldap.c:1945:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		str = getenv("LDAPRC");
data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c:327:14:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	const char *chroot;
data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c:3721:17:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		if (*service->chroot != '/' && *service->chroot != '\0') {
data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c:3721:44:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		if (*service->chroot != '/' && *service->chroot != '\0') {
data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c:3724:19:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
					    service->chroot, NULL);
data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c:3727:17:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		    *service->chroot != '\0') {
data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c:3907:15:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	DEF(SET_STR, chroot),
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:882:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("USE_SYSEXITS") != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:1034:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (getenv(DOVECOT_PRESERVE_ENVS_ENV) != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/client-connection-tcp.c:219:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, (char **)argv, getopt_args)) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-auth-server.c:212:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "a:")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-auth.c:280:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "a:")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-auth.c:320:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "a:M:x:")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-auth.c:410:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "a:m:M:x:")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-auth.c:464:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "a:f:x:")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-auth.c:621:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "a:e:f:ux:")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-cmd.c:527:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, (char*const*)argv, str_c(optbuf), array_front(&opts), &li)) > -1) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump.c:50:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "t:")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-fs.c:24:7:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	 if (getopt(*argc, *argv, "") == '?')
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-fs.c:110:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "h:")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-fs.c:460:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "Rn:")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-fs.c:489:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "CO")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-instance.c:56:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "c")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-log.c:335:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "s:")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-batch.c:84:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, (void *)argv, getopt_args)) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail.c:696:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	cctx.username = getenv("USER");
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail.c:709:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, getopt_args)) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mutf7.c:19:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "78")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-oldstats.c:549:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "bs:")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-oldstats.c:580:13:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt(argc, argv, "s:")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-proxy.c:34:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, getopt_args)) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-pw.c:43:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "lp:r:s:t:u:V")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-replicator.c:86:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(*argc, *argv, getopt_args)) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm.c:394:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	cctx.username = getenv("USER");
data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-client.c:39:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        (getenv(MASTER_IS_PARENT_ENV) == NULL)
data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-worker.c:43:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        (getenv(MASTER_IS_PARENT_ENV) == NULL)
data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-worker.c:937:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	debug = getenv("DEBUG") != NULL;
data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth-worker.c:938:52:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	access_user = access_user != NULL ? access_user : getenv("USER");
data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth.c:68:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        (getenv(MASTER_IS_PARENT_ENV) == NULL)
data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth.c:122:43:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	username = username != NULL ? username : getenv("USER");
data/dovecot-2.3.11.3+dfsg1/src/imap/main.c:31:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        (getenv(MASTER_IS_PARENT_ENV) == NULL)
data/dovecot-2.3.11.3+dfsg1/src/imap/main.c:187:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		input.tag = getenv("IMAPLOGINTAG");
data/dovecot-2.3.11.3+dfsg1/src/imap/main.c:312:49:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	input.username = username != NULL ? username : getenv("USER");
data/dovecot-2.3.11.3+dfsg1/src/imap/main.c:317:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((value = getenv("IP")) != NULL)
data/dovecot-2.3.11.3+dfsg1/src/imap/main.c:319:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((value = getenv("LOCAL_IP")) != NULL)
data/dovecot-2.3.11.3+dfsg1/src/imap/main.c:326:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	input_base64 = getenv("CLIENT_INPUT");
data/dovecot-2.3.11.3+dfsg1/src/lda/main.c:411:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	user = getenv("USER");
data/dovecot-2.3.11.3+dfsg1/src/lda/main.c:501:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		home = getenv("HOME");
data/dovecot-2.3.11.3+dfsg1/src/lib-auth/auth-master.h:23:21:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	const char *home, *chroot;
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-client-errors.c:3546:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "D")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-payload.c:2270:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "DS")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-server-errors.c:1037:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "D")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-server.c:195:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt(argc, argv, "D")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-settings.c:308:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (getenv(DOVECOT_PRESERVE_ENVS_ENV) == NULL)
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-settings.c:571:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("DOVECONF_ENV") != NULL ||
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-settings.c:594:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("DOVECONF_ENV") == NULL &&
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-settings.c:648:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("DOVECONF_ENV") == NULL &&
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:175:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		value = getenv(t_strdup_printf("SOCKET%u_SETTINGS", i));
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:211:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GDB") == NULL &&
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:213:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		value = getenv("SOCKET_COUNT");
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:241:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	service_configured_name = getenv(MASTER_SERVICE_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:259:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv(MASTER_UID_ENV) == NULL)
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:266:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	service_configured_name = getenv(MASTER_SERVICE_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:285:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	service->config_path = i_strdup(getenv(MASTER_CONFIG_FILE_ENV));
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:292:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		service->version_string = getenv(MASTER_DOVECOT_VERSION_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:299:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	value = getenv("SOCKET_COUNT");
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:320:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("LOG_SERVICE") != NULL)
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:322:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("USER") != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:324:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				     getenv("USER"));
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:335:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	value = getenv(DOVECOT_LOG_DEBUG_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:349:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		value = getenv(MASTER_UID_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:356:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		value = getenv(MASTER_CLIENT_LIMIT_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:363:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		value = getenv(MASTER_PROCESS_LIMIT_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:368:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		value = getenv(MASTER_PROCESS_MIN_AVAIL_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:374:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		value = getenv(MASTER_SERVICE_COUNT_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:380:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		value = getenv(MASTER_SERVICE_IDLE_KILL_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:395:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		value = getenv(DOVECOT_STATS_WRITER_SOCKET_PATH);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:410:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(service->argc, service->argv,
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:443:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		timestamp = getenv("LOG_STDERR_TIMESTAMP");
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:450:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("LOG_SERVICE") != NULL && !service->log_directly) {
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:706:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	value = getenv(DOVECOT_PRESERVE_ENVS_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:736:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *value = getenv(DOVECOT_PRESERVE_ENVS_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/service-settings.h:50:14:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	const char *chroot;
data/dovecot-2.3.11.3+dfsg1/src/lib-program-client/test-program-client-local.c:245:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "D")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-program-client/test-program-client-net.c:497:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "D")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-program-client/test-program-client-unix.c:400:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "D")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-client-errors.c:3948:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "D")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-payload.c:1121:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "DS")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-server-errors.c:3095:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "D")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-namespace.c:529:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		inbox_set->location = getenv("MAIL");
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-namespace.c:533:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		inbox_set->location = getenv("MAILDIR");
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:50:14:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	const char *chroot;
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:232:30:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	const char *chroot = reply->chroot;
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:262:6:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	if (chroot != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:263:40:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		if (!validate_chroot(user->user_set, chroot)) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:266:40:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
				"(see valid_chroot_dirs setting)", chroot);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:269:40:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		set_keyval(ctx, user, "mail_chroot", chroot);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:538:14:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
				&priv_r->chroot, &error)) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:602:57:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	rset.chroot_dir = *priv->chroot == '\0' ? NULL : priv->chroot;
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:616:45:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
				"can't chroot to %s", cur_chroot, priv->chroot);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:720:13:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	if (*priv->chroot != '\0')
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:721:41:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		str_printfa(str, ", chroot=%s", priv->chroot);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:1348:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *home = getenv("HOME");
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:1478:20:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	len = strlen(priv.chroot);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:1480:30:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	    strncmp(priv.home, priv.chroot, len - 2) == 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:1487:33:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
			priv.chroot = t_strndup(priv.chroot, len - 2);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:1490:46:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
			set_keyval(ctx, user, "mail_chroot", priv.chroot);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:1496:21:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
			priv.home = priv.chroot;
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:1498:33:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
			priv.home = t_strconcat(priv.chroot, priv.home, NULL);
data/dovecot-2.3.11.3+dfsg1/src/lib/data-stack.c:434:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (warn && getenv("DEBUG_SILENT") == NULL) {
data/dovecot-2.3.11.3+dfsg1/src/lib/env-util.c:86:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		value = getenv(key);
data/dovecot-2.3.11.3+dfsg1/src/lib/failures.c:457:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (type == LOG_TYPE_PANIC || getenv("CORE_ERROR") != NULL ||
data/dovecot-2.3.11.3+dfsg1/src/lib/failures.c:458:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	    (status == FATAL_OUTOFMEM && getenv("CORE_OUTOFMEM") != NULL))
data/dovecot-2.3.11.3+dfsg1/src/lib/failures.c:613:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	coredump_on_error = getenv("CORE_ERROR") != NULL;
data/dovecot-2.3.11.3+dfsg1/src/lib/file-lock.c:477:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	value = getenv("FILE_LOCK_SLOW_WARNING_MSECS");
data/dovecot-2.3.11.3+dfsg1/src/lib/home-expand.c:19:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		home = getenv("HOME");
data/dovecot-2.3.11.3+dfsg1/src/lib/hostpid.c:27:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	value = getenv(MY_HOSTNAME_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib/hostpid.c:57:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		name = getenv(MY_HOSTDOMAIN_ENV);
data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop.c:811:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		panic_on_leak = getenv("CORE_IO_LEAK") != NULL;
data/dovecot-2.3.11.3+dfsg1/src/lib/mempool-alloconly.c:256:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	    getenv("DEBUG_SILENT") != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/lib/module-dir.c:66:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GDB") == NULL) {
data/dovecot-2.3.11.3+dfsg1/src/lib/path-util.c:378:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	} else if ((path_env = getenv("PATH")) != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/lib/randgen.c:151:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	env_seed = getenv("DOVECOT_SRAND");
data/dovecot-2.3.11.3+dfsg1/src/lib/randgen.c:180:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(seed);
data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-access.c:327:7:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		if (chroot(set->chroot_dir) != 0)
data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-access.c:426:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((value = getenv("RESTRICT_SETUID")) != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-access.c:430:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((value = getenv("RESTRICT_SETGID")) != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-access.c:434:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((value = getenv("RESTRICT_SETGID_PRIV")) != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-access.c:438:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((value = getenv("RESTRICT_GID_FIRST")) != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-access.c:442:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((value = getenv("RESTRICT_GID_LAST")) != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-access.c:447:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	set_r->extra_groups = null_if_empty(getenv("RESTRICT_SETEXTRAGROUPS"));
data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-access.c:448:44:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	set_r->system_groups_user = null_if_empty(getenv("RESTRICT_USER"));
data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-access.c:449:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	set_r->chroot_dir = null_if_empty(getenv("RESTRICT_CHROOT"));
data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-access.c:508:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("PR_SET_DUMPABLE") != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c:361:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		value = getenv(data);
data/dovecot-2.3.11.3+dfsg1/src/lmtp/main.c:22:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        (getenv(MASTER_IS_PARENT_ENV) == NULL)
data/dovecot-2.3.11.3+dfsg1/src/login-common/client-common.c:783:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	tab[4].value = getenv("HOME");
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:762:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GDB") == NULL)
data/dovecot-2.3.11.3+dfsg1/src/master/master-settings.c:112:15:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	DEF(SET_STR, chroot),
data/dovecot-2.3.11.3+dfsg1/src/master/master-settings.c:530:17:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		if (*service->chroot != '/' && *service->chroot != '\0') {
data/dovecot-2.3.11.3+dfsg1/src/master/master-settings.c:530:44:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		if (*service->chroot != '/' && *service->chroot != '\0') {
data/dovecot-2.3.11.3+dfsg1/src/master/master-settings.c:533:19:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
					    service->chroot, NULL);
data/dovecot-2.3.11.3+dfsg1/src/master/master-settings.c:536:17:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		    *service->chroot != '\0') {
data/dovecot-2.3.11.3+dfsg1/src/master/sd-daemon.c:57:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!(e = getenv("LISTEN_PID"))) {
data/dovecot-2.3.11.3+dfsg1/src/master/sd-daemon.c:81:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!(e = getenv("LISTEN_FDS"))) {
data/dovecot-2.3.11.3+dfsg1/src/master/sd-daemon.c:343:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (!(e = getenv("NOTIFY_SOCKET")))
data/dovecot-2.3.11.3+dfsg1/src/master/service-process.c:190:17:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		service->set->chroot;
data/dovecot-2.3.11.3+dfsg1/src/master/service-process.c:450:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (getenv("CORE_OUTOFMEM") == NULL)
data/dovecot-2.3.11.3+dfsg1/src/master/service-process.c:571:20:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	if (service->set->chroot[0] != '\0') {
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/test-solr-response.c:275:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "D")) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/pop3/main.c:27:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        (getenv(MASTER_IS_PARENT_ENV) == NULL)
data/dovecot-2.3.11.3+dfsg1/src/pop3/main.c:231:49:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	input.username = username != NULL ? username : getenv("USER");
data/dovecot-2.3.11.3+dfsg1/src/pop3/main.c:236:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((value = getenv("IP")) != NULL)
data/dovecot-2.3.11.3+dfsg1/src/pop3/main.c:238:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((value = getenv("LOCAL_IP")) != NULL)
data/dovecot-2.3.11.3+dfsg1/src/pop3/main.c:241:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	input_base64 = getenv("CLIENT_INPUT");
data/dovecot-2.3.11.3+dfsg1/src/submission/main.c:37:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        (getenv(MASTER_IS_PARENT_ENV) == NULL)
data/dovecot-2.3.11.3+dfsg1/src/submission/main.c:201:49:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	input.username = username != NULL ? username : getenv("USER");
data/dovecot-2.3.11.3+dfsg1/src/submission/main.c:206:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((value = getenv("IP")) != NULL)
data/dovecot-2.3.11.3+dfsg1/src/submission/main.c:208:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((value = getenv("LOCAL_IP")) != NULL)
data/dovecot-2.3.11.3+dfsg1/src/submission/main.c:211:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	input_base64 = getenv("CLIENT_INPUT");
data/dovecot-2.3.11.3+dfsg1/src/util/maildirlock.c:30:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	dotlock_settings.use_excl_lock = getenv("DOTLOCK_USE_EXCL") != NULL;
data/dovecot-2.3.11.3+dfsg1/src/util/maildirlock.c:31:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	dotlock_settings.nfs_flush = getenv("MAIL_NFS_STORAGE") != NULL;
data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c:311:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	chroot_dir = getenv("RESTRICT_CHROOT");
data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c:312:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	home = getenv("HOME");
data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c:323:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		else if (getenv("DEBUG") != NULL)
data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c:328:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (getenv("DEBUG") != NULL)
data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c:359:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	restrict_access_by_env(0, getenv("HOME"));
data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c:361:54:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	process_title_set(t_strdup_printf("[%s:%s rawlog]", getenv("USER"),
data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c:365:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	(void)rawlog_proxy_create(0, 1, sfd[0], path, getenv("IP"), flags);
data/dovecot-2.3.11.3+dfsg1/src/util/script-login.c:125:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		restrict_access_by_env(0, getenv("HOME"));
data/dovecot-2.3.11.3+dfsg1/src/util/script-login.c:159:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	keys_str = getenv(ENV_USERDB_KEYS);
data/dovecot-2.3.11.3+dfsg1/src/util/script-login.c:163:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	username = getenv("USER");
data/dovecot-2.3.11.3+dfsg1/src/util/script-login.c:169:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		value = getenv(t_str_ucase(*keys));
data/dovecot-2.3.11.3+dfsg1/src/util/script-login.c:200:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv(MASTER_IS_PARENT_ENV) == NULL)
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve-tool/sieve-tool.c:548:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ( (fd = open(filename, O_WRONLY | O_TRUNC | O_CREAT, 0600)) < 0 ) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/duplicate/ext-duplicate-common.c:71:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/duplicate/ext-duplicate-common.c:138:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/duplicate/ext-duplicate-common.c:179:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/duplicate/ext-duplicate-common.c:233:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(act->hash, hash, MD5_RESULTLEN);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/duplicate/ext-duplicate-common.c:239:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char no_last_hash[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/duplicate/ext-duplicate-common.c:266:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hash_record->hash, hash, MD5_RESULTLEN);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/mailto/uri-mailto.c:115:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char _qchar_lookup[256] = {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/enotify/vmodf-encodeurl.c:47:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char _uri_reserved_lookup[256] = {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/spamvirustest/ext-spamvirustest-common.c:50:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *text_values[11];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vacation/cmd-vacation.c:1240:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char dupl_hash[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-common.c:256:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_var, var, sizeof(*new_var));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-file.c:423:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(path, O_RDONLY)) < 0) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-error.c:352:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[256];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-error.c:890:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-error.c:896:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(ehandler->logfile, O_CREAT | O_APPEND | O_WRONLY, 0600);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-error.c:962:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(ehandler->logfile,
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-message.c:826:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			*value_r = (const char *)headers[i].value;
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-message.c:1002:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(part_data, result_buf->data, result_buf->used);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-message.c:1331:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					header->value = memcpy(data, value, vlen);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-message.c:1336:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					header->utf8_value = memcpy(data,
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-message.c:1344:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(data, value, vlen);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-script-private.h:14:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int (*open)(struct sieve_script *script, enum sieve_error *error_r);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-script-private.h:66:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	bool open:1;
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-script.c:181:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (script->open)
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-script.c:184:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (script->v.open(script, error_r) < 0)
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-script.c:294:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return script->open;
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-script.c:325:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	i_assert(script->open);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-script.c:630:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	i_assert(script->open); // FIXME: auto-open?
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-script.c:678:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	i_assert(script->open); // FIXME: auto-open?
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-script.c:751:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	i_assert(script->open); // FIXME: auto-open?
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-storage.c:1532:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[256];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve.c:968:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_CREAT | O_APPEND | O_WRONLY, 0600);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-script.c:433:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fd=open(fscript->path, O_RDONLY)) < 0 ) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-storage-save.c:109:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(str_c(path),
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/ldap/sieve-ldap-db.c:44:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *val_1_arr[2];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/ldap/sieve-ldap-db.c:1155:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(data, vals[0]->bv_val, size);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/ldap/sieve-ldap-db.c:1197:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tab, auth_request_var_expand_static_tab,
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/edit-mail.c:1805:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stream->w_buffer + stream->pos, data, pos);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/edit-mail.c:1870:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stream->w_buffer + stream->pos,
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-login-settings-plugin.c:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-login-settings-plugin.c:128:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char *argv[5];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-proxy.c:30:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *managesieve_proxy_state_names[MSIEVE_PROXY_STATE_COUNT] = {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-sync.c:553:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[256];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/sieve-extprograms/sieve-extprograms-common.c:384:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[256];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-smtp.c:92:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fd=open(smtp->msg_file, O_WRONLY | O_CREAT, 0600)) < 0 ) {
data/dovecot-2.3.11.3+dfsg1/src/anvil/penalty.c:125:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rec->checksum.value + 1, rec->checksum.value,
data/dovecot-2.3.11.3+dfsg1/src/anvil/penalty.c:134:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(checksums, rec->checksum.value,
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-cache.c:456:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(node->data, key, key_len);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-cache.c:457:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(node->data + key_len + 1, value, value_len);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-cache.h:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[4]; /* key \0 value \0 */
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request-handler.c:658:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(initial_resp_data, buf->data, buf->used);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request-var-expand.c:88:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tab, auth_request_var_expand_static_tab,
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request.c:62:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char auth_default_subsystems[2];
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request.c:1406:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dup, credentials, size);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request.c:2716:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char sha1[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request.h:179:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char auth_default_subsystems[2];
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-settings.h:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username_chars_map[256];
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-settings.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username_translation_map[256];
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-stats.c:84:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, data, sizeof(*stats));
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:33:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char auth_token_secret[AUTH_TOKEN_SECRET_LEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:36:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
auth_token_read_secret(const char *path,
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:37:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       unsigned char secret_r[AUTH_TOKEN_SECRET_LEN])
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:42:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:98:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
auth_token_write_secret(const char *path,
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:99:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			const unsigned char secret[AUTH_TOKEN_SECRET_LEN])
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:108:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(temp_path, O_WRONLY | O_CREAT | O_TRUNC, 0600);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:165:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char result[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-worker-client.c:695:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char passdb_md5[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-worker-client.c:696:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char userdb_md5[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-worker-server.c:154:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char passdb_md5[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-worker-server.c:155:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char userdb_md5[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/crypt-blowfish.c:363:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char BF_itoa64[64 + 1] =
data/dovecot-2.3.11.3+dfsg1/src/auth/crypt-blowfish.c:366:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char BF_atoi64[0x60] = {
data/dovecot-2.3.11.3+dfsg1/src/auth/crypt-blowfish.c:639:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char flags_by_subtype[26] =
data/dovecot-2.3.11.3+dfsg1/src/auth/crypt-blowfish.c:759:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(output, setting, 7 + 22 - 1);
data/dovecot-2.3.11.3+dfsg1/src/auth/crypt-blowfish.c:812:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char * const test_hashes[2] =
data/dovecot-2.3.11.3+dfsg1/src/auth/crypt-blowfish.c:821:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[7 + 22 + 1];
data/dovecot-2.3.11.3+dfsg1/src/auth/crypt-blowfish.c:822:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char o[7 + 22 + 31 + 1 + 1 + 1];
data/dovecot-2.3.11.3+dfsg1/src/auth/db-checkpassword.c:301:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/auth/db-dict.c:466:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_key, key, sizeof(struct db_dict_key));
data/dovecot-2.3.11.3+dfsg1/src/auth/db-ldap.c:74:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *val_1_arr[2];
data/dovecot-2.3.11.3+dfsg1/src/auth/db-passwd-file.c:177:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(pw->path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-apop.c:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char response_digest[16];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-apop.c:35:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[16];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-cram-md5.c:36:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[17];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-cram-md5.c:53:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5-private.h:30:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char response[32];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:31:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nonce[16];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:32:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nonce_base64[MAX_BASE64_ENCODED_SIZE(sizeof(nonce))+1];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:87:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:397:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(request->response, value, 32);
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-gssapi.c:369:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ret[4];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-ntlm.c:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char lm_response[LM_RESPONSE_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-ntlm.c:108:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char ntlm_v2_response[NTLMSSP_V2_RESPONSE_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-ntlm.c:124:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char ntlm_response[NTLMSSP_RESPONSE_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-ntlm.c:219:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(request->response, response, data_size);
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-otp.c:139:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[OTP_HASH_SIZE], cur_hash[OTP_HASH_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-otp.c:173:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[OTP_HASH_SIZE], cur_hash[OTP_HASH_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char pwd_md5[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c:45:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char session_key[16];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c:65:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			      unsigned char digest[STATIC_ARRAY MD5_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c:68:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char z[48];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c:89:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char digest[STATIC_ARRAY MD5_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c:92:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char tmp[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c:93:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char z[48];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c:231:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*buffer, p, len);
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c:336:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char timestamp[RPA_TIMESTAMP_LEN / 2];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c:374:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(request->service_timestamp,
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c:392:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char server_response[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c:424:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char response[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-rpa.c:519:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const unsigned char client_ack[3] = { 0x60, 0x01, 0x00 };
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.c:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char snonce[SCRAM_SERVER_NONCE_LEN+1];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.c:83:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char server_signature[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.c:233:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char client_key[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.c:234:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char client_signature[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.c:235:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char stored_key[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-skey.c:127:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[OTP_HASH_SIZE], cur_hash[OTP_HASH_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-skey.c:131:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hash, data, 8);
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-winbind.c:125:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char *args[3];
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-vpopmail.c:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vpop_user[VPOPMAIL_LIMIT], vpop_domain[VPOPMAIL_LIMIT];
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-vpopmail.c:163:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			static char ip_env[256];
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb.c:272:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void passdbs_generate_md5(unsigned char md5[STATIC_ARRAY MD5_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb.h:114:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void passdbs_generate_md5(unsigned char md5[STATIC_ARRAY MD5_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-crypt.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char salt[CRYPT_BLF_SALT_LEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-crypt.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char password[CRYPT_BLF_BUFFER_LEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-crypt.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic_salt[CRYPT_BLF_PREFIX_LEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-crypt.c:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char crypted[CRYPT_BLF_BUFFER_LEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-md5crypt.c:52:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	final[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-otp.c:25:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char random_data[OTP_MAX_SEED_LEN / 2];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-pbkdf2.c:17:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
pbkdf_run(const char *plaintext, const char *salt,
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-pbkdf2.c:17:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
pbkdf_run(const char *plaintext, const char *salt,
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-pbkdf2.c:18:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  unsigned int rounds, unsigned char key_r[PBKDF2_KEY_SIZE_SHA1])
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-pbkdf2.c:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char key[PBKDF2_KEY_SIZE_SHA1];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-pbkdf2.c:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char key1[PBKDF2_KEY_SIZE_SHA1], key2[PBKDF2_KEY_SIZE_SHA1];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:34:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char U[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:43:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result, U, hmethod->digest_size);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:88:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stored_key_r, buf->data, hmethod->digest_size);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:97:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(server_key_r, buf->data, hmethod->digest_size);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:110:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char salted_password[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:111:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char client_key[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:112:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char stored_key[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:113:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char calculated_stored_key[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:114:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char server_key[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:151:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char salt[16];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:152:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char salted_password[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:153:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char client_key[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:154:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char server_key[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:155:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char stored_key[hmethod->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-sodium.c:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char result[crypto_pwhash_STRBYTES];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-sodium.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char result[crypto_pwhash_argon2id_STRBYTES];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:376:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char salt[9];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:453:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sha1_digest[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:494:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sha256_digest[SHA256_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:537:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sha512_digest[SHA512_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:580:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char md5_digest[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-passwd-file.c:127:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(ctx->path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-vpopmail.c:21:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				     char vpop_user[VPOPMAIL_LIMIT],
data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-vpopmail.c:22:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				     char vpop_domain[VPOPMAIL_LIMIT])
data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-vpopmail.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vpop_user[VPOPMAIL_LIMIT], vpop_domain[VPOPMAIL_LIMIT];
data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-vpopmail.h:14:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				     char vpop_user[VPOPMAIL_LIMIT],
data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-vpopmail.h:15:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				     char vpop_domain[VPOPMAIL_LIMIT]);
data/dovecot-2.3.11.3+dfsg1/src/auth/userdb.c:197:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void userdbs_generate_md5(unsigned char md5[STATIC_ARRAY MD5_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/auth/userdb.h:85:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void userdbs_generate_md5(unsigned char md5[STATIC_ARRAY MD5_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c:2092:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username_chars_map[256];
data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c:2093:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username_translation_map[256];
data/dovecot-2.3.11.3+dfsg1/src/config/config-parser.c:469:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/config/config-parser.c:475:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/config/config-parser.c:506:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(path, O_RDONLY)) == -1) {
data/dovecot-2.3.11.3+dfsg1/src/config/config-parser.c:986:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:758:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GUID_128_HOST_HASH_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:812:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		key = NULL; memcpy(&key, hash, sizeof(hash));
data/dovecot-2.3.11.3+dfsg1/src/config/old-set-parser.c:108:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&keysize, buf, 2);
data/dovecot-2.3.11.3+dfsg1/src/config/old-set-parser.c:110:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&off, buf+4, 4);
data/dovecot-2.3.11.3+dfsg1/src/config/sysinfo-get.c:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/config/sysinfo-get.c:20:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/director/director-connection.c:2182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dec_buf[MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/director/director.c:34:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *user_kill_state_names[USER_KILL_STATE_DELAY+1] = {
data/dovecot-2.3.11.3+dfsg1/src/director/director.h:67:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char *user_kill_state_names[USER_KILL_STATE_DELAY+1];
data/dovecot-2.3.11.3+dfsg1/src/director/login-connection.c:59:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[4096];
data/dovecot-2.3.11.3+dfsg1/src/director/login-connection.c:162:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char secs_buf[MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/director/mail-host.c:56:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char md5[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/director/mail-host.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char num_str[MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-cmd.c:289:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(value_r, &param->value.v_ip, sizeof(struct ip_addr));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-cmd.c:522:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(param, &cctx->cmd->parameters[pargc], sizeof(struct doveadm_cmd_param));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dsync.c:244:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tab, static_tab, sizeof(static_tab));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dsync.c:1310:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *p, *dup, new_flags[6];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-dbox.c:199:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(argv[1], O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-dcrypt-key.c:99:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(filename, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-dcrypt-key.c:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[KEY_BUF_SIZE+1];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-index.c:52:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char guid[GUID_128_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-index.c:53:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char oid[GUID_128_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-index.c:200:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest, data, size);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-index.c:221:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, data, ext->hdr_size);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-index.c:609:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			    ((const char *)data)[size-1] == '\n')
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-log.c:124:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		printf("%02x", ((const unsigned char *)data)[i]);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-log.c:168:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			printf("%02x", ((const unsigned char *)data)[i]);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-log.c:551:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-mailboxlog.c:64:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(argv[1], O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-mailboxlog.c:87:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-thread.c:102:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(argv[1], O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-instance.c:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-instance.c:26:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-log.c:155:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(file->path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-master.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-master.c:26:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-oldstats.c:118:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *args[3] = {0};
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-oldstats.c:383:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char numstr[MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-sis.c:41:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd1 = open(path1, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-sis.c:47:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd2 = open(path2, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-sis.c:63:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf1[IO_BLOCK_SIZE], buf2[IO_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-sis.c:100:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char randbuf[8];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-zlib.c:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-zlib.c:28:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-zlib.c:52:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(argv[1], O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-zlib.c:93:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm.c:171:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *man_argv[3];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-brain-mailbox-tree.c:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sep[2];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-brain-mailbox-tree.c:328:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sep[2];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-brain-mails.c:11:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *dsync_box_state_names[DSYNC_BOX_STATE_DONE+1] = {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-brain-private.h:130:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char *dsync_box_state_names[DSYNC_BOX_STATE_DONE+1];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-ibc-stream.c:657:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sync_type[2];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-ibc-stream.c:1166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sep[2];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-ibc-stream.c:1266:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char decision[3];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-ibc-stream.c:1490:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[2];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-ibc-stream.c:1624:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[2];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mail.c:27:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char md5_result[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-state.c:117:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(state->mailbox_guid, data, GUID_128_SIZE);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-tree-private.h:8:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sep, sep_str[2], remote_sep, alt_char;
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-tree-sync.c:391:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[TEMP_MAX_NAME_LEN+1];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-tree-sync.c:952:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/test-dsync-mailbox-tree-sync.c:27:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sha[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/test-dsync-mailbox-tree-sync.c:30:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(guid_128_r, sha, I_MIN(GUID_128_SIZE, sizeof(sha)));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/test-dsync-mailbox-tree-sync.c:40:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(node->mailbox_guid, &counter, sizeof(counter));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/test-dsync-mailbox-tree-sync.c:119:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(node->mailbox_guid, newguid_counter,
data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/imap-client.c:491:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tab, stack_tab, sizeof(stack_tab));
data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/imap-client.c:564:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(statebuf, state->state, state->state_size);
data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-login-client.h:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[IMAP_ID_KEY_MAX_LEN+1];
data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-proxy.c:19:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *imap_proxy_sent_state_names[IMAP_PROXY_SENT_STATE_COUNT] = {
data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-proxy.c:23:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *imap_proxy_rcvd_state_names[IMAP_PROXY_RCVD_STATE_COUNT] = {
data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-getmetadata.c:546:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char *patterns[2];
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-client-hibernate.c:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-client-hibernate.c:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-client.c:46:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *client_command_state_names[CLIENT_COMMAND_STATE_DONE+1] = {
data/dovecot-2.3.11.3+dfsg1/src/indexer/master-connection.c:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char percentage_str[2+1+1];
data/dovecot-2.3.11.3+dfsg1/src/lib-charset/charset-iconv.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpbuf[8192], *ic_destbuf;
data/dovecot-2.3.11.3+dfsg1/src/lib-charset/test-charset.c:141:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nextbuf[5+CHARSET_MAX_PENDING_BUF_SIZE+1];
data/dovecot-2.3.11.3+dfsg1/src/lib-charset/test-charset.c:151:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(nextbuf, "+AOQ-", 5);
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/bench-compression.c:128:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[block_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/iostream-lz4.h:15:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char magic[IOSTREAM_LZ4_MAGIC_LEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/iostream-lz4.h:17:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char max_uncompressed_chunk_size[4];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/istream-zstd.c:120:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(PTR_OFFSET(stream->w_buffer,stream->pos),
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-bzlib.c:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char outbuf[CHUNK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-lz4.c:17:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char compressbuf[CHUNK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-lz4.c:21:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char outbuf[IOSTREAM_LZ4_CHUNK_PREFIX_LEN +
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-lz4.c:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(zstream->compressbuf + zstream->compressbuf_offset,
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-lzma.c:17:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char outbuf[CHUNK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-zlib.c:19:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char gz_header[10];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-zlib.c:20:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char outbuf[CHUNK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/ostream-zlib.c:59:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[sizeof(uint32_t)];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:234:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[IO_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:239:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char output_sha1[SHA1_RESULTLEN], input_sha1[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:247:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_TRUNC | O_CREAT | O_RDWR, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:339:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char input_buffer[64];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:390:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char in_buf[8192];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:551:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[IO_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:766:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char output_sha1[SHA1_RESULTLEN], input_sha1[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:777:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd_in = open(in_path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:780:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd_out = open(out_path, O_TRUNC | O_CREAT | O_RDWR, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:305:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->key, key, I_MIN(key_len,
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:317:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->iv, iv, I_MIN(iv_len,
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:373:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->aad, aad, aad_len);
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:397:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->tag, tag, tag_len);
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:599:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->key, key, ctx->klen);
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:661:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[HMAC_MAX_MD_CBLOCK];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:754:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[len];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:865:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char R_buf[len];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:894:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buffer[result_len];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:1009:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[SHA256_DIGEST_LENGTH];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:1139:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char digest[SHA256_DIGEST_LENGTH];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:2126:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char keybuf[keylen];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:2193:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char salt[8];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:2278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char objtxt[OID_TEXT_MAX_LEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:2500:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[27]; /* begin public key */
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:2930:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[outl];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:2960:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[outl];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:3044:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[SHA256_DIGEST_LENGTH];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:3068:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[SHA256_DIGEST_LENGTH];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:3095:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[EVP_MD_size(md)], *ptr;
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:3724:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char objtxt[OID_TEXT_MAX_LEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/istream-decrypt.c:108:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&len, data, 2);
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/istream-decrypt.c:202:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hctx[hash->context_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/istream-decrypt.c:203:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hres[hash->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/istream-decrypt.c:333:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char dgst[32];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/istream-decrypt.c:534:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hctx[hash->context_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/istream-decrypt.c:535:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hres[hash->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/istream-decrypt.c:641:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stream->iv, ptr, dcrypt_ctx_sym_get_iv_length(stream->ctx_sym));
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/istream-decrypt.c:918:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char dgst[dcrypt_ctx_hmac_get_digest_length(dstream->ctx_mac)];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/ostream-encrypt.c:147:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char seed[IO_STREAM_ENCRYPT_SEED_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/ostream-encrypt.c:148:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char pkhash[hash->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/ostream-encrypt.c:149:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ekhash[hash->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/ostream-encrypt.c:150:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hres[hash->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/ostream-encrypt.c:152:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hctx[hash->context_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/ostream-encrypt.c:424:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hctx[hash->context_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/ostream-encrypt.c:425:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hres[hash->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/ostream-encrypt.c:502:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ciphertext[IO_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-stream.c:64:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash_ctx[hash->context_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-stream.c:65:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash_dgst[hash->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-stream.c:101:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash_ctx[hash->context_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-stream.c:102:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash_dgst[hash->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-stream.c:140:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash_ctx[hash->context_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-stream.c:141:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash_dgst[hash->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-stream.c:200:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char payload[IO_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-stream.c:253:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char payload[1];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-stream.c:348:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char payload[IO_BLOCK_SIZE*10];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-stream.c:413:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char payload[1];
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-stream.c:516:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[512];
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-cdb.c:51:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dict->fd = open(dict->path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-db.c:82:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ret = dict->db_env->open(dict->db_env, dir, DB_CREATE |
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-db.c:114:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((ret = dict->pdb->open(dict->pdb, dict->tid, uri, NULL,
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-db.c:129:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((ret = dict->sdb->open(dict->sdb, dict->tid, NULL, NULL,
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-ldap.c:431:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *attributes[2] = {0, 0};
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-file.c:153:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dict->fd = open(dict->path, open_type);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-file.c:347:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(old_value, tmp, new_len + 1);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-file.c:479:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		dict->fd = open(dict->path, O_CREAT | O_RDWR, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-file.c:483:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			dict->fd = open(dict->path, O_CREAT | O_RDWR, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-memcached.c:89:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&body_len, data+8, 4); body_len = ntohl(body_len);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-memcached.c:96:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&key_len, data+2, 2); key_len = ntohs(key_len);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-memcached.c:99:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&status, data+6, 2); status = ntohs(status);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict.c:309:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *paths[2];
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/test-dict-client.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[1000], value[100];
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-api.c:686:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, data, ret);
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-api.c:952:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(file->write_digest, digest, method->digest_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-posix.c:300:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file->fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-posix.c:306:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file->fd = open(path, O_RDWR | O_APPEND);
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-randomfail.c:15:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *fs_op_names[FS_OP_COUNT] = {
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/test-fs-posix.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10];
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-tokenizer-generic.c:18:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char fts_ascii_word_breaks[128] = {
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-filter.c:587:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[250] = {0};
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-filter.c:590:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sha512_digest[SHA512_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-filter.c:607:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	input = fopen(udhr_path, "r");
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-tokenizer.c:453:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		fts_tokenizer_delete_trailing_partial_char((const unsigned char *)tests[i].str, &size);
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-tokenizer.c:482:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char addr[10] = { 0 };
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-tokenizer.c:523:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *settings[9] = { "algorithm", "tr29", "wb5a", "yes" };
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-client-host.c:114:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hshared->ips, result->ips, sizeof(*hshared->ips) * hshared->ips_count);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-client-host.c:169:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hshared->ips, ips, ips_count * sizeof(*ips));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-client-request.c:579:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(payload_data, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-header.c:37:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(value, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-parser.c:50:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char _http_char_lookup[256] = {
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-parser.h:15:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char _http_char_lookup[256];
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server-response.c:222:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(payload_data, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-transfer-chunked.c:434:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&stream->w_buffer[stream->pos], data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-transfer-chunked.c:710:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&iov_new[1], iov, sizeof(struct const_iovec) * iov_count_new);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-payload.c:171:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/imapc-connection.c:1849:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(conn->ips, result->ips, sizeof(*conn->ips) * conn->ips_count);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/imapc-connection.c:1910:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(conn->ips, ips, ips_count * sizeof(*ips));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth-backend.c:17:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					   unsigned char mailbox_key_r[IMAP_URLAUTH_KEY_LEN],
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth-backend.c:55:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					   unsigned char mailbox_key_r[IMAP_URLAUTH_KEY_LEN],
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth-backend.c:106:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					 unsigned char mailbox_key_r[IMAP_URLAUTH_KEY_LEN],
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth-backend.h:9:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					 unsigned char mailbox_key_r[IMAP_URLAUTH_KEY_LEN],
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth.c:83:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char *
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth.c:84:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
imap_urlauth_internal_generate(const char *rumpurl,
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth.c:85:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			       const unsigned char mailbox_key[IMAP_URLAUTH_KEY_LEN],
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth.c:103:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
imap_urlauth_internal_verify(const char *rumpurl,
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth.c:104:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			     const unsigned char mailbox_key[IMAP_URLAUTH_KEY_LEN],
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth.c:254:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mailbox_key[IMAP_URLAUTH_KEY_LEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth.c:383:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mailbox_key[IMAP_URLAUTH_KEY_LEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-date.c:161:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void imap_to_date_tm(char buf[11], const struct tm *tm)
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-date.c:169:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf+3, month_names[tm->tm_mon], 3);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-match.c:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char patterns_data[FLEXIBLE_ARRAY_MEMBER];
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-match.c:41:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *patterns[2];
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-match.c:147:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(glob->patterns_data + pos,
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-parser.c:234:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ret, data, len);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-utf7.c:12:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char imap_b64dec[256] = {
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-utf7.c:137:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int utf16buf_to_utf8(string_t *dest, const unsigned char output[4],
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-utf7.c:191:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char input[4], output[4];
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-utf7.c:85:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char mb64[64]="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+,";
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-utf7.c:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char csrc[1+4+1+1];
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-utf7.c:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char csrc[1+1];
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-utf7.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char csrc[1+3+1+1];
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache-lookup.c:493:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data_dup, CONST_PTR_OFFSET(field->data, pos), data_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache-private.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[fields_count][];
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache-purge.c:129:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cache->field_file_map, ctx->field_file_map,
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-map-read.c:20:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&map->hdr, hdr, hdr->base_header_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-map-read.c:136:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char read_buf[IO_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-strmap.c:261:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	strmap->fd = open(strmap->path, O_RDWR);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-strmap.c:481:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(crc32_r, ctx->data, sizeof(*crc32_r));
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-strmap.c:700:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hash_rec, &ctx->rec, sizeof(*hash_rec));
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-strmap.c:879:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hash_rec, &recs[i], sizeof(*hash_rec));
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-ext.c:663:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(old_data, u + 1, ctx->cur_ext_record_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-keywords.c:81:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ext_intro_data[sizeof(*u) +
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-update.c:407:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dest, rec, sizeof(*rec));
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-update.c:501:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(PTR_OFFSET(&map->hdr, u->offset),
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-update.c:504:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(PTR_OFFSET(&map->hdr, u->offset),
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-update.c:1064:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(map->rec_map->mmap_base, map->hdr_copy_buf->data,
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync.c:80:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *keyword_names[2];
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-finish.c:250:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(new_range, range, array->arr.element_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-private.h:61:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char pre_hdr_change[sizeof(struct mail_index_header)];
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-private.h:62:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char pre_hdr_mask[sizeof(struct mail_index_header)];
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-private.h:63:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char post_hdr_change[sizeof(struct mail_index_header)];
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-private.h:64:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char post_hdr_mask[sizeof(struct mail_index_header)];
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-update.c:723:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t->pre_hdr_change + offset, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-update.c:728:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t->post_hdr_change + offset, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-update.c:755:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(array_append_space(array), old_record,
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-update.c:1009:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hdr->data + offset, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-view.c:123:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(trec, rec, map->hdr.record_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-util.c:126:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(old_record, PTR_OFFSET(p, sizeof(seq)),
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-util.c:129:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(PTR_OFFSET(p, sizeof(seq)), record, record_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-util.c:134:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, &seq, sizeof(seq));
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-util.c:135:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(PTR_OFFSET(p, sizeof(seq)), record, record_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index.c:246:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(index->ext_hdr_init_data, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index.c:509:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		index->fd = open(index->filepath, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index.c:558:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDWR|O_CREAT|O_EXCL, index->mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index.c:566:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_RDWR|O_CREAT|O_EXCL, index->mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-transaction-log-append.c:124:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char update_data[sizeof(*u) + sizeof(offset)];
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mailbox-log.c:98:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	log->fd = open(log->filepath, O_RDWR | O_APPEND);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mailbox-log.c:104:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	log->fd = open(log->filepath, O_RDWR | O_APPEND | O_CREAT, 0666);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mailbox-log.c:214:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	iter->fd = open(iter->filepath, O_RDONLY | O_APPEND);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache-purge.c:931:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[30];
data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache-purge.c:985:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[30];
data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache.c:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char headers[8];
data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-index-transaction-update.c:648:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t->post_hdr_change, &hdr, sizeof(hdr));
data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-transaction-log-append.c:128:7:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
	fd = mkstemp(tmp_path);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-transaction-log-file.c:223:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char tempbuf[1024] = { 0 };
data/dovecot-2.3.11.3+dfsg1/src/lib-lda/mail-send.c:45:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tab, stack_tab, sizeof(stack_tab));
data/dovecot-2.3.11.3+dfsg1/src/lib-lua/dlua-script.c:198:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char scripthash[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-attachment-extractor.c:68:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(i_stream_alloc(&astream->istream, size), data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-binary-converter.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char base64_delayed[BASE64_BLOCK_INPUT_SIZE-1];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-binary-converter.c:78:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(i_stream_alloc(&bstream->istream, size), data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-binary-converter.c:90:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char base64_block[BASE64_BLOCK_INPUT_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-binary-converter.c:99:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(base64_block, bstream->base64_delayed,
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-binary-converter.c:107:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(base64_block + base64_block_len,
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-binary-converter.c:115:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(i_stream_alloc(stream, 2), "\r\n", 2);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-binary-converter.c:130:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(i_stream_alloc(stream, 2), "\r\n", 2);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-binary-converter.c:159:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bstream->base64_delayed, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-dot.c:10:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pending[3]; /* max. \r\n */
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-nonuls.c:49:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stream->w_buffer+stream->pos, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/istream-nonuls.c:52:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stream->w_buffer+stream->pos, data, i);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/mail-html2text.c:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char entity[10];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/mail-html2text.c:163:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(entity, data, i); entity[i] = '\0';
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/mail-user-hash.c:12:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char md5[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-address.c:27:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr, &ctx->addr, sizeof(ctx->addr));
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-decoder.c:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char translation_buf[CHARSET_MAX_PENDING_BUF_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-decoder.c:203:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char trans_buf[CHARSET_MAX_PENDING_BUF_SIZE+1];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-decoder.c:210:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(trans_buf, ctx->translation_buf, ctx->translation_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-decoder.c:214:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(trans_buf + ctx->translation_size, *data, data_wanted);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-decoder.c:223:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->translation_buf, trans_buf, orig_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-decoder.c:327:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ctx->translation_buf, data + pos,
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-header-parser.c:422:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dest, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-part-serialize.c:115:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, ctx->data, buffer_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-search.c:85:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const unsigned char crlf[2] = { '\r', '\n' };
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/qp-decoder.c:206:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char data[3];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/quoted-printable.c:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hexbuf[3];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/rfc822-parser.c:34:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char rfc822_atext_chars[256] = {
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/rfc822-parser.h:21:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern unsigned char rfc822_atext_chars[256];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-attachment.c:253:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash_file[SHA1_RESULTLEN], hash_attached[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-binary-converter.c:162:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash_file[SHA1_RESULTLEN], hash_converter[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-mail-html2text.c:98:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char s[2];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-mbox-from.c:64:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		ret = mbox_from_parse((const unsigned char *)input[i],
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-address.c:379:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			(const unsigned char *)inputs[i];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-decode.c:46:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		message_header_decode_utf8((const unsigned char *)data[i],
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-decode.c:66:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-encode.c:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bufdata[1000];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-encode.c:210:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char nuls[10] = { 0, };
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-hash.c:54:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char md5_input[MD5_RESULTLEN], md5_output[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-hash.c:64:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					 (const unsigned char *)tests[i].input,
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-hash.c:91:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				(const unsigned char *)tests[i].input + j;
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-auth.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof(struct master_auth_reply)];
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-instance.c:110:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(list->path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-login.c:148:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			       unsigned char data[MASTER_AUTH_MAX_DATA_SIZE],
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-login.c:289:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-login.c:464:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[MASTER_AUTH_MAX_DATA_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-login.c:496:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(client->data, data+i, req.data_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-login.h:21:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[FLEXIBLE_ARRAY_MEMBER];
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-haproxy.c:51:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char haproxy_v2sig[12] =
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-haproxy.c:282:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char rbuf[1500];
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-haproxy.c:285:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char v1_data[HAPROXY_V1_MAX_HEADER_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-haproxy.c:425:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&local_ip.u.ip6.s6_addr, data->addr.ip6.dst_addr, 16);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-haproxy.c:428:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&remote_ip.u.ip6.s6_addr, data->addr.ip6.src_addr, 16);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-settings.c:341:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(conf_argv+i, service->argv + 1,
data/dovecot-2.3.11.3+dfsg1/src/lib-master/test-event-stats.c:175:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if ((fd=open(stats_data_file, O_WRONLY | O_CREAT | O_APPEND, 0600)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-master/test-event-stats.c:213:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(signal_file, O_CREAT, 0666)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:36:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void lm_hash(const char *passwd, unsigned char hash[LM_HASH_SIZE])
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:36:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void lm_hash(const char *passwd, unsigned char hash[LM_HASH_SIZE])
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:38:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const unsigned char lm_magic[8] = "KGS!@#$%";
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:39:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buffer[14];
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:54:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ntlm_v1_hash(const char *passwd, unsigned char hash[NTLMSSP_HASH_SIZE])
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:54:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ntlm_v1_hash(const char *passwd, unsigned char hash[NTLMSSP_HASH_SIZE])
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:74:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ntlm_v2_hash(const char *user, const char *target,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:74:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ntlm_v2_hash(const char *user, const char *target,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:75:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     const unsigned char *hash_v1,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:76:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     unsigned char hash[NTLMSSP_V2_HASH_SIZE])
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:88:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ntlmssp_v1_response(const unsigned char *hash,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:89:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    const unsigned char *challenge,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:90:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char response[NTLMSSP_RESPONSE_SIZE])
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:92:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char des_hash[NTLMSSP_DES_KEY_LENGTH * 3];
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:94:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(des_hash, hash, NTLMSSP_HASH_SIZE);
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:106:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ntlmssp2_response(const unsigned char *hash,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:107:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  const unsigned char *server_challenge,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:108:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  const unsigned char *client_challenge,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:109:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  unsigned char response[NTLMSSP_RESPONSE_SIZE])
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:112:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char session_hash[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:123:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ntlmssp_v2_response(const char *user, const char *target,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:123:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ntlmssp_v2_response(const char *user, const char *target,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:124:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    const unsigned char *hash_v1,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:125:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    const unsigned char *challenge,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:126:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    const unsigned char *blob, size_t blob_size,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:127:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char response[NTLMSSP_V2_RESPONSE_SIZE])
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:130:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[NTLMSSP_V2_HASH_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:4:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void lm_hash(const char *passwd, unsigned char hash[LM_HASH_SIZE]);
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:4:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void lm_hash(const char *passwd, unsigned char hash[LM_HASH_SIZE]);
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:5:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ntlm_v1_hash(const char *passwd, unsigned char hash[NTLMSSP_HASH_SIZE]);
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:5:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ntlm_v1_hash(const char *passwd, unsigned char hash[NTLMSSP_HASH_SIZE]);
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:7:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ntlmssp_v1_response(const unsigned char *hash,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:8:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			 const unsigned char *challenge,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:9:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			 unsigned char response[NTLMSSP_RESPONSE_SIZE]);
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:11:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ntlmssp2_response( const unsigned char *hash,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:12:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			const unsigned char *server_challenge,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:13:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			const unsigned char *client_challenge,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:14:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char response[NTLMSSP_RESPONSE_SIZE]);
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:16:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ntlmssp_v2_response(const char *user, const char *target,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:16:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ntlmssp_v2_response(const char *user, const char *target,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:17:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			 const unsigned char *hash_v1,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:18:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			 const unsigned char *challenge,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:19:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			 const unsigned char *blob, size_t blob_size,
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.h:20:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			 unsigned char response[NTLMSSP_V2_RESPONSE_SIZE])
data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2-jwt.c:104:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[method->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/test-oauth2-jwt.c:329:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char *key_values[20];
data/dovecot-2.3.11.3+dfsg1/src/lib-old-stats/stats-connection.c:29:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	conn->fd = open(conn->path, O_WRONLY | O_NONBLOCK);
data/dovecot-2.3.11.3+dfsg1/src/lib-old-stats/stats.c:92:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest, src, stats_total_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-old-stats/stats.c:195:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, old_stats, stats_total_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp-dictionary.c:48:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char word[4];
data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp-parity.c:12:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char parity_table[256] = {
data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp-parity.h:4:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char parity_table[256];
data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp.h:13:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[OTP_HASH_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp.h:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char seed[OTP_MAX_SEED_LEN + 1];
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:162:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(link->set_struct, info->defaults, info->struct_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:1057:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:1725:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_defines, array_front(&defines),
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:1731:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(parent_defaults, parent->defaults, parent->struct_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:1734:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(PTR_OFFSET(parent_defaults, offset),
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:1759:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(parent->dynamic_parsers, array_front(&dynamic_parsers),
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:1785:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_defs, parent->defines, sizeof(*new_defs) * count);
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings.c:110:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(path, O_RDONLY)) == -1) {
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings.c:183:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-address.c:815:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(localpart, src->localpart, lpsize);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-address.c:819:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(domain, src->domain, dsize);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-address.c:823:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(raw, src->raw, rsize);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client-connection.c:1582:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(conn->ips, result->ips, sizeof(*conn->ips) * conn->ips_count);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client-connection.c:1638:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(conn->ips, ips, ips_count * sizeof(*ips));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-payload.c:135:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-submit.c:1335:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if ((fd=open(ctx->file_path, O_WRONLY | O_CREAT, 0600)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-cassandra.c:48:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *counter_names[CASSANDRA_COUNTER_COUNT] = {
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-cassandra.c:69:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *cassandra_query_type_names[CASSANDRA_QUERY_TYPE_COUNT] = {
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-cassandra.c:804:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(str_c(path), O_WRONLY | O_CREAT | O_TRUNC | O_NONBLOCK, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-cassandra.c:1508:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(output_dup, output, output_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-sqlite.c:127:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest, string, p - string);
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-test.c:294:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(res->result, result, sizeof(*result));
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl.c:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char certname[1024];
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl.c:393:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buffer[IO_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl.c:876:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/istream-openssl.c:36:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buffer[IO_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/istream-openssl.c:89:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(i_stream_alloc(stream, ret), buffer, ret);
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/test-iostream-ssl.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[amt];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/cydir/cydir-mail.c:108:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/cydir/cydir-save.c:91:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ctx->fd = open(path, O_WRONLY | O_CREAT | O_EXCL, 0660);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file.c:179:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	while ((file->fd = open(path, flags)) == -1) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file.h:82:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char magic_pre[2];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file.h:85:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char oldv1_uid_hex[8];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file.h:87:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char message_size_hex[16];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file.h:93:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char magic_post[sizeof(DBOX_MAGIC_POST)-1];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-file.c:312:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDWR | O_CREAT | O_TRUNC, 0666);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-file.c:327:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_RDWR | O_CREAT | O_TRUNC, 0666);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-map.c:263:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hdr_r, data, I_MIN(data_size, sizeof(*hdr_r)));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-purge.c:86:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(meta_hdr_r, data, sizeof(*meta_hdr_r));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-storage-rebuild.c:495:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hdr_r, data, I_MIN(data_size, sizeof(*hdr_r)));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-storage.c:227:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hdr, data, I_MIN(data_size, sizeof(*hdr)));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-storage.c:418:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(guid_r, hdr.mailbox_guid, GUID_128_SIZE);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-file.c:251:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDWR | O_CREAT | O_TRUNC, 0666);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-file.c:266:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_RDWR | O_CREAT | O_TRUNC, 0666);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-storage.c:169:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hdr, data, I_MIN(data_size, sizeof(*hdr)));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-mail.c:266:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *header_names[2];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-mail.c:495:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sha1_output[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail-headers.c:635:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *headers[2], *value;
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail-headers.c:731:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_str, str, i);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-storage.c:71:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ibox->cache_fields, global_cache_fields,
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sync-changes.c:82:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(expunged_guid_128_r, syncs[i].guid_128,
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sync-changes.c:109:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(expunged_guid_128_r, sync_rec->guid_128,
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-keywords.c:147:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(mk->path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-save.c:349:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(str_c(path),
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-storage.c:409:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_WRONLY | O_CREAT, perm->file_create_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-storage.c:485:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_CREAT | O_WRONLY, perm->file_create_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c:435:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rec->extensions, buf->data, buf->used);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c:1104:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mailbox_guid, uidlist->mailbox_guid, GUID_128_SIZE);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c:1170:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rec->extensions, buf->data, buf->used);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c:1411:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(temp_path, O_RDWR | O_CREAT | O_TRUNC, 0777);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c:1746:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ret, extensions, len);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-util.c:215:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *dirs[N_ELEMENTS(subdirs) + 2];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-file.c:28:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(mailbox_get_path(&mbox->box),
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-file.c:32:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(mailbox_get_path(&mbox->box), O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-lock.c:154:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(storage->read_locks, read_locks,
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-lock.c:159:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(storage->write_locks, write_locks,
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-lock.c:258:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	orig_dir_fd = open(".", O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-md5-all.c:29:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char result[STATIC_ARRAY 16])
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-md5-apop3d.c:109:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				   unsigned char result[STATIC_ARRAY 16])
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-md5.h:11:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       unsigned char result[STATIC_ARRAY 16]);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-save.c:247:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char space[MBOX_HEADER_PADDING+1 +
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-save.c:346:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char md5_result[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-save.c:622:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char hdr_md5_sum[16];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-storage.c:542:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(inbox_path, O_RDWR | O_CREAT | O_EXCL, 0660);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-storage.c:546:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(inbox_path, O_RDWR | O_CREAT | O_EXCL, 0660);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-storage.c:665:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(guid_r, mbox2->mbox_hdr.mailbox_guid, GUID_128_SIZE);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-storage.c:669:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(guid_r, mbox->mbox_hdr.mailbox_guid, GUID_128_SIZE);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-sync-private.h:84:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hdr_md5_sum[16];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-sync-rewrite.c:73:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char space[1024];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-sync.c:518:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[10];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-sync.c:1287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char block[IO_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/raw/raw-storage.c:161:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-delete.c:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char randbuf[8];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-backend.c:523:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (ibox->module_ctx.super.open(box) < 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-backend.c:570:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newname, name_hdr, name_hdr_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-status.c:86:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(mailbox_guid, rec->guid, GUID_128_SIZE);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-status.c:123:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(vsize_r, data, sizeof(*vsize_r));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-status.c:247:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(first_saved_r, data, sizeof(*first_saved_r));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-sync.c:27:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(guid_r, metadata.guid, GUID_128_SIZE);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-sync.c:296:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *patterns[2];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-sync.h:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sep[2];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index.c:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sep[2];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index.c:805:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (ibox->module_ctx.super.open(box) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index.c:918:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&counter, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-iter.c:53:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *patterns[2];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/subscription-file.c:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char separators[2];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-duplicate.c:136:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(new_id, data, hdr.id_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-duplicate.c:166:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(file->path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-duplicate.c:274:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_id, id, id_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search.c:41:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(uids, array_front(&arg->value.seqset), sizeof(*uids) * count);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search.c:122:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *keywords[2];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-private.h:216:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int (*open)(struct mailbox *box);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:439:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tab, stack_tab, sizeof(stack_tab));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:985:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->set_roots + 1, set_roots,
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c:1126:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ret = box->v.open(box);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c:1457:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ret = box->v.open(box);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c:2896:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, flags, perm->file_create_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c:3160:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char box_name_sha1[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-user.c:320:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tab, stack_tab, sizeof(stack_tab));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail.c:467:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sha1_sum[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-header.c:30:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sorted_headers, headers, count * sizeof(*sorted_headers));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:705:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[3];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:793:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ret, list->ns->prefix, prefix_len);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:1774:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sha[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:1777:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(guid_128_r, sha, I_MIN(GUID_128_SIZE, sizeof(sha)));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:2092:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char ns_prefix_hash[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[8+1];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.c:47:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDWR | O_CREAT, 0666);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.c:170:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(tmp, O_RDWR | O_CREAT | O_EXCL, 0444);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.c:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[8+1];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.c:205:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDWR);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/test-mail-storage.c:225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path_buf[4096];
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/test-mail-storage.c:226:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char rand[4];
data/dovecot-2.3.11.3+dfsg1/src/lib-test/test-istream.c:66:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stream->w_buffer, old_w_buffer,
data/dovecot-2.3.11.3+dfsg1/src/lib-test/test-istream.c:80:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stream->w_buffer + new_skip_diff,
data/dovecot-2.3.11.3+dfsg1/src/lib/array.c:122:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp, PTR_OFFSET(data, i * element_size), element_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/array.c:123:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(PTR_OFFSET(data, i * element_size),
data/dovecot-2.3.11.3+dfsg1/src/lib/array.c:126:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(PTR_OFFSET(data, (count-1) * element_size), tmp,
data/dovecot-2.3.11.3+dfsg1/src/lib/askpass.c:25:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open("/dev/tty", O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/backtrace-string.c:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char proc_name[256];
data/dovecot-2.3.11.3+dfsg1/src/lib/base32.c:13:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char b32dec[256] = {
data/dovecot-2.3.11.3+dfsg1/src/lib/base32.c:49:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char b32hexdec[256] = {
data/dovecot-2.3.11.3+dfsg1/src/lib/base32.c:90:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char tmp[8], endb;
data/dovecot-2.3.11.3+dfsg1/src/lib/base32.c:186:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char output[5], ipos, opos;
data/dovecot-2.3.11.3+dfsg1/src/lib/base64.c:171:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, enc->w_buf, res_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/base64.c:176:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, enc->w_buf, enc->w_buf_len);
data/dovecot-2.3.11.3+dfsg1/src/lib/base64.c:285:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, enc->w_buf, res_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/base64.c:290:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, enc->w_buf, enc->w_buf_len);
data/dovecot-2.3.11.3+dfsg1/src/lib/base64.c:466:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, enc->w_buf, line_avail);
data/dovecot-2.3.11.3+dfsg1/src/lib/base64.c:487:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, &enc->w_buf[w_buf_pos], write);
data/dovecot-2.3.11.3+dfsg1/src/lib/base64.h:16:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char encmap[64];
data/dovecot-2.3.11.3+dfsg1/src/lib/base64.h:17:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const unsigned char decmap[256];
data/dovecot-2.3.11.3+dfsg1/src/lib/base64.h:41:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char w_buf[10];
data/dovecot-2.3.11.3+dfsg1/src/lib/buffer.c:86:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_buf, buf->w_buffer, buf->alloc);
data/dovecot-2.3.11.3+dfsg1/src/lib/buffer.c:187:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf->w_buffer + pos, data, data_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/buffer.c:209:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf->w_buffer + pos, data, data_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/buffer.c:257:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf->w_buffer + pos, data, data_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/buffer.c:314:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dest->w_buffer + dest_pos,
data/dovecot-2.3.11.3+dfsg1/src/lib/compat.c:225:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(str, tmp, size-1);
data/dovecot-2.3.11.3+dfsg1/src/lib/compat.c:241:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(str, tmp, size-1);
data/dovecot-2.3.11.3+dfsg1/src/lib/data-stack.c:36:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[FLEXIBLE_ARRAY_MEMBER];
data/dovecot-2.3.11.3+dfsg1/src/lib/data-stack.c:55:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *marker[BLOCK_FRAME_COUNT];
data/dovecot-2.3.11.3+dfsg1/src/lib/data-stack.c:92:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[512];
data/dovecot-2.3.11.3+dfsg1/src/lib/data-stack.c:444:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ret, &size, sizeof(size));
data/dovecot-2.3.11.3+dfsg1/src/lib/data-stack.c:559:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_buffer, buffer, old_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/event-filter.c:479:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib/failures.c:25:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *failure_log_type_prefixes[LOG_TYPE_COUNT] = {
data/dovecot-2.3.11.3+dfsg1/src/lib/failures.c:34:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *failure_log_type_names[LOG_TYPE_COUNT] = {
data/dovecot-2.3.11.3+dfsg1/src/lib/failures.c:319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/dovecot-2.3.11.3+dfsg1/src/lib/failures.c:678:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		*fd = open(path, O_CREAT | O_APPEND | O_WRONLY, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib/fdatasync-path.c:15:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/fdpass.c:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMSG_SPACE(sizeof(int))];
data/dovecot-2.3.11.3+dfsg1/src/lib/fdpass.c:132:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(CMSG_DATA(cmsg), &send_fd, sizeof(send_fd));
data/dovecot-2.3.11.3+dfsg1/src/lib/fdpass.c:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CMSG_SPACE(sizeof(int))];
data/dovecot-2.3.11.3+dfsg1/src/lib/fdpass.c:191:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fd, CMSG_DATA(cmsg), sizeof(*fd));
data/dovecot-2.3.11.3+dfsg1/src/lib/file-cache.c:253:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(PTR_OFFSET(cache->mmap_base, offset), data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/file-copy.c:43:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd_in = open(srcpath, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/file-copy.c:58:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd_out = open(tmppath, O_WRONLY | O_CREAT | O_TRUNC, st.st_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib/file-create-locked.c:145:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_RDWR);
data/dovecot-2.3.11.3+dfsg1/src/lib/file-dotlock.c:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[512], *host;
data/dovecot-2.3.11.3+dfsg1/src/lib/file-dotlock.c:102:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(lock_path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/file-dotlock.c:403:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(lock_info->lock_path, O_RDWR | O_EXCL | O_CREAT, 0666);
data/dovecot-2.3.11.3+dfsg1/src/lib/file-lock.c:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node_buf[MAX_INT_STRLEN * 3 + 2];
data/dovecot-2.3.11.3+dfsg1/src/lib/file-lock.c:114:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/proc/locks", O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/file-set-size.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char block[IO_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib/guid.c:39:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void guid_128_host_hash_get(const char *host,
data/dovecot-2.3.11.3+dfsg1/src/lib/guid.c:40:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			    unsigned char hash_r[STATIC_ARRAY GUID_128_HOST_HASH_SIZE])
data/dovecot-2.3.11.3+dfsg1/src/lib/guid.c:42:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char full_hash[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib/guid.c:45:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hash_r, full_hash + sizeof(full_hash)-GUID_128_HOST_HASH_SIZE,
data/dovecot-2.3.11.3+dfsg1/src/lib/guid.c:93:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(guid_r + 8, guid_static, 8);
data/dovecot-2.3.11.3+dfsg1/src/lib/guid.h:31:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest, src, GUID_128_SIZE);
data/dovecot-2.3.11.3+dfsg1/src/lib/guid.h:49:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void guid_128_host_hash_get(const char *host,
data/dovecot-2.3.11.3+dfsg1/src/lib/guid.h:50:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			    unsigned char hash_r[STATIC_ARRAY GUID_128_HOST_HASH_SIZE]);
data/dovecot-2.3.11.3+dfsg1/src/lib/hash-method.c:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ctx[meth->context_size];
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac-cram-md5.c:13:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char context_digest[CRAM_MD5_CONTEXTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac-cram-md5.c:39:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			const unsigned char context_digest[CRAM_MD5_CONTEXTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac-cram-md5.h:9:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char context_digest[CRAM_MD5_CONTEXTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac-cram-md5.h:11:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const unsigned char context_digest[CRAM_MD5_CONTEXTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac.c:22:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char k_ipad[64];
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac.c:23:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char k_opad[64];
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac.c:24:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hashedkey[meth->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac.c:38:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(k_ipad, key, key_len);
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac.c:40:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(k_opad, k_ipad, 64);
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac.c:109:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char prk[method->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac.c:110:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char okm[method->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac.h:10:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctx[HMAC_MAX_CONTEXT_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac.h:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctxo[HMAC_MAX_CONTEXT_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib/hostpid.c:19:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char pid[MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib/hostpid.c:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[256];
data/dovecot-2.3.11.3+dfsg1/src/lib/imem.c:73:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ret, temp, len);
data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-notify-inotify.c:39:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char event_buf[INOTIFY_BUFLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-notify-kqueue.c:140:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-select.c:116:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ctx->tmp_read_fds, &ctx->read_fds, sizeof(fd_set));
data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-select.c:117:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ctx->tmp_write_fds, &ctx->write_fds, sizeof(fd_set));
data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-select.c:118:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ctx->tmp_except_fds, &ctx->except_fds, sizeof(fd_set));
data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-rawlog.c:27:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[MAX_INT_STRLEN + 1 + 6 + 1 + 3];
data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-rawlog.c:229:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	in_fd = open(in_path, O_CREAT | O_APPEND | O_WRONLY, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-rawlog.c:236:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	out_fd = open(out_path, O_CREAT | O_APPEND | O_WRONLY, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-rawlog.c:265:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_CREAT | O_APPEND | O_WRONLY, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib/iostream-temp.c:84:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[IO_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-chain.c:154:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(i_stream_alloc(&cstream->istream, data_size),
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-chain.c:265:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(i_stream_alloc(stream, new_bytes_count),
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-concat.c:103:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cstream->istream.w_buffer, data, data_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-concat.c:219:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stream->w_buffer + stream->pos,
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-crlf.c:82:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dest, src, copy_len);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-crlf.c:160:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stream->w_buffer + dest, data + i, max);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-data.c:54:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buffer, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-file.c:34:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	stream->fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-jsonstr.c:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char chbuf[5] = {0};
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-jsonstr.c:86:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(chbuf, src+1, 4);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-jsonstr.c:97:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(chbuf, src+7, 4);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-multiplex.c:136:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(stream->w_buffer + stream->pos + channel->pending_pos,
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-multiplex.c:142:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(stream->w_buffer + stream->pos, data, used);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-seekable.c:223:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stream->w_buffer + stream->pos, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-seekable.c:440:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sstream->input, input, sizeof(*input) * count);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-seekable.c:461:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(i_stream_alloc(&sstream->istream, size), data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream.c:253:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char prev_buf[4];
data/dovecot-2.3.11.3+dfsg1/src/lib/istream.c:262:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(prev_buf, prev_data + prev_skip, prev_pos - prev_skip);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream.c:264:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(prev_buf, prev_data + prev_skip, 2);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream.c:265:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(prev_buf+2, prev_data + prev_pos - 2, 2);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream.c:807:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(new_buffer, stream->w_buffer, old_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream.c:914:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stream->w_buffer + stream->pos, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/json-parser.c:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char chbuf[5] = {0};
data/dovecot-2.3.11.3+dfsg1/src/lib/json-parser.c:217:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(chbuf, parser->data, 4);
data/dovecot-2.3.11.3+dfsg1/src/lib/json-parser.c:249:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(chbuf, &parser->data[2], 4);
data/dovecot-2.3.11.3+dfsg1/src/lib/lib-signals.c:233:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/dovecot-2.3.11.3+dfsg1/src/lib/lib-signals.c:480:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errno_buf[MAX_INT_STRLEN], *errno_str;
data/dovecot-2.3.11.3+dfsg1/src/lib/lib-signals.c:485:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[prefix_len + errno_str_len + 1];
data/dovecot-2.3.11.3+dfsg1/src/lib/lib-signals.c:487:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, prefix, prefix_len);
data/dovecot-2.3.11.3+dfsg1/src/lib/lib-signals.c:488:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf + prefix_len, errno_str, errno_str_len);
data/dovecot-2.3.11.3+dfsg1/src/lib/lib.c:119:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dev_null_fd = open("/dev/null", O_WRONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/md4.c:193:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&ctx->buffer[used], data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/md4.c:197:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ctx->buffer[used], data, free);
data/dovecot-2.3.11.3+dfsg1/src/lib/md4.c:208:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->buffer, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/md4.c:211:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void md4_final(struct md4_context *ctx, unsigned char result[STATIC_ARRAY MD4_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/md4.c:264:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char result[STATIC_ARRAY MD4_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/md4.h:19:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buffer[64];
data/dovecot-2.3.11.3+dfsg1/src/lib/md4.h:26:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char result[STATIC_ARRAY MD4_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/md4.h:29:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char result[STATIC_ARRAY MD4_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/md5.c:207:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&ctx->buffer[used], data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/md5.c:211:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ctx->buffer[used], data, free);
data/dovecot-2.3.11.3+dfsg1/src/lib/md5.c:222:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->buffer, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/md5.c:226:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
md5_final(struct md5_context *ctx, unsigned char result[STATIC_ARRAY MD5_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/md5.c:279:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char result[STATIC_ARRAY MD5_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/md5.h:19:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buffer[64];
data/dovecot-2.3.11.3+dfsg1/src/lib/md5.h:26:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	       unsigned char result[STATIC_ARRAY MD5_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/md5.h:29:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char result[STATIC_ARRAY MD5_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/mempool-alloconly.c:404:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mem, &size, sizeof(size));
data/dovecot-2.3.11.3+dfsg1/src/lib/mempool-alloconly.c:463:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_mem, mem, old_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/mempool-datastack.c:174:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_mem, mem, old_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/mempool-unsafe-datastack.c:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_mem, mem, old_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/mkdir-parents.c:28:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/mmap-anon.c:40:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	zero_fd = open("/dev/zero", O_RDWR);
data/dovecot-2.3.11.3+dfsg1/src/lib/mmap-anon.c:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) new_base + old_size, p, block_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/mountpoint.c:171:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(iter->mtab, mtab, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/mountpoint.c:174:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	iter->f = fopen(MTAB_PATH, "r");
data/dovecot-2.3.11.3+dfsg1/src/lib/net.c:109:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&so->sin6.sin6_addr, &ip->u.ip6, sizeof(ip->u.ip6));
data/dovecot-2.3.11.3+dfsg1/src/lib/net.c:111:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&so->sin.sin_addr, &ip->u.ip4, sizeof(ip->u.ip4));
data/dovecot-2.3.11.3+dfsg1/src/lib/net.c:688:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hbuf[NI_MAXHOST];
data/dovecot-2.3.11.3+dfsg1/src/lib/net.c:849:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[110];
data/dovecot-2.3.11.3+dfsg1/src/lib/net.c:1049:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dest->u.ip6, &src->u.ip6.s6_addr[3*4], 4);
data/dovecot-2.3.11.3+dfsg1/src/lib/nfs-workarounds.c:76:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ctx->fd = open(path, ctx->flags);
data/dovecot-2.3.11.3+dfsg1/src/lib/nfs-workarounds.c:273:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/nfs-workarounds.c:333:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		cur_dir_fd = open(".", O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-file.c:561:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fstream->buffer + fstream->tail,
data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-file.c:665:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fstream->buffer + pos, data, copy_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-file.c:672:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fstream->buffer, data, copy_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-file.c:886:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(foutstream->buffer, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/ostream-file.c:1136:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(path, open_flags, mode)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/lib/path-util.c:207:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(npath_link + ret, npath_pos + 1, tlen);
data/dovecot-2.3.11.3+dfsg1/src/lib/path-util.c:210:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(npath_link + ret, segend, tlen);
data/dovecot-2.3.11.3+dfsg1/src/lib/pkcs5.c:23:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char dk[hash->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib/pkcs5.c:24:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ctx[hash->context_size];
data/dovecot-2.3.11.3+dfsg1/src/lib/pkcs5.c:53:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char dk[l * hash->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib/pkcs5.c:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char U_c[hash->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib/pkcs5.c:68:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(block, U_c, hash->digest_size);
data/dovecot-2.3.11.3+dfsg1/src/lib/printf-format-fix.c:27:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, fmt, len1);
data/dovecot-2.3.11.3+dfsg1/src/lib/printf-format-fix.c:28:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf + len1, errstr, len2);
data/dovecot-2.3.11.3+dfsg1/src/lib/printf-format-fix.c:29:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf + len1 + len2, p + 2, len3 + 1);
data/dovecot-2.3.11.3+dfsg1/src/lib/process-title.c:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(memblock, old_argv[i], len);
data/dovecot-2.3.11.3+dfsg1/src/lib/process-title.c:113:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(process_title, title, len);
data/dovecot-2.3.11.3+dfsg1/src/lib/randgen.c:66:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	urandom_fd = open(DEV_URANDOM_PATH, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/restrict-access.c:216:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gid_list2, gid_list, gid_count * sizeof(gid_t));
data/dovecot-2.3.11.3+dfsg1/src/lib/safe-mkdir.c:30:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(dir, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/safe-mkstemp.c:21:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char randbuf[8];
data/dovecot-2.3.11.3+dfsg1/src/lib/safe-mkstemp.c:41:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(str_c(prefix), O_RDWR | O_EXCL | O_CREAT, 0666);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha1.c:256:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		     unsigned char result[STATIC_ARRAY SHA1_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/sha1.h:80:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char result[STATIC_ARRAY SHA1_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.c:246:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ctx->block[ctx->len], data, rem_len);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.c:262:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->block, &shifted_message[block_nb << 6], rem_len);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.c:269:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		   unsigned char digest[STATIC_ARRAY SHA256_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.c:294:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       unsigned char digest[STATIC_ARRAY SHA256_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.c:372:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ctx->block[ctx->len], data, rem_len);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.c:388:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->block, &shifted_message[block_nb << 7], rem_len);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.c:395:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		   unsigned char digest[STATIC_ARRAY SHA512_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.c:420:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       unsigned char digest[STATIC_ARRAY SHA512_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.h:43:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char block[2 * SHA256_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.h:50:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char block[2 * SHA512_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.h:57:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		   unsigned char digest[STATIC_ARRAY SHA256_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.h:60:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       unsigned char digest[STATIC_ARRAY SHA256_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.h:65:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		   unsigned char digest[STATIC_ARRAY SHA512_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha2.h:68:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       unsigned char digest[STATIC_ARRAY SHA512_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha3.c:255:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		     unsigned char digest[STATIC_ARRAY SHA256_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/sha3.c:259:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(digest, ctx->sb, SHA256_RESULTLEN);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha3.c:264:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		     unsigned char digest[STATIC_ARRAY SHA512_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/sha3.c:268:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(digest, ctx->sb, SHA512_RESULTLEN);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha3.c:273:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			 unsigned char digest[STATIC_ARRAY SHA256_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/sha3.c:282:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			 unsigned char digest[STATIC_ARRAY SHA512_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/lib/sha3.h:60:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		   unsigned char digest[STATIC_ARRAY SHA256_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha3.h:62:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       unsigned char digest[STATIC_ARRAY SHA256_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha3.h:66:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		   unsigned char digest[STATIC_ARRAY SHA512_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/sha3.h:68:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       unsigned char digest[STATIC_ARRAY SHA512_RESULTLEN]);
data/dovecot-2.3.11.3+dfsg1/src/lib/str-find.c:92:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->key, key, key_len);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:53:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mem, str, len);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:62:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mem, data, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:84:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mem, start, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:97:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	while (len < max_chars && ((const char *) str)[len] != '\0')
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:101:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mem, str, len);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:169:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, tmp, size - 1);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:196:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(temp + i, str, len); i += len;
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:225:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ret, temp, len);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:777:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(str + pos, separator, sep_len);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:781:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str + pos, arr[i], len);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:846:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, arr[i], len);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:859:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *dec2str_buf(char buffer[STATIC_ARRAY MAX_INT_STRLEN], uintmax_t number)
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:859:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *dec2str_buf(char buffer[STATIC_ARRAY MAX_INT_STRLEN], uintmax_t number)
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.h:125:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *dec2str_buf(char buffer[STATIC_ARRAY MAX_INT_STRLEN], uintmax_t number);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.h:125:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *dec2str_buf(char buffer[STATIC_ARRAY MAX_INT_STRLEN], uintmax_t number);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-array.c:243:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *elemstrs[NELEMS+1];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-array.c:263:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[12];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-array.c:265:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, ostr, olen+1);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base32.c:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:1082:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char in_buf[512];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-buffer.c:11:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char *p, testdata[BUF_TEST_SIZE], shadowbuf[BUF_TEST_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-buffer.c:40:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(shadowbuf + pos, testdata, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-buffer.c:52:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(shadowbuf + shadowbuf_size,
data/dovecot-2.3.11.3+dfsg1/src/lib/test-buffer.c:68:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(shadowbuf + pos, testdata, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-buffer.c:117:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(shadowbuf + pos, testdata, size2);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-buffer.c:139:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(p, testdata, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-buffer.c:140:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(shadowbuf + pos, testdata, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-data-stack.c:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tag[2] = { depth+1, '\0' };
data/dovecot-2.3.11.3+dfsg1/src/lib/test-guid.c:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char guidbuf[GUID_128_SIZE*2 + 2];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-hash-method.c:333:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char context[method->context_size];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-hash-method.c:334:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char result[method->digest_size];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-hmac.c:118:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char res[SHA256_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-iostream-temp.c:84:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(".temp.istream", O_RDWR | O_CREAT | O_TRUNC, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-base64-decoder.c:132:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char in_buf[2048];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-crlf.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[100];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-failure-at.c:13:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char test_data[TEST_DATA_LENGTH];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-multiplex.c:149:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char packet_data[len];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-seekable.c:18:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(*path_r, O_RDWR | O_CREAT | O_TRUNC, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-sized.c:58:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const unsigned char test_data[10] = "1234567890";
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-unix.c:166:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((send_fd = open("/dev/null", O_RDONLY)) == -1)
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-unix.c:168:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((send_fd2 = open("/dev/zero", O_RDONLY)) == -1)
data/dovecot-2.3.11.3+dfsg1/src/lib/test-json-parser.c:194:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			    type == JSON_TYPE_NUMBER && atoi(value) == i);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-mempool.c:6:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char uint32max_array_t[4294967295];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-mempool.c:8:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char uint32max_array_t[65535];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-multiplex.c:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[128];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-buffer.c:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_BUFSIZE*4], randbuf[MAX_BUFSIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-buffer.c:28:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, randbuf, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-buffer.c:35:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf + offset, randbuf, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-failure-at.c:13:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char test_data[TEST_DATA_LENGTH];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-file.c:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_BUFSIZE*4], buf2[MAX_BUFSIZE*4], randbuf[MAX_BUFSIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-file.c:35:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, randbuf, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-file.c:42:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf + offset, randbuf, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-file.c:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-file.c:82:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(".temp.istream", O_RDWR | O_CREAT | O_TRUNC, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-file.c:90:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(".temp.ostream", O_RDWR | O_CREAT | O_TRUNC, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-file.c:120:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, "1234", 4);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-file.c:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-file.c:148:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(".temp.istream", O_RDWR | O_CREAT | O_TRUNC, 0600);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-multiplex.c:229:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-multiplex.c:299:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-multiplex.c:312:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-path-util.c:221:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[128+1];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-seq-range-array.c:159:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char shadowbuf[SEQ_RANGE_TEST_BUFSIZE];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strescape.c:52:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[1 << CHAR_BIT];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strfuncs.c:425:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_INT_STRLEN], buf2[MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strnum.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[50]; /* totally assumes < 159 bits */
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strnum.c:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[52]; /* totally assumes < 200 bits */
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strnum.c:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[69]; /* totally assumes < 200 bits */
data/dovecot-2.3.11.3+dfsg1/src/lib/unichar.c:13:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char utf8_replacement_char[UTF8_REPLACEMENT_CHAR_LEN] =
data/dovecot-2.3.11.3+dfsg1/src/lib/unichar.h:50:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char utf8_replacement_char[UTF8_REPLACEMENT_CHAR_LEN];
data/dovecot-2.3.11.3+dfsg1/src/lib/unlink-directory.c:74:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dir_fd = open(dir, O_RDONLY | O_NOFOLLOW);
data/dovecot-2.3.11.3+dfsg1/src/lib/unlink-directory.c:101:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dir_fd = open(dir, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/unlink-directory.c:247:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(".", O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/lib/uri-util.c:107:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned const char _uri_char_lookup[256] = {
data/dovecot-2.3.11.3+dfsg1/src/lib/uri-util.c:1188:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const unsigned char esc_table[256],
data/dovecot-2.3.11.3+dfsg1/src/lib/uri-util.h:225:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const unsigned char esc_table[256],
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand-if.c:37:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *ops[OP_COUNT] = {
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c:95:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char result[MD5_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c:121:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[16];
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c:469:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *(*modifier[MAX_MODIFIER_COUNT])
data/dovecot-2.3.11.3+dfsg1/src/log/log-error-buffer.c:13:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char prefix_text[FLEXIBLE_ARRAY_MEMBER];
data/dovecot-2.3.11.3+dfsg1/src/log/log-error-buffer.c:66:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data->prefix_text, error->prefix, prefix_size);
data/dovecot-2.3.11.3+dfsg1/src/log/log-error-buffer.c:67:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data->prefix_text + prefix_size, error->text, text_size);
data/dovecot-2.3.11.3+dfsg1/src/login-common/access-lookup.c:28:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[3];
data/dovecot-2.3.11.3+dfsg1/src/login-common/client-common-auth.c:232:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(alt, array_front(&alt_usernames),
data/dovecot-2.3.11.3+dfsg1/src/login-common/client-common.c:777:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tab, login_var_expand_empty_tab,
data/dovecot-2.3.11.3+dfsg1/src/login-common/login-proxy-state.c:115:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	state->notify_fd = open(state->notify_path, O_WRONLY);
data/dovecot-2.3.11.3+dfsg1/src/login-common/login-settings.c:127:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tab, stack_tab, sizeof(stack_tab));
data/dovecot-2.3.11.3+dfsg1/src/login-common/sasl-server.c:31:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char cookie[MASTER_AUTH_COOKIE_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/login-common/sasl-server.c:532:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char *args[2];
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:157:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_CREAT | O_TRUNC | O_WRONLY, 0600);
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:244:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:263:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:270:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:318:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_WRONLY|O_CREAT|O_TRUNC, 0644);
data/dovecot-2.3.11.3+dfsg1/src/master/service-anvil.c:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/master/service-listen.c:141:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(set->path, O_RDWR | O_NONBLOCK);
data/dovecot-2.3.11.3+dfsg1/src/master/service-log.c:16:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int service_log_fds_init(const char *log_prefix, int log_fd[2],
data/dovecot-2.3.11.3+dfsg1/src/master/service-process.c:465:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(LINUX_PROC_FS_SUID_DUMPABLE, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/master/service-process.c:472:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10];
data/dovecot-2.3.11.3+dfsg1/src/master/service-process.c:491:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(LINUX_PROC_SYS_KERNEL_CORE_PATTERN, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/master/service-process.c:498:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10];
data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-session.c:213:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *new_args[5];
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-api.c:113:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rights, buf, count * sizeof(const char *));
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-api.c:618:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char c2[2];
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-backend-vfile-acllist.c:118:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-cache.c:104:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mask->mask, bitmask->data, bitmask->used);
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-cache.c:127:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mask->mask, src->mask, src->size);
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-cache.c:321:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(obj_cache + 1, validity, cache->validity_rec_size);
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-cache.c:359:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mask->mask, obj_cache->my_rights->mask, mask->size);
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-cache.h:14:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mask[1];
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-mailbox-list.c:29:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *acl_storage_right_names[ACL_STORAGE_RIGHT_COUNT] = {
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-mailbox.c:575:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return abox->module_ctx.super.open(box);
data/dovecot-2.3.11.3+dfsg1/src/plugins/autocreate/autocreate-plugin.c:52:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)&ns->set->mailboxes.arr, &tmp_ns_set.mailboxes.arr,
data/dovecot-2.3.11.3+dfsg1/src/plugins/autocreate/autocreate-plugin.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char env_name[strlen(env_name_base) + MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/plugins/expire/doveadm-expire.c:174:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char set_name[6 + MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/plugins/expire/expire-plugin.c:385:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char set_name[6 + MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/Snowball.cc:116:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char utf8text[LUCENE_MAX_WORD_LEN*5+1];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/Snowball.cc:133:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  TCHAR tchartext[tchartext_size];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/Snowball.cc:142:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  TCHAR tchartext[tchartext_size];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/fts-backend-lucene.c:80:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(guid_r, metadata.guid, GUID_128_SIZE);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/fts-backend-lucene.c:88:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char guid_hex[MAILBOX_GUID_HEX_LENGTH];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/fts-backend-lucene.c:89:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wguid_hex[MAILBOX_GUID_HEX_LENGTH];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:67:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t mailbox_guid[MAILBOX_GUID_HEX_LENGTH + 1];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:252:12:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				 const wchar_t guid[MAILBOX_GUID_HEX_LENGTH])
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:254:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(index->mailbox_guid, guid,
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:295:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		index->reader = IndexReader::open(index->path);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:567:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t id[MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:608:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t wname[namesize];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:660:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src_chars[GUID_128_SIZE*2 + 1];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:741:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(guidp, guid, sizeof(*guidp));
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:927:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			     wchar_t wguid_hex[MAILBOX_GUID_HEX_LENGTH + 1])
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:930:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char guid_hex[MAILBOX_GUID_HEX_LENGTH];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:945:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wuid[MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:983:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wguid[MAILBOX_GUID_HEX_LENGTH + 1];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.h:27:12:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				 const wchar_t guid[MAILBOX_GUID_HEX_LENGTH]);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/fts-backend-solr.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char box_guid[MAILBOX_GUID_HEX_LENGTH+1];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-test.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *line, *str, buf[4096];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-test.c:65:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(argv[1], O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie-private.h:88:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char static_leaf_string[sizeof(void *)];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie-private.h:137:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char default_normalize_map[256];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.c:220:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	trie->fd = open(trie->path, O_RDWR);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.c:563:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dest, data, len);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.c:662:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str, node->children.static_leaf_string, leafstr_len);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.c:664:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str, node->children.leaf_string, leafstr_len);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.c:687:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(child->children.static_leaf_string,
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.c:691:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(child->children.leaf_string,
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.c:810:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(node->children.static_leaf_string,
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.c:814:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(node->children.leaf_string, data, len);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.c:1546:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDWR | O_CREAT | flags, trie->create_mode);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-uidlist.c:537:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	uidlist->fd = open(uidlist->path, O_RDWR);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-uidlist.c:755:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char null[sizeof(uint32_t)-1] = { 0, };
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/doveadm-dump-fts-expunge-log.c:81:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(argv[1], O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-api.c:428:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hdr_r, data, sizeof(*hdr_r));
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-expunge-log.c:94:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(log->path, O_RDWR | O_APPEND | (create ? O_CREAT : 0), 0600);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-parser-script.c:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char outbuf[IO_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-storage.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char score[30];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-storage.c:805:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char set_name[21 + MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-user.c:57:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *lang_config[3] = {NULL, NULL, NULL};
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/xml2text.c:12:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[IO_BLOCK_SIZE];
data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/test-mail-key.c:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path_buf[4096];
data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-log/mail-log-plugin.c:213:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *headers[4];
data/dovecot-2.3.11.3+dfsg1/src/plugins/old-stats/mail-stats-fill.c:49:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	proc_io_fd = open(PROC_IO_PATH, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/plugins/old-stats/mail-stats-fill.c:56:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			proc_io_fd = open(PROC_IO_PATH, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/plugins/old-stats/mail-stats-fill.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/plugins/old-stats/mail-stats.c:125:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stats, data, sizeof(*stats));
data/dovecot-2.3.11.3+dfsg1/src/plugins/pop3-migration/pop3-migration-plugin.c:28:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hdr_sha1[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/plugins/pop3-migration/pop3-migration-plugin.c:207:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char sha1_r[STATIC_ARRAY SHA1_RESULTLEN],
data/dovecot-2.3.11.3+dfsg1/src/plugins/pop3-migration/pop3-migration-plugin.c:261:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
get_hdr_sha1(struct mail *mail, unsigned char sha1_r[STATIC_ARRAY SHA1_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/plugins/pop3-migration/pop3-migration-plugin.c:325:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char sha1_r[STATIC_ARRAY SHA1_RESULTLEN])
data/dovecot-2.3.11.3+dfsg1/src/plugins/pop3-migration/pop3-migration-plugin.c:333:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sha1_r, cache_buf->data, cache_buf->used);
data/dovecot-2.3.11.3+dfsg1/src/plugins/pop3-migration/pop3-migration-plugin.h:10:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char sha1_r[STATIC_ARRAY SHA1_RESULTLEN],
data/dovecot-2.3.11.3+dfsg1/src/plugins/pop3-migration/test-pop3-migration-plugin.c:38:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-fs.c:239:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		mount->fd = open(mount->path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-maildir.c:572:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[5120+1];
data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-maildir.c:727:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_INT_STRLEN * 2 + 2];
data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota.c:305:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char root_name[5 + MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota.c:1043:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_args, args, sizeof(const char *) * count);
data/dovecot-2.3.11.3+dfsg1/src/plugins/replication/replication-plugin.c:59:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fifo_fd = open(fifo_path, O_WRONLY | O_NONBLOCK);
data/dovecot-2.3.11.3+dfsg1/src/plugins/replication/replication-plugin.c:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/plugins/trash/trash-plugin.c:294:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-config.c:481:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-sync.c:367:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *kw_names[2];
data/dovecot-2.3.11.3+dfsg1/src/plugins/welcome/welcome-plugin.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/plugins/welcome/welcome-plugin.c:109:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return wbox->module_ctx.super.open(box);
data/dovecot-2.3.11.3+dfsg1/src/plugins/zlib/zlib-plugin.c:272:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(box_path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/plugins/zlib/zlib-plugin.c:299:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return zbox->super.open(box);
data/dovecot-2.3.11.3+dfsg1/src/pop3-login/client.c:228:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buffer[16];
data/dovecot-2.3.11.3+dfsg1/src/pop3-login/client.c:229:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buffer_base64[MAX_BASE64_ENCODED_SIZE(sizeof(buffer)) + 1];
data/dovecot-2.3.11.3+dfsg1/src/pop3-login/pop3-proxy.c:16:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pop3_proxy_state_names[POP3_PROXY_STATE_COUNT] = {
data/dovecot-2.3.11.3+dfsg1/src/pop3/pop3-client.c:239:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *deleted_keywords[2];
data/dovecot-2.3.11.3+dfsg1/src/pop3/pop3-commands.c:598:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uid_str[MAX_INT_STRLEN] = { 0 };
data/dovecot-2.3.11.3+dfsg1/src/replication/aggregator/replicator-connection.c:240:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(conn->ips, ips, sizeof(*ips) * ips_count);
data/dovecot-2.3.11.3+dfsg1/src/replication/replicator/replicator-queue.c:383:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/dovecot-2.3.11.3+dfsg1/src/stats/stats-metrics.c:505:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sub_metric->group_value.hash, value.hash, SHA1_RESULTLEN);
data/dovecot-2.3.11.3+dfsg1/src/stats/stats-metrics.h:63:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[SHA1_RESULTLEN];
data/dovecot-2.3.11.3+dfsg1/src/stats/test-stats-metrics.c:137:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *values_first[DISCRETE_TEST_VAL_COUNT];
data/dovecot-2.3.11.3+dfsg1/src/stats/test-stats-metrics.c:138:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *values_second[DISCRETE_TEST_VAL_COUNT];
data/dovecot-2.3.11.3+dfsg1/src/submission-login/submission-proxy.c:20:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *submission_proxy_state_names[SUBMISSION_PROXY_STATE_COUNT] = {
data/dovecot-2.3.11.3+dfsg1/src/util/gdbhelper.c:51:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/util/gdbhelper.c:57:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd_log = open(path, O_CREAT | O_WRONLY, 0600);
data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c:156:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[OUTBUF_THRESHOLD];
data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c:177:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[OUTBUF_THRESHOLD];
data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c:249:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(fname, O_CREAT|O_EXCL|O_WRONLY, 0600);
data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c:260:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(fname, O_CREAT|O_EXCL|O_WRONLY, 0600);
data/dovecot-2.3.11.3+dfsg1/src/util/script-login.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/dovecot-2.3.11.3+dfsg1/src/util/script.c:250:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char response[2];
data/dovecot-2.3.11.3+dfsg1/src/util/tcpwrap.c:48:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[1024];
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-managesieve/managesieve-arg.c:162:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		str_append_escaped(dest, strval, strlen(strval));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-managesieve/managesieve-arg.c:171:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(strarg));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-managesieve/managesieve-parser.c:176:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			arg->str_len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-managesieve/managesieve-quote.c:31:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		value_len = strlen((const char *) value);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve-tool/sieve-tool.c:493:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     strlen(str), 1, 0);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/cmd-redirect.c:555:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (sieve_action_duplicate_check(senv, dupeid, strlen(dupeid))) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/cmd-redirect.c:584:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sieve_action_duplicate_mark(senv, dupeid, strlen(dupeid),
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/ext-envelope.c:487:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*unparsed_r = t_str_new_const(value, strlen(value));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/ext-envelope.c:517:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*str_r = t_str_new_const(addr_str, strlen(addr_str));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/date/ext-date-common.c:88:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(zone);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/date/ext-date-common.c:472:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read:1;
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/date/ext-date-common.c:508:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ( strlist->read ) return 0;
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/date/ext-date-common.c:537:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(date_string), &date_value, &original_zone) ) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/date/ext-date-common.c:580:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*str_r = t_str_new_const(part_value, strlen(part_value));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/duplicate/ext-duplicate-common.c:154:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md5_update(&md5ctx, id, strlen(id));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/duplicate/tst-duplicate.c:424:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			val_len = strlen(val);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/editheader/cmd-deleteheader.c:488:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						(mctx, value, strlen(value), vpattern_list)) < 0 )
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/editheader/ext-editheader-common.c:67:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(*headers, strlen(*headers)) ) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/environment/ext-environment-common.c:173:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		prefix_len = strlen(item->name);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mime/tag-mime.c:360:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t nlen = strlen(name);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mime/tag-mime.c:364:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t plen = strlen(*params);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/mime/tag-mime.c:380:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					return t_str_new_const(value, strlen(value));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/notify/cmd-denotify.c:356:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						(mctx, nact->id, strlen(nact->id), match_key)) < 0 )
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/subaddress/ext-subaddress.c:169:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		delim > (address->localpart + strlen(address->localpart)) )
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vacation/cmd-vacation.c:905:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					 strlen(header_val), 256, 0);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vacation/cmd-vacation.c:962:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(header), 256, 0);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vacation/cmd-vacation.c:1220:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md5_update(&ctx, rpath, strlen(rpath));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vacation/cmd-vacation.c:1222:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md5_update(&ctx, vctx->handle, strlen(vctx->handle));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/variables/ext-variables-name.c:19:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t plen = strlen(identifier);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vnd.dovecot/environment/ext-vnd-environment-variables.c:179:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*str_r = t_str_new_const(ext_value, strlen(ext_value));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/plugins/vnd.dovecot/report/ext-vnd-report-common.c:36:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(const unsigned char *)feedback_type, strlen(feedback_type), NULL);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-address-parts.c:307:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				*str_r = t_str_new_const(part, strlen(part));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-address-source.c:26:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	val_len = strlen(value);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-address.c:163:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*str_r = t_str_new_const(addr_str, strlen(addr_str));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-address.c:523:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((const unsigned char *)address, strlen(address), error_r);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-address.c:537:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((const unsigned char *)address, strlen(address), error_r);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-ast.c:541:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	newstr = str_new(node->ast->pool, strlen(str));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-ast.c:654:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	string_t *copied_str = str_new(list->ast->pool, strlen(str));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-ast.c:894:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strchr(str, '\n') != NULL && str[strlen(str)-1] == '\n' ) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-code.c:166:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					       (sieve_size_t)strlen(str));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-code.c:335:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!sieve_binary_read_unsigned(sblock, address, &strlen))
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-code.c:338:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen > ADDR_BYTES_LEFT(address))
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-code.c:342:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ADDR_JUMP(address, strlen);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-code.c:348:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*str_r = t_str_new_const(strdata, strlen);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-binary-file.c:514:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if ((ret = read(file->fd, indata, insize)) <= 0) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-code.c:440:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return intf->read(renv, oprnd, address, number_r);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-code.c:580:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return intf->read(renv, oprnd, address, str_r);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-code.c:787:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if ( (ret=intf->read(renv, oprnd, address, strlist_r)) <= 0 )
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-code.c:804:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if ( (ret=intf->read(renv, oprnd, address, NULL)) <= 0 )
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-code.c:808:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if ( (ret=intf->read(renv, oprnd, address, &stritem)) <= 0 )
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-code.h:139:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int (*read)
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-code.h:148:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int (*read)
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-code.h:157:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int (*read)
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-extensions.c:559:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strlen(name) > 128 )
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-message.c:482:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pend = raw + strlen(raw);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-message.c:881:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	type_len = ( subtype == NULL ? strlen(content_type) :
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-message.c:897:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(*wanted_types) == type_len &&
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-message.c:1324:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if ( strlen(str_c(hdr_content)) != str_len(hdr_content) ) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-script.c:33:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t namelen = strlen(scriptname);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/sieve-stringlist.c:106:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	string_t *str = t_str_new_const(cstr, strlen(cstr));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/dict/sieve-dict-script.c:140:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*stream_r = i_stream_create_from_data(dscript->data, strlen(dscript->data));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-script-sequence.c:80:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ( path[strlen(path)-1] == '/' )
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-script.c:398:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			} else 	if ( bpath[strlen(bpath)-1] == '/' ) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-storage-save.c:108:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
			mode_t old_mask = umask(0777 & ~(fstorage->file_create_mode));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-storage-save.c:111:4:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
			umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-storage-save.c:226:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     strlen(scriptname) == namelen &&
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-storage.c:39:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( path[strlen(path)-1] == '/' )
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/file/sieve-file-storage.c:125:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pathlen = strlen(link_path);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/storage/ldap/sieve-ldap-db.c:609:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			in->len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/edit-mail.c:440:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	out = t_str_new(i + strlen(value+i) + 10);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/edit-mail.c:540:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		enc_value = t_str_new(strlen(field_name) + strlen(value) + 64);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/edit-mail.c:540:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		enc_value = t_str_new(strlen(field_name) + strlen(value) + 64);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/edit-mail.c:541:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data = t_str_new(strlen(field_name) + strlen(value) + 128);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/edit-mail.c:541:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data = t_str_new(strlen(field_name) + strlen(value) + 128);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/edit-mail.c:1165:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for ( i = strlen(raw)-1; i >= 0; i-- ) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/rfc2822.c:132:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int line_len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/test-edit-mail.c:191:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	inputs[0] = i_stream_create_from_data(msg_part1, strlen(msg_part1));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/test-edit-mail.c:192:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	inputs[1] = i_stream_create_from_data(msg_part2, strlen(msg_part2));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/test-edit-mail.c:193:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	inputs[2] = i_stream_create_from_data(msg_part3, strlen(msg_part3));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/test-edit-mail.c:194:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	inputs[3] = i_stream_create_from_data(msg_part4, strlen(msg_part4));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/lib-sieve/util/test-edit-mail.c:705:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input_msg = i_stream_create_from_data(big_header, strlen(big_header));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/client.c:179:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(value) <= LOGIN_MAX_SESSION_ID_LEN) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-login-settings-plugin.c:171:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((ret = read(fd[0], buf + pos, sizeof(buf) - pos)) > 0)
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-proxy.c:39:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(client->proxy_password, 0, strlen(client->proxy_password));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-proxy.c:134:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(line, strlen(line));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-proxy.c:185:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (base64_decode(challenge, strlen(challenge), NULL, str) < 0) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-proxy.c:251:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(line, strlen(line));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-proxy.c:402:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			( strlen(line) == 2 || line[2] == ' ' ) ) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-proxy.c:455:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			( strlen(line) == 2 || line[2] == ' ' ) ) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve-login/managesieve-proxy.c:495:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(strlen(line) == 2 || line[2] == ' ') ) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/main.c:241:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			  strlen(MSG_BYE_INTERNAL_ERROR)) < 0) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/main.c:258:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(client->fd, msg, strlen(msg)) < 0) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/managesieve-client.c:94:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write(fd_out, byemsg, strlen(byemsg)) < 0) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/managesieve/managesieve-client.c:342:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iov[0].iov_len = strlen(data);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-sync.c:216:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		input = i_stream_create_from_data(value->value, strlen(value->value));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-sync.c:300:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	scriptname = key + strlen(MAILBOX_ATTRIBUTE_PREFIX_SIEVE_FILES);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-sync.c:304:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						  strlen(value->value));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-sync.c:526:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	scriptname = key + strlen(MAILBOX_ATTRIBUTE_PREFIX_SIEVE_FILES);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/doveadm-sieve/doveadm-sieve-sync.c:635:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		str_truncate(siter->name, strlen(MAILBOX_ATTRIBUTE_PREFIX_SIEVE_FILES));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imap-filter-sieve/cmd-filter-sieve.c:274:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		input = i_stream_create_from_data(value, strlen(value));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imap-filter-sieve/imap-filter-sieve.c:862:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				       strlen(address), &msg_addr) < 0) {
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/plugins/imap-filter-sieve/imap-filter.c:163:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				cmd->tag, strlen(error), error));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/sieve-tools/sievec.c:117:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if ( scriptfile[strlen(scriptfile)-1] == '/' )
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-log.c:307:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*str_r = t_str_new_const(msg->message, strlen(msg->message));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-message.c:57:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     strlen(str), 1, 0);
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-result.c:184:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*str_r = t_str_new_const(act_name, strlen(act_name));
data/dovecot-2.3.11.3+dfsg1/pigeonhole/src/testsuite/testsuite-variables.c:153:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*str_r = t_str_new_const(testsuite_test_path, strlen(testsuite_test_path));
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-cache.c:297:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	username_len = strlen(username);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-cache.c:387:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	value = node->data + strlen(node->data) + 1;
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-cache.c:416:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t data_size, alloc_size, key_len, value_len = strlen(value);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-cache.c:433:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	key_len = strlen(key);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-client-connection.c:43:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	newline = t_str_new(strlen(line));
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-client-connection.c:70:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iov[0].iov_len = strlen(cmd);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-client-connection.c:312:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			safe_memset(line, 0, strlen(line));
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-master-connection.c:80:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iov[0].iov_len = strlen(reply);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-policy.c:505:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(context->set->policy_hash_nonce));
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-policy.c:513:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	digest->loop(ctx, requested_username, strlen(requested_username)+1);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-policy.c:515:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		digest->loop(ctx, password, strlen(password));
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-policy.c:555:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(context->set->policy_server_url);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request-handler.c:646:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(initial_resp);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request-handler.c:704:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	data_len = strlen(data);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request.c:368:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(request->mech_password));
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request.c:995:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(request->passdb_password));
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request.c:2149:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t name_len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request.c:2370:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t name_len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-request.c:2719:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(request->mech_password), sha1);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:107:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_mask = umask(0);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:109:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:167:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hmac_init(&ctx, (const unsigned char*)username, strlen(username),
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:169:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hmac_update(&ctx, session_pid, strlen(session_pid));
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:171:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		hmac_update(&ctx, session_id, strlen(session_id));
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-token.c:172:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hmac_update(&ctx, service, strlen(service));
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-worker-server.c:118:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iov[0].iov_len = strlen(iov[0].iov_base);
data/dovecot-2.3.11.3+dfsg1/src/auth/auth-worker-server.c:120:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iov[1].iov_len = strlen(request->data);
data/dovecot-2.3.11.3+dfsg1/src/auth/db-checkpassword.c:88:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(request->auth_password));
data/dovecot-2.3.11.3+dfsg1/src/auth/db-checkpassword.c:304:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(request->fd_in, buf, sizeof(buf));
data/dovecot-2.3.11.3+dfsg1/src/auth/db-checkpassword.c:344:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer_append(buf, auth_request->user, strlen(auth_request->user)+1);
data/dovecot-2.3.11.3+dfsg1/src/auth/db-checkpassword.c:347:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			      strlen(request->auth_password)+1);
data/dovecot-2.3.11.3+dfsg1/src/auth/db-checkpassword.c:466:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	output_len = strlen(request->user) + 3;
data/dovecot-2.3.11.3+dfsg1/src/auth/db-checkpassword.c:468:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output_len += strlen(auth_password);
data/dovecot-2.3.11.3+dfsg1/src/auth/db-dict.c:415:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		str_truncate(path, strlen(DICT_PATH_SHARED));
data/dovecot-2.3.11.3+dfsg1/src/auth/db-dict.c:467:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		string_t *expanded_key = str_new(iter->pool, strlen(key->key));
data/dovecot-2.3.11.3+dfsg1/src/auth/db-dict.c:534:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(data, strlen(data));
data/dovecot-2.3.11.3+dfsg1/src/auth/db-ldap.c:996:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			in->len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/auth/db-oauth2.c:521:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	string_t *username_val = t_str_new(strlen(username_value));
data/dovecot-2.3.11.3+dfsg1/src/auth/db-passwd-file.c:47:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = pass == NULL ? 0 : strlen(pass);
data/dovecot-2.3.11.3+dfsg1/src/auth/db-passwd-file.c:62:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(pu->password) != 32 + 12) {
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-apop.c:39:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md5_update(&ctx, request->challenge, strlen(request->challenge));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-cram-md5.c:65:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hmac_update(&ctx, request->challenge, strlen(request->challenge));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-cram-md5.c:167:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    strlen(request->challenge));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:128:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md5_update(&ctx, request->nonce, strlen(request->nonce));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:130:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md5_update(&ctx, request->cnonce, strlen(request->cnonce));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:133:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		md5_update(&ctx, request->authzid, strlen(request->authzid));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:150:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   strlen(request->digest_uri));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:164:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		md5_update(&ctx, request->nonce, strlen(request->nonce));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:167:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(request->nonce_count));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:169:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		md5_update(&ctx, request->cnonce, strlen(request->cnonce));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:172:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(request->qop_value));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:392:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(value) != 32) {
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-digest-md5.c:506:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     strlen(request->rspauth));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-dovecot-token.c:67:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		safe_memset(auth_token, 0, strlen(auth_token));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-login.c:33:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						    strlen(prompt2));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-login.c:37:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		safe_memset(pass, 0, strlen(pass));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-login.c:49:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						    strlen(prompt1));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-oauth2.c:59:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		auth_request_handler_reply_continue(request, error, strlen(error));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-otp.c:54:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    strlen(answer));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-plain.c:64:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		safe_memset(pass, 0, strlen(pass));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.c:91:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hmac_update(&ctx, auth_message, strlen(auth_message));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.c:243:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hmac_update(&ctx, auth_message, strlen(auth_message));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.c:286:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(request->server_first_message));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.c:314:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str = t_str_new(MAX_BASE64_ENCODED_SIZE(strlen(cbind_input)));
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.c:316:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	base64_encode(cbind_input, strlen(cbind_input), str);
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.c:330:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(&fields[field_count-1][2]);
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-scram.c:384:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(server_final_message);
data/dovecot-2.3.11.3+dfsg1/src/auth/mech-skey.c:60:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    strlen(answer));
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-bsdauth.c:44:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(pw.pw_passwd, 0, strlen(pw.pw_passwd));
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-pam.c:103:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						    strlen(resp[i].resp));
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-passwd.c:59:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(pw.pw_passwd, 0, strlen(pw.pw_passwd));
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-shadow.c:57:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(spw->sp_pwdp, 0, strlen(spw->sp_pwdp));
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-vpopmail.c:92:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(vpw->pw_passwd, 0, strlen(vpw->pw_passwd));
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-vpopmail.c:95:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(vpw->pw_clear_passwd));
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-vpopmail.c:116:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(password, 0, strlen(password));
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb-vpopmail.c:146:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(crypted_pass, 0, strlen(crypted_pass));
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb.c:283:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(passdbs[i]->iface.name));
data/dovecot-2.3.11.3+dfsg1/src/auth/passdb.c:284:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		md5_update(&ctx, passdbs[i]->args, strlen(passdbs[i]->args));
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-crypt.c:32:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*size_r = strlen(password);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-crypt.c:62:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*size_r = strlen(password);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-crypt.c:119:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*size_r = strlen(password);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-crypt.c:143:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*size_r = strlen(password);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-md5crypt.c:57:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t pw_len = strlen(pw);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-pbkdf2.c:25:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(const unsigned char *)plaintext, strlen(plaintext),
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-pbkdf2.c:26:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(const unsigned char *)salt, strlen(salt),
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-pbkdf2.c:74:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(fields[2]) != sizeof(key1)*2 ||
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:82:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (base64_decode(fields[2], strlen(fields[2]), NULL, buf) < 0 ||
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:91:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (base64_decode(fields[3], strlen(fields[3]), NULL, buf) < 0 ||
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:125:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	Hi(hmethod, (const unsigned char *)plaintext, strlen(plaintext),
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-scram.c:164:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	Hi(hmethod, (const unsigned char *)plaintext, strlen(plaintext), salt,
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-sodium.c:27:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (crypto_pwhash_argon2i_str(result, plaintext, strlen(plaintext), rounds, memlimit) < 0)
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-sodium.c:30:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*size_r = strlen(result);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-sodium.c:57:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (crypto_pwhash_argon2id_str(result, plaintext, strlen(plaintext), rounds, memlimit) < 0)
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-sodium.c:60:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*size_r = strlen(result);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme-sodium.c:70:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (crypto_pwhash_str_verify(passwd, plaintext, strlen(plaintext)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:148:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(password);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:386:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*size_r = strlen(password);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:396:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha1_get_digest(plaintext, strlen(plaintext), digest);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:409:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha256_get_digest(plaintext, strlen(plaintext), digest);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:422:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha512_get_digest(plaintext, strlen(plaintext), digest);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:441:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha1_loop(&ctx, plaintext, strlen(plaintext));
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:463:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha1_loop(&ctx, plaintext, strlen(plaintext));
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:482:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha256_loop(&ctx, plaintext, strlen(plaintext));
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:504:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha256_loop(&ctx, plaintext, strlen(plaintext));
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:525:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha512_loop(&ctx, plaintext, strlen(plaintext));
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:547:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha512_loop(&ctx, plaintext, strlen(plaintext));
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:568:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md5_update(&ctx, plaintext, strlen(plaintext));
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:590:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md5_update(&ctx, plaintext, strlen(plaintext));
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:601:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*size_r = strlen(plaintext);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:609:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t plaintext_len = strlen(plaintext);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:636:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	plaintext_len = strlen(plaintext);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:655:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  strlen(plaintext), &hash_method_md5);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:688:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md5_get_digest(str, strlen(str), digest);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:701:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md4_get_digest(plaintext, strlen(plaintext), digest);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:714:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md5_get_digest(plaintext, strlen(plaintext), digest);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:770:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*size_r = strlen(password);
data/dovecot-2.3.11.3+dfsg1/src/auth/password-scheme.c:782:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*size_r = strlen(password);
data/dovecot-2.3.11.3+dfsg1/src/auth/userdb-dict.c:119:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ctx->key_prefix_len = strlen(ctx->key_prefix);
data/dovecot-2.3.11.3+dfsg1/src/auth/userdb.c:208:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(userdbs[i]->iface->name));
data/dovecot-2.3.11.3+dfsg1/src/auth/userdb.c:209:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		md5_update(&ctx, userdbs[i]->args, strlen(userdbs[i]->args));
data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c:754:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(address), 2, 0);
data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c:3475:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t base_dir_len = strlen(master_set->base_dir);
data/dovecot-2.3.11.3+dfsg1/src/config/all-settings.c:3630:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(set->base_dir);
data/dovecot-2.3.11.3+dfsg1/src/config/config-parser.c:481:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((ret = read(fd, buf, sizeof(buf))) > 0)
data/dovecot-2.3.11.3+dfsg1/src/config/config-parser.c:617:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(line);
data/dovecot-2.3.11.3+dfsg1/src/config/config-parser.c:677:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(line);
data/dovecot-2.3.11.3+dfsg1/src/config/config-request.c:169:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(*val);
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:171:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(value);
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:249:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t n = strlen(suffix)+1;
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:274:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			ptr += strlen(secret);
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:342:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(setting_name_filter);
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:398:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(prefixes[prefix_idx]);
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:417:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(prefixes[j]);
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:420:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					      strlen(prefixes[prefix_idx]));
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:453:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		skip_len = prefix_idx == UINT_MAX ? 0 : strlen(prefixes[prefix_idx]);
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:627:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(setting_name_filter);
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:666:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		filter_len = strlen(setting_name_filters[i]);
data/dovecot-2.3.11.3+dfsg1/src/config/doveconf.c:786:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(my_hostname);
data/dovecot-2.3.11.3+dfsg1/src/config/old-set-parser.c:231:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(value);
data/dovecot-2.3.11.3+dfsg1/src/config/old-set-parser.c:700:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(ctx->old->base_dir);
data/dovecot-2.3.11.3+dfsg1/src/config/old-set-parser.c:705:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(path);
data/dovecot-2.3.11.3+dfsg1/src/config/sysinfo-get.c:23:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, buf, sizeof(buf));
data/dovecot-2.3.11.3+dfsg1/src/config/sysinfo-get.c:99:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(path) <= 1)
data/dovecot-2.3.11.3+dfsg1/src/director/auth-connection.c:55:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			safe_memset(line, 0, strlen(line));
data/dovecot-2.3.11.3+dfsg1/src/director/director-connection.c:2523:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(data);
data/dovecot-2.3.11.3+dfsg1/src/director/director-test.c:407:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_full(i_stream_get_fd(conn->input), data, strlen(data)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/director/login-connection.c:62:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(conn->fd, buf, sizeof(buf));
data/dovecot-2.3.11.3+dfsg1/src/director/login-connection.c:119:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iov[0].iov_len = strlen(line);
data/dovecot-2.3.11.3+dfsg1/src/director/mail-host.c:64:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md5_update(&md5_ctx, host->ip_str, strlen(host->ip_str));
data/dovecot-2.3.11.3+dfsg1/src/director/mail-host.c:69:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		md5_update(&md5_ctx2, num_str, strlen(num_str));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/client-connection-http.c:758:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i = 0, k = 0; i < strlen(ptr);) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/client-connection-http.c:986:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	base64_encode(value, strlen(value), b64_value);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/client-connection-http.c:1011:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      strlen(set->doveadm_api_key), b64_value);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/client-connection-tcp.c:467:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (base64_decode(line + 6, strlen(line + 6), NULL, plain) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/client-connection-tcp.c:480:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(pass) != strlen(set->doveadm_password) ||
data/dovecot-2.3.11.3+dfsg1/src/doveadm/client-connection-tcp.c:480:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(pass) != strlen(set->doveadm_password) ||
data/dovecot-2.3.11.3+dfsg1/src/doveadm/client-connection-tcp.c:482:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				    strlen(pass))) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-auth-server.c:89:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t show_field_len = strlen(show_field);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-auth.c:92:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t show_field_len = strlen(show_field);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-auth.c:385:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(input->auth_cookie) == MASTER_AUTH_COOKIE_SIZE*2)
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-cmd.c:121:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t alen = strlen((*argv)[i+k]);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-cmd.c:123:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(cptr) < alen) break;
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-cmd.c:155:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(argv[1]);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-cmd.c:184:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd_name_len = strlen(cmd_name);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-director.c:52:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_full(i_stream_get_fd(ctx->input), data, strlen(data)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dsync.c:192:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write_full(ctx->fd_out, prefix, strlen(prefix)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-dbox.c:21:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		t = hex2dec((const void *)value, strlen(value));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-dbox.c:38:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = hex2dec((const void *)value, strlen(value));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-dbox.c:69:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					       strlen(*arg + 1));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-dcrypt-key.c:106:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t res = read(fd, buf, KEY_BUF_SIZE);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-log.c:437:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			i += strlen(keys+i) + 1;
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-log.c:458:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			i += strlen(keys+i) + 1;
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-log.c:555:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(fd, &hdr, sizeof(hdr)) >= MAIL_TRANSACTION_LOG_HEADER_MIN_SIZE &&
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-mailboxlog.c:22:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, &rec, sizeof(rec));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-dump-mailboxlog.c:91:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(fd, &rec, sizeof(rec)) == sizeof(rec) &&
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-fs.c:398:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	path_len = strlen(path);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-instance.c:33:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, buf, sizeof(buf));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-log.c:136:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-log.c:165:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		p += strlen(TEST_LOG_MSG_PREFIX);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-log.c:291:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (pos = strlen(orig); pos > 0; pos--) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-fetch.c:189:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(addr->name), str, NULL);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-index.c:156:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		       strlen(INDEXER_HANDSHAKE)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail-mailbox.c:238:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail.c:764:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen((*argv)[0]);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail.c:791:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd_name_len = strlen(cmd_name);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-mail.c:880:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(cmd_name);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-master.c:33:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, buf, sizeof(buf)-1);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-master.c:107:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_full(fd, str, strlen(str)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-oldstats.c:81:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_full(fd, cmd, strlen(cmd)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-oldstats.c:333:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_full(ctx->fd, TOP_CMD, strlen(TOP_CMD)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-penalty.c:70:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(fd, ANVIL_CMD, strlen(ANVIL_CMD)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-print-table.c:46:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	thdr->length = thdr->max_length = thdr->min_length = strlen(hdr->title);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-replicator.c:31:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_full(i_stream_get_fd(ctx->input), data, strlen(data)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-sis.c:25:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(hash) < 4 || strchr(hash, '/') != NULL)
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-sis.c:67:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while ((ret1 = read(fd1, buf1, sizeof(buf1))) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-sis.c:276:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (argc < 3 || strlen(argv[2]) < 4)
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-sis.c:286:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hash_len = strlen(hash);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-util.c:52:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t name_len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-who.c:185:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(fd, ANVIL_CMD, strlen(ANVIL_CMD)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-zlib.c:32:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, buf, sizeof(buf)-1);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm-zlib.c:96:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(STDIN_FILENO, buf, sizeof(buf));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm.c:62:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t prefix_len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/doveadm.c:235:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(cmd_name);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-brain-mailbox-tree.c:136:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		part_len = strlen(part);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-brain-mailbox-tree.c:214:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    strlen(old_vname), vname_str))
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-ibc-stream.c:1230:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(value) != 1) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-import.c:435:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i_stream_create_from_data(attr1->value, strlen(attr1->value));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-import.c:437:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i_stream_create_from_data(attr2->value, strlen(attr2->value));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-state.c:86:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = t_buffer_create(strlen(input));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-state.c:87:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (base64_decode(input, strlen(input), NULL, buf) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-tree-sync.c:937:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			md5_update(md5, node->name, strlen(node->name));
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-tree-sync.c:1004:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	max_prefix_len = TEMP_MAX_NAME_LEN - strlen(new_suffix) - 1;
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-tree.c:184:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		return strlen(node->name);
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-mailbox-tree.c:186:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		return strlen(node->name) + 1 +
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-transaction-log-scan.c:314:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i_assert(strlen(attr_change) > 2); /* checked by lib-index */
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/dsync-transaction-log-scan.c:342:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i += strlen(attr_changes+i) + 1;
data/dovecot-2.3.11.3+dfsg1/src/doveadm/dsync/test-dsync-mailbox-tree-sync.c:29:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha1_get_digest(name, strlen(name), sha);
data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/imap-client.c:378:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((size_t)ret != strlen(output)) {
data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/imap-client.c:429:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i_assert((size_t)ret == strlen(imap_still_here_text));
data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/imap-client.c:506:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			value = *fields+strlen(field_name);
data/dovecot-2.3.11.3+dfsg1/src/imap-hibernate/imap-hibernate-client.c:142:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (base64_decode(value, strlen(value), NULL,
data/dovecot-2.3.11.3+dfsg1/src/imap-login/client-authenticate.c:131:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	imap_client->common.master_data_prefix_len = strlen(prefix)+1;
data/dovecot-2.3.11.3+dfsg1/src/imap-login/client-authenticate.c:206:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer_append(plain_login, user, strlen(user));
data/dovecot-2.3.11.3+dfsg1/src/imap-login/client-authenticate.c:208:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer_append(plain_login, pass, strlen(pass));
data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-login-client.c:273:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    strlen(client->cmd_tag) > IMAP_TAG_MAX_LEN) {
data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-login-cmd-id.c:59:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(value) <= LOGIN_MAX_SESSION_ID_LEN) {
data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-login-cmd-id.c:90:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		unsigned int prefix_len = strlen(imap_login_id_params[i].key);
data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-login-cmd-id.c:123:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t kvlen = strlen(key) + 2 + 1 +
data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-login-cmd-id.c:124:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		       (value == NULL ? 3 : strlen(value)) + 2;
data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-proxy.c:73:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(client->proxy_password, 0, strlen(client->proxy_password));
data/dovecot-2.3.11.3+dfsg1/src/imap-login/imap-proxy.c:285:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    base64_decode(line+2, strlen(line+2), NULL, str) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth.c:150:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write(client->fd, msg, strlen(msg)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth.c:167:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write(client->fd, msg, strlen(msg)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/imap-urlauth/imap-urlauth.c:185:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(client->fd, msg, strlen(msg)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-create.c:25:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(orig_mailbox);
data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-create.c:36:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (len == strlen(mailbox))
data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-getmetadata.c:203:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		value_len = strlen(value.value);
data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-list.c:418:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t len = strlen(pattern);
data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-notify.c:156:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cur_len, name_len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-notify.c:181:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cur_len = strlen(names[i]);
data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-rename.c:29:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		oldlen = strlen(oldname);
data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-subscribe.c:28:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/imap/cmd-x-state.c:31:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (base64_decode(str, strlen(str), NULL, state) < 0)
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-client-hibernate.c:28:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		       strlen(IMAP_HIBERNATE_HANDSHAKE)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-client-hibernate.c:31:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} else if ((ret = read(fd, buf, sizeof(buf)-1)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-client-hibernate.c:132:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((ret = read(fd, buf, sizeof(buf)-1)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-client.c:581:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iov[0].iov_len = strlen(data);
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-fetch.c:953:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mutf7_name = t_str_new(strlen(name)*2);
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-master-client.c:129:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (base64_decode(value, strlen(value), NULL,
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-master-client.c:136:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (base64_decode(value, strlen(value), NULL,
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-master-client.c:143:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (base64_decode(value, strlen(value), NULL,
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-notify.c:208:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			name_len = strlen(*namep);
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-state.c:230:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer_append(dest, vname, strlen(vname)+1);
data/dovecot-2.3.11.3+dfsg1/src/imap/imap-state.c:286:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			buffer_append(dest, features[i], strlen(features[i])+1);
data/dovecot-2.3.11.3+dfsg1/src/imap/main.c:163:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	taglen = strlen(input_r->tag) + 1;
data/dovecot-2.3.11.3+dfsg1/src/imap/main.c:369:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			  strlen(MSG_BYE_INTERNAL_ERROR)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/imap/main.c:386:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       strlen(MSG_BYE_INTERNAL_ERROR)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/imap/main.c:408:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(client->fd, msg, strlen(msg)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/indexer/master-connection.c:112:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						 strlen(percentage_str));
data/dovecot-2.3.11.3+dfsg1/src/indexer/master-connection.c:258:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return write_full(conn->fd, str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/indexer/master-connection.c:310:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	(void)write_full(conn->fd, handshake, strlen(handshake));
data/dovecot-2.3.11.3+dfsg1/src/ipc/main.c:18:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/lib-auth/auth-client-request.c:158:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iov[0].iov_len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-auth/auth-client-request.c:160:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iov[1].iov_len = strlen(data_base64);
data/dovecot-2.3.11.3+dfsg1/src/lib-charset/charset-iconv.c:124:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					      strlen(UNICODE_REPLACEMENT_CHAR_UTF8));
data/dovecot-2.3.11.3+dfsg1/src/lib-charset/charset-utf8.c:29:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(input);
data/dovecot-2.3.11.3+dfsg1/src/lib-charset/test-charset.c:96:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(tests[i].input);
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/compression.c:127:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len, path_len = strlen(path);
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/compression.c:133:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(compression_handlers[i].ext);
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:642:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(size == strlen(str1)+strlen(str2) &&
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:642:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(size == strlen(str1)+strlen(str2) &&
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:643:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    memcmp(data, str1, strlen(str1)) == 0 &&
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:644:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    memcmp(data+strlen(str1), str2, strlen(str2)) == 0);
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:644:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    memcmp(data+strlen(str1), str2, strlen(str2)) == 0);
data/dovecot-2.3.11.3+dfsg1/src/lib-compression/test-compression.c:682:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						      strlen(input_strings[i]));
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:1146:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		SHA256((unsigned char*)id, strlen(id), digest);
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:1308:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		salt = t_buffer_create(strlen(input[4])/2);
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:1309:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		peer_key = t_buffer_create(strlen(input[8])/2);
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:1348:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		salt = t_buffer_create(strlen(input[4])/2);
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:1349:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buffer_create_from_const_data(&secret, password, strlen(password));
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:1350:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data = t_buffer_create(strlen(input[7])/2);
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:2125:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t keylen = strlen(input[1])/2;
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:2438:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	BIO *key_in = BIO_new_mem_buf((void*)data, strlen(data));
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:2491:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	BIO *key_in = BIO_new_mem_buf((void*)data, strlen(data));
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:3058:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SHA256((const unsigned char*)pub_pt_hex, strlen(pub_pt_hex), buf);
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt-openssl.c:3082:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SHA256((const unsigned char*)pub_pt_hex, strlen(pub_pt_hex), buf);
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/dcrypt.c:634:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	struct istream *is = i_stream_create_from_data(key_data, strlen(key_data));
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-crypto.c:1055:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		 data, strlen(data), signature, 0, &error));
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-crypto.c:1058:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		 data, strlen(data),
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-crypto.c:1091:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data, strlen(data), signature, 0, &error));
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-crypto.c:1094:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data, strlen(data), signature->data,
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-crypto.c:1138:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				  input, strlen(input),
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-crypto.c:1222:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data, strlen(data),
data/dovecot-2.3.11.3+dfsg1/src/lib-dcrypt/test-crypto.c:1260:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data, strlen(data),
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-cdb.c:97:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ret = cdb_find(&dict->cdb, key, (unsigned)strlen(key)+1);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-cdb.c:104:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ret = cdb_find(&dict->cdb, key, (unsigned)strlen(key));
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-cdb.c:203:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     strchr(key + strlen(*ptr), '/') == NULL)) {
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-db.c:241:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pkey.size = strlen(key);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-db.c:315:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			ctx->pkey.size = strlen(ctx->path);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-db.c:340:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ctx->path_len = ctx->path == NULL ? 0 : strlen(ctx->path);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-db.c:424:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dkey.size = strlen(key);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-db.c:437:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ddata.size = strlen(value);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-db.c:453:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dkey.size = strlen(key);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-ldap-settings.c:66:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*pattern += strlen(*pattern);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-ldap-settings.c:92:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pattern = t_str_new(strlen(ctx->cur_map.pattern) + 1);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-ldap.c:76:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(path);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-ldap.c:107:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				path += strlen(path);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-ldap.c:442:81:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!ldap_dict_build_query(ctx, map, &values, strncmp(key, DICT_PATH_PRIVATE, strlen(DICT_PATH_PRIVATE))==0, query, &error)) {
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-sql-settings.c:64:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*pattern += strlen(*pattern);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-sql-settings.c:90:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pattern = t_str_new(strlen(ctx->cur_map.pattern) + 1);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-sql-settings.c:225:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		value_len = strlen(value);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-sql.c:152:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(path);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-sql.c:183:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				path += strlen(path);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-backend/dict-sql.c:315:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = t_buffer_create(strlen(value)/2);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-extra/dict-fs.c:73:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		return key + strlen(DICT_PATH_SHARED);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-extra/dict-fs.c:76:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				       key + strlen(DICT_PATH_PRIVATE));
data/dovecot-2.3.11.3+dfsg1/src/lib-dict-extra/dict-fs.c:238:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (fs_write(file, change->value.str, strlen(change->value.str)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-client.c:274:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iov[0].iov_len = strlen(query);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-file.c:230:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ctx->paths[i].len = strlen(paths[i]);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-file.c:343:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			new_len = strlen(tmp);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-file.c:344:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (old_value == NULL || new_len > strlen(old_value))
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-memcached-ascii.c:505:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		key += strlen(DICT_PATH_SHARED);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-memcached-ascii.c:509:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      key + strlen(DICT_PATH_PRIVATE));
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-memcached-ascii.c:570:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    key, strlen(change->value.str), change->value.str);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-memcached-ascii.c:585:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				    key, (unsigned int)strlen(value), value);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-memcached.c:285:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		key += strlen(DICT_PATH_SHARED);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-memcached.c:292:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	key_len = strlen(key);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-redis.c:485:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		key += strlen(DICT_PATH_SHARED);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-redis.c:489:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      key + strlen(DICT_PATH_PRIVATE));
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-redis.c:506:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	                      (int)strlen(dict->password), dict->password);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-redis.c:524:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			      (int)strlen(db_str), db_str);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-redis.c:563:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					      (int)strlen(key), key);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-redis.c:722:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    (unsigned int)strlen(key), key,
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-redis.c:723:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    (unsigned int)strlen(dict->expire_value),
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-redis.c:743:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    (unsigned int)strlen(key), key,
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-redis.c:744:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    (unsigned int)strlen(value), value);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-redis.c:767:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			      (unsigned int)strlen(key), key);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-redis.c:792:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    (unsigned int)strlen(key), key,
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict-redis.c:793:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    (unsigned int)strlen(diffstr), diffstr);
data/dovecot-2.3.11.3+dfsg1/src/lib-dict/dict.c:635:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = t_str_new((size_t) (p - str) + strlen(p) + 1);
data/dovecot-2.3.11.3+dfsg1/src/lib-dns/dns-lookup.c:348:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((ret = o_stream_send(client->conn.output, cmd, strlen(cmd))) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-dns/dns-util.c:41:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const char *ptr_a = a + strlen(a);
data/dovecot-2.3.11.3+dfsg1/src/lib-dns/dns-util.c:42:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const char *ptr_b = b + strlen(b);
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-api-private.h:55:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t (*read)(struct fs_file *file, void *buf, size_t size);
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-api.c:393:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				    strlen(FS_METADATA_INTERNAL_PREFIX)) == 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-api.c:448:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(FS_METADATA_INTERNAL_PREFIX)) == 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-api.c:702:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (file->fs->v.read != NULL) {
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-api.c:704:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			ret = file->fs->v.read(file, buf, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-dict.c:182:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		input = i_stream_create_from_data(file->value, strlen(file->value));
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-dict.c:261:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	st_r->st_size = strlen(file->value);
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-posix.c:87:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fs->temp_file_prefix_len = strlen(fs->temp_file_prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-posix.c:338:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t path_len = strlen(path);
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-posix.c:454:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(file->fd, buf, size);
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-test.c:331:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iter->prefix_len = strlen(iter->prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-fs/fs-test.c:342:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len, prev_dir_len = strlen(iter->prev_dir);
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter-english-possessive.c:26:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(*token);
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter-stemmer-snowball.c:82:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	base = sb_stemmer_stem(sp->stemmer, (const unsigned char *)*token, strlen(*token));
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-filter-stemmer-snowball.c:88:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       strlen(*token));
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-icu.c:35:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t src_bytes = strlen(src_utf8);
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-icu.c:185:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	t_array_init(&id_utf16, strlen(id));
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/fts-tokenizer.c:183:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buffer_append(tok->parent_input, *token_r, strlen(*token_r));
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-filter.c:615:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sha512_loop(&ctx, tokens, strlen(tokens));
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-filter.c:727:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(strlen(token) <= 250);
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-tokenizer.c:85:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t input_len = strlen(_input);
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-tokenizer.c:452:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = strlen(tests[i].str);
data/dovecot-2.3.11.3+dfsg1/src/lib-fts/test-fts-tokenizer.c:470:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				  strlen(input), &token, &error) > 0) ;
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-auth.c:471:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	base64_encode(auth, strlen(auth), data);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-client-request.c:406:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t key_len = strlen(key);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-response-parser.c:306:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((unsigned char *)hdrval, strlen(hdrval), retry_after_r) ? 0 : -1);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server-connection.c:777:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					  strlen(response)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server-request.c:197:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						       response, strlen(response));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server-request.c:258:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(auth), credentials) < 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server-request.c:467:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			resp, (const unsigned char *)text, strlen(text));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-server-resource.c:82:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	loc_len = strlen(loc->path);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-transfer-chunked.c:709:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iov_new[0].iov_len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/http-url.c:182:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const char *pend = base->path + strlen(base->path);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-auth.c:102:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			((const unsigned char *)challenges_in, strlen(challenges_in), 
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-auth.c:220:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			((const unsigned char *)credentials_in, strlen(credentials_in), 
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-client.c:144:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((unsigned char *)test_query1, strlen(test_query1));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-client.c:156:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((unsigned char *)test_query2, strlen(test_query2));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-client.c:204:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((unsigned char *)test_query1, strlen(test_query1));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-client.c:215:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((unsigned char *)test_query1, strlen(test_query1));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-client.c:226:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((unsigned char *)test_query1, strlen(test_query1));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-client.c:249:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((unsigned char *)test_query3, strlen(test_query3));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-client.c:259:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((unsigned char *)test_query3, strlen(test_query3));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-client.c:269:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((unsigned char *)test_query3, strlen(test_query3));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-date.c:127:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			((const unsigned char *)date_in, strlen(date_in), &ptm);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-date.c:134:32:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
			test_out("valid timestamp", equal);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-date.c:208:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			((const unsigned char *)date_in, strlen(date_in), &tm);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-header-parser.c:195:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		header_len = strlen(header);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-header-parser.c:355:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		input = i_stream_create_from_data(header, strlen(header));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-request-parser.c:412:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		request_text_len = strlen(request_text);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-request-parser.c:613:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						  strlen(request_text));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-response-parser.c:182:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		input_text_len = strlen(input_text);
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-response-parser.c:326:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		input = i_stream_create_from_data(response_text, strlen(response_text));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-transfer.c:101:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		input = i_stream_create_from_data(in, strlen(in));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-transfer.c:197:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		input = i_stream_create_from_data(in, strlen(in));
data/dovecot-2.3.11.3+dfsg1/src/lib-http/test-http-transfer.c:270:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		input = i_stream_create_from_data(data, strlen(data));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/imapc-connection.c:922:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input_len = strlen(reply->text_full);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/imapc-connection.c:2361:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(cmd_str);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/imapc-connection.c:2425:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    strlen(arg), arg);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-client/imapc-connection.c:2428:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    strlen(arg), arg);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-storage/imap-metadata.c:90:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*key_r = entry + strlen(IMAP_METADATA_PRIVATE_PREFIX);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-storage/imap-metadata.c:94:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*key_r = entry + strlen(IMAP_METADATA_SHARED_PREFIX);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-storage/imap-msgpart.c:150:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(header_list, strlen(header_list));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth-backend.c:94:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(mailbox_key_hex) != 2*IMAP_URLAUTH_KEY_LEN ||
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth.c:95:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hmac_update(&hmac, rumpurl, strlen(rumpurl));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap-urlauth/imap-urlauth.c:135:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(app);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-base-subject.c:205:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	subject_len = strlen(subject);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-bodystructure.c:633:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(bodystructure, strlen(bodystructure));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-bodystructure.c:700:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		str_printfa(str, "{%zu}\r\n", strlen(cstr));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-bodystructure.c:880:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(bodystructure, strlen(bodystructure));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-envelope.c:31:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(const void *)addr->name, strlen(addr->name));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-envelope.c:65:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(data->subject));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-envelope.c:227:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(envelope, strlen(envelope));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-id.c:111:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(settings, strlen(settings));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-id.c:158:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(key) > 30) {
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-match.c:131:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		patterns_data_len += strlen(match_patterns[i].pattern) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-match.c:143:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(match_patterns[i].pattern) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-parser.c:273:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		arg->str_len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-parser.c:565:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(arg->_data.str);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-quote.c:47:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t full_len = pos + strlen(src+pos);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-quote.c:97:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	src_len = strlen(src);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-url.c:332:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(urlext);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-url.c:375:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				parser->begin, parser->end-strlen(p));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-url.c:378:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				t_strdup_until(parser->begin, parser->end-strlen(p)),
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-url.c:411:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(q) < 32) {
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-url.c:493:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			p = base->section + strlen(base->section);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-url.c:512:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			p = base->mailbox + strlen(base->mailbox);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-utf7.c:85:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	utf16 = t_malloc0(MALLOC_MULTIPLY(strlen(p), 2));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-util.c:89:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		str_append_escaped(dest, strarg, strlen(strarg));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-util.c:96:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(strarg));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-util.c:162:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    strlen(strarg));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/imap-util.c:171:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						    strlen(strarg), dest))
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-bodystructure.c:395:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(message, strlen(message));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-envelope.c:133:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(message, strlen(message));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-quote.c:41:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					      strlen(tests[i].input));
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-url.c:746:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
						       equal);
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-url.c:748:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
					if (equal) {
data/dovecot-2.3.11.3+dfsg1/src/lib-imap/test-imap-url.c:756:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
							       equal);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache-fields.c:605:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buffer_append(dest, name, strlen(name)+1);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-cache-fields.c:611:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			buffer_append(dest, name, strlen(name)+1);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-fsck.c:237:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buffer_append(dest, name_array[i], strlen(name_array[i]) + 1);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-map.c:86:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ext_offset + mail_index_map_ext_hdr_offset(strlen(name));
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-ext.c:111:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			ext->name, strlen(ext->name)) == 0);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-ext.c:394:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i_assert(ext_hdr->name_size == strlen(name));
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-ext.c:441:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ext_hdr.name_size = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-ext.c:509:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ext_hdr.name_size = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-keywords.c:62:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	offset += strlen(name + offset) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-keywords.c:102:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		u->name_size = strlen(MAIL_INDEX_EXT_KEYWORDS);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-sync-keywords.c:161:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	keyword_len = strlen(keyword_name) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-export.c:134:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			intro->name_size = strlen(rext->name);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-export.c:145:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			intro->name_size = strlen(rext->name);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-export.c:366:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	kt_hdr.name_size = strlen(keyword);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-transaction-update.c:688:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer_append(t->attribute_updates, key, strlen(key)+1);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index-view-sync.c:309:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		kw_up.name_size = strlen(kw_names[kw_idx[i]]);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index.c:557:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_mask = umask(0);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index.c:559:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index.c:565:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		old_mask = umask(0);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-index.c:567:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-transaction-log-file.c:659:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	intro->name_size = strlen(rext->name);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-transaction-log-file.c:872:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_mask = umask(index->mode ^ 0666);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-transaction-log-file.c:874:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-transaction-log-file.c:1045:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(MAIL_INDEX_MODSEQ_EXT_NAME);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mail-transaction-log-view.c:721:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			i += strlen(attr_changes+i) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mailbox-log.c:103:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_mode = umask(0666 ^ log->mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/mailbox-log.c:105:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache-common.c:127:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       cache_data, strlen(cache_data));
data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache-common.c:150:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		       cache_data, strlen(cache_data));
data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache-purge.c:67:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache-purge.c:134:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache-purge.c:194:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache-purge.c:721:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				       value, strlen(value));
data/dovecot-2.3.11.3+dfsg1/src/lib-index/test-mail-cache-purge.c:723:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				       value, strlen(value));
data/dovecot-2.3.11.3+dfsg1/src/lib-lda/mail-deliver.c:70:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     strlen(str), 1, 0);
data/dovecot-2.3.11.3+dfsg1/src/lib-lda/mail-deliver.c:495:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				       strlen(path), &addr) < 0 ||
data/dovecot-2.3.11.3+dfsg1/src/lib-ldap/ldap-compare.c:58:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		.bv_len = strlen(input->value),
data/dovecot-2.3.11.3+dfsg1/src/lib-ldap/ldap-connection.c:158:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ber_str2bv(conn->set.password, strlen(conn->set.password), 0, &conn->cred);
data/dovecot-2.3.11.3+dfsg1/src/lib-lua/dlua-script.c:202:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha1_get_digest(str, strlen(str), scripthash);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/mail-user-hash.c:19:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		md5_get_digest(username, strlen(username), md5);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/mail-user-hash.c:24:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				       strlen(username), md5);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-header-encode.c:8:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define MIME_WRAPPER_LEN (strlen("=?utf-8?q?""?="))
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-header-encode.c:156:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	message_header_encode_data((const void *)input, strlen(input), output);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-header-parser.c:405:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buffer_append(output, hdr->name, strlen(hdr->name));
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-id.c:15:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(*msgid_p), NULL);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-parser.c:216:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	b->len = strlen(b->boundary);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/message-part-data.c:418:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const char *name = hdr->name + strlen("Content-");
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/qp-encoder.c:69:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			qp->line_len = strlen(ptr+1);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-attachment.c:155:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(strlen(info->hash) == 160/8*2); /* sha1 size */
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-attachment.c:352:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    sizeof(BINARY_TEXT_LONG)-1 + strlen(BINARY_TEXT_SHORT));
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-attachment.c:355:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   BINARY_TEXT_SHORT, strlen(BINARY_TEXT_SHORT)) == 0);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-attachment.c:367:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t prefix_len = strlen(mail_broken_input_body_prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-attachment.c:377:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	datainput = test_istream_create_data(mail_text, strlen(mail_text));
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-attachment.c:401:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unchanged = attachment_data->used <= strlen(body) &&
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-attachment.c:403:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(body) - attachment_data->used == size &&
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-binary-converter.c:139:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buffer_append(inbuf, suffixes[i], strlen(suffixes[i]));
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-dot.c:30:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input_len = strlen(test->input);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-dot.c:31:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	output_len = strlen(test->output);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-dot.c:104:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(size == strlen(test->parent_input));
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-dot.c:123:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input_len = strlen(input_str);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:68:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(*size_r == strlen(output) &&
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:134:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t input_len = strlen(input);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:135:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t output_len = strlen(output);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:404:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i_stream_header_filter_add(input, new_hdr, strlen(new_hdr));
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:410:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i_stream_header_filter_add(input, new_to, strlen(new_to));
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:422:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_istream_run(istream, strlen(input), output,
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:438:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t input_len = strlen(input);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:439:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t output_len = strlen(output);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:517:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 strlen(tests[i].input) + tests[i].extra,
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:547:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		test_istream_run(istream, strlen(tests[i].input), tests[i].output,
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:579:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 (int)strlen(tests[i].input) + tests[i].extra,
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:607:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_istream_run(istream, strlen(input), output,
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:622:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i_stream_header_filter_add(input, new_hdr, strlen(new_hdr));
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:634:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_istream_run(istream, strlen(input) + 1, output,
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-header-filter.c:649:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_istream_run(istream, strlen(input)+1, output,
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-qp-decoder.c:28:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t qp_input_len = strlen(qp_input);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-istream-qp-encoder.c:72:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t qp_input_len = strlen(qp_input);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-mail-html2text.c:82:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				    strlen(test_blockquote_input[i]), str);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-mbox-from.c:63:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(input[i]) - j*6;
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-address.c:29:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t input_len = strlen(input);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-address.c:382:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			addr_input, strlen(inputs[i]), UINT_MAX,
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-address.c:388:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			addr_input, strlen(inputs[i]), UINT_MAX, 0);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-address.c:404:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t input_len = strlen(input);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-date.c:49:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					 strlen(test->input), &t, &tz);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-decoder.c:37:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hdr.name_len = strlen(hdr.name);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-decoder.c:39:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hdr.full_value_len = strlen((const char *)hdr.full_value);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-decoder.c:51:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input.size = strlen((const char *)input.data);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-decoder.c:57:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input.size = strlen((const char *)input.data);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-decoder.c:170:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hdr.name_len = strlen(hdr.name);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-decoder.c:172:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hdr.full_value_len = strlen((const char *)hdr.full_value);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-decoder.c:183:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hdr.full_value_len = strlen((const char *)hdr.full_value);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-decoder.c:194:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hdr.full_value_len = strlen((const char *)hdr.full_value);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-decode.c:47:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					   strlen(data[i]), dest, NULL);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-hash.c:59:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sizeof(test_input_with_nuls)-1 : strlen(tests[i].input);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-hash.c:69:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		md5_update(&md5_ctx, tests[i].output, strlen(tests[i].output));
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-parser.c:146:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(hdr_size.physical_size == strlen(test1_msg)-TEST1_MSG_BODY_LEN);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-parser.c:147:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(hdr_size.virtual_size == strlen(test1_msg) - TEST1_MSG_BODY_LEN + 4);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-parser.c:173:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int i, max = (strlen(test1_msg)-TEST1_MSG_BODY_LEN)*2;
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-parser.c:207:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-parser.c:229:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(lf_str);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-header-parser.c:235:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(crlf_str);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-search.c:30:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hdr.name = "Content-Type"; hdr.name_len = strlen(hdr.name);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-message-snippet.c:141:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			I_MIN(45, strlen(tests[i].input)));
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-ostream-dot.c:43:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(output->offset == strlen(test->input));
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-ostream-dot.c:44:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(test_output->offset == strlen(test->output));
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-qp-decoder.c:59:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ret = qp_decoder_more(qp, (const void *)input, strlen(input),
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-qp-decoder.c:62:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			error_pos = strlen(input);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-quoted-printable.c:25:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		quoted_printable_q_decode((const void *)data[i], strlen(data[i]),
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-rfc822-parser.c:39:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   strlen(tests[i].input), str);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-rfc822-parser.c:41:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   strlen(tests[i].input), NULL);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-rfc822-parser.c:105:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   strlen(tests[i].input), NULL);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-rfc822-parser.c:145:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   strlen(tests[i].input), NULL);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-rfc822-parser.c:191:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   strlen(tests[i].input), NULL);
data/dovecot-2.3.11.3+dfsg1/src/lib-mail/test-rfc822-parser.c:219:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	rfc822_parser_init(&parser, (const void *)input, strlen(input), NULL);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/anvil-client.c:211:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iov[0].iov_len = strlen(cmd);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/ipc-client.c:195:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		iov[0].iov_len = strlen(cmd);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-auth.c:128:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(conn->fd, conn->buf + conn->buf_pos,
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-login.c:181:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(conn->fd, data, req_r->data_size);
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service-settings.c:478:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = write_full(fd, CONFIG_HANDSHAKE"FILTERS\n", strlen(CONFIG_HANDSHAKE"FILTERS\n"));
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:907:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = write(MASTER_ANVIL_FD, cmd, strlen(cmd));
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:918:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i_assert((size_t)ret == strlen(cmd));
data/dovecot-2.3.11.3+dfsg1/src/lib-master/master-service.c:1341:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t service_name_len = strlen(service_name);
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-encrypt.c:43:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memcpy(buffer, passwd, I_MIN(sizeof(buffer), strlen(passwd)));
data/dovecot-2.3.11.3+dfsg1/src/lib-ntlm/ntlm-message.c:103:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					   strlen(data) * sizeof(ucs2le_t));
data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2-jwt.c:41:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     !iso8601_date_parse((const unsigned char*)value, strlen(value),
data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2-jwt.c:101:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hmac_update(&ctx, blobs[0], strlen(blobs[0]));
data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2-jwt.c:103:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hmac_update(&ctx, blobs[1], strlen(blobs[1]));
data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2-jwt.c:201:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!dcrypt_verify(pubkey, method, sig_format, data, strlen(data),
data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2-jwt.c:407:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (pos < strlen(kid)) {
data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2-jwt.c:409:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		string_t *new_kid = t_str_new(strlen(kid));
data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/oauth2-request.c:202:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		payload = str_new(p, strlen(input->token)+6);
data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/test-oauth2-json.c:69:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	req->is = test_istream_create_data(test_input, strlen(test_input));
data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/test-oauth2-json.c:74:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (pos = 0; pos <= strlen(test_input); pos +=2) {
data/dovecot-2.3.11.3+dfsg1/src/lib-oauth2/test-oauth2-jwt.c:27:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 strlen((str)), (dest))
data/dovecot-2.3.11.3+dfsg1/src/lib-old-stats/stats.c:182:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			      strlen((*itemp)->v.short_name)+1);
data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp-hash.c:146:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	digest_update(&ctx, seed, strlen(seed));
data/dovecot-2.3.11.3+dfsg1/src/lib-otp/otp-hash.c:147:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	digest_update(&ctx, passphrase, strlen(passphrase));
data/dovecot-2.3.11.3+dfsg1/src/lib-program-client/test-program-client-local.c:218:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(str_len(output) == strlen(pclient_test_io_string)*10*10*10);
data/dovecot-2.3.11.3+dfsg1/src/lib-sasl/dsasl-client.c:81:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(client->password, 0, strlen(client->password));
data/dovecot-2.3.11.3+dfsg1/src/lib-sasl/mech-external.c:48:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*output_len_r = strlen(username);
data/dovecot-2.3.11.3+dfsg1/src/lib-sasl/mech-login.c:59:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*output_len_r = strlen(_client->set.authid);
data/dovecot-2.3.11.3+dfsg1/src/lib-sasl/mech-login.c:63:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*output_len_r = strlen(_client->set.password);
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:370:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncasecmp(p, "secs", strlen(p)) == 0 ||
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:371:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    strncasecmp(p, "seconds", strlen(p)) == 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:376:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncasecmp(p, "mins", strlen(p)) == 0 ||
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:377:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    strncasecmp(p, "minutes", strlen(p)) == 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:379:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strncasecmp(p, "msecs", strlen(p)) == 0 ||
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:380:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 strncasecmp(p, "mseconds", strlen(p)) == 0 ||
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:381:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 strncasecmp(p, "millisecs", strlen(p)) == 0 ||
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:382:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 strncasecmp(p, "milliseconds", strlen(p)) == 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:400:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncasecmp(p, "hours", strlen(p)) == 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:405:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncasecmp(p, "days", strlen(p)) == 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:410:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncasecmp(p, "weeks", strlen(p)) == 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings-parser.c:2202:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str = t_str_new(i + strlen(name+i) + 8);
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings.c:243:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(line);
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings.c:285:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(line);
data/dovecot-2.3.11.3+dfsg1/src/lib-settings/settings.c:319:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					section += strlen(next_section);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-address.c:589:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pend = p + strlen(in);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-address.c:666:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pend = p + strlen(address->localpart);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-address.c:799:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		lpsize = strlen(src->localpart) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-address.c:803:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		dsize = strlen(src->domain) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-address.c:807:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		rsize = strlen(src->raw) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client-command.c:143:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	name_len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client-command.c:885:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int len = strlen(cmd_str);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client-connection.c:553:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(conn->password, 0, strlen(conn->password));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-client-connection.c:578:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		input_len = strlen(reply->text_lines[0]);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-params.c:259:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pend = p + strlen(envid);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-params.c:569:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	smtp_xtext_encode(buffer, (const unsigned char *)envid, strlen(envid));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-params.c:839:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    strlen(addr_str), 2, 0);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-parser.c:125:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	parser->end = (unsigned char *)data + strlen(data);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-reply.c:109:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_len = strlen(reply->content->status_prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-reply.c:306:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t prefix_len = strlen(reply->content->status_prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-reply.c:354:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	offset = strlen(reply->content->status_prefix) +
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-reply.c:363:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		reply->content->last_line += strlen(text_prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-reply.c:376:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_len = strlen(reply->content->status_prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-server-reply.c:562:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_len = strlen(reply->content->status_prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-syntax.c:51:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pend = p + strlen(value);
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-syntax.c:112:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(*value_r) != str_len(value)) {
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/smtp-syntax.h:25:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	smtp_xtext_encode(out, (const unsigned char *)data, strlen(data));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-client-errors.c:795:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	msg_input = i_stream_create_from_data(message, strlen(message));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-client-errors.c:1026:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(message, strlen(message));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-client-errors.c:1334:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(message, strlen(message));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-client-errors.c:1794:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(message, strlen(message));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-client-errors.c:2154:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	o_stream_nsend(pctx->output, message, strlen(message));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-client-errors.c:3182:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(message, strlen(message));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-client-errors.c:3406:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = i_stream_create_from_data(message, strlen(message));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-command-parser.c:83:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						  strlen(test->command));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-command-parser.c:174:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						  strlen(command_text));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-command-parser.c:239:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						  strlen(test->auth_response));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-command-parser.c:311:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						  strlen(response_text));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-reply.c:128:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						  strlen(test->input));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-reply.c:254:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		input = i_stream_create_from_data(reply_text, strlen(reply_text));
data/dovecot-2.3.11.3+dfsg1/src/lib-smtp/test-smtp-submit.c:2054:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	msize = strlen(message);
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-cassandra.c:436:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(void)write_full(STDERR_FILENO, str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-cassandra.c:455:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(db->fd_pipe[0], ids, sizeof(ids));
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-cassandra.c:557:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	escaped = t_str_new(strlen(string)+10);
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-cassandra.c:1477:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			output_size = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-cassandra.c:1490:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			output_size = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-mysql.c:363:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(string);
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-pgsql.c:156:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(msg);
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-pgsql.c:546:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(string);
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-pgsql.c:878:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(msg);
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-sqlite.c:125:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dest = destbegin = t_buffer_get((p - string) + strlen(string) * 2 + 1);
data/dovecot-2.3.11.3+dfsg1/src/lib-sql/driver-test.c:231:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	string_t *esc = t_str_new(strlen(string));
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl-common.c:52:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(cstr) != len) {
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl-context.c:73:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen(buf);
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl-context.c:86:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bio = BIO_new_mem_buf(key, strlen(key));
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl-context.c:90:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		safe_memset(key, 0, strlen(key));
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl-context.c:109:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(key, 0, strlen(key));
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl-context.c:124:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bio = BIO_new_mem_buf(dhvalue, strlen(dhvalue));
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl-context.c:193:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	in = BIO_new_mem_buf(t_strdup_noconst(cert), strlen(cert));
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl-context.c:256:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bio = BIO_new_mem_buf(t_strdup_noconst(ca), strlen(ca));
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl-context.c:413:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (set->curve_list != NULL && strlen(set->curve_list) > 0 &&
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl.c:69:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	in = BIO_new_mem_buf(t_strdup_noconst(cert), strlen(cert));
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl.c:175:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (set->curve_list != NULL && strlen(set->curve_list) > 0 &&
data/dovecot-2.3.11.3+dfsg1/src/lib-ssl-iostream/iostream-openssl.c:791:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strlen(name) != (size_t)len) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file-fix.c:36:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (memcmp(hdr->magic_pre, DBOX_MAGIC_PRE, strlen(DBOX_MAGIC_PRE)) != 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file-fix.c:76:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (size < strlen(DBOX_MAGIC_POST)) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file-fix.c:77:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*need_bytes = strlen(DBOX_MAGIC_POST);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file-fix.c:80:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (memcmp(data, DBOX_MAGIC_POST, strlen(DBOX_MAGIC_POST)) != 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file-fix.c:84:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i = strlen(DBOX_MAGIC_POST); i < size; ) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file-fix.c:153:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	need_bytes = strlen(DBOX_MAGIC_POST); prev_need_bytes = 0;
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file-fix.c:166:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			need_bytes = strlen(DBOX_MAGIC_POST);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file-fix.c:176:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			need_bytes = strlen(DBOX_MAGIC_POST);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file-fix.c:186:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				need_bytes = strlen(DBOX_MAGIC_POST);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file-fix.c:198:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				need_bytes = strlen(DBOX_MAGIC_POST);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file-fix.c:264:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t magic_len = strlen(DBOX_MAGIC_PRE);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-file.c:134:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pos += strlen(value) + 2;
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-common/dbox-mail.c:206:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					 value, strlen(value));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-file.c:311:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_mask = umask(0666 & ~perm.file_create_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-file.c:313:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-file.c:326:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		old_mask = umask(0666 & ~perm.file_create_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-file.c:328:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-map.c:987:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(MDBOX_MAIL_FILE_PREFIX)) != 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-map.c:989:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (str_to_uint32(d->d_name + strlen(MDBOX_MAIL_FILE_PREFIX),
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-map.c:1193:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t prefix_len = strlen(MDBOX_MAIL_FILE_PREFIX);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-purge.c:531:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (str_to_uint32(d->d_name + strlen(MDBOX_MAIL_FILE_PREFIX),
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-storage-rebuild.c:271:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	id_str = fname + strlen(MDBOX_MAIL_FILE_PREFIX);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-multi/mdbox-storage-rebuild.c:887:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(MDBOX_MAIL_FILE_PREFIX)) == 0) T_BEGIN {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-file.c:250:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_mask = umask(0666 & ~perm->file_create_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-file.c:252:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-file.c:265:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		old_mask = umask(0666 & ~perm->file_create_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-file.c:267:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/dbox-single/sdbox-sync-rebuild.c:78:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fname += strlen(SDBOX_MAIL_FILE_PREFIX);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-list.c:271:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   imapc_list_prefix[strlen(imapc_list_prefix)-1] == list->root_sep) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-list.c:367:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		prefix_len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-list.c:424:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t vname_len = strlen(vname);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-list.c:503:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t imapc_list_prefix_len = strlen(imapc_list_prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-mail.c:528:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				imail->data.guid, strlen(imail->data.guid));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-mail.c:569:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 imail->data.guid, strlen(imail->data.guid));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-mailbox.c:626:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				       guid_cache_idx, guid, strlen(guid));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/imapc/imapc-storage.c:1091:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(ns->prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-attachment.c:103:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(digest) < 4) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-attachment.c:122:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				path + strlen(attachment_dir) + 1);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-attribute.c:235:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						 ts, strlen(value_str));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-attribute.c:286:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		iter->prefix_len = strlen(iter->prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail-binary.c:78:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					   strlen(cte_binary));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail-headers.c:730:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	new_str = p_malloc(pool, i + strlen(str+i) + 1);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail-headers.c:787:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					   strlen(input), str, NULL);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail-headers.c:789:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(str_c(str)) != str_len(str)) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail.c:409:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(str), &t, &tz)) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail.c:643:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     uidl, strlen(uidl));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail.c:914:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     strlen(mail->data.body_snippet));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-mail.c:1423:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						     strlen(mail->data.body_snippet));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-search-mime.c:185:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(envelope->date), &sent_time, &timezone_offset))
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-search-mime.c:266:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(arg->value.str), mpctx->buf) < 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-search-mime.c:276:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(value), mpctx->buf) >= 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-search-mime.c:287:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		vlen = strlen(value);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-search-mime.c:288:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		alen = strlen(key);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-search.c:485:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					     strlen(arg->value.str), dtc) < 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sort.c:497:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(str), 1,
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sort.c:529:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(addr->name);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-sort.c:610:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	(void)uni_utf8_to_decomposed_titlecase(str, strlen(str), dest);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/index-storage.c:1089:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		subs_name += strlen(ns->prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-keywords.c:375:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		old_mask = umask(0777 & ~perm->file_create_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-keywords.c:378:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-save.c:348:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		old_mask = umask(0777 & ~perm->file_create_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-save.c:351:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-storage.c:407:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_mask = umask(0);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-storage.c:410:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-storage.c:484:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_mask = umask(0);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-storage.c:486:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c:159:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		old_mask = umask(0777 & ~perm->file_create_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c:162:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c:1077:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		p += strlen((const char *)p) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c:1157:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen((const char *)p) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c:1165:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buffer_append(buf, value, strlen(value) + 1);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c:1292:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen((const char *)p);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c:1410:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		old_mask = umask(0777 & ~perm->file_create_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/maildir/maildir-uidlist.c:1412:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-save.c:95:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(fd, &ch, 1) != 1) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-save.c:170:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-save.c:396:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		streams[0] = i_stream_create_from_data(hdr, strlen(hdr));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-save.c:635:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			hdr.value_len = strlen((const char *)hdr.value);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-storage.c:706:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/mbox/mbox-sync-update.c:304:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			p = hdr + strlen(hdr);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/pop3c/pop3c-sync.c:251:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				       strlen(rmsg[ridx].uidl));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/shared/shared-list.c:93:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t prefix_len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/index/shared/shared-storage.c:94:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ns->prefix_len = strlen(ns->prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-delete.c:295:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(path);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-fs-iter.c:115:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				    strlen(storage_name), destname))
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-fs-iter.c:368:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_len = strlen(_list->ns->prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-fs-iter.c:484:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		parentlen = strlen(*parentp);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-fs-iter.c:820:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    strlen(ctx->info.vname) < _ctx->list->ns->prefix_len) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-backend.c:540:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t box_name_len = strlen(box_zerosep_name);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-backend.c:737:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t oldname_len = strlen(oldname);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-iter.c:149:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				ctx->parent_len -= strlen(node->name);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-index-sync.c:174:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			buffer_append(hdr_buf, name, strlen(name) + 1);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-iter.c:367:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t prefix_len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-iter.c:796:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len, name_len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-iter.c:807:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = I_MIN(name_len, strlen(sets[i]->name));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-iter.c:908:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			name_len = strlen(autobox->name);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-maildir-iter.c:54:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t vname_len = strlen(vname);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-maildir-iter.c:304:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    strlen(fname), destvname))
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-maildir.c:334:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	old_vnamelen = strlen(old_vname);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/mailbox-list-subscriptions.c:87:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/subscription-file.c:63:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const unsigned char version2_header_len = strlen(version2_header);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/list/subscription-file.c:333:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_append_tabunescaped(ctx->name, line, strlen(line));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-duplicate.c:315:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		rec.user_size = strlen(d->user);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-namespace.c:49:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ns->prefix_len = strlen(ns->prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-namespace.c:344:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    ns->prefix[strlen(ns->prefix)-1] != ns_sep) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-namespace.c:824:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-namespace.c:839:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-search-register-imap.c:510:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	utf8_name = t_str_new(strlen(sarg->value.str));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:154:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(key);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:846:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	field_name_len = strlen(field_name);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:964:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	(void)umask(0077);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:1203:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t prefix_len = prefix == NULL ? 0 : strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-service.c:1478:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(priv.chroot);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage-settings.c:735:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(address), 2, 0);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c:1322:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(box->vname) > MAILBOX_LIST_NAME_MAX_LENGTH) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c:1340:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(old_name) > MAILBOX_MAX_HIERARCHY_NAME_LENGTH) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c:1351:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t name_len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c:1918:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t src_prefix_len = strlen(src->vname)+1; /* include separator */
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c:1919:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t dest_prefix_len = strlen(dest->vname)+1;
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c:1934:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(child->vname + src_prefix_len)+dest_prefix_len > MAILBOX_LIST_NAME_MAX_LENGTH) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c:2895:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_mask = umask(0);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c:2897:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-storage.c:3171:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sha1_get_digest(box->name, strlen(box->name), box_name_sha1);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-user.c:354:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(ns->prefix) < strlen((*tmp)->prefix))
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-user.c:354:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(ns->prefix) < strlen((*tmp)->prefix))
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-user.c:615:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t name_len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail-user.c:731:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t home_len = strlen(home);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mail.c:474:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sha1_get_digest(guid, strlen(guid), sha1_sum);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-attribute.c:163:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			prefixed_key = p_strndup(pool, key, strlen(key)-1);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-attribute.c:183:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	plen = strlen(bare_prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-attribute.c:211:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    attr->iter(box, bare_prefix + strlen(attr->key),
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-attribute.c:515:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(MAILBOX_ATTRIBUTE_PREFIX_DOVECOT_PVT_SERVER)) == 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-attribute.h:179:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		 strlen(MAILBOX_ATTRIBUTE_PREFIX_DOVECOT_PVT_SERVER MAILBOX_ATTRIBUTE_PREFIX_DOVECOT_PVT)) != 0))
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-header.c:58:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		dest_name[i] = p_strdup(pool, fields[i].name + strlen("hdr."));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:195:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if (set->mailbox_dir_name[strlen(set->mailbox_dir_name)-1] == '/') {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:236:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(path);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:364:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(value) != 1) {
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:471:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(maildir_name);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:484:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t ns_prefix_len = strlen(ns_prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:578:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t prefix_len = strlen(ns->prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:595:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 strlen(storage_name) == prefix_len-1 &&
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:607:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		str = t_str_new(strlen(storage_name)*2);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:660:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t ns_prefix_len = strlen(ns_prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:661:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	string_t *dest = t_str_new(strlen(src));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:768:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		string_t *str = t_str_new(strlen(vname));
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:779:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_len = strlen(list->ns->prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:791:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		name_len = strlen(vname);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:1442:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			path = t_strndup(path, strlen(path)-1);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:1451:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			path = t_strndup(path, strlen(path)-1);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:1617:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(rootdir);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:1776:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha1_get_digest(name, strlen(name), sha);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-list.c:1891:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(root_dir);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-tree.c:101:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str = t_str_new(strlen(path)+1);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-tree.c:210:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t len = strlen(nodes[i-1]->name) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.c:46:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_mask = umask(0666 & ~perm.file_create_mode);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.c:48:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.c:67:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (pwrite_full(fd, buf, strlen(buf), 0) < 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.c:144:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.c:169:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
			old_mask = umask(0);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.c:171:4:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
			umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib-storage/mailbox-uidvalidity.c:235:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (pwrite_full(fd, buf, strlen(buf), 0) < 0)
data/dovecot-2.3.11.3+dfsg1/src/lib-test/test-common.c:131:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i += strlen(test_prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib-test/test-common.c:142:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i += strlen(name) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib-test/test-istream.c:129:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return test_istream_create_data(data, strlen(data));
data/dovecot-2.3.11.3+dfsg1/src/lib/askpass.c:42:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (read(fd, &ch, 1) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib/base32.c:299:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib/base32.c:309:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib/base64.h:226:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      src, strlen(src));
data/dovecot-2.3.11.3+dfsg1/src/lib/base64.h:260:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return t_base64_scheme_decode(b64, flags, str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/lib/base64.h:297:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      src, strlen(src));
data/dovecot-2.3.11.3+dfsg1/src/lib/base64.h:363:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      src, strlen(src));
data/dovecot-2.3.11.3+dfsg1/src/lib/compat.c:124:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, buf, count);
data/dovecot-2.3.11.3+dfsg1/src/lib/connection.c:358:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(conn->label) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/lib/env-util.c:42:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/lib/event-log.c:199:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		glmctx->type_pos = (prefix == NULL ? 0 : strlen(prefix));
data/dovecot-2.3.11.3+dfsg1/src/lib/failures.c:347:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i_assert(ctx->log_prefix_type_pos <= strlen(ctx->log_prefix));
data/dovecot-2.3.11.3+dfsg1/src/lib/failures.c:671:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(void)write_full(STDERR_FILENO, str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/lib/failures.c:683:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(void)write_full(STDERR_FILENO, str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/lib/failures.c:729:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	(void)write_full(STDERR_FILENO, str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/lib/failures.c:833:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (failure->log_prefix_len > strlen(line)) {
data/dovecot-2.3.11.3+dfsg1/src/lib/file-copy.c:57:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_umask = umask(0);
data/dovecot-2.3.11.3+dfsg1/src/lib/file-copy.c:59:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_umask);
data/dovecot-2.3.11.3+dfsg1/src/lib/file-dotlock.c:107:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, buf, sizeof(buf)-1);
data/dovecot-2.3.11.3+dfsg1/src/lib/file-dotlock.c:308:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_full(fd, str, strlen(str)) < 0 ||
data/dovecot-2.3.11.3+dfsg1/src/lib/file-dotlock.c:353:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		old_mask = umask(0666);
data/dovecot-2.3.11.3+dfsg1/src/lib/file-dotlock.c:356:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib/file-dotlock.c:800:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_mask = umask(0666 ^ mode);
data/dovecot-2.3.11.3+dfsg1/src/lib/file-dotlock.c:802:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib/guid.c:44:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sha1_get_digest(host, strlen(host), full_hash);
data/dovecot-2.3.11.3+dfsg1/src/lib/guid.c:117:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen(str) == GUID_128_SIZE*2 &&
data/dovecot-2.3.11.3+dfsg1/src/lib/guid.c:159:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib/hash-method.h:50:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return t_hash_data(meth, data, strlen(data));
data/dovecot-2.3.11.3+dfsg1/src/lib/hmac.c:95:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return t_hmac_data(meth, key, key_len, data, strlen(data));
data/dovecot-2.3.11.3+dfsg1/src/lib/hostpid.c:36:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    strcspn(value, HOSTNAME_DISALLOWED_CHARS) != strlen(value))
data/dovecot-2.3.11.3+dfsg1/src/lib/ioloop-notify-inotify.c:45:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(ctx->inotify_fd, event_buf, sizeof(event_buf));
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-callback.c:98:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i_stream_callback_append(input, str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-file.c:70:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(stream->fd, stream->w_buffer + stream->pos,
data/dovecot-2.3.11.3+dfsg1/src/lib/istream-private.h:16:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t (*read)(struct istream_private *stream);
data/dovecot-2.3.11.3+dfsg1/src/lib/istream.c:313:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = _stream->read(_stream);
data/dovecot-2.3.11.3+dfsg1/src/lib/json-parser.c:400:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t avail, len = strlen(atom);
data/dovecot-2.3.11.3+dfsg1/src/lib/json-parser.c:810:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	json_append_escaped_data(dest, (const unsigned char*)src, strlen(src));
data/dovecot-2.3.11.3+dfsg1/src/lib/lib-signals.c:250:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(sig_pipe_fd[0], buf, sizeof(buf));
data/dovecot-2.3.11.3+dfsg1/src/lib/lib-signals.c:483:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t prefix_len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib/lib-signals.c:484:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t errno_str_len = strlen(errno_str);
data/dovecot-2.3.11.3+dfsg1/src/lib/mempool-alloconly.c:238:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	min_alloc += MEM_ALIGN(strlen(name) + 1 + SENTRY_COUNT) +
data/dovecot-2.3.11.3+dfsg1/src/lib/mempool-alloconly.c:257:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		name += strlen(MEMPOOL_GROWING);
data/dovecot-2.3.11.3+dfsg1/src/lib/mkdir-parents.c:23:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		old_mask = umask(0);
data/dovecot-2.3.11.3+dfsg1/src/lib/mkdir-parents.c:25:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/lib/module-dir.c:123:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(*deps);
data/dovecot-2.3.11.3+dfsg1/src/lib/module-dir.c:329:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/lib/module-dir.c:426:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (p == NULL || strlen(p) != 3)
data/dovecot-2.3.11.3+dfsg1/src/lib/module-dir.c:686:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/lib/net.c:329:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(i_rand_minmax(1, 10) * 10000);
data/dovecot-2.3.11.3+dfsg1/src/lib/net.c:616:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, buf, len);
data/dovecot-2.3.11.3+dfsg1/src/lib/net.c:871:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100);
data/dovecot-2.3.11.3+dfsg1/src/lib/net.c:944:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				size_t len = strlen(addr);
data/dovecot-2.3.11.3+dfsg1/src/lib/ostream.c:309:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return o_stream_send(stream, str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/lib/ostream.c:339:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	o_stream_nsend(stream, str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/lib/path-util.c:53:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		npath_pos = npath + strlen(npath);
data/dovecot-2.3.11.3+dfsg1/src/lib/path-util.c:125:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				size_t lsize = 128, tlen = strlen(segend), espace;
data/dovecot-2.3.11.3+dfsg1/src/lib/path-util.c:331:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	t_buffer_alloc(strlen(dir) + 1);
data/dovecot-2.3.11.3+dfsg1/src/lib/printf-format-fix.c:22:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len2 = strlen(errstr);
data/dovecot-2.3.11.3+dfsg1/src/lib/printf-format-fix.c:23:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len3 = strlen(p + 2);
data/dovecot-2.3.11.3+dfsg1/src/lib/printf-format-fix.c:162:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*len_r = p - format + strlen(p);
data/dovecot-2.3.11.3+dfsg1/src/lib/process-title.c:47:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	last = argv[0] + strlen(argv[0]) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib/process-title.c:50:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			last = argv[i] + strlen(argv[i]) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib/process-title.c:58:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				last = env[i] + strlen(env[i]) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib/process-title.c:82:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memblock_len += strlen(old_argv[count]) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib/process-title.c:96:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(old_argv[i]) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib/process-title.c:107:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(title);
data/dovecot-2.3.11.3+dfsg1/src/lib/randgen.c:98:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(urandom_fd, buf, size);
data/dovecot-2.3.11.3+dfsg1/src/lib/read-full.c:13:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(fd, data, size < SSIZE_T_MAX ? size : SSIZE_T_MAX);
data/dovecot-2.3.11.3+dfsg1/src/lib/safe-mkstemp.c:40:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		old_umask = umask(0666 ^ mode);
data/dovecot-2.3.11.3+dfsg1/src/lib/safe-mkstemp.c:42:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask(old_umask);
data/dovecot-2.3.11.3+dfsg1/src/lib/str-find.c:81:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t key_len = strlen(key);
data/dovecot-2.3.11.3+dfsg1/src/lib/str.h:35:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer_append(str, cstr, strlen(cstr));
data/dovecot-2.3.11.3+dfsg1/src/lib/str.h:60:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer_insert(str, pos, cstr, strlen(cstr));
data/dovecot-2.3.11.3+dfsg1/src/lib/str.h:71:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer_replace(str, pos, len, cstr, strlen(cstr));
data/dovecot-2.3.11.3+dfsg1/src/lib/strescape.c:137:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_append_tabescaped_n(dest, (const unsigned char*)src, strlen(src));
data/dovecot-2.3.11.3+dfsg1/src/lib/strescape.h:13:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return str_nescape(str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:51:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(str) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:188:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:312:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:334:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:436:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pend = str + strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:763:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sep_len = strlen(separator);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:769:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(arr[i]);
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:840:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size += sizeof(const char *) + strlen(arr[i]) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.c:845:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(arr[i]) + 1;
data/dovecot-2.3.11.3+dfsg1/src/lib/strfuncs.h:97:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
# define str_begins(h, n) (__builtin_constant_p(n) ? strncmp((h), (n), strlen(n))==0 : (str_begins)((h), (n)))
data/dovecot-2.3.11.3+dfsg1/src/lib/test-array.c:260:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		unsigned int olen = strlen(ostr);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base32.c:31:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		base32_encode(TRUE, input[i], strlen(input[i]), str);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base32.c:43:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(output[i]);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base32.c:47:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		base32_encode(FALSE, input[i], strlen(input[i]), str);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base32.c:76:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		base32hex_encode(TRUE, input[i], strlen(input[i]), str);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base32.c:88:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(output[i]);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base32.c:92:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		base32hex_encode(FALSE, input[i], strlen(input[i]), str);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base32.c:132:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ret = base32_decode(input[i], strlen(input[i]), &src_pos, str);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base32.c:138:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			      src_pos == strlen(input[i]))));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:30:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		base64_encode(tests[i].input, strlen(tests[i].input), str);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:34:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(tests[i].input)), i);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:80:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			MAX_BASE64_DECODED_SIZE(strlen(tests[i].input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:87:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ret = base64_decode(tests[i].input, strlen(tests[i].input),
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:91:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		test_assert_idx(strlen(tests[i].output) == str_len(str) &&
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:97:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(tests[i].input)), i);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:153:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		base64url_encode(0, 0, tests[i].input, strlen(tests[i].input),
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:158:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(tests[i].input)), i);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:204:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			MAX_BASE64_DECODED_SIZE(strlen(tests[i].input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:212:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				       strlen(tests[i].input), str);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:215:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		test_assert_idx(strlen(tests[i].output) == str_len(str) &&
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:221:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(tests[i].input)), i);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:467:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			&enc, strlen(test->input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:468:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		base64_encode_more(&enc, test->input, strlen(test->input),
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:475:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(test->input)), i);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:883:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			MAX_BASE64_DECODED_SIZE(strlen(test->input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:891:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ret = base64_decode_more(&dec, test->input, strlen(test->input),
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:897:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		test_assert_idx(strlen(test->output) == str_len(str) &&
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:902:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				src_pos == strlen(test->input)), i);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:906:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(test->input)), i);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:1197:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t in_len = strlen(in);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:1250:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			base64_encode_more(&b64enc, input[i], strlen(input[i]),
data/dovecot-2.3.11.3+dfsg1/src/lib/test-base64.c:1272:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			base64_encode_more(&b64enc, input[i], strlen(input[i]),
data/dovecot-2.3.11.3+dfsg1/src/lib/test-event-log.c:2472:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(10);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-iso8601-date.c:76:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			((const unsigned char *)date_in, strlen(date_in), &ptm, &pzone_offset);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-iso8601-date.c:83:32:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
			test_out("valid timestamp", equal);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-iso8601-date.c:136:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			((const unsigned char *)date_in, strlen(date_in), &tm, &tz);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-base64-decoder.c:90:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(size == strlen(output));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-base64-decoder.c:99:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int base64_input_len = strlen(base64_input);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-base64-decoder.c:116:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int base64_input_len = strlen(base64_input);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-base64-encoder.c:95:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(size == strlen(output) && memcmp(data, output, size) == 0);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-base64-encoder.c:106:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int text_len = strlen(text);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-base64-encoder.c:124:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int text_len = strlen(text);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-base64-encoder.c:141:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int offset, len = strlen(textout);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-base64-encoder.c:166:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input_data = i_stream_create_from_data(textin, strlen(textin));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-base64-encoder.c:180:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input_data = i_stream_create_from_data(textin, strlen(textin));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-crlf.c:14:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int i, j, pos, input_len = strlen(input);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-jsonstr.c:34:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t json_input_len = strlen(json_input);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-jsonstr.c:65:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		test_assert(size == strlen(output));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-jsonstr.c:83:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t json_input_len = strlen(json_input);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-jsonstr.c:106:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t json_input_len = strlen(json_input);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-jsonstr.c:119:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(memcmp(i_stream_get_data(input, &len), output, I_MIN(len, strlen(output))) == 0 &&
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-jsonstr.c:120:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    len == strlen(output));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-multiplex.c:244:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		siz = strlen(line);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-multiplex.c:260:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	uint32_t len = cpu32_to_be(strlen(msg) + 1);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-multiplex.c:264:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		{ msg, strlen(msg) },
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-seekable.c:140:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int in_str_len = strlen(in_str);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-sized.c:23:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int sized_input_len = strlen(sized_input);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-istream-unix.c:25:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(fd, &buf, 1) < 0)
data/dovecot-2.3.11.3+dfsg1/src/lib/test-json-parser.c:127:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int i, pos, json_input_len = strlen(json_input);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-json-parser.c:188:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = test_istream_create_data(test_input, strlen(test_input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-json-parser.c:237:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = test_istream_create_data(test_input, strlen(test_input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-json-parser.c:251:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = test_istream_create_data(test_input, strlen(test_input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-json-parser.c:253:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (pos = 0; pos <= strlen(test_input); pos +=2) {
data/dovecot-2.3.11.3+dfsg1/src/lib/test-json-parser.c:271:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = test_istream_create_data(test_input, strlen(test_input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-json-parser.c:287:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = test_istream_create_data(test_input, strlen(test_input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-json-parser.c:289:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (pos = 0; pos <= strlen(test_input); pos +=2) {
data/dovecot-2.3.11.3+dfsg1/src/lib/test-json-parser.c:320:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input = test_istream_create_data(test_input, strlen(test_input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-buffer.c:91:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(ret == (ssize_t)strlen(partial_input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-ostream-file.c:164:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	test_assert(read(sock_fd[1], buf, sizeof(buf)) == 4 &&
data/dovecot-2.3.11.3+dfsg1/src/lib/test-path-util.c:188:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = nearest_power(I_MAX(127, str_len(basedir) + strlen(COMPONENT_COMPONENT) + 1)) -
data/dovecot-2.3.11.3+dfsg1/src/lib/test-path-util.c:189:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(COMPONENT_COMPONENT);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-printf-format-fix.c:43:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			test_assert_idx(len == strlen(tests[i]), i);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-printf-format-fix.c:66:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	needlen = strlen(needle);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-printf-format-fix.c:86:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			test_assert_idx(len == strlen(chgd), i);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-str-find.c:11:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const unsigned int text_len = strlen(str_find_text);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-str-find.c:46:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				offset - strlen(key);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-str-find.c:71:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (idx = 0; idx < strlen(str_find_text); idx++) {
data/dovecot-2.3.11.3+dfsg1/src/lib/test-str-find.c:72:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for (len = strlen(str_find_text)-idx; len > 0; len--) {
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strescape.c:63:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert(strlen(escaped) == (1 << CHAR_BIT) - 1 + 3);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strescape.c:90:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		str_append_unescaped(str, unesc[i].input, strlen(unesc[i].input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strescape.c:115:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		str_append_tabunescaped(str, tabesc[i].output, strlen(tabesc[i].output));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strescape.c:120:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_append_tabunescaped(str, tabstr, strlen(tabstr));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strescape.c:138:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_append_tabunescaped(str, tabescaped_input, strlen(tabescaped_input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strescape.c:146:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_append_tabunescaped(str, wrong_tabescaped_input, strlen(wrong_tabescaped_input));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strfuncs.c:380:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(tests[i].a);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strfuncs.c:381:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i_assert(len == strlen(tests[i].b));
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strfuncs.c:470:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(strlen(tests[i].s2) == tests[i].match), i);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strnum.c:21:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return len + strlen(STRINGIFY2(BIGBASE))-4;
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strnum.c:94:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return len + strlen(STRINGIFY2(BIGBASE))-6;
data/dovecot-2.3.11.3+dfsg1/src/lib/test-strnum.c:170:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return len + strlen(STRINGIFY2(BIGBASE))-5;
data/dovecot-2.3.11.3+dfsg1/src/lib/test-time-util.c:290:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert_idx(strlen(t[0]) == 4, idx);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-time-util.c:297:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert_idx(strlen(t[1]) == 2, idx);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-time-util.c:302:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert_idx(strlen(t[2]) == 2, idx);
data/dovecot-2.3.11.3+dfsg1/src/lib/test-time-util.c:307:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_assert_idx(strlen(t[3]) == 2, idx);
data/dovecot-2.3.11.3+dfsg1/src/lib/time-util.c:107:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t bufsize = strlen(fmt) + 32;
data/dovecot-2.3.11.3+dfsg1/src/lib/unichar.c:193:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return uni_utf8_strlen_n(input, strlen(input));
data/dovecot-2.3.11.3+dfsg1/src/lib/unichar.c:422:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					 strlen(str), &i) == 0;
data/dovecot-2.3.11.3+dfsg1/src/lib/unix-socket-create.c:16:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_umask = umask(0777 ^ mode);
data/dovecot-2.3.11.3+dfsg1/src/lib/unix-socket-create.c:18:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_umask);
data/dovecot-2.3.11.3+dfsg1/src/lib/unlink-old-files.c:39:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/lib/uri-util.c:1064:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(parser, pool, (const unsigned char *)uri, strlen(uri));
data/dovecot-2.3.11.3+dfsg1/src/lib/uri-util.c:1180:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((unsigned char *)uri, strlen(uri), flags, error_r);
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c:62:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c:99:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md5_get_digest(str, strlen(str), result);
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c:123:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	md5_get_digest(str, strlen(str), digest);
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c:149:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c:229:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((ret = var_expand_long(ctx, field, strlen(field),
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c:388:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (sep == NULL) sep = key + strlen(key);
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c:601:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					size_t len = strlen(var);
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c:615:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						ctx.width = strlen(var) - (-ctx.width);
data/dovecot-2.3.11.3+dfsg1/src/lib/var-expand.c:619:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					ssize_t len = strlen(var);
data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-commands.c:262:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(state->added_headers_local));
data/dovecot-2.3.11.3+dfsg1/src/lmtp/lmtp-commands.c:273:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(state->added_headers_proxy));
data/dovecot-2.3.11.3+dfsg1/src/log/log-error-buffer.c:54:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t prefix_size = strlen(error->prefix)+1;
data/dovecot-2.3.11.3+dfsg1/src/log/log-error-buffer.c:55:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t text_size = strlen(error->text)+1;
data/dovecot-2.3.11.3+dfsg1/src/log/log-error-buffer.c:111:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					  strlen(iter->error.prefix) + 1);
data/dovecot-2.3.11.3+dfsg1/src/login-common/access-lookup.c:32:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(lookup->fd, buf, sizeof(buf));
data/dovecot-2.3.11.3+dfsg1/src/login-common/access-lookup.c:79:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = fd_send(fd, client_fd, cmd, strlen(cmd));
data/dovecot-2.3.11.3+dfsg1/src/login-common/access-lookup.c:80:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (ret != (ssize_t)strlen(cmd)) {
data/dovecot-2.3.11.3+dfsg1/src/login-common/client-common-auth.c:248:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(client->proxy_password, 0, strlen(client->proxy_password));
data/dovecot-2.3.11.3+dfsg1/src/login-common/client-common-auth.c:688:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iov[1].iov_len = strlen(data);
data/dovecot-2.3.11.3+dfsg1/src/login-common/client-common.c:332:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(client->proxy_password));
data/dovecot-2.3.11.3+dfsg1/src/login-common/client-common.c:865:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	field_name_len = strlen(field_name);
data/dovecot-2.3.11.3+dfsg1/src/login-common/client-common.c:1082:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	client_send_raw_data(client, data, strlen(data));
data/dovecot-2.3.11.3+dfsg1/src/login-common/login-proxy-state.c:142:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(cmd);
data/dovecot-2.3.11.3+dfsg1/src/login-common/sasl-server.c:191:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer_append(buf, session_id, strlen(session_id)+1);
data/dovecot-2.3.11.3+dfsg1/src/login-common/sasl-server.c:261:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(cookie) == MASTER_AUTH_COOKIE_SIZE*2)
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:162:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(void)write_full(fd, str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:248:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, buf, sizeof(buf)-1);
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:277:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, buf, sizeof(buf)-1);
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:321:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_full(fd, pid, strlen(pid)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/master/main.c:528:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        (void)umask(0077);
data/dovecot-2.3.11.3+dfsg1/src/master/master-settings.c:284:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t base_dir_len = strlen(master_set->base_dir);
data/dovecot-2.3.11.3+dfsg1/src/master/master-settings.c:439:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(set->base_dir);
data/dovecot-2.3.11.3+dfsg1/src/master/master-settings.c:671:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t dir_len = strlen(dir);
data/dovecot-2.3.11.3+dfsg1/src/master/master-settings.c:703:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/master/sd-daemon.c:307:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        length = strlen(path);
data/dovecot-2.3.11.3+dfsg1/src/master/sd-daemon.c:347:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((e[0] != '@' && e[0] != '/') || e[1] == 0 || strlen(e) > (sizeof(sockaddr.un.sun_path)-1)) {
data/dovecot-2.3.11.3+dfsg1/src/master/sd-daemon.c:359:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(sockaddr.un.sun_path, e, sizeof(sockaddr.un.sun_path)-1);
data/dovecot-2.3.11.3+dfsg1/src/master/sd-daemon.c:366:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        iovec.iov_len = strlen(state);
data/dovecot-2.3.11.3+dfsg1/src/master/sd-daemon.c:370:71:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        msghdr.msg_namelen = offsetof(struct sockaddr_un, sun_path) + strlen(e);
data/dovecot-2.3.11.3+dfsg1/src/master/service-anvil.c:31:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, buf, sizeof(buf));
data/dovecot-2.3.11.3+dfsg1/src/master/service-anvil.c:63:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = write(fd, ANVIL_HANDSHAKE, strlen(ANVIL_HANDSHAKE));
data/dovecot-2.3.11.3+dfsg1/src/master/service-anvil.c:73:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i_assert((size_t)ret == strlen(ANVIL_HANDSHAKE));
data/dovecot-2.3.11.3+dfsg1/src/master/service-anvil.c:83:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(fd, data, strlen(data)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/master/service-listen.c:61:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_umask = umask((set->mode ^ 0777) & 0777);
data/dovecot-2.3.11.3+dfsg1/src/master/service-listen.c:95:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_umask);
data/dovecot-2.3.11.3+dfsg1/src/master/service-listen.c:119:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		old_umask = umask((set->mode ^ 0777) & 0777);
data/dovecot-2.3.11.3+dfsg1/src/master/service-listen.c:121:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask(old_umask);
data/dovecot-2.3.11.3+dfsg1/src/master/service-listen.c:342:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_umask = umask(0600 ^ 0777);
data/dovecot-2.3.11.3+dfsg1/src/master/service-listen.c:350:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_umask);
data/dovecot-2.3.11.3+dfsg1/src/master/service-log.c:33:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	handshake.prefix_len = strlen(log_prefix);
data/dovecot-2.3.11.3+dfsg1/src/master/service-log.c:37:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer_append(handshake_buf, log_prefix, strlen(log_prefix));
data/dovecot-2.3.11.3+dfsg1/src/master/service-log.c:64:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(fd, data, strlen(data)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/master/service-monitor.c:170:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(service->status_fd[0], &status, sizeof(status));
data/dovecot-2.3.11.3+dfsg1/src/master/service-process.c:193:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(rset.chroot_dir);
data/dovecot-2.3.11.3+dfsg1/src/master/service-process.c:473:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t ret = read(fd, buf, sizeof(buf)-1);
data/dovecot-2.3.11.3+dfsg1/src/master/service-process.c:499:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t ret = read(fd, buf, sizeof(buf)-1);
data/dovecot-2.3.11.3+dfsg1/src/master/service-process.c:633:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  data, strlen(data)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/master/test-auth-client.c:394:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	base64_encode(prompt1, strlen(prompt1), chal_b64);
data/dovecot-2.3.11.3+dfsg1/src/master/test-auth-client.c:434:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	base64_encode(prompt2, strlen(prompt2), chal_b64);
data/dovecot-2.3.11.3+dfsg1/src/master/test-auth-client.c:463:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (base64_decode(resp, strlen(resp), NULL, data) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/master/test-auth-client.c:497:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (base64_decode(resp, strlen(resp), NULL, data) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/master/test-auth-client.c:907:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(login_test->username), resp_b64);
data/dovecot-2.3.11.3+dfsg1/src/master/test-auth-client.c:911:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(login_test->password), resp_b64);
data/dovecot-2.3.11.3+dfsg1/src/master/test-auth-client.c:1249:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000); /* wait a little for server setup */
data/dovecot-2.3.11.3+dfsg1/src/master/test-auth-master.c:1390:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000); /* wait a little for server setup */
data/dovecot-2.3.11.3+dfsg1/src/master/test-master-login-auth.c:977:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000); /* wait a little for server setup */
data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-command.c:22:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return sizeof(*cmd) + strlen(cmd->name) + 1 + strlen(cmd->args) + 1;
data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-command.c:22:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return sizeof(*cmd) + strlen(cmd->name) + 1 + strlen(cmd->args) + 1;
data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-command.c:171:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    base64_decode(args[0], strlen(args[0]), NULL, buf) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-domain.c:19:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return sizeof(*domain) + strlen(domain->name) + 1;
data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-session.c:41:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return sizeof(*session) + strlen(session->id) + 1;
data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-session.c:277:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    base64_decode(args[1], strlen(args[1]), NULL, buf) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-user.c:22:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return sizeof(*user) + strlen(user->name) + 1;
data/dovecot-2.3.11.3+dfsg1/src/old-stats/mail-user.c:134:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (base64_decode(args[2], strlen(args[2]), NULL, buf) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/old-stats/stats-carbon.c:69:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_full(ctx->fd, ctx->str, strlen(ctx->str)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-attributes.c:46:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	id = key + strlen(MAILBOX_ATTRIBUTE_PREFIX_ACL);
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-attributes.c:78:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	id = key + strlen(MAILBOX_ATTRIBUTE_PREFIX_ACL);
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-attributes.c:188:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		str_truncate(aiter->acl_name, strlen(MAILBOX_ATTRIBUTE_PREFIX_ACL));
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-lookup-dict.c:170:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-lookup-dict.c:275:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_len = strlen(prefix);
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-lookup-dict.c:285:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i_assert(prefix_len < strlen(key));
data/dovecot-2.3.11.3+dfsg1/src/plugins/acl/acl-mailbox-list.c:239:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/plugins/autocreate/autocreate-plugin.c:77:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char env_name[strlen(env_name_base) + MAX_INT_STRLEN];
data/dovecot-2.3.11.3+dfsg1/src/plugins/expire/doveadm-expire.c:86:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	username = dict_key + strlen(DICT_EXPIRE_PREFIX);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/fts-backend-lucene.c:533:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i_assert(strlen(guid) == MAILBOX_GUID_HEX_LENGTH);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:240:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	t_array_init(&dest_arr, strlen(str) + 1);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:493:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(textcat_dir);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:610:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				       strlen(hdr_name), wname, namesize);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:1173:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		index->normalizer(str, strlen(str), index->normalizer_buf);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-lucene/lucene-wrapper.cc:1179:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	analyzer = guess_analyzer(index, str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/fts-backend-solr-old.c:114:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	xml_encode_data(dest, (const unsigned char *)str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/fts-backend-solr-old.c:154:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = t_str_new(strlen(str) + 16);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/fts-backend-solr.c:145:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	xml_encode_data(dest, (const unsigned char *)str, strlen(str));
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/fts-backend-solr.c:153:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = t_str_new(strlen(str) + 16);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/fts-backend-solr.c:449:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i_assert(strlen(box_guid) == sizeof(ctx->box_guid)-1);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/solr-connection.c:55:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(http_url->path);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/solr-connection.c:306:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	post_payload = i_stream_create_from_data(cmd, strlen(cmd));
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-solr/test-solr-response.c:203:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		text_len = strlen(text);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/fts-backend-squat.c:389:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    default_normalizer(arg->value.str, strlen(arg->value.str), dtc) < 0)
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-test.c:122:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(line);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-test.c:177:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ret = strlen(str)-1;
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.c:1545:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_mask = umask(0);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.c:1547:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_mask);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts-squat/squat-trie.c:1983:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_bytelen = strlen(str);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/doveadm-dump-fts-expunge-log.c:32:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, &rec, sizeof(rec));
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/doveadm-dump-fts-expunge-log.c:47:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, data, data_size);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/doveadm-fts.c:195:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    (const unsigned char *)ctx->tokens, strlen(ctx->tokens),
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/doveadm-fts.c:236:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(const unsigned char *)ctx->tokens, strlen(ctx->tokens),
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-api.c:468:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(ns->prefix);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-build-mail.c:205:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					   strlen(hdr->name), TRUE) < 0)
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-build-mail.c:286:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							  strlen(token)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-expunge-log.c:531:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	struct fts_expunge_log *read;
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-expunge-log.c:540:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	read_ctx = fts_expunge_log_read_begin(read);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-expunge-log.c:550:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	fts_expunge_log_deinit(&read);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-indexer.c:52:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_full(fd, cmd, strlen(cmd)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-parser-script.c:81:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_full(fd, cmd, strlen(cmd)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-parser-script.c:172:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(content_disposition), NULL);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-parser-script.c:215:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_full(fd, cmd, strlen(cmd)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-parser-script.c:249:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(parser->fd, parser->outbuf, sizeof(parser->outbuf));
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/fts-search-args.c:106:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t orig_token_len = strlen(orig_token);
data/dovecot-2.3.11.3+dfsg1/src/plugins/fts/xml2text.c:23:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((ret = read(STDIN_FILENO, buf, sizeof(buf))) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/plugins/imap-acl/imap-acl-plugin.c:468:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		rights->identifier = id + strlen(IMAP_ACL_GROUP_PREFIX);
data/dovecot-2.3.11.3+dfsg1/src/plugins/imap-acl/imap-acl-plugin.c:472:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(IMAP_ACL_GROUP_OVERRIDE_PREFIX);
data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/mail-crypt-key.c:838:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			      strlen(user->username));
data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/mail-crypt-key.c:890:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      strlen(target_uid));
data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-crypt/mail-crypt-key.c:936:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			      strlen(target_uid));
data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-lua/mail-storage-lua.c:86:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*value_len_r = strlen(value.value);
data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-lua/mail-storage-lua.c:546:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					const char *endp = ptr+strlen(MAILBOX_ATTRIBUTE_PREFIX_DOVECOT_PVT_SERVER);
data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-lua/mail-storage-lua.c:547:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					memmove(ptr, endp, strlen(endp));
data/dovecot-2.3.11.3+dfsg1/src/plugins/mail-lua/mail-storage-lua.c:548:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					memset(ptr+strlen(endp), '\0', 1);
data/dovecot-2.3.11.3+dfsg1/src/plugins/notify-status/notify-status-plugin.c:152:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		string_t *username = t_str_new(strlen(user->username));
data/dovecot-2.3.11.3+dfsg1/src/plugins/pop3-migration/pop3-migration-plugin.c:819:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				imap_map[i].pop3_uidl, strlen(imap_map[i].pop3_uidl)+1);
data/dovecot-2.3.11.3+dfsg1/src/plugins/pop3-migration/test-pop3-migration-plugin.c:46:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						  strlen(tests[i].input));
data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-driver-lua.c:242:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	string_t *fn = t_str_new(strlen(evname) +
data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-driver-lua.c:243:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 strlen(DLUA_FN_EVENT_PREFIX) + 2);
data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-message-common.c:21:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(const unsigned char *)hdr, strlen(hdr), 1, 0);
data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-message-common.c:39:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					   strlen(display_name), name_utf8, NULL);
data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-message-common.c:81:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(value), subject_utf8, NULL);
data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-event-messageread.h:8:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read;
data/dovecot-2.3.11.3+dfsg1/src/plugins/push-notification/push-notification-plugin.c:277:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		str_truncate(root_name, strlen(config_name));
data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-dirsize.c:133:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	path_len = strlen(path);
data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-dirsize.c:137:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(count_path[i].path)) == 0) {
data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-maildir.c:587:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((ret = read(root->fd, buf + size, sizeof(buf)-1 - size)) != 0) {
data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota-maildir.c:741:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_full(root->fd, str, strlen(str)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/plugins/quota/quota.c:1494:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmp_param_len = strlen(valid_params->param_name);
data/dovecot-2.3.11.3+dfsg1/src/plugins/replication/replication-plugin.c:151:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(fd, buf, sizeof(buf));
data/dovecot-2.3.11.3+dfsg1/src/plugins/var-expand-crypt/var-expand-crypt-plugin.c:167:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((ret = var_expand_long(_ctx, field, strlen(field),
data/dovecot-2.3.11.3+dfsg1/src/plugins/var-expand-crypt/var-expand-crypt-plugin.c:247:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((ret = var_expand_long(_ctx, field, strlen(field),
data/dovecot-2.3.11.3+dfsg1/src/plugins/virtual/virtual-sync.c:311:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		mailbox.name_len = strlen(bboxes[i]->name);
data/dovecot-2.3.11.3+dfsg1/src/plugins/welcome/welcome-plugin.c:71:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(fd, buf, sizeof(buf));
data/dovecot-2.3.11.3+dfsg1/src/pop3-login/client-authenticate.c:197:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (p == NULL || strlen(p+1) != 32) {
data/dovecot-2.3.11.3+dfsg1/src/pop3-login/client-authenticate.c:208:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      strlen(pop3_client->apop_challenge)+1);
data/dovecot-2.3.11.3+dfsg1/src/pop3-login/client.c:63:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(value) <= LOGIN_MAX_SESSION_ID_LEN) {
data/dovecot-2.3.11.3+dfsg1/src/pop3-login/client.c:71:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t value_len = strlen((*tmp)+8);
data/dovecot-2.3.11.3+dfsg1/src/pop3-login/pop3-proxy.c:25:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(client->proxy_password, 0, strlen(client->proxy_password));
data/dovecot-2.3.11.3+dfsg1/src/pop3-login/pop3-proxy.c:119:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (base64_decode(line, strlen(line), NULL, str) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/pop3/main.c:112:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write(fd_out, lookup_error_str, strlen(lookup_error_str)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/pop3/main.c:297:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(client->fd, msg, strlen(msg)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/replication/aggregator/replicator-connection.c:266:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t data_len = strlen(data);
data/dovecot-2.3.11.3+dfsg1/src/stats/stats-metrics.c:353:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sha1_get_digest(field->value.str, strlen(field->value.str),
data/dovecot-2.3.11.3+dfsg1/src/stats/stats-service-openmetrics.c:79:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pend = p + strlen(name);
data/dovecot-2.3.11.3+dfsg1/src/stats/test-stats-common.c:72:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1); /* make sure duration>0 always */
data/dovecot-2.3.11.3+dfsg1/src/submission-login/client-authenticate.c:284:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	client->master_data_prefix_len = strlen(prefix) + 1;
data/dovecot-2.3.11.3+dfsg1/src/submission-login/client.c:189:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t value_len = strlen(value);
data/dovecot-2.3.11.3+dfsg1/src/submission-login/submission-proxy.c:29:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	safe_memset(client->proxy_password, 0, strlen(client->proxy_password));
data/dovecot-2.3.11.3+dfsg1/src/submission-login/submission-proxy.c:160:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (base64_decode(line, strlen(line), NULL, str) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/submission/main.c:109:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(fd_out, msg, strlen(msg)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/submission/main.c:175:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				helo_len = strlen(helo) + 1;
data/dovecot-2.3.11.3+dfsg1/src/submission/main.c:262:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(client->fd, msg, strlen(msg)) < 0) {
data/dovecot-2.3.11.3+dfsg1/src/util/gdbhelper.c:36:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write(fd_in[1], cmd, strlen(cmd)) < 0)
data/dovecot-2.3.11.3+dfsg1/src/util/gdbhelper.c:61:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			while ((ret = read(fd_out[0], buf, sizeof(buf))) > 0) {
data/dovecot-2.3.11.3+dfsg1/src/util/maildirlock.c:70:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(fd[0], &c, 1);
data/dovecot-2.3.11.3+dfsg1/src/util/rawlog.c:335:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		path += strlen(chroot_dir);
data/dovecot-2.3.11.3+dfsg1/src/util/script-login.c:54:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(conn->fd, buf, sizeof(buf));

ANALYSIS SUMMARY:

Hits = 2629
Lines analyzed = 692512 in approximately 15.93 seconds (43486 lines/second)
Physical Source Lines of Code (SLOC) = 540602
Hits@level = [0] 538 [1] 1289 [2] 1070 [3] 195 [4]  68 [5]   7
Hits@level+ = [0+] 3167 [1+] 2629 [2+] 1340 [3+] 270 [4+]  75 [5+]   7
Hits/KSLOC@level+ = [0+] 5.85828 [1+] 4.8631 [2+] 2.47872 [3+] 0.499443 [4+] 0.138734 [5+] 0.0129485
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.