Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/fis-gtm-6.3-007/sr_i386/auto_zlink.c
Examining data/fis-gtm-6.3-007/sr_i386/auto_zlink.h
Examining data/fis-gtm-6.3-007/sr_i386/cmerrors_ctl.c
Examining data/fis-gtm-6.3-007/sr_i386/cmierrors_ctl.c
Examining data/fis-gtm-6.3-007/sr_i386/emit_code.c
Examining data/fis-gtm-6.3-007/sr_i386/emit_code.h
Examining data/fis-gtm-6.3-007/sr_i386/find_line_call.c
Examining data/fis-gtm-6.3-007/sr_i386/gdeerrors_ctl.c
Examining data/fis-gtm-6.3-007/sr_i386/incr_link.c
Examining data/fis-gtm-6.3-007/sr_i386/make_cimode.c
Examining data/fis-gtm-6.3-007/sr_i386/make_dmode.c
Examining data/fis-gtm-6.3-007/sr_i386/masscomp.h
Examining data/fis-gtm-6.3-007/sr_i386/merrors_ansi.h
Examining data/fis-gtm-6.3-007/sr_i386/merrors_ctl.c
Examining data/fis-gtm-6.3-007/sr_i386/obj_file.c
Examining data/fis-gtm-6.3-007/sr_i386/ttt.c
Examining data/fis-gtm-6.3-007/sr_i386/zbreaksp.h
Examining data/fis-gtm-6.3-007/sr_linux/caller_id.c
Examining data/fis-gtm-6.3-007/sr_linux/gtm_getenv.c
Examining data/fis-gtm-6.3-007/sr_linux/hugetlbfs_overrides.c
Examining data/fis-gtm-6.3-007/sr_linux/inst_flush.c
Examining data/fis-gtm-6.3-007/sr_linux/release_name.h
Examining data/fis-gtm-6.3-007/sr_port/act_in_gvt.c
Examining data/fis-gtm-6.3-007/sr_port/actuallist.c
Examining data/fis-gtm-6.3-007/sr_port/add_atom.c
Examining data/fis-gtm-6.3-007/sr_port/add_inter.h
Examining data/fis-gtm-6.3-007/sr_port/adjust_frames.c
Examining data/fis-gtm-6.3-007/sr_port/advancewindow.c
Examining data/fis-gtm-6.3-007/sr_port/advancewindow.h
Examining data/fis-gtm-6.3-007/sr_port/aio_shim.h
Examining data/fis-gtm-6.3-007/sr_port/alias.h
Examining data/fis-gtm-6.3-007/sr_port/alias_funcs.c
Examining data/fis-gtm-6.3-007/sr_port/alloc_reg.c
Examining data/fis-gtm-6.3-007/sr_port/alloc_reg.h
Examining data/fis-gtm-6.3-007/sr_port/anticipatory_freeze.h
Examining data/fis-gtm-6.3-007/sr_port/arit.h
Examining data/fis-gtm-6.3-007/sr_port/asc2i.c
Examining data/fis-gtm-6.3-007/sr_port/asc_hex2i.c
Examining data/fis-gtm-6.3-007/sr_port/aswp.h
Examining data/fis-gtm-6.3-007/sr_port/azl_geturxlab.c
Examining data/fis-gtm-6.3-007/sr_port/azl_geturxrtn.c
Examining data/fis-gtm-6.3-007/sr_port/backup_block.c
Examining data/fis-gtm-6.3-007/sr_port/base_frame.c
Examining data/fis-gtm-6.3-007/sr_port/bg_update.h
Examining data/fis-gtm-6.3-007/sr_port/bit_clear.c
Examining data/fis-gtm-6.3-007/sr_port/bit_clear.h
Examining data/fis-gtm-6.3-007/sr_port/bit_set.c
Examining data/fis-gtm-6.3-007/sr_port/bit_set.h
Examining data/fis-gtm-6.3-007/sr_port/bm_find_blk.c
Examining data/fis-gtm-6.3-007/sr_port/bm_getfree.c
Examining data/fis-gtm-6.3-007/sr_port/bm_getfree.h
Examining data/fis-gtm-6.3-007/sr_port/bm_setmap.c
Examining data/fis-gtm-6.3-007/sr_port/bm_update.h
Examining data/fis-gtm-6.3-007/sr_port/bml_busy.c
Examining data/fis-gtm-6.3-007/sr_port/bml_find_busy.c
Examining data/fis-gtm-6.3-007/sr_port/bml_find_busy.h
Examining data/fis-gtm-6.3-007/sr_port/bml_find_free.c
Examining data/fis-gtm-6.3-007/sr_port/bml_free.c
Examining data/fis-gtm-6.3-007/sr_port/bml_init.c
Examining data/fis-gtm-6.3-007/sr_port/bml_newmap.c
Examining data/fis-gtm-6.3-007/sr_port/bml_recycled.c
Examining data/fis-gtm-6.3-007/sr_port/bml_status_check.c
Examining data/fis-gtm-6.3-007/sr_port/bml_status_check.h
Examining data/fis-gtm-6.3-007/sr_port/bmm_find_free.c
Examining data/fis-gtm-6.3-007/sr_port/bmm_find_free.h
Examining data/fis-gtm-6.3-007/sr_port/bmm_init.c
Examining data/fis-gtm-6.3-007/sr_port/bool_expr.c
Examining data/fis-gtm-6.3-007/sr_port/break.h
Examining data/fis-gtm-6.3-007/sr_port/bt_get.c
Examining data/fis-gtm-6.3-007/sr_port/bt_init.c
Examining data/fis-gtm-6.3-007/sr_port/bt_malloc.c
Examining data/fis-gtm-6.3-007/sr_port/bt_put.c
Examining data/fis-gtm-6.3-007/sr_port/bt_refresh.c
Examining data/fis-gtm-6.3-007/sr_port/buddy_list.c
Examining data/fis-gtm-6.3-007/sr_port/buddy_list.h
Examining data/fis-gtm-6.3-007/sr_port/bx_boollit.c
Examining data/fis-gtm-6.3-007/sr_port/bx_boolop.c
Examining data/fis-gtm-6.3-007/sr_port/bx_relop.c
Examining data/fis-gtm-6.3-007/sr_port/bx_tail.c
Examining data/fis-gtm-6.3-007/sr_port/cache.h
Examining data/fis-gtm-6.3-007/sr_port/cache_cleanup.c
Examining data/fis-gtm-6.3-007/sr_port/cache_cleanup.h
Examining data/fis-gtm-6.3-007/sr_port/cache_get.c
Examining data/fis-gtm-6.3-007/sr_port/cache_init.c
Examining data/fis-gtm-6.3-007/sr_port/cache_put.c
Examining data/fis-gtm-6.3-007/sr_port/cache_stats.c
Examining data/fis-gtm-6.3-007/sr_port/cache_table_rebuild.c
Examining data/fis-gtm-6.3-007/sr_port/cachectl.h
Examining data/fis-gtm-6.3-007/sr_port/cacheflush.c
Examining data/fis-gtm-6.3-007/sr_port/cacheflush.h
Examining data/fis-gtm-6.3-007/sr_port/caller_id.c
Examining data/fis-gtm-6.3-007/sr_port/caller_id.h
Examining data/fis-gtm-6.3-007/sr_port/callg.h
Examining data/fis-gtm-6.3-007/sr_port/callg_signal.c
Examining data/fis-gtm-6.3-007/sr_port/ccp.h
Examining data/fis-gtm-6.3-007/sr_port/ccp_cluster_lock_wake.h
Examining data/fis-gtm-6.3-007/sr_port/ccpact.h
Examining data/fis-gtm-6.3-007/sr_port/ccpact_tab.h
Examining data/fis-gtm-6.3-007/sr_port/cdb_sc.h
Examining data/fis-gtm-6.3-007/sr_port/cdb_sc_table.h
Examining data/fis-gtm-6.3-007/sr_port/cdbg_dump.c
Examining data/fis-gtm-6.3-007/sr_port/cdbg_dump.h
Examining data/fis-gtm-6.3-007/sr_port/ceil_log2.c
Examining data/fis-gtm-6.3-007/sr_port/ceprep_file.c
Examining data/fis-gtm-6.3-007/sr_port/cert_blk.c
Examining data/fis-gtm-6.3-007/sr_port/cert_blk.h
Examining data/fis-gtm-6.3-007/sr_port/cg_var.c
Examining data/fis-gtm-6.3-007/sr_port/cg_var.h
Examining data/fis-gtm-6.3-007/sr_port/cgp.h
Examining data/fis-gtm-6.3-007/sr_port/change_reg.c
Examining data/fis-gtm-6.3-007/sr_port/change_reg.h
Examining data/fis-gtm-6.3-007/sr_port/chktchain.c
Examining data/fis-gtm-6.3-007/sr_port/cli_get_str_ele.c
Examining data/fis-gtm-6.3-007/sr_port/cli_port.c
Examining data/fis-gtm-6.3-007/sr_port/cliif.h
Examining data/fis-gtm-6.3-007/sr_port/cmd.c
Examining data/fis-gtm-6.3-007/sr_port/cmd.h
Examining data/fis-gtm-6.3-007/sr_port/cmd_qlf.h
Examining data/fis-gtm-6.3-007/sr_port/cmi.h
Examining data/fis-gtm-6.3-007/sr_port/cmidef.h
Examining data/fis-gtm-6.3-007/sr_port/cmmdef.h
Examining data/fis-gtm-6.3-007/sr_port/code_address_type.h
Examining data/fis-gtm-6.3-007/sr_port/code_gen.c
Examining data/fis-gtm-6.3-007/sr_port/coerce.c
Examining data/fis-gtm-6.3-007/sr_port/collseq.c
Examining data/fis-gtm-6.3-007/sr_port/collseq.h
Examining data/fis-gtm-6.3-007/sr_port/comline.h
Examining data/fis-gtm-6.3-007/sr_port/common_startup_init.c
Examining data/fis-gtm-6.3-007/sr_port/common_startup_init.h
Examining data/fis-gtm-6.3-007/sr_port/comp_esc.h
Examining data/fis-gtm-6.3-007/sr_port/comp_fini.c
Examining data/fis-gtm-6.3-007/sr_port/comp_indr.c
Examining data/fis-gtm-6.3-007/sr_port/comp_init.c
Examining data/fis-gtm-6.3-007/sr_port/compile_pattern.c
Examining data/fis-gtm-6.3-007/sr_port/compile_pattern.h
Examining data/fis-gtm-6.3-007/sr_port/compiler.h
Examining data/fis-gtm-6.3-007/sr_port/compiler_ch.c
Examining data/fis-gtm-6.3-007/sr_port/compiler_startup.c
Examining data/fis-gtm-6.3-007/sr_port/compswap.h
Examining data/fis-gtm-6.3-007/sr_port/copy.h
Examining data/fis-gtm-6.3-007/sr_port/copy_stack_frame.c
Examining data/fis-gtm-6.3-007/sr_port/cre_jnl_file.c
Examining data/fis-gtm-6.3-007/sr_port/cre_jnl_file_intrpt_rename.c
Examining data/fis-gtm-6.3-007/sr_port/cre_private_code_copy.c
Examining data/fis-gtm-6.3-007/sr_port/create_byte_xlate_table.c
Examining data/fis-gtm-6.3-007/sr_port/create_dummy_gbldir.c
Examining data/fis-gtm-6.3-007/sr_port/create_fatal_error_zshow_dmp.c
Examining data/fis-gtm-6.3-007/sr_port/create_fatal_error_zshow_dmp.h
Examining data/fis-gtm-6.3-007/sr_port/create_temporaries.c
Examining data/fis-gtm-6.3-007/sr_port/create_utf8_xlate_table.c
Examining data/fis-gtm-6.3-007/sr_port/crit_wake.h
Examining data/fis-gtm-6.3-007/sr_port/cryptdef.h
Examining data/fis-gtm-6.3-007/sr_port/ctrlc_handler_dummy.c
Examining data/fis-gtm-6.3-007/sr_port/ctrlc_handler_dummy.h
Examining data/fis-gtm-6.3-007/sr_port/cvtparm.c
Examining data/fis-gtm-6.3-007/sr_port/cvtparm.h
Examining data/fis-gtm-6.3-007/sr_port/cvtprot.h
Examining data/fis-gtm-6.3-007/sr_port/cvttime.h
Examining data/fis-gtm-6.3-007/sr_port/cws_insert.h
Examining data/fis-gtm-6.3-007/sr_port/db_auto_upgrade.c
Examining data/fis-gtm-6.3-007/sr_port/db_common_init.c
Examining data/fis-gtm-6.3-007/sr_port/db_csh_get.c
Examining data/fis-gtm-6.3-007/sr_port/db_csh_getn.c
Examining data/fis-gtm-6.3-007/sr_port/db_csh_ini.c
Examining data/fis-gtm-6.3-007/sr_port/db_csh_ref.c
Examining data/fis-gtm-6.3-007/sr_port/dbcertify.c
Examining data/fis-gtm-6.3-007/sr_port/dbcertify.h
Examining data/fis-gtm-6.3-007/sr_port/dbcertify_base_ch.c
Examining data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c
Examining data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c
Examining data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c
Examining data/fis-gtm-6.3-007/sr_port/dbfilop.h
Examining data/fis-gtm-6.3-007/sr_port/ddphdr.h
Examining data/fis-gtm-6.3-007/sr_port/deferred_events.c
Examining data/fis-gtm-6.3-007/sr_port/deferred_events.h
Examining data/fis-gtm-6.3-007/sr_port/deferred_events_queue.c
Examining data/fis-gtm-6.3-007/sr_port/deferred_events_queue.h
Examining data/fis-gtm-6.3-007/sr_port/desired_db_format_set.c
Examining data/fis-gtm-6.3-007/sr_port/desired_db_format_set.h
Examining data/fis-gtm-6.3-007/sr_port/deviceparameters.c
Examining data/fis-gtm-6.3-007/sr_port/deviceparameters.h
Examining data/fis-gtm-6.3-007/sr_port/dfa_calc.c
Examining data/fis-gtm-6.3-007/sr_port/dm_read.h
Examining data/fis-gtm-6.3-007/sr_port/dm_setup.c
Examining data/fis-gtm-6.3-007/sr_port/dm_setup.h
Examining data/fis-gtm-6.3-007/sr_port/do_indir_do.c
Examining data/fis-gtm-6.3-007/sr_port/do_indir_do.h
Examining data/fis-gtm-6.3-007/sr_port/do_patalt.c
Examining data/fis-gtm-6.3-007/sr_port/do_patfixed.c
Examining data/fis-gtm-6.3-007/sr_port/do_patsplit.c
Examining data/fis-gtm-6.3-007/sr_port/do_pattern.c
Examining data/fis-gtm-6.3-007/sr_port/do_xform.h
Examining data/fis-gtm-6.3-007/sr_port/dollar_quit.c
Examining data/fis-gtm-6.3-007/sr_port/dollar_quit.h
Examining data/fis-gtm-6.3-007/sr_port/dollar_system_init.c
Examining data/fis-gtm-6.3-007/sr_port/dollar_system_init.h
Examining data/fis-gtm-6.3-007/sr_port/dollar_zlevel.c
Examining data/fis-gtm-6.3-007/sr_port/dollar_zlevel.h
Examining data/fis-gtm-6.3-007/sr_port/dollarx.c
Examining data/fis-gtm-6.3-007/sr_port/dollarx.h
Examining data/fis-gtm-6.3-007/sr_port/dpgbldir.c
Examining data/fis-gtm-6.3-007/sr_port/dpgbldir.h
Examining data/fis-gtm-6.3-007/sr_port/dse.h
Examining data/fis-gtm-6.3-007/sr_port/dse_adrec.c
Examining data/fis-gtm-6.3-007/sr_port/dse_adstar.c
Examining data/fis-gtm-6.3-007/sr_port/dse_all.c
Examining data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c
Examining data/fis-gtm-6.3-007/sr_port/dse_cache.c
Examining data/fis-gtm-6.3-007/sr_port/dse_chng_bhead.c
Examining data/fis-gtm-6.3-007/sr_port/dse_chng_fhead.c
Examining data/fis-gtm-6.3-007/sr_port/dse_chng_rhead.c
Examining data/fis-gtm-6.3-007/sr_port/dse_crit.c
Examining data/fis-gtm-6.3-007/sr_port/dse_data.c
Examining data/fis-gtm-6.3-007/sr_port/dse_dmp.c
Examining data/fis-gtm-6.3-007/sr_port/dse_dmp_fhead.c
Examining data/fis-gtm-6.3-007/sr_port/dse_eval.c
Examining data/fis-gtm-6.3-007/sr_port/dse_exhaus.c
Examining data/fis-gtm-6.3-007/sr_port/dse_exit.c
Examining data/fis-gtm-6.3-007/sr_port/dse_exit.h
Examining data/fis-gtm-6.3-007/sr_port/dse_f_blk.c
Examining data/fis-gtm-6.3-007/sr_port/dse_f_free.c
Examining data/fis-gtm-6.3-007/sr_port/dse_f_key.c
Examining data/fis-gtm-6.3-007/sr_port/dse_f_reg.c
Examining data/fis-gtm-6.3-007/sr_port/dse_fdmp.c
Examining data/fis-gtm-6.3-007/sr_port/dse_find_gvt.c
Examining data/fis-gtm-6.3-007/sr_port/dse_find_roots.c
Examining data/fis-gtm-6.3-007/sr_port/dse_flush.c
Examining data/fis-gtm-6.3-007/sr_port/dse_getblk.c
Examining data/fis-gtm-6.3-007/sr_port/dse_getki.c
Examining data/fis-gtm-6.3-007/sr_port/dse_integ.c
Examining data/fis-gtm-6.3-007/sr_port/dse_is_blk_free.c
Examining data/fis-gtm-6.3-007/sr_port/dse_is_blk_in.c
Examining data/fis-gtm-6.3-007/sr_port/dse_ksrch.c
Examining data/fis-gtm-6.3-007/sr_port/dse_lm_blk_free.c
Examining data/fis-gtm-6.3-007/sr_port/dse_m_rest.c
Examining data/fis-gtm-6.3-007/sr_port/dse_maps.c
Examining data/fis-gtm-6.3-007/sr_port/dse_order.c
Examining data/fis-gtm-6.3-007/sr_port/dse_over.c
Examining data/fis-gtm-6.3-007/sr_port/dse_page.c
Examining data/fis-gtm-6.3-007/sr_port/dse_puttime.h
Examining data/fis-gtm-6.3-007/sr_port/dse_r_dmp.c
Examining data/fis-gtm-6.3-007/sr_port/dse_range.c
Examining data/fis-gtm-6.3-007/sr_port/dse_rest.c
Examining data/fis-gtm-6.3-007/sr_port/dse_rmrec.c
Examining data/fis-gtm-6.3-007/sr_port/dse_rmsb.c
Examining data/fis-gtm-6.3-007/sr_port/dse_save.c
Examining data/fis-gtm-6.3-007/sr_port/dse_shift.c
Examining data/fis-gtm-6.3-007/sr_port/dse_wcreinit.c
Examining data/fis-gtm-6.3-007/sr_port/dsefind.h
Examining data/fis-gtm-6.3-007/sr_port/dump_lockhist.c
Examining data/fis-gtm-6.3-007/sr_port/dump_record.c
Examining data/fis-gtm-6.3-007/sr_port/dumptable.c
Examining data/fis-gtm-6.3-007/sr_port/dumptable.h
Examining data/fis-gtm-6.3-007/sr_port/eb_muldiv.c
Examining data/fis-gtm-6.3-007/sr_port/eb_muldiv.h
Examining data/fis-gtm-6.3-007/sr_port/ebc_xlat.c
Examining data/fis-gtm-6.3-007/sr_port/ebc_xlat.h
Examining data/fis-gtm-6.3-007/sr_port/ecode_add.c
Examining data/fis-gtm-6.3-007/sr_port/ecode_get.c
Examining data/fis-gtm-6.3-007/sr_port/ecode_init.c
Examining data/fis-gtm-6.3-007/sr_port/ecode_set.c
Examining data/fis-gtm-6.3-007/sr_port/eintr_wrappers.h
Examining data/fis-gtm-6.3-007/sr_port/emit_code.c
Examining data/fis-gtm-6.3-007/sr_port/emit_code.h
Examining data/fis-gtm-6.3-007/sr_port/entryref.c
Examining data/fis-gtm-6.3-007/sr_port/err_check.c
Examining data/fis-gtm-6.3-007/sr_port/error.h
Examining data/fis-gtm-6.3-007/sr_port/error_trap.h
Examining data/fis-gtm-6.3-007/sr_port/eval_expr.c
Examining data/fis-gtm-6.3-007/sr_port/ex_tail.c
Examining data/fis-gtm-6.3-007/sr_port/exfun_frame.c
Examining data/fis-gtm-6.3-007/sr_port/exfunc.c
Examining data/fis-gtm-6.3-007/sr_port/expr.c
Examining data/fis-gtm-6.3-007/sr_port/expratom.c
Examining data/fis-gtm-6.3-007/sr_port/expritem.c
Examining data/fis-gtm-6.3-007/sr_port/ext2jnl.c
Examining data/fis-gtm-6.3-007/sr_port/extern_func.c
Examining data/fis-gtm-6.3-007/sr_port/f_ascii.c
Examining data/fis-gtm-6.3-007/sr_port/f_data.c
Examining data/fis-gtm-6.3-007/sr_port/f_extract.c
Examining data/fis-gtm-6.3-007/sr_port/f_find.c
Examining data/fis-gtm-6.3-007/sr_port/f_fnumber.c
Examining data/fis-gtm-6.3-007/sr_port/f_fnzbitfind.c
Examining data/fis-gtm-6.3-007/sr_port/f_fnzbitget.c
Examining data/fis-gtm-6.3-007/sr_port/f_fnzbitset.c
Examining data/fis-gtm-6.3-007/sr_port/f_fnzbitstr.c
Examining data/fis-gtm-6.3-007/sr_port/f_get.c
Examining data/fis-gtm-6.3-007/sr_port/f_get1.c
Examining data/fis-gtm-6.3-007/sr_port/f_incr.c
Examining data/fis-gtm-6.3-007/sr_port/f_justify.c
Examining data/fis-gtm-6.3-007/sr_port/f_length.c
Examining data/fis-gtm-6.3-007/sr_port/f_mint.c
Examining data/fis-gtm-6.3-007/sr_port/f_mint_mstr.c
Examining data/fis-gtm-6.3-007/sr_port/f_mstr.c
Examining data/fis-gtm-6.3-007/sr_port/f_name.c
Examining data/fis-gtm-6.3-007/sr_port/f_next.c
Examining data/fis-gtm-6.3-007/sr_port/f_one_mval.c
Examining data/fis-gtm-6.3-007/sr_port/f_order.c
Examining data/fis-gtm-6.3-007/sr_port/f_order1.c
Examining data/fis-gtm-6.3-007/sr_port/f_qlength.c
Examining data/fis-gtm-6.3-007/sr_port/f_qsubscript.c
Examining data/fis-gtm-6.3-007/sr_port/f_query.c
Examining data/fis-gtm-6.3-007/sr_port/f_reverse.c
Examining data/fis-gtm-6.3-007/sr_port/f_select.c
Examining data/fis-gtm-6.3-007/sr_port/f_stack.c
Examining data/fis-gtm-6.3-007/sr_port/f_text.c
Examining data/fis-gtm-6.3-007/sr_port/f_translate.c
Examining data/fis-gtm-6.3-007/sr_port/f_two_mstrs.c
Examining data/fis-gtm-6.3-007/sr_port/f_two_mval.c
Examining data/fis-gtm-6.3-007/sr_port/f_view.c
Examining data/fis-gtm-6.3-007/sr_port/f_zahandle.c
Examining data/fis-gtm-6.3-007/sr_port/f_zatransform.c
Examining data/fis-gtm-6.3-007/sr_port/f_zcall.c
Examining data/fis-gtm-6.3-007/sr_port/f_zchar.c
Examining data/fis-gtm-6.3-007/sr_port/f_zcollate.c
Examining data/fis-gtm-6.3-007/sr_port/f_zconvert.c
Examining data/fis-gtm-6.3-007/sr_port/f_zdate.c
Examining data/fis-gtm-6.3-007/sr_port/f_zgetsyi.c
Examining data/fis-gtm-6.3-007/sr_port/f_zjobexam.c
Examining data/fis-gtm-6.3-007/sr_port/f_zparse.c
Examining data/fis-gtm-6.3-007/sr_port/f_zpeek.c
Examining data/fis-gtm-6.3-007/sr_port/f_zprevious.c
Examining data/fis-gtm-6.3-007/sr_port/f_zqgblmod.c
Examining data/fis-gtm-6.3-007/sr_port/f_zsearch.c
Examining data/fis-gtm-6.3-007/sr_port/f_zsigproc.c
Examining data/fis-gtm-6.3-007/sr_port/f_zsocket.c
Examining data/fis-gtm-6.3-007/sr_port/f_ztrigger.c
Examining data/fis-gtm-6.3-007/sr_port/f_ztrnlnm.c
Examining data/fis-gtm-6.3-007/sr_port/f_zwidth.c
Examining data/fis-gtm-6.3-007/sr_port/f_zwrite.c
Examining data/fis-gtm-6.3-007/sr_port/fao_parm.h
Examining data/fis-gtm-6.3-007/sr_port/fgn_glopref.c
Examining data/fis-gtm-6.3-007/sr_port/fgncal.h
Examining data/fis-gtm-6.3-007/sr_port/fgncal_lookup.c
Examining data/fis-gtm-6.3-007/sr_port/fgncal_unwind.c
Examining data/fis-gtm-6.3-007/sr_port/file_head_read.h
Examining data/fis-gtm-6.3-007/sr_port/file_head_write.h
Examining data/fis-gtm-6.3-007/sr_port/fileinfo.h
Examining data/fis-gtm-6.3-007/sr_port/find_line_addr.c
Examining data/fis-gtm-6.3-007/sr_port/find_line_start.c
Examining data/fis-gtm-6.3-007/sr_port/find_mvstent.c
Examining data/fis-gtm-6.3-007/sr_port/find_mvstent.h
Examining data/fis-gtm-6.3-007/sr_port/find_rtn_hdr.c
Examining data/fis-gtm-6.3-007/sr_port/five_2_ascii.c
Examining data/fis-gtm-6.3-007/sr_port/five_2_ascii.h
Examining data/fis-gtm-6.3-007/sr_port/five_bit.c
Examining data/fis-gtm-6.3-007/sr_port/five_bit.h
Examining data/fis-gtm-6.3-007/sr_port/fix_pages.h
Examining data/fis-gtm-6.3-007/sr_port/fix_xfer_entry.h
Examining data/fis-gtm-6.3-007/sr_port/flt_mod.c
Examining data/fis-gtm-6.3-007/sr_port/flt_mod.h
Examining data/fis-gtm-6.3-007/sr_port/flush_jmp.c
Examining data/fis-gtm-6.3-007/sr_port/flush_jmp.h
Examining data/fis-gtm-6.3-007/sr_port/flush_pio.c
Examining data/fis-gtm-6.3-007/sr_port/fnname.h
Examining data/fis-gtm-6.3-007/sr_port/fnorder.h
Examining data/fis-gtm-6.3-007/sr_port/fnpc.h
Examining data/fis-gtm-6.3-007/sr_port/fnpc_stats.c
Examining data/fis-gtm-6.3-007/sr_port/fntext_ch.c
Examining data/fis-gtm-6.3-007/sr_port/follow.h
Examining data/fis-gtm-6.3-007/sr_port/format2disp.c
Examining data/fis-gtm-6.3-007/sr_port/format2zwr.c
Examining data/fis-gtm-6.3-007/sr_port/format_key_lv_val.c
Examining data/fis-gtm-6.3-007/sr_port/format_key_mvals.c
Examining data/fis-gtm-6.3-007/sr_port/format_lvname.c
Examining data/fis-gtm-6.3-007/sr_port/format_targ_key.c
Examining data/fis-gtm-6.3-007/sr_port/format_targ_key.h
Examining data/fis-gtm-6.3-007/sr_port/fullbool.h
Examining data/fis-gtm-6.3-007/sr_port/funsvn.h
Examining data/fis-gtm-6.3-007/sr_port/gbldefs.c
Examining data/fis-gtm-6.3-007/sr_port/gbldefs_usr_share.c
Examining data/fis-gtm-6.3-007/sr_port/gds_blk_downgrade.c
Examining data/fis-gtm-6.3-007/sr_port/gds_blk_downgrade.h
Examining data/fis-gtm-6.3-007/sr_port/gds_blk_upgrade.c
Examining data/fis-gtm-6.3-007/sr_port/gds_blk_upgrade.h
Examining data/fis-gtm-6.3-007/sr_port/gds_map_moved.c
Examining data/fis-gtm-6.3-007/sr_port/gds_map_moved.h
Examining data/fis-gtm-6.3-007/sr_port/gds_rundown.h
Examining data/fis-gtm-6.3-007/sr_port/gdsbgtr.h
Examining data/fis-gtm-6.3-007/sr_port/gdsblk.h
Examining data/fis-gtm-6.3-007/sr_port/gdsblkops.h
Examining data/fis-gtm-6.3-007/sr_port/gdsbml.h
Examining data/fis-gtm-6.3-007/sr_port/gdsbt.h
Examining data/fis-gtm-6.3-007/sr_port/gdscc.h
Examining data/fis-gtm-6.3-007/sr_port/gdsdbver.h
Examining data/fis-gtm-6.3-007/sr_port/gdsdbver_sp.h
Examining data/fis-gtm-6.3-007/sr_port/gdsfhead.h
Examining data/fis-gtm-6.3-007/sr_port/gdsfilext.h
Examining data/fis-gtm-6.3-007/sr_port/gdskill.h
Examining data/fis-gtm-6.3-007/sr_port/gdsroot.h
Examining data/fis-gtm-6.3-007/sr_port/get_cmd_qlf.c
Examining data/fis-gtm-6.3-007/sr_port/get_command_line.h
Examining data/fis-gtm-6.3-007/sr_port/get_dir_root.c
Examining data/fis-gtm-6.3-007/sr_port/get_dlr_device.c
Examining data/fis-gtm-6.3-007/sr_port/get_dlr_key.c
Examining data/fis-gtm-6.3-007/sr_port/get_dlr_zkey.c
Examining data/fis-gtm-6.3-007/sr_port/get_dollar_stack_info.c
Examining data/fis-gtm-6.3-007/sr_port/get_frame_creation_info.c
Examining data/fis-gtm-6.3-007/sr_port/get_frame_place_mcode.c
Examining data/fis-gtm-6.3-007/sr_port/get_fs_block_size.c
Examining data/fis-gtm-6.3-007/sr_port/get_fs_block_size.h
Examining data/fis-gtm-6.3-007/sr_port/get_lmap.c
Examining data/fis-gtm-6.3-007/sr_port/get_log_name.c
Examining data/fis-gtm-6.3-007/sr_port/get_mladdr.c
Examining data/fis-gtm-6.3-007/sr_port/get_mmseg.c
Examining data/fis-gtm-6.3-007/sr_port/get_mumps_code.h
Examining data/fis-gtm-6.3-007/sr_port/get_mvaddr.c
Examining data/fis-gtm-6.3-007/sr_port/get_page_size.h
Examining data/fis-gtm-6.3-007/sr_port/get_reference.c
Examining data/fis-gtm-6.3-007/sr_port/get_reference.h
Examining data/fis-gtm-6.3-007/sr_port/get_ret_targ.c
Examining data/fis-gtm-6.3-007/sr_port/get_ret_targ.h
Examining data/fis-gtm-6.3-007/sr_port/get_root.h
Examining data/fis-gtm-6.3-007/sr_port/get_spec.c
Examining data/fis-gtm-6.3-007/sr_port/get_spec.h
Examining data/fis-gtm-6.3-007/sr_port/get_symb_line.c
Examining data/fis-gtm-6.3-007/sr_port/getjobname.c
Examining data/fis-gtm-6.3-007/sr_port/getjobname.h
Examining data/fis-gtm-6.3-007/sr_port/getjobnum.h
Examining data/fis-gtm-6.3-007/sr_port/getprime.c
Examining data/fis-gtm-6.3-007/sr_port/getstorage.h
Examining data/fis-gtm-6.3-007/sr_port/getzdir.c
Examining data/fis-gtm-6.3-007/sr_port/getzdir.h
Examining data/fis-gtm-6.3-007/sr_port/getzmode.h
Examining data/fis-gtm-6.3-007/sr_port/getzposition.c
Examining data/fis-gtm-6.3-007/sr_port/getzposition.h
Examining data/fis-gtm-6.3-007/sr_port/getzprocess.h
Examining data/fis-gtm-6.3-007/sr_port/global_map.c
Examining data/fis-gtm-6.3-007/sr_port/global_map.h
Examining data/fis-gtm-6.3-007/sr_port/glvn.c
Examining data/fis-gtm-6.3-007/sr_port/glvn_pool.c
Examining data/fis-gtm-6.3-007/sr_port/glvn_pool.h
Examining data/fis-gtm-6.3-007/sr_port/goerrorframe.c
Examining data/fis-gtm-6.3-007/sr_port/goframes.c
Examining data/fis-gtm-6.3-007/sr_port/golevel.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_assert.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_assert2.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_bintim.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_byteswap_64.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_c_stack_trace.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_caseconv.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_connect.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_ctype.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_dirent.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_env_init.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_env_init.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_env_xlate_init.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_env_xlate_init.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_facility.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_fcntl.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_fetch.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_ffs.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_ffs.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_file_remove.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_file_stat.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_iconv.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_inet.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_ipv6.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_libaio.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_limits.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_malloc.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_malloc.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_malloc_dbg.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_maxstr.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_maxstr.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_memcmp.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_memcpy_validate_and_execute.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_memcpy_validate_and_execute.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_netdb.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_newintrinsic.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_newintrinsic.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_putmsg_list.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_pwd.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_relqueopi.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_rename.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_repl.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_reservedDB.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_savetraps.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_savetraps.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_select.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_sizeof.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_socket.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_stat.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_stdlib.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_string.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_strings.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_tempnam.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_tempnam.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_text_alloc.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_threadgbl.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_threadgbl_defs.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_threadgbl_deftypes.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_threadgbl_init.c
Examining data/fis-gtm-6.3-007/sr_port/gtm_threadgbl_init.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_time.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_un.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_unistd.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_utsname.h
Examining data/fis-gtm-6.3-007/sr_port/gtm_wake.h
Examining data/fis-gtm-6.3-007/sr_port/gtmctype.h
Examining data/fis-gtm-6.3-007/sr_port/gtmdbglvl.h
Examining data/fis-gtm-6.3-007/sr_port/gtmimagename.h
Examining data/fis-gtm-6.3-007/sr_port/gtmimagetable.h
Examining data/fis-gtm-6.3-007/sr_port/gtmmsg.h
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_ch.c
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_changelog.c
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_checkhealth.c
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_comm_init.c
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_end_helpers.c
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_exit.c
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_get_opt.c
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_helpers_init.c
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_reap_helpers.c
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_reinit_logseqno.c
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_showbacklog.c
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_start_helpers.c
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_statslog.c
Examining data/fis-gtm-6.3-007/sr_port/gtmrecv_upd_proc_init.c
Examining data/fis-gtm-6.3-007/sr_port/gtmsource_ch.c
Examining data/fis-gtm-6.3-007/sr_port/gtmsource_comm_init.c
Examining data/fis-gtm-6.3-007/sr_port/gtmsource_ctl_init.c
Examining data/fis-gtm-6.3-007/sr_port/gtmsource_exit.c
Examining data/fis-gtm-6.3-007/sr_port/gtmsource_heartbeat.h
Examining data/fis-gtm-6.3-007/sr_port/gtmsource_poll_actions.c
Examining data/fis-gtm-6.3-007/sr_port/gtmsource_reinit_logseqno.c
Examining data/fis-gtm-6.3-007/sr_port/gv_bind_name.c
Examining data/fis-gtm-6.3-007/sr_port/gv_bind_subsname.c
Examining data/fis-gtm-6.3-007/sr_port/gv_init_reg.c
Examining data/fis-gtm-6.3-007/sr_port/gv_match.c
Examining data/fis-gtm-6.3-007/sr_port/gv_match.h
Examining data/fis-gtm-6.3-007/sr_port/gv_rundown.c
Examining data/fis-gtm-6.3-007/sr_port/gv_rundown.h
Examining data/fis-gtm-6.3-007/sr_port/gv_select.c
Examining data/fis-gtm-6.3-007/sr_port/gv_select.h
Examining data/fis-gtm-6.3-007/sr_port/gv_srch_gblname.c
Examining data/fis-gtm-6.3-007/sr_port/gv_srch_map.c
Examining data/fis-gtm-6.3-007/sr_port/gv_trigger_common.h
Examining data/fis-gtm-6.3-007/sr_port/gv_xform_key.c
Examining data/fis-gtm-6.3-007/sr_port/gv_xform_key.h
Examining data/fis-gtm-6.3-007/sr_port/gvcmx.h
Examining data/fis-gtm-6.3-007/sr_port/gvcmy_close.h
Examining data/fis-gtm-6.3-007/sr_port/gvcmy_rundown.h
Examining data/fis-gtm-6.3-007/sr_port/gvcst_blk_build.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_blk_build.h
Examining data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.h
Examining data/fis-gtm-6.3-007/sr_port/gvcst_bmp_mark_free.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_bmp_mark_free.h
Examining data/fis-gtm-6.3-007/sr_port/gvcst_data.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_dataget.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_delete_blk.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_delete_blk.h
Examining data/fis-gtm-6.3-007/sr_port/gvcst_expand_any_key.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_expand_free_subtree.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_expand_free_subtree.h
Examining data/fis-gtm-6.3-007/sr_port/gvcst_expand_key.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_expand_key.h
Examining data/fis-gtm-6.3-007/sr_port/gvcst_gblmod.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_get.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_incr.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_init.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_jrt_null.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_jrt_null.h
Examining data/fis-gtm-6.3-007/sr_port/gvcst_kill.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_kill_blk.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_kill_blk.h
Examining data/fis-gtm-6.3-007/sr_port/gvcst_kill_sort.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_kill_sort.h
Examining data/fis-gtm-6.3-007/sr_port/gvcst_lbm_check.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_lbm_check.h
Examining data/fis-gtm-6.3-007/sr_port/gvcst_lftsib.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_map_build.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_map_build.h
Examining data/fis-gtm-6.3-007/sr_port/gvcst_order.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_protos.h
Examining data/fis-gtm-6.3-007/sr_port/gvcst_put.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_query.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_queryget.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_root_search.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_rtsib.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_search.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_tp_init.c
Examining data/fis-gtm-6.3-007/sr_port/gvcst_zprevious.c
Examining data/fis-gtm-6.3-007/sr_port/gvincr_compute_post_incr.c
Examining data/fis-gtm-6.3-007/sr_port/gvincr_recompute_upd_array.c
Examining data/fis-gtm-6.3-007/sr_port/gvinit.c
Examining data/fis-gtm-6.3-007/sr_port/gvn.c
Examining data/fis-gtm-6.3-007/sr_port/gvn2gds.c
Examining data/fis-gtm-6.3-007/sr_port/gvn2gds.h
Examining data/fis-gtm-6.3-007/sr_port/gvname_env_restore.c
Examining data/fis-gtm-6.3-007/sr_port/gvname_env_save.c
Examining data/fis-gtm-6.3-007/sr_port/gvname_info.h
Examining data/fis-gtm-6.3-007/sr_port/gvnh_spanreg.h
Examining data/fis-gtm-6.3-007/sr_port/gvnh_spanreg_init.c
Examining data/fis-gtm-6.3-007/sr_port/gvnh_spanreg_ismapped.c
Examining data/fis-gtm-6.3-007/sr_port/gvnh_spanreg_subs_gvt_init.c
Examining data/fis-gtm-6.3-007/sr_port/gvstats_rec.c
Examining data/fis-gtm-6.3-007/sr_port/gvstats_rec.h
Examining data/fis-gtm-6.3-007/sr_port/gvstrsub.h
Examining data/fis-gtm-6.3-007/sr_port/gvsub2str.c
Examining data/fis-gtm-6.3-007/sr_port/gvsub2str.h
Examining data/fis-gtm-6.3-007/sr_port/gvt_hashtab.c
Examining data/fis-gtm-6.3-007/sr_port/gvt_hashtab.h
Examining data/fis-gtm-6.3-007/sr_port/gvusr.h
Examining data/fis-gtm-6.3-007/sr_port/gvusr_queryget.h
Examining data/fis-gtm-6.3-007/sr_port/gvzwr_arg.c
Examining data/fis-gtm-6.3-007/sr_port/gvzwr_fini.c
Examining data/fis-gtm-6.3-007/sr_port/gvzwr_init.c
Examining data/fis-gtm-6.3-007/sr_port/gvzwr_out.c
Examining data/fis-gtm-6.3-007/sr_port/gvzwr_var.c
Examining data/fis-gtm-6.3-007/sr_port/gvzwrite_ch.c
Examining data/fis-gtm-6.3-007/sr_port/gvzwrite_clnup.c
Examining data/fis-gtm-6.3-007/sr_port/gvzwrite_clnup.h
Examining data/fis-gtm-6.3-007/sr_port/hashtab.h
Examining data/fis-gtm-6.3-007/sr_port/hashtab_addr.c
Examining data/fis-gtm-6.3-007/sr_port/hashtab_addr.h
Examining data/fis-gtm-6.3-007/sr_port/hashtab_implementation.h
Examining data/fis-gtm-6.3-007/sr_port/hashtab_int4.c
Examining data/fis-gtm-6.3-007/sr_port/hashtab_int4.h
Examining data/fis-gtm-6.3-007/sr_port/hashtab_int8.c
Examining data/fis-gtm-6.3-007/sr_port/hashtab_int8.h
Examining data/fis-gtm-6.3-007/sr_port/hashtab_mname.c
Examining data/fis-gtm-6.3-007/sr_port/hashtab_mname.h
Examining data/fis-gtm-6.3-007/sr_port/hashtab_objcode.c
Examining data/fis-gtm-6.3-007/sr_port/hashtab_objcode.h
Examining data/fis-gtm-6.3-007/sr_port/hashtab_rehash_ch.c
Examining data/fis-gtm-6.3-007/sr_port/hashtab_str.c
Examining data/fis-gtm-6.3-007/sr_port/hashtab_str.h
Examining data/fis-gtm-6.3-007/sr_port/have_crit.c
Examining data/fis-gtm-6.3-007/sr_port/have_crit.h
Examining data/fis-gtm-6.3-007/sr_port/i2asc.c
Examining data/fis-gtm-6.3-007/sr_port/i2hex.c
Examining data/fis-gtm-6.3-007/sr_port/i2hex_blkfill.c
Examining data/fis-gtm-6.3-007/sr_port/i2hex_nofill.c
Examining data/fis-gtm-6.3-007/sr_port/ind_cg_var.c
Examining data/fis-gtm-6.3-007/sr_port/ind_code.c
Examining data/fis-gtm-6.3-007/sr_port/indir.h
Examining data/fis-gtm-6.3-007/sr_port/indir_enum.h
Examining data/fis-gtm-6.3-007/sr_port/indir_lits.c
Examining data/fis-gtm-6.3-007/sr_port/indirection.c
Examining data/fis-gtm-6.3-007/sr_port/ins_errtriple.c
Examining data/fis-gtm-6.3-007/sr_port/ins_triple.c
Examining data/fis-gtm-6.3-007/sr_port/insert_region.c
Examining data/fis-gtm-6.3-007/sr_port/inst_flush.h
Examining data/fis-gtm-6.3-007/sr_port/int_label.c
Examining data/fis-gtm-6.3-007/sr_port/int_namelook.c
Examining data/fis-gtm-6.3-007/sr_port/int_namelook.h
Examining data/fis-gtm-6.3-007/sr_port/io.h
Examining data/fis-gtm-6.3-007/sr_port/io_dev_dispatch.h
Examining data/fis-gtm-6.3-007/sr_port/io_init.c
Examining data/fis-gtm-6.3-007/sr_port/io_init_ch.c
Examining data/fis-gtm-6.3-007/sr_port/io_params.h
Examining data/fis-gtm-6.3-007/sr_port/io_rundown.c
Examining data/fis-gtm-6.3-007/sr_port/ionl_close.c
Examining data/fis-gtm-6.3-007/sr_port/ionl_dummy.c
Examining data/fis-gtm-6.3-007/sr_port/ionl_flush.c
Examining data/fis-gtm-6.3-007/sr_port/ionl_open.c
Examining data/fis-gtm-6.3-007/sr_port/ionl_rdone.c
Examining data/fis-gtm-6.3-007/sr_port/ionl_read.c
Examining data/fis-gtm-6.3-007/sr_port/ionl_readfl.c
Examining data/fis-gtm-6.3-007/sr_port/ionl_use.c
Examining data/fis-gtm-6.3-007/sr_port/ionl_write.c
Examining data/fis-gtm-6.3-007/sr_port/ionl_wteol.c
Examining data/fis-gtm-6.3-007/sr_port/ionl_wtff.c
Examining data/fis-gtm-6.3-007/sr_port/ionl_wtone.c
Examining data/fis-gtm-6.3-007/sr_port/iop.h
Examining data/fis-gtm-6.3-007/sr_port/iop_parms_size.c
Examining data/fis-gtm-6.3-007/sr_port/iorm_wtff.c
Examining data/fis-gtm-6.3-007/sr_port/iorm_wtone.c
Examining data/fis-gtm-6.3-007/sr_port/iormdefsp.h
Examining data/fis-gtm-6.3-007/sr_port/iosocket_bind.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_close.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_connect.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_create.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_destroy.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_flush.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_handle.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_listen.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_open.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_poolinit.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_rdone.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_read.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_snr.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_switch.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_use.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_wait.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_write.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_wteol.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_wtff.c
Examining data/fis-gtm-6.3-007/sr_port/iosocket_wtone.c
Examining data/fis-gtm-6.3-007/sr_port/iosocketdef.h
Examining data/fis-gtm-6.3-007/sr_port/iotimer.h
Examining data/fis-gtm-6.3-007/sr_port/iott_dummy.c
Examining data/fis-gtm-6.3-007/sr_port/iott_escape.c
Examining data/fis-gtm-6.3-007/sr_port/iott_wrterr.c
Examining data/fis-gtm-6.3-007/sr_port/iott_wrterr.h
Examining data/fis-gtm-6.3-007/sr_port/iott_wteol.c
Examining data/fis-gtm-6.3-007/sr_port/iott_wtff.c
Examining data/fis-gtm-6.3-007/sr_port/iott_wtone.c
Examining data/fis-gtm-6.3-007/sr_port/ious_close.c
Examining data/fis-gtm-6.3-007/sr_port/ious_dummy.c
Examining data/fis-gtm-6.3-007/sr_port/ious_flush.c
Examining data/fis-gtm-6.3-007/sr_port/ious_use.c
Examining data/fis-gtm-6.3-007/sr_port/ious_wteol.c
Examining data/fis-gtm-6.3-007/sr_port/ious_wtff.c
Examining data/fis-gtm-6.3-007/sr_port/iousdef.h
Examining data/fis-gtm-6.3-007/sr_port/is_canonic_name.c
Examining data/fis-gtm-6.3-007/sr_port/is_canonic_name.h
Examining data/fis-gtm-6.3-007/sr_port/is_equ.c
Examining data/fis-gtm-6.3-007/sr_port/is_file_identical.h
Examining data/fis-gtm-6.3-007/sr_port/is_ident.c
Examining data/fis-gtm-6.3-007/sr_port/is_proc_alive.h
Examining data/fis-gtm-6.3-007/sr_port/jfh_from_jnl_info.c
Examining data/fis-gtm-6.3-007/sr_port/jmp_opto.c
Examining data/fis-gtm-6.3-007/sr_port/jmp_opto.h
Examining data/fis-gtm-6.3-007/sr_port/jnl.h
Examining data/fis-gtm-6.3-007/sr_port/jnl2ext.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_ensure_open.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_file_close.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_file_lost.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_file_open_common.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_file_open_switch.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_flush.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_format.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_get_checksum.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_get_checksum.h
Examining data/fis-gtm-6.3-007/sr_port/jnl_phase2_cleanup.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_phase2_salvage.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_pool_write.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_rec_table.h
Examining data/fis-gtm-6.3-007/sr_port/jnl_send_oper.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_set_cur_prior.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_typedef.h
Examining data/fis-gtm-6.3-007/sr_port/jnl_wait.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write.h
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_aimg_rec.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_aimg_rec.h
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_align_rec.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_attempt.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_eof_rec.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_epoch_rec.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_extend_if_needed.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_inctn_rec.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_logical.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_multi_align_rec.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_pblk.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_pblk.h
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_pfin.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_phase2.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_pini.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_reserve.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_trunc_rec.c
Examining data/fis-gtm-6.3-007/sr_port/jnl_write_ztp_logical.c
Examining data/fis-gtm-6.3-007/sr_port/jnlpool_hasnt_overflowed.c
Examining data/fis-gtm-6.3-007/sr_port/job.h
Examining data/fis-gtm-6.3-007/sr_port/job_addr.c
Examining data/fis-gtm-6.3-007/sr_port/job_addr.h
Examining data/fis-gtm-6.3-007/sr_port/jobexam_process.c
Examining data/fis-gtm-6.3-007/sr_port/jobexam_process.h
Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_event.c
Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_event.h
Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_init.c
Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_init.h
Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_process.c
Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_process.h
Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_process_cleanup.c
Examining data/fis-gtm-6.3-007/sr_port/jobinterrupt_process_cleanup.h
Examining data/fis-gtm-6.3-007/sr_port/jobparameters.c
Examining data/fis-gtm-6.3-007/sr_port/jobparams.h
Examining data/fis-gtm-6.3-007/sr_port/jobparamstrs.h
Examining data/fis-gtm-6.3-007/sr_port/la_encrypt.c
Examining data/fis-gtm-6.3-007/sr_port/la_encrypt.h
Examining data/fis-gtm-6.3-007/sr_port/lb_init.c
Examining data/fis-gtm-6.3-007/sr_port/lb_init.h
Examining data/fis-gtm-6.3-007/sr_port/lckclr.c
Examining data/fis-gtm-6.3-007/sr_port/lckclr.h
Examining data/fis-gtm-6.3-007/sr_port/lcl_arg1_is_desc_of_arg2.c
Examining data/fis-gtm-6.3-007/sr_port/line.c
Examining data/fis-gtm-6.3-007/sr_port/linetail.c
Examining data/fis-gtm-6.3-007/sr_port/linktrc.h
Examining data/fis-gtm-6.3-007/sr_port/list_file.h
Examining data/fis-gtm-6.3-007/sr_port/lke.h
Examining data/fis-gtm-6.3-007/sr_port/lke_clean.c
Examining data/fis-gtm-6.3-007/sr_port/lke_clear.c
Examining data/fis-gtm-6.3-007/sr_port/lke_clearlock.c
Examining data/fis-gtm-6.3-007/sr_port/lke_clearlock.h
Examining data/fis-gtm-6.3-007/sr_port/lke_cleartree.c
Examining data/fis-gtm-6.3-007/sr_port/lke_cleartree.h
Examining data/fis-gtm-6.3-007/sr_port/lke_exit.c
Examining data/fis-gtm-6.3-007/sr_port/lke_getcli.c
Examining data/fis-gtm-6.3-007/sr_port/lke_getcli.h
Examining data/fis-gtm-6.3-007/sr_port/lke_getki.c
Examining data/fis-gtm-6.3-007/sr_port/lke_growhash.c
Examining data/fis-gtm-6.3-007/sr_port/lke_show.c
Examining data/fis-gtm-6.3-007/sr_port/lke_showlock.c
Examining data/fis-gtm-6.3-007/sr_port/lke_showtree.c
Examining data/fis-gtm-6.3-007/sr_port/lkglvn.c
Examining data/fis-gtm-6.3-007/sr_port/localvarmonitor.h
Examining data/fis-gtm-6.3-007/sr_port/lock_str_to_buff.c
Examining data/fis-gtm-6.3-007/sr_port/lock_str_to_buff.h
Examining data/fis-gtm-6.3-007/sr_port/lockconst.h
Examining data/fis-gtm-6.3-007/sr_port/locklits.h
Examining data/fis-gtm-6.3-007/sr_port/logical_truth_value.c
Examining data/fis-gtm-6.3-007/sr_port/logical_truth_value.h
Examining data/fis-gtm-6.3-007/sr_port/longset.h
Examining data/fis-gtm-6.3-007/sr_port/lookup_variable_htent.c
Examining data/fis-gtm-6.3-007/sr_port/lookup_variable_htent.h
Examining data/fis-gtm-6.3-007/sr_port/lower_to_upper.c
Examining data/fis-gtm-6.3-007/sr_port/lref.c
Examining data/fis-gtm-6.3-007/sr_port/lv_getslot.c
Examining data/fis-gtm-6.3-007/sr_port/lv_kill.c
Examining data/fis-gtm-6.3-007/sr_port/lv_killarray.c
Examining data/fis-gtm-6.3-007/sr_port/lv_newblock.c
Examining data/fis-gtm-6.3-007/sr_port/lv_newname.c
Examining data/fis-gtm-6.3-007/sr_port/lv_tree.c
Examining data/fis-gtm-6.3-007/sr_port/lv_tree.h
Examining data/fis-gtm-6.3-007/sr_port/lv_val.h
Examining data/fis-gtm-6.3-007/sr_port/lv_var_clone.c
Examining data/fis-gtm-6.3-007/sr_port/lvmon_compare_value_slots.c
Examining data/fis-gtm-6.3-007/sr_port/lvmon_pull_values.c
Examining data/fis-gtm-6.3-007/sr_port/lvn.c
Examining data/fis-gtm-6.3-007/sr_port/lvzwr_arg.c
Examining data/fis-gtm-6.3-007/sr_port/lvzwr_fini.c
Examining data/fis-gtm-6.3-007/sr_port/lvzwr_init.c
Examining data/fis-gtm-6.3-007/sr_port/lvzwr_key.c
Examining data/fis-gtm-6.3-007/sr_port/lvzwr_out.c
Examining data/fis-gtm-6.3-007/sr_port/lvzwr_var.c
Examining data/fis-gtm-6.3-007/sr_port/m_break.c
Examining data/fis-gtm-6.3-007/sr_port/m_close.c
Examining data/fis-gtm-6.3-007/sr_port/m_do.c
Examining data/fis-gtm-6.3-007/sr_port/m_else.c
Examining data/fis-gtm-6.3-007/sr_port/m_for.c
Examining data/fis-gtm-6.3-007/sr_port/m_goto.c
Examining data/fis-gtm-6.3-007/sr_port/m_goto_postcond.c
Examining data/fis-gtm-6.3-007/sr_port/m_halt.c
Examining data/fis-gtm-6.3-007/sr_port/m_hang.c
Examining data/fis-gtm-6.3-007/sr_port/m_hcmd.c
Examining data/fis-gtm-6.3-007/sr_port/m_if.c
Examining data/fis-gtm-6.3-007/sr_port/m_job.c
Examining data/fis-gtm-6.3-007/sr_port/m_kill.c
Examining data/fis-gtm-6.3-007/sr_port/m_lock.c
Examining data/fis-gtm-6.3-007/sr_port/m_merge.c
Examining data/fis-gtm-6.3-007/sr_port/m_new.c
Examining data/fis-gtm-6.3-007/sr_port/m_open.c
Examining data/fis-gtm-6.3-007/sr_port/m_quit.c
Examining data/fis-gtm-6.3-007/sr_port/m_read.c
Examining data/fis-gtm-6.3-007/sr_port/m_set.c
Examining data/fis-gtm-6.3-007/sr_port/m_tcommit.c
Examining data/fis-gtm-6.3-007/sr_port/m_trestart.c
Examining data/fis-gtm-6.3-007/sr_port/m_trollback.c
Examining data/fis-gtm-6.3-007/sr_port/m_tstart.c
Examining data/fis-gtm-6.3-007/sr_port/m_use.c
Examining data/fis-gtm-6.3-007/sr_port/m_view.c
Examining data/fis-gtm-6.3-007/sr_port/m_write.c
Examining data/fis-gtm-6.3-007/sr_port/m_xecute.c
Examining data/fis-gtm-6.3-007/sr_port/m_zallocate.c
Examining data/fis-gtm-6.3-007/sr_port/m_zattach.c
Examining data/fis-gtm-6.3-007/sr_port/m_zbreak.c
Examining data/fis-gtm-6.3-007/sr_port/m_zcompile.c
Examining data/fis-gtm-6.3-007/sr_port/m_zcontinue.c
Examining data/fis-gtm-6.3-007/sr_port/m_zdeallocate.c
Examining data/fis-gtm-6.3-007/sr_port/m_zedit.c
Examining data/fis-gtm-6.3-007/sr_port/m_zgoto.c
Examining data/fis-gtm-6.3-007/sr_port/m_zhalt.c
Examining data/fis-gtm-6.3-007/sr_port/m_zhelp.c
Examining data/fis-gtm-6.3-007/sr_port/m_zinvcmd.c
Examining data/fis-gtm-6.3-007/sr_port/m_zlink.c
Examining data/fis-gtm-6.3-007/sr_port/m_zmessage.c
Examining data/fis-gtm-6.3-007/sr_port/m_zprint.c
Examining data/fis-gtm-6.3-007/sr_port/m_zshow.c
Examining data/fis-gtm-6.3-007/sr_port/m_zstep.c
Examining data/fis-gtm-6.3-007/sr_port/m_zsystem.c
Examining data/fis-gtm-6.3-007/sr_port/m_ztcommit.c
Examining data/fis-gtm-6.3-007/sr_port/m_ztstart.c
Examining data/fis-gtm-6.3-007/sr_port/m_zwatch.c
Examining data/fis-gtm-6.3-007/sr_port/m_zwithdraw.c
Examining data/fis-gtm-6.3-007/sr_port/m_zwrite.c
Examining data/fis-gtm-6.3-007/sr_port/main_pragma.h
Examining data/fis-gtm-6.3-007/sr_port/make_commarg.c
Examining data/fis-gtm-6.3-007/sr_port/make_gvsubsc.c
Examining data/fis-gtm-6.3-007/sr_port/maketriple.c
Examining data/fis-gtm-6.3-007/sr_port/matchc.c
Examining data/fis-gtm-6.3-007/sr_port/matchc.h
Examining data/fis-gtm-6.3-007/sr_port/mcalloc.c
Examining data/fis-gtm-6.3-007/sr_port/mcfree.c
Examining data/fis-gtm-6.3-007/sr_port/md5hash.c
Examining data/fis-gtm-6.3-007/sr_port/md5hash.h
Examining data/fis-gtm-6.3-007/sr_port/mdb_condition_handler.c
Examining data/fis-gtm-6.3-007/sr_port/mdef.h
Examining data/fis-gtm-6.3-007/sr_port/mdq.h
Examining data/fis-gtm-6.3-007/sr_port/mem_access.h
Examining data/fis-gtm-6.3-007/sr_port/memcoherency.h
Examining data/fis-gtm-6.3-007/sr_port/memvcmp.c
Examining data/fis-gtm-6.3-007/sr_port/merge_def.h
Examining data/fis-gtm-6.3-007/sr_port/merge_desc_check.c
Examining data/fis-gtm-6.3-007/sr_port/min_max.h
Examining data/fis-gtm-6.3-007/sr_port/mlabel2xtern.c
Examining data/fis-gtm-6.3-007/sr_port/mlabel2xtern.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_bckout.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_bckout.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_check_own.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_check_own.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_garbage_collect.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_garbage_collect.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_gbldef.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_lock.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_lock.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_nocrit_unlock.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_ops.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_prcblk_add.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_prcblk_add.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_prcblk_delete.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_prcblk_delete.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_create.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_create.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_delete.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_delete.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_equ.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_equ.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_insert.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_insert.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_region_lookup.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_region_lookup.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_shr_init.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_shr_init.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_create.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_create.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_delete_if_empty.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_delete_if_empty.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_find.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_find.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrblk_sort.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrclean.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrclean.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrhash_find_bucket.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrhash_find_bucket.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrhash_resize.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrhash_resize.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrsub_garbage_collect.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_shrsub_garbage_collect.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_tree_wake_children.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_tree_wake_children.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_unlock.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_unlock.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_unpend.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_unpend.h
Examining data/fis-gtm-6.3-007/sr_port/mlk_wake_pending.c
Examining data/fis-gtm-6.3-007/sr_port/mlk_wake_pending.h
Examining data/fis-gtm-6.3-007/sr_port/mlkdef.h
Examining data/fis-gtm-6.3-007/sr_port/mm_read.c
Examining data/fis-gtm-6.3-007/sr_port/mm_read.h
Examining data/fis-gtm-6.3-007/sr_port/mm_update.h
Examining data/fis-gtm-6.3-007/sr_port/mmemory.h
Examining data/fis-gtm-6.3-007/sr_port/mmseg.h
Examining data/fis-gtm-6.3-007/sr_port/movtc.c
Examining data/fis-gtm-6.3-007/sr_port/movtc.h
Examining data/fis-gtm-6.3-007/sr_port/mprof.h
Examining data/fis-gtm-6.3-007/sr_port/mprof_funcs.c
Examining data/fis-gtm-6.3-007/sr_port/mprof_stack.c
Examining data/fis-gtm-6.3-007/sr_port/mprof_tree.c
Examining data/fis-gtm-6.3-007/sr_port/mrout2xtern.h
Examining data/fis-gtm-6.3-007/sr_port/mstack_size_init.c
Examining data/fis-gtm-6.3-007/sr_port/mstack_size_init.h
Examining data/fis-gtm-6.3-007/sr_port/mtables.c
Examining data/fis-gtm-6.3-007/sr_port/mtables.h
Examining data/fis-gtm-6.3-007/sr_port/mu_clsce.c
Examining data/fis-gtm-6.3-007/sr_port/mu_cre_file.h
Examining data/fis-gtm-6.3-007/sr_port/mu_dwngrd_header.c
Examining data/fis-gtm-6.3-007/sr_port/mu_extr_gblout.c
Examining data/fis-gtm-6.3-007/sr_port/mu_extr_getblk.c
Examining data/fis-gtm-6.3-007/sr_port/mu_extr_ident.c
Examining data/fis-gtm-6.3-007/sr_port/mu_freeze_ch.c
Examining data/fis-gtm-6.3-007/sr_port/mu_getlst.h
Examining data/fis-gtm-6.3-007/sr_port/mu_gv_cur_reg_init.c
Examining data/fis-gtm-6.3-007/sr_port/mu_gv_cur_reg_init.h
Examining data/fis-gtm-6.3-007/sr_port/mu_gv_stack_init.c
Examining data/fis-gtm-6.3-007/sr_port/mu_gv_stack_init.h
Examining data/fis-gtm-6.3-007/sr_port/mu_gvis.h
Examining data/fis-gtm-6.3-007/sr_port/mu_int_blk.c
Examining data/fis-gtm-6.3-007/sr_port/mu_int_err.c
Examining data/fis-gtm-6.3-007/sr_port/mu_int_fhead.c
Examining data/fis-gtm-6.3-007/sr_port/mu_int_getkey.c
Examining data/fis-gtm-6.3-007/sr_port/mu_int_init.c
Examining data/fis-gtm-6.3-007/sr_port/mu_int_maps.c
Examining data/fis-gtm-6.3-007/sr_port/mu_int_maps.h
Examining data/fis-gtm-6.3-007/sr_port/mu_int_read.c
Examining data/fis-gtm-6.3-007/sr_port/mu_int_reg.c
Examining data/fis-gtm-6.3-007/sr_port/mu_int_reg_ch.c
Examining data/fis-gtm-6.3-007/sr_port/mu_int_wait_rdonly.c
Examining data/fis-gtm-6.3-007/sr_port/mu_int_wait_rdonly.h
Examining data/fis-gtm-6.3-007/sr_port/mu_int_write.c
Examining data/fis-gtm-6.3-007/sr_port/mu_interactive.c
Examining data/fis-gtm-6.3-007/sr_port/mu_interactive.h
Examining data/fis-gtm-6.3-007/sr_port/mu_outofband_setup.h
Examining data/fis-gtm-6.3-007/sr_port/mu_put_gvdata.c
Examining data/fis-gtm-6.3-007/sr_port/mu_put_gvn_fragment.c
Examining data/fis-gtm-6.3-007/sr_port/mu_reduce_level.c
Examining data/fis-gtm-6.3-007/sr_port/mu_reorg.c
Examining data/fis-gtm-6.3-007/sr_port/mu_reorg.h
Examining data/fis-gtm-6.3-007/sr_port/mu_reorg_upgrd_dwngrd.c
Examining data/fis-gtm-6.3-007/sr_port/mu_reorg_upgrd_dwngrd.h
Examining data/fis-gtm-6.3-007/sr_port/mu_signal_process.h
Examining data/fis-gtm-6.3-007/sr_port/mu_split.c
Examining data/fis-gtm-6.3-007/sr_port/mu_swap_blk.c
Examining data/fis-gtm-6.3-007/sr_port/mu_upgrd_dngrd_confirmed.c
Examining data/fis-gtm-6.3-007/sr_port/mu_upgrd_dngrd_confirmed.h
Examining data/fis-gtm-6.3-007/sr_port/mu_upgrd_dngrd_hdr.h
Examining data/fis-gtm-6.3-007/sr_port/mu_upgrd_header.c
Examining data/fis-gtm-6.3-007/sr_port/mubclnup.c
Examining data/fis-gtm-6.3-007/sr_port/mucblkini.h
Examining data/fis-gtm-6.3-007/sr_port/mucregini.c
Examining data/fis-gtm-6.3-007/sr_port/mucregini.h
Examining data/fis-gtm-6.3-007/sr_port/muext_rec_table.h
Examining data/fis-gtm-6.3-007/sr_port/muextr.h
Examining data/fis-gtm-6.3-007/sr_port/mupfndfil.c
Examining data/fis-gtm-6.3-007/sr_port/mupint.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_backup.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_backup.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_create.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_create.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_cvtgbl.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_cvtpgm.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_downgrade.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_downgrade.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_exit.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_extend.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_extend.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_freeze.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_freeze.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_help.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_integ.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_integ.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_intrpt.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_intrpt.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_io_dev_dispatch.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_load_ch.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_put_gvdata.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_put_gvn_fragment.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_quit.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_recover.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_recover.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_reorg.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_reorg.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_restore.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_rundown.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_set.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_set.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_set_jnl_ch.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_set_jnl_cleanup.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_set_journal_newstate.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_set_journal_parse.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_stop.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_stop.h
Examining data/fis-gtm-6.3-007/sr_port/mupip_upgrade.c
Examining data/fis-gtm-6.3-007/sr_port/mupip_upgrade.h
Examining data/fis-gtm-6.3-007/sr_port/mupipbckup.h
Examining data/fis-gtm-6.3-007/sr_port/muprec.h
Examining data/fis-gtm-6.3-007/sr_port/mur_apply_pblk.c
Examining data/fis-gtm-6.3-007/sr_port/mur_back_process.c
Examining data/fis-gtm-6.3-007/sr_port/mur_block_count_correct.c
Examining data/fis-gtm-6.3-007/sr_port/mur_blocks_free.c
Examining data/fis-gtm-6.3-007/sr_port/mur_close_file_extfmt.c
Examining data/fis-gtm-6.3-007/sr_port/mur_close_files.c
Examining data/fis-gtm-6.3-007/sr_port/mur_db_files_from_jnllist.c
Examining data/fis-gtm-6.3-007/sr_port/mur_db_files_from_jnllist.h
Examining data/fis-gtm-6.3-007/sr_port/mur_do_wildcard.c
Examining data/fis-gtm-6.3-007/sr_port/mur_forward.c
Examining data/fis-gtm-6.3-007/sr_port/mur_forward_play_cur_jrec.c
Examining data/fis-gtm-6.3-007/sr_port/mur_forward_play_multireg_tp.c
Examining data/fis-gtm-6.3-007/sr_port/mur_gbldefs.c
Examining data/fis-gtm-6.3-007/sr_port/mur_get_options.c
Examining data/fis-gtm-6.3-007/sr_port/mur_get_pini.c
Examining data/fis-gtm-6.3-007/sr_port/mur_init.c
Examining data/fis-gtm-6.3-007/sr_port/mur_insert_prev.c
Examining data/fis-gtm-6.3-007/sr_port/mur_jctl_from_next_gen.c
Examining data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c
Examining data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.h
Examining data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c
Examining data/fis-gtm-6.3-007/sr_port/mur_multi_rehash.c
Examining data/fis-gtm-6.3-007/sr_port/mur_open_files.c
Examining data/fis-gtm-6.3-007/sr_port/mur_output_record.c
Examining data/fis-gtm-6.3-007/sr_port/mur_output_show.c
Examining data/fis-gtm-6.3-007/sr_port/mur_pini_addr_reset.c
Examining data/fis-gtm-6.3-007/sr_port/mur_pini_state.c
Examining data/fis-gtm-6.3-007/sr_port/mur_process_intrpt_recov.c
Examining data/fis-gtm-6.3-007/sr_port/mur_process_seqno_table.c
Examining data/fis-gtm-6.3-007/sr_port/mur_process_timequal.c
Examining data/fis-gtm-6.3-007/sr_port/mur_process_token_table.c
Examining data/fis-gtm-6.3-007/sr_port/mur_put_aimg_rec.c
Examining data/fis-gtm-6.3-007/sr_port/mur_read_file.c
Examining data/fis-gtm-6.3-007/sr_port/mur_read_file.h
Examining data/fis-gtm-6.3-007/sr_port/mur_rem_jctls.c
Examining data/fis-gtm-6.3-007/sr_port/mur_report_error.c
Examining data/fis-gtm-6.3-007/sr_port/mur_select_rec.c
Examining data/fis-gtm-6.3-007/sr_port/mur_sort_files.c
Examining data/fis-gtm-6.3-007/sr_port/mur_token_lookup.c
Examining data/fis-gtm-6.3-007/sr_port/mur_tp_resolve_time.c
Examining data/fis-gtm-6.3-007/sr_port/mur_validate_checksum.c
Examining data/fis-gtm-6.3-007/sr_port/mur_validate_checksum.h
Examining data/fis-gtm-6.3-007/sr_port/mur_write_header_extfmt.c
Examining data/fis-gtm-6.3-007/sr_port/mur_ztp_lookback.c
Examining data/fis-gtm-6.3-007/sr_port/murest.h
Examining data/fis-gtm-6.3-007/sr_port/mutex.h
Examining data/fis-gtm-6.3-007/sr_port/mutex_deadlock_check.c
Examining data/fis-gtm-6.3-007/sr_port/mutex_deadlock_check.h
Examining data/fis-gtm-6.3-007/sr_port/mv_stent.h
Examining data/fis-gtm-6.3-007/sr_port/mval2fao.c
Examining data/fis-gtm-6.3-007/sr_port/mval2fao.h
Examining data/fis-gtm-6.3-007/sr_port/mval2subsc.c
Examining data/fis-gtm-6.3-007/sr_port/mval_lex.c
Examining data/fis-gtm-6.3-007/sr_port/mval_nongraphic.c
Examining data/fis-gtm-6.3-007/sr_port/mval_write.c
Examining data/fis-gtm-6.3-007/sr_port/mvalconv.c
Examining data/fis-gtm-6.3-007/sr_port/mvalconv.h
Examining data/fis-gtm-6.3-007/sr_port/n2s.c
Examining data/fis-gtm-6.3-007/sr_port/name_glvn.c
Examining data/fis-gtm-6.3-007/sr_port/namelook.c
Examining data/fis-gtm-6.3-007/sr_port/namelook.h
Examining data/fis-gtm-6.3-007/sr_port/nametabtyp.h
Examining data/fis-gtm-6.3-007/sr_port/new_stack_frame.c
Examining data/fis-gtm-6.3-007/sr_port/newtriple.c
Examining data/fis-gtm-6.3-007/sr_port/nil_iocontrol.c
Examining data/fis-gtm-6.3-007/sr_port/nref.c
Examining data/fis-gtm-6.3-007/sr_port/numcmp.c
Examining data/fis-gtm-6.3-007/sr_port/numcmp.h
Examining data/fis-gtm-6.3-007/sr_port/obj_file.h
Examining data/fis-gtm-6.3-007/sr_port/obj_gen.h
Examining data/fis-gtm-6.3-007/sr_port/objlabel.h
Examining data/fis-gtm-6.3-007/sr_port/oc_tab.c
Examining data/fis-gtm-6.3-007/sr_port/oc_tab_graphic.c
Examining data/fis-gtm-6.3-007/sr_port/one_job_param.c
Examining data/fis-gtm-6.3-007/sr_port/op.h
Examining data/fis-gtm-6.3-007/sr_port/op_add.c
Examining data/fis-gtm-6.3-007/sr_port/op_bindparm.c
Examining data/fis-gtm-6.3-007/sr_port/op_break.c
Examining data/fis-gtm-6.3-007/sr_port/op_cat.c
Examining data/fis-gtm-6.3-007/sr_port/op_close.c
Examining data/fis-gtm-6.3-007/sr_port/op_clralsvars.c
Examining data/fis-gtm-6.3-007/sr_port/op_commarg.c
Examining data/fis-gtm-6.3-007/sr_port/op_cvtparm.c
Examining data/fis-gtm-6.3-007/sr_port/op_decrlock.c
Examining data/fis-gtm-6.3-007/sr_port/op_div.c
Examining data/fis-gtm-6.3-007/sr_port/op_dmode.c
Examining data/fis-gtm-6.3-007/sr_port/op_dt_false.c
Examining data/fis-gtm-6.3-007/sr_port/op_dt_get.c
Examining data/fis-gtm-6.3-007/sr_port/op_dt_store.c
Examining data/fis-gtm-6.3-007/sr_port/op_dt_true.c
Examining data/fis-gtm-6.3-007/sr_port/op_exfunret.c
Examining data/fis-gtm-6.3-007/sr_port/op_exfunretals.c
Examining data/fis-gtm-6.3-007/sr_port/op_exp.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnascii.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnchar.c
Examining data/fis-gtm-6.3-007/sr_port/op_fndata.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnfind.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnfnumber.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnget1.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnget2.c
Examining data/fis-gtm-6.3-007/sr_port/op_fngvget.c
Examining data/fis-gtm-6.3-007/sr_port/op_fngvget1.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnincr.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnj2.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnj3.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnlength.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnlvname.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnlvnameo2.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnlvprvname.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnname.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnnext.c
Examining data/fis-gtm-6.3-007/sr_port/op_fno2.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnorder.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnqlength.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnqsubscript.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnquery.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnreverse.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnstack1.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnstack2.c
Examining data/fis-gtm-6.3-007/sr_port/op_fntext.c
Examining data/fis-gtm-6.3-007/sr_port/op_fntranslate.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnview.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzahandle.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzatransform.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitand.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitcoun.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitfind.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitget.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitlen.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitnot.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitor.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitset.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitstr.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzbitxor.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzcollate.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzdata.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzdate.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzjobexam.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzm.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzp1.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzpiece.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzpopulation.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzprevious.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzqgblmod.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzsearch.h
Examining data/fis-gtm-6.3-007/sr_port/op_fnzsigproc.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzsubstr.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnztrigger.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzwidth.c
Examining data/fis-gtm-6.3-007/sr_port/op_fnzwrite.c
Examining data/fis-gtm-6.3-007/sr_port/op_get_msf.c
Examining data/fis-gtm-6.3-007/sr_port/op_getindx.c
Examining data/fis-gtm-6.3-007/sr_port/op_glvnpop.c
Examining data/fis-gtm-6.3-007/sr_port/op_glvnslot.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvdata.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvextnam.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvget.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvincr.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvkill.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvnaked.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvname.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvnext.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvo2.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvorder.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvput.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvquery.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvqueryget.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvrectarg.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvsavtarg.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvzwithdraw.c
Examining data/fis-gtm-6.3-007/sr_port/op_gvzwrite.c
Examining data/fis-gtm-6.3-007/sr_port/op_hang.c
Examining data/fis-gtm-6.3-007/sr_port/op_hardret.c
Examining data/fis-gtm-6.3-007/sr_port/op_idiv.c
Examining data/fis-gtm-6.3-007/sr_port/op_igetdst.c
Examining data/fis-gtm-6.3-007/sr_port/op_igetsrc.c
Examining data/fis-gtm-6.3-007/sr_port/op_incrlock.c
Examining data/fis-gtm-6.3-007/sr_port/op_inddevparms.c
Examining data/fis-gtm-6.3-007/sr_port/op_indfnname.c
Examining data/fis-gtm-6.3-007/sr_port/op_indfnname2.c
Examining data/fis-gtm-6.3-007/sr_port/op_indfun.c
Examining data/fis-gtm-6.3-007/sr_port/op_indget1.c
Examining data/fis-gtm-6.3-007/sr_port/op_indget2.c
Examining data/fis-gtm-6.3-007/sr_port/op_indglvn.c
Examining data/fis-gtm-6.3-007/sr_port/op_indincr.c
Examining data/fis-gtm-6.3-007/sr_port/op_indlvadr.c
Examining data/fis-gtm-6.3-007/sr_port/op_indlvarg.c
Examining data/fis-gtm-6.3-007/sr_port/op_indlvnamadr.c
Examining data/fis-gtm-6.3-007/sr_port/op_indmerge.c
Examining data/fis-gtm-6.3-007/sr_port/op_indmerge2.c
Examining data/fis-gtm-6.3-007/sr_port/op_indname.c
Examining data/fis-gtm-6.3-007/sr_port/op_indo2.c
Examining data/fis-gtm-6.3-007/sr_port/op_indpat.c
Examining data/fis-gtm-6.3-007/sr_port/op_indrzshow.c
Examining data/fis-gtm-6.3-007/sr_port/op_indsavglvn.c
Examining data/fis-gtm-6.3-007/sr_port/op_indsavlvn.c
Examining data/fis-gtm-6.3-007/sr_port/op_indset.c
Examining data/fis-gtm-6.3-007/sr_port/op_indtext.c
Examining data/fis-gtm-6.3-007/sr_port/op_iocontrol.c
Examining data/fis-gtm-6.3-007/sr_port/op_iretmval.c
Examining data/fis-gtm-6.3-007/sr_port/op_kill.c
Examining data/fis-gtm-6.3-007/sr_port/op_killalias.c
Examining data/fis-gtm-6.3-007/sr_port/op_killaliasall.c
Examining data/fis-gtm-6.3-007/sr_port/op_killall.c
Examining data/fis-gtm-6.3-007/sr_port/op_labaddr.c
Examining data/fis-gtm-6.3-007/sr_port/op_litc.c
Examining data/fis-gtm-6.3-007/sr_port/op_lkinit.c
Examining data/fis-gtm-6.3-007/sr_port/op_lkname.c
Examining data/fis-gtm-6.3-007/sr_port/op_lock.c
Examining data/fis-gtm-6.3-007/sr_port/op_lock2.c
Examining data/fis-gtm-6.3-007/sr_port/op_lvpatwrite.c
Examining data/fis-gtm-6.3-007/sr_port/op_lvzwithdraw.c
Examining data/fis-gtm-6.3-007/sr_port/op_lvzwrite.c
Examining data/fis-gtm-6.3-007/sr_port/op_m_srchindx.c
Examining data/fis-gtm-6.3-007/sr_port/op_merge.c
Examining data/fis-gtm-6.3-007/sr_port/op_merge.h
Examining data/fis-gtm-6.3-007/sr_port/op_merge_arg.c
Examining data/fis-gtm-6.3-007/sr_port/op_mul.c
Examining data/fis-gtm-6.3-007/sr_port/op_newintrinsic.c
Examining data/fis-gtm-6.3-007/sr_port/op_newvar.c
Examining data/fis-gtm-6.3-007/sr_port/op_nullexp.c
Examining data/fis-gtm-6.3-007/sr_port/op_oldvar.c
Examining data/fis-gtm-6.3-007/sr_port/op_open.c
Examining data/fis-gtm-6.3-007/sr_port/op_open_dummy.c
Examining data/fis-gtm-6.3-007/sr_port/op_putindx.c
Examining data/fis-gtm-6.3-007/sr_port/op_rdone.c
Examining data/fis-gtm-6.3-007/sr_port/op_read.c
Examining data/fis-gtm-6.3-007/sr_port/op_readfl.c
Examining data/fis-gtm-6.3-007/sr_port/op_rfrshgvn.c
Examining data/fis-gtm-6.3-007/sr_port/op_rfrshlvn.c
Examining data/fis-gtm-6.3-007/sr_port/op_rhdaddr.c
Examining data/fis-gtm-6.3-007/sr_port/op_rterror.c
Examining data/fis-gtm-6.3-007/sr_port/op_savgvn.c
Examining data/fis-gtm-6.3-007/sr_port/op_savlvn.c
Examining data/fis-gtm-6.3-007/sr_port/op_setals2als.c
Examining data/fis-gtm-6.3-007/sr_port/op_setalsct2alsct.c
Examining data/fis-gtm-6.3-007/sr_port/op_setalsctin2als.c
Examining data/fis-gtm-6.3-007/sr_port/op_setalsin2alsct.c
Examining data/fis-gtm-6.3-007/sr_port/op_setfnretin2als.c
Examining data/fis-gtm-6.3-007/sr_port/op_setfnretin2alsct.c
Examining data/fis-gtm-6.3-007/sr_port/op_setzbrk.c
Examining data/fis-gtm-6.3-007/sr_port/op_setzextract.c
Examining data/fis-gtm-6.3-007/sr_port/op_setzp1.c
Examining data/fis-gtm-6.3-007/sr_port/op_setzpiece.c
Examining data/fis-gtm-6.3-007/sr_port/op_shareslot.c
Examining data/fis-gtm-6.3-007/sr_port/op_srchindx.c
Examining data/fis-gtm-6.3-007/sr_port/op_stoglvn.c
Examining data/fis-gtm-6.3-007/sr_port/op_stolitc.c
Examining data/fis-gtm-6.3-007/sr_port/op_svget.c
Examining data/fis-gtm-6.3-007/sr_port/op_svput.c
Examining data/fis-gtm-6.3-007/sr_port/op_tcommit.c
Examining data/fis-gtm-6.3-007/sr_port/op_tcommit.h
Examining data/fis-gtm-6.3-007/sr_port/op_trestart.c
Examining data/fis-gtm-6.3-007/sr_port/op_trollback.c
Examining data/fis-gtm-6.3-007/sr_port/op_tstart.c
Examining data/fis-gtm-6.3-007/sr_port/op_unlock.c
Examining data/fis-gtm-6.3-007/sr_port/op_unwind.c
Examining data/fis-gtm-6.3-007/sr_port/op_use.c
Examining data/fis-gtm-6.3-007/sr_port/op_view.c
Examining data/fis-gtm-6.3-007/sr_port/op_write.c
Examining data/fis-gtm-6.3-007/sr_port/op_wteol.c
Examining data/fis-gtm-6.3-007/sr_port/op_wtff.c
Examining data/fis-gtm-6.3-007/sr_port/op_wtone.c
Examining data/fis-gtm-6.3-007/sr_port/op_wttab.c
Examining data/fis-gtm-6.3-007/sr_port/op_xkill.c
Examining data/fis-gtm-6.3-007/sr_port/op_xnew.c
Examining data/fis-gtm-6.3-007/sr_port/op_zallocate.c
Examining data/fis-gtm-6.3-007/sr_port/op_zbreak.c
Examining data/fis-gtm-6.3-007/sr_port/op_zcompile.c
Examining data/fis-gtm-6.3-007/sr_port/op_zcont.c
Examining data/fis-gtm-6.3-007/sr_port/op_zdealloc2.c
Examining data/fis-gtm-6.3-007/sr_port/op_zdeallocate.c
Examining data/fis-gtm-6.3-007/sr_port/op_zg1.c
Examining data/fis-gtm-6.3-007/sr_port/op_zgoto.c
Examining data/fis-gtm-6.3-007/sr_port/op_zhalt.c
Examining data/fis-gtm-6.3-007/sr_port/op_zprevious.c
Examining data/fis-gtm-6.3-007/sr_port/op_zprint.c
Examining data/fis-gtm-6.3-007/sr_port/op_zshow.c
Examining data/fis-gtm-6.3-007/sr_port/op_zst_break.c
Examining data/fis-gtm-6.3-007/sr_port/op_zst_over.c
Examining data/fis-gtm-6.3-007/sr_port/op_zstep.c
Examining data/fis-gtm-6.3-007/sr_port/op_zstepret.c
Examining data/fis-gtm-6.3-007/sr_port/op_zsystem.c
Examining data/fis-gtm-6.3-007/sr_port/op_ztcommit.c
Examining data/fis-gtm-6.3-007/sr_port/op_ztstart.c
Examining data/fis-gtm-6.3-007/sr_port/op_zwritesvn.c
Examining data/fis-gtm-6.3-007/sr_port/opcode.h
Examining data/fis-gtm-6.3-007/sr_port/opcode_def.h
Examining data/fis-gtm-6.3-007/sr_port/outofband.h
Examining data/fis-gtm-6.3-007/sr_port/outofband_action.c
Examining data/fis-gtm-6.3-007/sr_port/outofband_clear.c
Examining data/fis-gtm-6.3-007/sr_port/parm_pool.c
Examining data/fis-gtm-6.3-007/sr_port/parm_pool.h
Examining data/fis-gtm-6.3-007/sr_port/parse_trctbl_groups.c
Examining data/fis-gtm-6.3-007/sr_port/parse_trctbl_groups.h
Examining data/fis-gtm-6.3-007/sr_port/parse_until_rparen_or_space.c
Examining data/fis-gtm-6.3-007/sr_port/pat_compress.c
Examining data/fis-gtm-6.3-007/sr_port/pat_unwind.c
Examining data/fis-gtm-6.3-007/sr_port/patcode.h
Examining data/fis-gtm-6.3-007/sr_port/patmaskseq.c
Examining data/fis-gtm-6.3-007/sr_port/patstr.c
Examining data/fis-gtm-6.3-007/sr_port/pattab.c
Examining data/fis-gtm-6.3-007/sr_port/performcaslatchcheck.c
Examining data/fis-gtm-6.3-007/sr_port/performcaslatchcheck.h
Examining data/fis-gtm-6.3-007/sr_port/preemptive_db_clnup.c
Examining data/fis-gtm-6.3-007/sr_port/preemptive_db_clnup.h
Examining data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c
Examining data/fis-gtm-6.3-007/sr_port/print_exit_stats.c
Examining data/fis-gtm-6.3-007/sr_port/print_exit_stats.h
Examining data/fis-gtm-6.3-007/sr_port/print_target.c
Examining data/fis-gtm-6.3-007/sr_port/print_target.h
Examining data/fis-gtm-6.3-007/sr_port/private_code_copy.h
Examining data/fis-gtm-6.3-007/sr_port/process_deferred_stale.c
Examining data/fis-gtm-6.3-007/sr_port/process_deferred_stale.h
Examining data/fis-gtm-6.3-007/sr_port/process_gvt_pending_list.c
Examining data/fis-gtm-6.3-007/sr_port/process_gvt_pending_list.h
Examining data/fis-gtm-6.3-007/sr_port/promodemo.c
Examining data/fis-gtm-6.3-007/sr_port/promodemo.h
Examining data/fis-gtm-6.3-007/sr_port/push_lvval.c
Examining data/fis-gtm-6.3-007/sr_port/push_lvval.h
Examining data/fis-gtm-6.3-007/sr_port/push_mval.c
Examining data/fis-gtm-6.3-007/sr_port/push_stck.c
Examining data/fis-gtm-6.3-007/sr_port/push_tval.c
Examining data/fis-gtm-6.3-007/sr_port/push_tval.h
Examining data/fis-gtm-6.3-007/sr_port/put_cdlt.c
Examining data/fis-gtm-6.3-007/sr_port/put_ilit.c
Examining data/fis-gtm-6.3-007/sr_port/put_indr.c
Examining data/fis-gtm-6.3-007/sr_port/put_lit.c
Examining data/fis-gtm-6.3-007/sr_port/put_mfun.c
Examining data/fis-gtm-6.3-007/sr_port/put_mlab.c
Examining data/fis-gtm-6.3-007/sr_port/put_mmseg.c
Examining data/fis-gtm-6.3-007/sr_port/put_mnxl.c
Examining data/fis-gtm-6.3-007/sr_port/put_mvar.c
Examining data/fis-gtm-6.3-007/sr_port/put_ocnt.c
Examining data/fis-gtm-6.3-007/sr_port/put_str.c
Examining data/fis-gtm-6.3-007/sr_port/put_tjmp.c
Examining data/fis-gtm-6.3-007/sr_port/put_tnxt.c
Examining data/fis-gtm-6.3-007/sr_port/put_tref.c
Examining data/fis-gtm-6.3-007/sr_port/put_tsiz.c
Examining data/fis-gtm-6.3-007/sr_port/rc_cpt_ops.h
Examining data/fis-gtm-6.3-007/sr_port/rc_oflow.h
Examining data/fis-gtm-6.3-007/sr_port/read_db_files_from_gld.c
Examining data/fis-gtm-6.3-007/sr_port/read_db_files_from_gld.h
Examining data/fis-gtm-6.3-007/sr_port/real_len.c
Examining data/fis-gtm-6.3-007/sr_port/real_len.h
Examining data/fis-gtm-6.3-007/sr_port/region_freeze.c
Examining data/fis-gtm-6.3-007/sr_port/region_init.c
Examining data/fis-gtm-6.3-007/sr_port/region_init_ch.c
Examining data/fis-gtm-6.3-007/sr_port/reinit_compilation_externs.c
Examining data/fis-gtm-6.3-007/sr_port/reinit_compilation_externs.h
Examining data/fis-gtm-6.3-007/sr_port/rel_mmseg.c
Examining data/fis-gtm-6.3-007/sr_port/rel_quant.h
Examining data/fis-gtm-6.3-007/sr_port/release_private_code_copy.c
Examining data/fis-gtm-6.3-007/sr_port/relqop.h
Examining data/fis-gtm-6.3-007/sr_port/relqueop.c
Examining data/fis-gtm-6.3-007/sr_port/relqueopi.c
Examining data/fis-gtm-6.3-007/sr_port/relqueopi.h
Examining data/fis-gtm-6.3-007/sr_port/rename_file_if_exists.c
Examining data/fis-gtm-6.3-007/sr_port/reorg_funcs.c
Examining data/fis-gtm-6.3-007/sr_port/repl_comm.c
Examining data/fis-gtm-6.3-007/sr_port/repl_comm.h
Examining data/fis-gtm-6.3-007/sr_port/repl_ctl.h
Examining data/fis-gtm-6.3-007/sr_port/repl_dbg.h
Examining data/fis-gtm-6.3-007/sr_port/repl_dbg_disable.h
Examining data/fis-gtm-6.3-007/sr_port/repl_dbg_enable.h
Examining data/fis-gtm-6.3-007/sr_port/repl_errno.c
Examining data/fis-gtm-6.3-007/sr_port/repl_errno.h
Examining data/fis-gtm-6.3-007/sr_port/repl_filter.c
Examining data/fis-gtm-6.3-007/sr_port/repl_filter.h
Examining data/fis-gtm-6.3-007/sr_port/repl_log.h
Examining data/fis-gtm-6.3-007/sr_port/repl_phase2_cleanup.c
Examining data/fis-gtm-6.3-007/sr_port/repl_phase2_salvage.c
Examining data/fis-gtm-6.3-007/sr_port/repl_shutdcode.h
Examining data/fis-gtm-6.3-007/sr_port/repl_sort_tr_buff.c
Examining data/fis-gtm-6.3-007/sr_port/repl_sort_tr_buff.h
Examining data/fis-gtm-6.3-007/sr_port/repl_tr_good.c
Examining data/fis-gtm-6.3-007/sr_port/repl_tr_good.h
Examining data/fis-gtm-6.3-007/sr_port/replgbl.h
Examining data/fis-gtm-6.3-007/sr_port/replic_gbldefs.c
Examining data/fis-gtm-6.3-007/sr_port/replication_ch.c
Examining data/fis-gtm-6.3-007/sr_port/resolve_blocks.c
Examining data/fis-gtm-6.3-007/sr_port/resolve_blocks.h
Examining data/fis-gtm-6.3-007/sr_port/resolve_lab.c
Examining data/fis-gtm-6.3-007/sr_port/resolve_lab.h
Examining data/fis-gtm-6.3-007/sr_port/resolve_optimize.c
Examining data/fis-gtm-6.3-007/sr_port/resolve_ref.c
Examining data/fis-gtm-6.3-007/sr_port/restrict.c
Examining data/fis-gtm-6.3-007/sr_port/restrict.h
Examining data/fis-gtm-6.3-007/sr_port/rtn_src_chksum.c
Examining data/fis-gtm-6.3-007/sr_port/rtn_src_chksum.h
Examining data/fis-gtm-6.3-007/sr_port/rtnlaboff2entryref.c
Examining data/fis-gtm-6.3-007/sr_port/rwformat.c
Examining data/fis-gtm-6.3-007/sr_port/rwformat.h
Examining data/fis-gtm-6.3-007/sr_port/s2n.c
Examining data/fis-gtm-6.3-007/sr_port/s2pool.c
Examining data/fis-gtm-6.3-007/sr_port/s2pool_align.c
Examining data/fis-gtm-6.3-007/sr_port/s2pool_concat.c
Examining data/fis-gtm-6.3-007/sr_port/sec_shr_blk_build.c
Examining data/fis-gtm-6.3-007/sr_port/sec_shr_blk_build.h
Examining data/fis-gtm-6.3-007/sr_port/sec_shr_map_build.c
Examining data/fis-gtm-6.3-007/sr_port/sec_shr_map_build.h
Examining data/fis-gtm-6.3-007/sr_port/secshr_blk_full_build.c
Examining data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.c
Examining data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.h
Examining data/fis-gtm-6.3-007/sr_port/secshr_finish_CMT08_to_CMT14.c
Examining data/fis-gtm-6.3-007/sr_port/secshr_finish_CMT18.c
Examining data/fis-gtm-6.3-007/sr_port/secshr_finish_CMT18_to_CMT19.c
Examining data/fis-gtm-6.3-007/sr_port/secshr_rel_crit.c
Examining data/fis-gtm-6.3-007/sr_port/secshr_send_DBCLNUPINFO_msg.c
Examining data/fis-gtm-6.3-007/sr_port/semwt2long_handler.c
Examining data/fis-gtm-6.3-007/sr_port/semwt2long_handler.h
Examining data/fis-gtm-6.3-007/sr_port/send_msg.h
Examining data/fis-gtm-6.3-007/sr_port/set_gbuff_limit.c
Examining data/fis-gtm-6.3-007/sr_port/set_gbuff_limit.h
Examining data/fis-gtm-6.3-007/sr_port/set_jnl_info.c
Examining data/fis-gtm-6.3-007/sr_port/set_num_additional_processors.h
Examining data/fis-gtm-6.3-007/sr_port/set_testpoint.c
Examining data/fis-gtm-6.3-007/sr_port/setcurtchain.c
Examining data/fis-gtm-6.3-007/sr_port/setterm.h
Examining data/fis-gtm-6.3-007/sr_port/setzdir.c
Examining data/fis-gtm-6.3-007/sr_port/setzdir.h
Examining data/fis-gtm-6.3-007/sr_port/seven_2_ascii.c
Examining data/fis-gtm-6.3-007/sr_port/seven_2_ascii.h
Examining data/fis-gtm-6.3-007/sr_port/sgnl.h
Examining data/fis-gtm-6.3-007/sr_port/sgnl_gvnulsubsc.c
Examining data/fis-gtm-6.3-007/sr_port/sgnl_gvreplerr.c
Examining data/fis-gtm-6.3-007/sr_port/sgnl_gvundef.c
Examining data/fis-gtm-6.3-007/sr_port/sgtm_putmsg.h
Examining data/fis-gtm-6.3-007/sr_port/shmpool.c
Examining data/fis-gtm-6.3-007/sr_port/shmpool.h
Examining data/fis-gtm-6.3-007/sr_port/show_source_line.c
Examining data/fis-gtm-6.3-007/sr_port/show_source_line.h
Examining data/fis-gtm-6.3-007/sr_port/shrink_trips.c
Examining data/fis-gtm-6.3-007/sr_port/shuffq.c
Examining data/fis-gtm-6.3-007/sr_port/skan_offset.c
Examining data/fis-gtm-6.3-007/sr_port/skan_offset.h
Examining data/fis-gtm-6.3-007/sr_port/skan_rnum.c
Examining data/fis-gtm-6.3-007/sr_port/skan_rnum.h
Examining data/fis-gtm-6.3-007/sr_port/skpc.c
Examining data/fis-gtm-6.3-007/sr_port/sleep_cnt.h
Examining data/fis-gtm-6.3-007/sr_port/sockint_stats.c
Examining data/fis-gtm-6.3-007/sr_port/sockint_stats.h
Examining data/fis-gtm-6.3-007/sr_port/sorts_after.c
Examining data/fis-gtm-6.3-007/sr_port/sorts_after.h
Examining data/fis-gtm-6.3-007/sr_port/source_file.h
Examining data/fis-gtm-6.3-007/sr_port/spec_type.h
Examining data/fis-gtm-6.3-007/sr_port/srcline.h
Examining data/fis-gtm-6.3-007/sr_port/stack_frame.h
Examining data/fis-gtm-6.3-007/sr_port/start_fetches.c
Examining data/fis-gtm-6.3-007/sr_port/start_for_fetches.c
Examining data/fis-gtm-6.3-007/sr_port/startup.h
Examining data/fis-gtm-6.3-007/sr_port/std_dev_outbndset.h
Examining data/fis-gtm-6.3-007/sr_port/stp_expand_array.c
Examining data/fis-gtm-6.3-007/sr_port/stp_gcol.c
Examining data/fis-gtm-6.3-007/sr_port/stp_gcol_ch.c
Examining data/fis-gtm-6.3-007/sr_port/stp_gcol_src.h
Examining data/fis-gtm-6.3-007/sr_port/stp_init.c
Examining data/fis-gtm-6.3-007/sr_port/stp_move.c
Examining data/fis-gtm-6.3-007/sr_port/stp_parms.h
Examining data/fis-gtm-6.3-007/sr_port/stpg_sort.c
Examining data/fis-gtm-6.3-007/sr_port/stpg_sort.h
Examining data/fis-gtm-6.3-007/sr_port/str2gvargs.c
Examining data/fis-gtm-6.3-007/sr_port/str2gvargs.h
Examining data/fis-gtm-6.3-007/sr_port/str2gvkey.h
Examining data/fis-gtm-6.3-007/sr_port/str2gvkey_gvfunc.c
Examining data/fis-gtm-6.3-007/sr_port/str2gvkey_nogvfunc.c
Examining data/fis-gtm-6.3-007/sr_port/str_to_title.c
Examining data/fis-gtm-6.3-007/sr_port/stringpool.h
Examining data/fis-gtm-6.3-007/sr_port/strpiecediff.c
Examining data/fis-gtm-6.3-007/sr_port/strpiecediff.h
Examining data/fis-gtm-6.3-007/sr_port/stx_error.c
Examining data/fis-gtm-6.3-007/sr_port/sub2stbl.c
Examining data/fis-gtm-6.3-007/sr_port/subscript.h
Examining data/fis-gtm-6.3-007/sr_port/svnames.h
Examining data/fis-gtm-6.3-007/sr_port/symb_line.c
Examining data/fis-gtm-6.3-007/sr_port/symbinit.c
Examining data/fis-gtm-6.3-007/sr_port/t_abort.c
Examining data/fis-gtm-6.3-007/sr_port/t_abort.h
Examining data/fis-gtm-6.3-007/sr_port/t_abort_cleanup.c
Examining data/fis-gtm-6.3-007/sr_port/t_begin.c
Examining data/fis-gtm-6.3-007/sr_port/t_begin.h
Examining data/fis-gtm-6.3-007/sr_port/t_begin_crit.c
Examining data/fis-gtm-6.3-007/sr_port/t_begin_crit.h
Examining data/fis-gtm-6.3-007/sr_port/t_busy2free.c
Examining data/fis-gtm-6.3-007/sr_port/t_busy2free.h
Examining data/fis-gtm-6.3-007/sr_port/t_ch.c
Examining data/fis-gtm-6.3-007/sr_port/t_commit_cleanup.c
Examining data/fis-gtm-6.3-007/sr_port/t_commit_cleanup.h
Examining data/fis-gtm-6.3-007/sr_port/t_create.c
Examining data/fis-gtm-6.3-007/sr_port/t_create.h
Examining data/fis-gtm-6.3-007/sr_port/t_end.c
Examining data/fis-gtm-6.3-007/sr_port/t_end.h
Examining data/fis-gtm-6.3-007/sr_port/t_end_sysops.c
Examining data/fis-gtm-6.3-007/sr_port/t_qread.c
Examining data/fis-gtm-6.3-007/sr_port/t_qread.h
Examining data/fis-gtm-6.3-007/sr_port/t_retry.c
Examining data/fis-gtm-6.3-007/sr_port/t_retry.h
Examining data/fis-gtm-6.3-007/sr_port/t_write.c
Examining data/fis-gtm-6.3-007/sr_port/t_write.h
Examining data/fis-gtm-6.3-007/sr_port/t_write_map.c
Examining data/fis-gtm-6.3-007/sr_port/t_write_map.h
Examining data/fis-gtm-6.3-007/sr_port/t_write_root.c
Examining data/fis-gtm-6.3-007/sr_port/t_write_root.h
Examining data/fis-gtm-6.3-007/sr_port/tab_bg_trc_rec.h
Examining data/fis-gtm-6.3-007/sr_port/tab_db_csh_acct_rec.h
Examining data/fis-gtm-6.3-007/sr_port/tab_gvstats_rec.h
Examining data/fis-gtm-6.3-007/sr_port/tab_jpl_trc_rec.h
Examining data/fis-gtm-6.3-007/sr_port/targ_alloc.c
Examining data/fis-gtm-6.3-007/sr_port/targ_alloc.h
Examining data/fis-gtm-6.3-007/sr_port/tcp_open.c
Examining data/fis-gtm-6.3-007/sr_port/term_setup.h
Examining data/fis-gtm-6.3-007/sr_port/terminate_ch.c
Examining data/fis-gtm-6.3-007/sr_port/testpt.h
Examining data/fis-gtm-6.3-007/sr_port/time_calc.c
Examining data/fis-gtm-6.3-007/sr_port/timeout2msec.c
Examining data/fis-gtm-6.3-007/sr_port/timers.h
Examining data/fis-gtm-6.3-007/sr_port/tnxtarg.c
Examining data/fis-gtm-6.3-007/sr_port/toktyp.h
Examining data/fis-gtm-6.3-007/sr_port/tp.h
Examining data/fis-gtm-6.3-007/sr_port/tp_change_reg.c
Examining data/fis-gtm-6.3-007/sr_port/tp_change_reg.h
Examining data/fis-gtm-6.3-007/sr_port/tp_clean_up.c
Examining data/fis-gtm-6.3-007/sr_port/tp_cw_list.c
Examining data/fis-gtm-6.3-007/sr_port/tp_frame.h
Examining data/fis-gtm-6.3-007/sr_port/tp_get_cw.c
Examining data/fis-gtm-6.3-007/sr_port/tp_hist.c
Examining data/fis-gtm-6.3-007/sr_port/tp_incr_clean_up.c
Examining data/fis-gtm-6.3-007/sr_port/tp_incr_commit.c
Examining data/fis-gtm-6.3-007/sr_port/tp_incr_commit.h
Examining data/fis-gtm-6.3-007/sr_port/tp_restart.c
Examining data/fis-gtm-6.3-007/sr_port/tp_restart.h
Examining data/fis-gtm-6.3-007/sr_port/tp_set_sgm.c
Examining data/fis-gtm-6.3-007/sr_port/tp_set_sgm.h
Examining data/fis-gtm-6.3-007/sr_port/tp_tend.c
Examining data/fis-gtm-6.3-007/sr_port/tp_timeout.c
Examining data/fis-gtm-6.3-007/sr_port/tp_timeout.h
Examining data/fis-gtm-6.3-007/sr_port/tp_timeout_dummy.c
Examining data/fis-gtm-6.3-007/sr_port/tp_unwind.c
Examining data/fis-gtm-6.3-007/sr_port/tp_unwind.h
Examining data/fis-gtm-6.3-007/sr_port/tpdefs.c
Examining data/fis-gtm-6.3-007/sr_port/trace_table.h
Examining data/fis-gtm-6.3-007/sr_port/trace_table_types.h
Examining data/fis-gtm-6.3-007/sr_port/trans_code.c
Examining data/fis-gtm-6.3-007/sr_port/trans_code_cleanup.c
Examining data/fis-gtm-6.3-007/sr_port/trans_code_cleanup.h
Examining data/fis-gtm-6.3-007/sr_port/trans_log_name.h
Examining data/fis-gtm-6.3-007/sr_port/trans_numeric.c
Examining data/fis-gtm-6.3-007/sr_port/trans_numeric.h
Examining data/fis-gtm-6.3-007/sr_port/trap_env_init.c
Examining data/fis-gtm-6.3-007/sr_port/trap_env_init.h
Examining data/fis-gtm-6.3-007/sr_port/tripinit.c
Examining data/fis-gtm-6.3-007/sr_port/tt_write_error_set.c
Examining data/fis-gtm-6.3-007/sr_port/unary_tail.c
Examining data/fis-gtm-6.3-007/sr_port/underr.c
Examining data/fis-gtm-6.3-007/sr_port/underr_strict.c
Examining data/fis-gtm-6.3-007/sr_port/undx.c
Examining data/fis-gtm-6.3-007/sr_port/undx.h
Examining data/fis-gtm-6.3-007/sr_port/unuse_literal.c
Examining data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c
Examining data/fis-gtm-6.3-007/sr_port/unw_prof_frame_dummy.c
Examining data/fis-gtm-6.3-007/sr_port/unw_prof_frame_dummy.h
Examining data/fis-gtm-6.3-007/sr_port/unw_retarg.c
Examining data/fis-gtm-6.3-007/sr_port/unw_retarg.h
Examining data/fis-gtm-6.3-007/sr_port/unwind_nocounts.c
Examining data/fis-gtm-6.3-007/sr_port/unwind_nocounts.h
Examining data/fis-gtm-6.3-007/sr_port/upd_open_files.h
Examining data/fis-gtm-6.3-007/sr_port/updhelper_end.c
Examining data/fis-gtm-6.3-007/sr_port/updhelper_init.c
Examining data/fis-gtm-6.3-007/sr_port/updhelper_reader.c
Examining data/fis-gtm-6.3-007/sr_port/updhelper_writer.c
Examining data/fis-gtm-6.3-007/sr_port/updproc.c
Examining data/fis-gtm-6.3-007/sr_port/updproc.h
Examining data/fis-gtm-6.3-007/sr_port/updproc_end.c
Examining data/fis-gtm-6.3-007/sr_port/updproc_get_gblname.c
Examining data/fis-gtm-6.3-007/sr_port/updproc_get_gblname.h
Examining data/fis-gtm-6.3-007/sr_port/updproc_init.c
Examining data/fis-gtm-6.3-007/sr_port/updproc_open_files.c
Examining data/fis-gtm-6.3-007/sr_port/upper_to_lower.c
Examining data/fis-gtm-6.3-007/sr_port/urx.h
Examining data/fis-gtm-6.3-007/sr_port/urx_add.c
Examining data/fis-gtm-6.3-007/sr_port/urx_addlab.c
Examining data/fis-gtm-6.3-007/sr_port/urx_addrtn.c
Examining data/fis-gtm-6.3-007/sr_port/urx_free.c
Examining data/fis-gtm-6.3-007/sr_port/urx_getlab.c
Examining data/fis-gtm-6.3-007/sr_port/urx_getrtn.c
Examining data/fis-gtm-6.3-007/sr_port/urx_putlab.c
Examining data/fis-gtm-6.3-007/sr_port/urx_putrtn.c
Examining data/fis-gtm-6.3-007/sr_port/urx_resolve.c
Examining data/fis-gtm-6.3-007/sr_port/urxsp.h
Examining data/fis-gtm-6.3-007/sr_port/util.h
Examining data/fis-gtm-6.3-007/sr_port/util_base_ch.c
Examining data/fis-gtm-6.3-007/sr_port/util_ch.c
Examining data/fis-gtm-6.3-007/sr_port/util_format.h
Examining data/fis-gtm-6.3-007/sr_port/util_spawn.h
Examining data/fis-gtm-6.3-007/sr_port/v010_jnl.h
Examining data/fis-gtm-6.3-007/sr_port/v12_jnl_rec_table.h
Examining data/fis-gtm-6.3-007/sr_port/v15_gdsbt.h
Examining data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h
Examining data/fis-gtm-6.3-007/sr_port/v15_gdsroot.h
Examining data/fis-gtm-6.3-007/sr_port/v15_tab_bg_trc_rec_fixed.h
Examining data/fis-gtm-6.3-007/sr_port/v15_tab_bg_trc_rec_variable.h
Examining data/fis-gtm-6.3-007/sr_port/v15_tab_db_csh_acct_rec.h
Examining data/fis-gtm-6.3-007/sr_port/val_iscan.c
Examining data/fis-gtm-6.3-007/sr_port/valid_labname.c
Examining data/fis-gtm-6.3-007/sr_port/valid_mname.c
Examining data/fis-gtm-6.3-007/sr_port/valid_mname.h
Examining data/fis-gtm-6.3-007/sr_port/vdatsize.h
Examining data/fis-gtm-6.3-007/sr_port/verify_queue.c
Examining data/fis-gtm-6.3-007/sr_port/view.h
Examining data/fis-gtm-6.3-007/sr_port/view_arg_convert.c
Examining data/fis-gtm-6.3-007/sr_port/view_jnlfile.c
Examining data/fis-gtm-6.3-007/sr_port/view_routines.c
Examining data/fis-gtm-6.3-007/sr_port/viewkeys.c
Examining data/fis-gtm-6.3-007/sr_port/viewtab.h
Examining data/fis-gtm-6.3-007/sr_port/vxi.h
Examining data/fis-gtm-6.3-007/sr_port/vxt.h
Examining data/fis-gtm-6.3-007/sr_port/wait_for_block_flush.c
Examining data/fis-gtm-6.3-007/sr_port/wake.c
Examining data/fis-gtm-6.3-007/sr_port/wake.h
Examining data/fis-gtm-6.3-007/sr_port/wake_alarm.c
Examining data/fis-gtm-6.3-007/sr_port/wake_alarm.h
Examining data/fis-gtm-6.3-007/sr_port/walktree.c
Examining data/fis-gtm-6.3-007/sr_port/wbox_test_init.c
Examining data/fis-gtm-6.3-007/sr_port/wbox_test_init.h
Examining data/fis-gtm-6.3-007/sr_port/wcs_backoff.c
Examining data/fis-gtm-6.3-007/sr_port/wcs_backoff.h
Examining data/fis-gtm-6.3-007/sr_port/wcs_flu.h
Examining data/fis-gtm-6.3-007/sr_port/wcs_get_space.h
Examining data/fis-gtm-6.3-007/sr_port/wcs_mm_recover.h
Examining data/fis-gtm-6.3-007/sr_port/wcs_phase2_commit_wait.c
Examining data/fis-gtm-6.3-007/sr_port/wcs_phase2_commit_wait.h
Examining data/fis-gtm-6.3-007/sr_port/wcs_read_in_progress_wait.c
Examining data/fis-gtm-6.3-007/sr_port/wcs_read_in_progress_wait.h
Examining data/fis-gtm-6.3-007/sr_port/wcs_recover.c
Examining data/fis-gtm-6.3-007/sr_port/wcs_recover.h
Examining data/fis-gtm-6.3-007/sr_port/wcs_sleep.c
Examining data/fis-gtm-6.3-007/sr_port/wcs_sleep.h
Examining data/fis-gtm-6.3-007/sr_port/wcs_timer_start.h
Examining data/fis-gtm-6.3-007/sr_port/wcs_verify.c
Examining data/fis-gtm-6.3-007/sr_port/wrtcatopt.c
Examining data/fis-gtm-6.3-007/sr_port/xfer.h
Examining data/fis-gtm-6.3-007/sr_port/xfer_enum.h
Examining data/fis-gtm-6.3-007/sr_port/xfer_name.c
Examining data/fis-gtm-6.3-007/sr_port/xfer_table.c
Examining data/fis-gtm-6.3-007/sr_port/zbreak.h
Examining data/fis-gtm-6.3-007/sr_port/zco_init.c
Examining data/fis-gtm-6.3-007/sr_port/zco_init.h
Examining data/fis-gtm-6.3-007/sr_port/zdate_form_init.c
Examining data/fis-gtm-6.3-007/sr_port/zdate_form_init.h
Examining data/fis-gtm-6.3-007/sr_port/zlcompile.c
Examining data/fis-gtm-6.3-007/sr_port/zlput_rname.c
Examining data/fis-gtm-6.3-007/sr_port/zr_add_zbreak.c
Examining data/fis-gtm-6.3-007/sr_port/zr_find.c
Examining data/fis-gtm-6.3-007/sr_port/zr_init.c
Examining data/fis-gtm-6.3-007/sr_port/zr_remove_zbreak.c
Examining data/fis-gtm-6.3-007/sr_port/zr_remove_zbrks.c
Examining data/fis-gtm-6.3-007/sr_port/zr_unlink_rtn.c
Examining data/fis-gtm-6.3-007/sr_port/zr_unlink_rtn.h
Examining data/fis-gtm-6.3-007/sr_port/zro_init.c
Examining data/fis-gtm-6.3-007/sr_port/zroutines.h
Examining data/fis-gtm-6.3-007/sr_port/zshow.h
Examining data/fis-gtm-6.3-007/sr_port/zshow_ch.c
Examining data/fis-gtm-6.3-007/sr_port/zshow_format_lock.c
Examining data/fis-gtm-6.3-007/sr_port/zshow_gvstats.c
Examining data/fis-gtm-6.3-007/sr_port/zshow_locks.c
Examining data/fis-gtm-6.3-007/sr_port/zshow_output.c
Examining data/fis-gtm-6.3-007/sr_port/zshow_params.h
Examining data/fis-gtm-6.3-007/sr_port/zshow_stack.c
Examining data/fis-gtm-6.3-007/sr_port/zshow_svn.c
Examining data/fis-gtm-6.3-007/sr_port/zshow_zbreaks.c
Examining data/fis-gtm-6.3-007/sr_port/zshow_zwrite.c
Examining data/fis-gtm-6.3-007/sr_port/zsocket.h
Examining data/fis-gtm-6.3-007/sr_port/zsockettab.h
Examining data/fis-gtm-6.3-007/sr_port/zstep.h
Examining data/fis-gtm-6.3-007/sr_port/ztrap_save_ctxt.c
Examining data/fis-gtm-6.3-007/sr_port/ztrap_save_ctxt.h
Examining data/fis-gtm-6.3-007/sr_port/zwr2format.c
Examining data/fis-gtm-6.3-007/sr_port/zwrite.h
Examining data/fis-gtm-6.3-007/sr_port/zyerror_init.c
Examining data/fis-gtm-6.3-007/sr_port/zyerror_init.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_action_pending.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_action_pending.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_add_region.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_add_region.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_bind_name.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_bind_name.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_err_compat.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_err_compat.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_exi_handler.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_exi_handler.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_find_proc.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_find_proc.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_find_reghead.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_find_reghead.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_find_region.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_find_region.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_init_ast.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_init_ast.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_int_unpack.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_int_unpack.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_is_query_queryget.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_is_query_queryget.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_jnl_switched.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_jnl_switched.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_link_accept.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_link_accept.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_neterr.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_neterr.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_read_ast.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_read_ast.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_release_name.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_remove_from_action_queue.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_remove_from_action_queue.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_shutdown_ast.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_shutdown_ast.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_urgread_ast.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_write_ast.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcm_write_ast.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmd.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmd_cst_init.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmd_rundown.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_blklck.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_chklck.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_chkprc.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_chkreg.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_decrlock.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_dolock.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_incrlock.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lckclr.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lcktime.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lkbckout.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lkcancel.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lkhold.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lklist.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lkrundown.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lkstarve.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lock.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_lock_internal.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_unlock.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_zallocate.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcml_zdeallocate.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmlkdef.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_bufflush.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_data.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_get.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_increment.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_initproc.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_initreg.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_kill.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkacquire.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkcanall.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkcancel.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkdelete.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_clearrep.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_clearreq.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_showrep.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_showreq.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkreqimmed.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkreqnode.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkrequest.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lkresume.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lksuspend.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_order.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_protos.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_put.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_query.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_terminate.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_terminate_free.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_zprevious.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_zwithdraw.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_canremlk.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_data.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_get.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_increment.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_kill.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_order.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_put.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_query.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_reqremlk.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_resremlk.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_susremlk.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_unlock.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmx_zprevious.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmy_close.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open_ch.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmy_remlkmgr.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmy_remlkmgr.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmy_rundown.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz.h
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_bunch.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_clrlkreq.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_doop.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_error.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_int_lkcancel.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_lkacquire_ast.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_lkcancel_ast.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_lkread_ast.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_lksublist.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_lksuspend_ast.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_neterr.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_neterr_set.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_sndlkremove.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_zdef_ast.c
Examining data/fis-gtm-6.3-007/sr_port_cm/gvcmz_zflush.c
Examining data/fis-gtm-6.3-007/sr_port_cm/lock_cmtimeout.c
Examining data/fis-gtm-6.3-007/sr_port_cm/lock_cmtimeout.h
Examining data/fis-gtm-6.3-007/sr_port_cm/per2962.h
Examining data/fis-gtm-6.3-007/sr_unix/add_inter.c
Examining data/fis-gtm-6.3-007/sr_unix/aio_shim.c
Examining data/fis-gtm-6.3-007/sr_unix/anticipatory_freeze.c
Examining data/fis-gtm-6.3-007/sr_unix/arlinkdbg.h
Examining data/fis-gtm-6.3-007/sr_unix/ast.h
Examining data/fis-gtm-6.3-007/sr_unix/auto_zlink.c
Examining data/fis-gtm-6.3-007/sr_unix/auto_zlink.h
Examining data/fis-gtm-6.3-007/sr_unix/backup_buffer_flush.c
Examining data/fis-gtm-6.3-007/sr_unix/bin_load.c
Examining data/fis-gtm-6.3-007/sr_unix/bit_op.h
Examining data/fis-gtm-6.3-007/sr_unix/callg.c
Examining data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.c
Examining data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.h
Examining data/fis-gtm-6.3-007/sr_unix/ccp_cluster_lock_wake.c
Examining data/fis-gtm-6.3-007/sr_unix/ccp_fid_msg.c
Examining data/fis-gtm-6.3-007/sr_unix/ccp_sendmsg.c
Examining data/fis-gtm-6.3-007/sr_unix/ccp_userwait.c
Examining data/fis-gtm-6.3-007/sr_unix/ce_init.c
Examining data/fis-gtm-6.3-007/sr_unix/ce_substitute.c
Examining data/fis-gtm-6.3-007/sr_unix/cenable.c
Examining data/fis-gtm-6.3-007/sr_unix/cenable.h
Examining data/fis-gtm-6.3-007/sr_unix/ch_cond_core.c
Examining data/fis-gtm-6.3-007/sr_unix/ch_overrun.c
Examining data/fis-gtm-6.3-007/sr_unix/change_fhead_timer.c
Examining data/fis-gtm-6.3-007/sr_unix/ci_ret_code.c
Examining data/fis-gtm-6.3-007/sr_unix/clear_cache_array.c
Examining data/fis-gtm-6.3-007/sr_unix/clear_cache_array.h
Examining data/fis-gtm-6.3-007/sr_unix/cli.c
Examining data/fis-gtm-6.3-007/sr_unix/cli.h
Examining data/fis-gtm-6.3-007/sr_unix/cli_disallow.c
Examining data/fis-gtm-6.3-007/sr_unix/cli_disallow.h
Examining data/fis-gtm-6.3-007/sr_unix/cli_lex.c
Examining data/fis-gtm-6.3-007/sr_unix/cli_parse.c
Examining data/fis-gtm-6.3-007/sr_unix/cli_parse.h
Examining data/fis-gtm-6.3-007/sr_unix/cmidefsp.h
Examining data/fis-gtm-6.3-007/sr_unix/cmistub.c
Examining data/fis-gtm-6.3-007/sr_unix/comp_lits.c
Examining data/fis-gtm-6.3-007/sr_unix/condstk_expand.c
Examining data/fis-gtm-6.3-007/sr_unix/continue_handler.c
Examining data/fis-gtm-6.3-007/sr_unix/continue_handler.h
Examining data/fis-gtm-6.3-007/sr_unix/continue_proc.c
Examining data/fis-gtm-6.3-007/sr_unix/crit_wake.c
Examining data/fis-gtm-6.3-007/sr_unix/ctrap_set.c
Examining data/fis-gtm-6.3-007/sr_unix/ctrlc_handler.c
Examining data/fis-gtm-6.3-007/sr_unix/ctrlc_handler.h
Examining data/fis-gtm-6.3-007/sr_unix/ctrlc_set.c
Examining data/fis-gtm-6.3-007/sr_unix/ctrly_set.c
Examining data/fis-gtm-6.3-007/sr_unix/cvtprot.c
Examining data/fis-gtm-6.3-007/sr_unix/cvttime.c
Examining data/fis-gtm-6.3-007/sr_unix/daemon_crit.c
Examining data/fis-gtm-6.3-007/sr_unix/db_ipcs_reset.c
Examining data/fis-gtm-6.3-007/sr_unix/db_ipcs_reset.h
Examining data/fis-gtm-6.3-007/sr_unix/db_read.h
Examining data/fis-gtm-6.3-007/sr_unix/db_snapshot.h
Examining data/fis-gtm-6.3-007/sr_unix/db_write.h
Examining data/fis-gtm-6.3-007/sr_unix/db_write_eof_block.c
Examining data/fis-gtm-6.3-007/sr_unix/db_write_eof_block.h
Examining data/fis-gtm-6.3-007/sr_unix/dbcertify_cmd.c
Examining data/fis-gtm-6.3-007/sr_unix/dbcertify_dbfilop.c
Examining data/fis-gtm-6.3-007/sr_unix/dbcertify_deferred_signal_handler.c
Examining data/fis-gtm-6.3-007/sr_unix/dbcertify_parse_and_dispatch.c
Examining data/fis-gtm-6.3-007/sr_unix/dbcertify_signal_handler.c
Examining data/fis-gtm-6.3-007/sr_unix/dbfilop.c
Examining data/fis-gtm-6.3-007/sr_unix/dbinit_ch.c
Examining data/fis-gtm-6.3-007/sr_unix/dec_err.c
Examining data/fis-gtm-6.3-007/sr_unix/deferred_signal_handler.c
Examining data/fis-gtm-6.3-007/sr_unix/deferred_signal_handler.h
Examining data/fis-gtm-6.3-007/sr_unix/disk_block_available.c
Examining data/fis-gtm-6.3-007/sr_unix/disk_block_available.h
Examining data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c
Examining data/fis-gtm-6.3-007/sr_unix/dm_audit_log.h
Examining data/fis-gtm-6.3-007/sr_unix/dm_read.c
Examining data/fis-gtm-6.3-007/sr_unix/do_semop.c
Examining data/fis-gtm-6.3-007/sr_unix/do_semop.h
Examining data/fis-gtm-6.3-007/sr_unix/do_shmat.c
Examining data/fis-gtm-6.3-007/sr_unix/do_shmat.h
Examining data/fis-gtm-6.3-007/sr_unix/do_verify.c
Examining data/fis-gtm-6.3-007/sr_unix/do_xform.c
Examining data/fis-gtm-6.3-007/sr_unix/dollarh.c
Examining data/fis-gtm-6.3-007/sr_unix/dollarh.h
Examining data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c
Examining data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.h
Examining data/fis-gtm-6.3-007/sr_unix/dse.c
Examining data/fis-gtm-6.3-007/sr_unix/dse_cmd.c
Examining data/fis-gtm-6.3-007/sr_unix/dse_cmd_disallow.c
Examining data/fis-gtm-6.3-007/sr_unix/dse_cmd_disallow.h
Examining data/fis-gtm-6.3-007/sr_unix/dse_ctrlc_handler.c
Examining data/fis-gtm-6.3-007/sr_unix/dse_help.c
Examining data/fis-gtm-6.3-007/sr_unix/dse_open.c
Examining data/fis-gtm-6.3-007/sr_unix/dse_puttime.c
Examining data/fis-gtm-6.3-007/sr_unix/dse_remove.c
Examining data/fis-gtm-6.3-007/sr_unix/dsk_read.c
Examining data/fis-gtm-6.3-007/sr_unix/dsk_write_nocache.c
Examining data/fis-gtm-6.3-007/sr_unix/eintr_wrapper_semop.h
Examining data/fis-gtm-6.3-007/sr_unix/err_init.c
Examining data/fis-gtm-6.3-007/sr_unix/error_return.c
Examining data/fis-gtm-6.3-007/sr_unix/errorsp.h
Examining data/fis-gtm-6.3-007/sr_unix/exi_ch.c
Examining data/fis-gtm-6.3-007/sr_unix/extract_signal_info.c
Examining data/fis-gtm-6.3-007/sr_unix/exttab_parse.c
Examining data/fis-gtm-6.3-007/sr_unix/exttime.c
Examining data/fis-gtm-6.3-007/sr_unix/f_char.c
Examining data/fis-gtm-6.3-007/sr_unix/f_piece.c
Examining data/fis-gtm-6.3-007/sr_unix/fake_enospc.c
Examining data/fis-gtm-6.3-007/sr_unix/fake_enospc.h
Examining data/fis-gtm-6.3-007/sr_unix/fgn_getinfo.c
Examining data/fis-gtm-6.3-007/sr_unix/fgncalsp.h
Examining data/fis-gtm-6.3-007/sr_unix/file_head_read.c
Examining data/fis-gtm-6.3-007/sr_unix/file_head_write.c
Examining data/fis-gtm-6.3-007/sr_unix/file_input.c
Examining data/fis-gtm-6.3-007/sr_unix/file_input.h
Examining data/fis-gtm-6.3-007/sr_unix/filestruct.h
Examining data/fis-gtm-6.3-007/sr_unix/fix_pages.c
Examining data/fis-gtm-6.3-007/sr_unix/forced_exit_err_display.c
Examining data/fis-gtm-6.3-007/sr_unix/forced_exit_err_display.h
Examining data/fis-gtm-6.3-007/sr_unix/fork_init.h
Examining data/fis-gtm-6.3-007/sr_unix/ftok.c
Examining data/fis-gtm-6.3-007/sr_unix/ftok_sem_get_common.c
Examining data/fis-gtm-6.3-007/sr_unix/ftok_sem_incrcnt.c
Examining data/fis-gtm-6.3-007/sr_unix/ftok_sem_incrcnt.h
Examining data/fis-gtm-6.3-007/sr_unix/ftok_sems.c
Examining data/fis-gtm-6.3-007/sr_unix/ftok_sems.h
Examining data/fis-gtm-6.3-007/sr_unix/gbldirnam.h
Examining data/fis-gtm-6.3-007/sr_unix/gcall.h
Examining data/fis-gtm-6.3-007/sr_unix/gds_file_size.c
Examining data/fis-gtm-6.3-007/sr_unix/gds_rundown.c
Examining data/fis-gtm-6.3-007/sr_unix/gds_rundown_ch.c
Examining data/fis-gtm-6.3-007/sr_unix/gds_rundown_err_cleanup.c
Examining data/fis-gtm-6.3-007/sr_unix/gds_rundown_err_cleanup.h
Examining data/fis-gtm-6.3-007/sr_unix/gdsfheadsp.h
Examining data/fis-gtm-6.3-007/sr_unix/gdsfilext.c
Examining data/fis-gtm-6.3-007/sr_unix/gdsfilext_nojnl.c
Examining data/fis-gtm-6.3-007/sr_unix/gdsfilext_nojnl.h
Examining data/fis-gtm-6.3-007/sr_unix/generic_signal_handler.c
Examining data/fis-gtm-6.3-007/sr_unix/generic_signal_handler.h
Examining data/fis-gtm-6.3-007/sr_unix/genpat.c
Examining data/fis-gtm-6.3-007/sr_unix/get_command_line.c
Examining data/fis-gtm-6.3-007/sr_unix/get_full_path.c
Examining data/fis-gtm-6.3-007/sr_unix/get_page_size.c
Examining data/fis-gtm-6.3-007/sr_unix/get_src_line.c
Examining data/fis-gtm-6.3-007/sr_unix/get_ztimeout.c
Examining data/fis-gtm-6.3-007/sr_unix/getcaps.c
Examining data/fis-gtm-6.3-007/sr_unix/getcaps.h
Examining data/fis-gtm-6.3-007/sr_unix/geteditor.c
Examining data/fis-gtm-6.3-007/sr_unix/geteditor.h
Examining data/fis-gtm-6.3-007/sr_unix/geteuid.c
Examining data/fis-gtm-6.3-007/sr_unix/getjobnum.c
Examining data/fis-gtm-6.3-007/sr_unix/getmaxfds.c
Examining data/fis-gtm-6.3-007/sr_unix/getmaxfds.h
Examining data/fis-gtm-6.3-007/sr_unix/getstorage.c
Examining data/fis-gtm-6.3-007/sr_unix/getzmode.c
Examining data/fis-gtm-6.3-007/sr_unix/getzprocess.c
Examining data/fis-gtm-6.3-007/sr_unix/go_load.c
Examining data/fis-gtm-6.3-007/sr_unix/golevel.c
Examining data/fis-gtm-6.3-007/sr_unix/goq_load.c
Examining data/fis-gtm-6.3-007/sr_unix/grab_crit.c
Examining data/fis-gtm-6.3-007/sr_unix/grab_crit_encr_cycle_sync.c
Examining data/fis-gtm-6.3-007/sr_unix/grab_crit_immediate.c
Examining data/fis-gtm-6.3-007/sr_unix/grab_latch.c
Examining data/fis-gtm-6.3-007/sr_unix/grab_lock.c
Examining data/fis-gtm-6.3-007/sr_unix/gt_timer.h
Examining data/fis-gtm-6.3-007/sr_unix/gt_timers.c
Examining data/fis-gtm-6.3-007/sr_unix/gt_timers_add_safe_hndlrs.c
Examining data/fis-gtm-6.3-007/sr_unix/gt_timers_add_safe_hndlrs.h
Examining data/fis-gtm-6.3-007/sr_unix/gtcmstub.c
Examining data/fis-gtm-6.3-007/sr_unix/gtcmtrstub.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_aio.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_asm_establish.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_bintim.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace_semop.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace_semop.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_compile.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_compile.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_conv.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_conv.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_conv_init.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_dbjnl_dupfd_check.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_dbjnl_dupfd_check.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_descript.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_dump.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_dump_core.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_env_translate.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_exit_handler.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_exit_handler.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_fd_trace.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_file_remove.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_file_stat.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_filter_command.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_filter_command.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_ftok.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_getpwuid.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_icu.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_icu.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_icu_api.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_image_exit.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_init_env.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_ipc.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_is_main_thread.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_isanlp.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_isanlp.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_logicals.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_main.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_main.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_multi_proc.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_multi_proc.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_multi_thread.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_multi_thread.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_permissions.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_permissions.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_pipe.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_pipe.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_poll.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_post_startup_check_init.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_post_startup_check_init.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_pthread.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_pthread_init_key.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_pthread_init_key.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_putmsg.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_putmsg_list.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_rel_quant.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_rename.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_repl_multi_inst.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_sem.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_semaphore.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_semutils.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_semutils.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_signal.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_startup.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_startup.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_statvfs.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_stdio.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_syslog.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_system.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_term.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_termios.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_text_alloc.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_times.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls_funclist.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_tparm.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_tparm.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_tputs.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_tputs.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_trigger.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_trigger_trc.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_ulimit.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_unique_file_util.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_unlink_all.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_unlink_all.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_utf8.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_utf8.h
Examining data/fis-gtm-6.3-007/sr_unix/gtm_wake.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_zlib.c
Examining data/fis-gtm-6.3-007/sr_unix/gtm_zlib.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmci.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmci.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmci_ch.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmci_isv.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmci_signals.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmci_signals.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_funclist.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_interface.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_sym_ref.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_sym_ref.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmdbgflags.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmgblstat.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmgblstat.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmio.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmio_ch.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmlink.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmlink.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv_end.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv_fetchresync.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv_poll_actions.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmrecv_shutdown.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsecshr.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_cleanup.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsiginfo.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_changelog.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_checkforbacklog.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_checkhealth.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_end.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_flush_fh.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_freeze.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_heartbeat.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_inline.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_jnl_release_timer.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_jnlpool.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_losttncomplete.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_mode_change.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_needrestart.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_onln_rlbk_clnup.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_process.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_rootprimary_init.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_seqno_init.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_showbacklog.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_shutdown.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_srv_latch.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_srv_latch.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_statslog.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmsource_stopfilter.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmxc_types.h
Examining data/fis-gtm-6.3-007/sr_unix/gv_trig_cmd_table.h
Examining data/fis-gtm-6.3-007/sr_unix/gv_trigger.c
Examining data/fis-gtm-6.3-007/sr_unix/gv_trigger.h
Examining data/fis-gtm-6.3-007/sr_unix/gv_trigger_protos.h
Examining data/fis-gtm-6.3-007/sr_unix/gvcmx_canremlk_stub.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcmx_reqremlk_stub.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcmx_resremlk_stub.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcmx_susremlk_stub.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcmy_open.h
Examining data/fis-gtm-6.3-007/sr_unix/gvcmz_bunch_stub.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcmz_error_stub.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcmz_neterr_stub.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcmz_zflush_stub.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcst_spr_data.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcst_spr_kill.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcst_spr_order.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcst_spr_query.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcst_spr_queryget.c
Examining data/fis-gtm-6.3-007/sr_unix/gvcst_spr_zprevious.c
Examining data/fis-gtm-6.3-007/sr_unix/gvusr.c
Examining data/fis-gtm-6.3-007/sr_unix/hugetlbfs_overrides.h
Examining data/fis-gtm-6.3-007/sr_unix/ident.h
Examining data/fis-gtm-6.3-007/sr_unix/incr_link.c
Examining data/fis-gtm-6.3-007/sr_unix/incr_link.h
Examining data/fis-gtm-6.3-007/sr_unix/init_gtm.c
Examining data/fis-gtm-6.3-007/sr_unix/interlock.h
Examining data/fis-gtm-6.3-007/sr_unix/invocation_mode.h
Examining data/fis-gtm-6.3-007/sr_unix/io_get_fgn_driver.c
Examining data/fis-gtm-6.3-007/sr_unix/io_init_name.c
Examining data/fis-gtm-6.3-007/sr_unix/io_is_rm.c
Examining data/fis-gtm-6.3-007/sr_unix/io_is_sn.c
Examining data/fis-gtm-6.3-007/sr_unix/io_open_try.c
Examining data/fis-gtm-6.3-007/sr_unix/io_type.c
Examining data/fis-gtm-6.3-007/sr_unix/iob.h
Examining data/fis-gtm-6.3-007/sr_unix/iob_close.c
Examining data/fis-gtm-6.3-007/sr_unix/iob_flush.c
Examining data/fis-gtm-6.3-007/sr_unix/iob_open_rd.c
Examining data/fis-gtm-6.3-007/sr_unix/iob_open_wt.c
Examining data/fis-gtm-6.3-007/sr_unix/iob_read.c
Examining data/fis-gtm-6.3-007/sr_unix/iob_write.c
Examining data/fis-gtm-6.3-007/sr_unix/ioff_open.c
Examining data/fis-gtm-6.3-007/sr_unix/iopi_iocontrol.c
Examining data/fis-gtm-6.3-007/sr_unix/iopi_open.c
Examining data/fis-gtm-6.3-007/sr_unix/iorm_close.c
Examining data/fis-gtm-6.3-007/sr_unix/iorm_flush.c
Examining data/fis-gtm-6.3-007/sr_unix/iorm_get.c
Examining data/fis-gtm-6.3-007/sr_unix/iorm_open.c
Examining data/fis-gtm-6.3-007/sr_unix/iorm_rdone.c
Examining data/fis-gtm-6.3-007/sr_unix/iorm_read.c
Examining data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c
Examining data/fis-gtm-6.3-007/sr_unix/iorm_use.c
Examining data/fis-gtm-6.3-007/sr_unix/iorm_write.c
Examining data/fis-gtm-6.3-007/sr_unix/iorm_wteol.c
Examining data/fis-gtm-6.3-007/sr_unix/iormdef.h
Examining data/fis-gtm-6.3-007/sr_unix/iosize.h
Examining data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c
Examining data/fis-gtm-6.3-007/sr_unix/iosocket_tls.c
Examining data/fis-gtm-6.3-007/sr_unix/iosp.h
Examining data/fis-gtm-6.3-007/sr_unix/iott_close.c
Examining data/fis-gtm-6.3-007/sr_unix/iott_edit.c
Examining data/fis-gtm-6.3-007/sr_unix/iott_edit.h
Examining data/fis-gtm-6.3-007/sr_unix/iott_flush.c
Examining data/fis-gtm-6.3-007/sr_unix/iott_flush_time.h
Examining data/fis-gtm-6.3-007/sr_unix/iott_iocontrol.c
Examining data/fis-gtm-6.3-007/sr_unix/iott_open.c
Examining data/fis-gtm-6.3-007/sr_unix/iott_rdone.c
Examining data/fis-gtm-6.3-007/sr_unix/iott_read.c
Examining data/fis-gtm-6.3-007/sr_unix/iott_readfl.c
Examining data/fis-gtm-6.3-007/sr_unix/iott_use.c
Examining data/fis-gtm-6.3-007/sr_unix/iott_write.c
Examining data/fis-gtm-6.3-007/sr_unix/iottdef.h
Examining data/fis-gtm-6.3-007/sr_unix/iottdefsp.h
Examining data/fis-gtm-6.3-007/sr_unix/ious_iocontrol.c
Examining data/fis-gtm-6.3-007/sr_unix/ious_open.c
Examining data/fis-gtm-6.3-007/sr_unix/ious_rdone.c
Examining data/fis-gtm-6.3-007/sr_unix/ious_read.c
Examining data/fis-gtm-6.3-007/sr_unix/ious_readfl.c
Examining data/fis-gtm-6.3-007/sr_unix/ious_write.c
Examining data/fis-gtm-6.3-007/sr_unix/ious_wtone.c
Examining data/fis-gtm-6.3-007/sr_unix/ipcrmid.c
Examining data/fis-gtm-6.3-007/sr_unix/ipcrmid.h
Examining data/fis-gtm-6.3-007/sr_unix/is_file_identical.c
Examining data/fis-gtm-6.3-007/sr_unix/is_fstype_nfs.c
Examining data/fis-gtm-6.3-007/sr_unix/is_fstype_nfs.h
Examining data/fis-gtm-6.3-007/sr_unix/is_proc_alive.c
Examining data/fis-gtm-6.3-007/sr_unix/is_raw_dev.c
Examining data/fis-gtm-6.3-007/sr_unix/is_raw_dev.h
Examining data/fis-gtm-6.3-007/sr_unix/jnl_file_close_timer.c
Examining data/fis-gtm-6.3-007/sr_unix/jnl_file_close_timer.h
Examining data/fis-gtm-6.3-007/sr_unix/jnl_file_extend.c
Examining data/fis-gtm-6.3-007/sr_unix/jnl_file_open.c
Examining data/fis-gtm-6.3-007/sr_unix/jnl_fsync.c
Examining data/fis-gtm-6.3-007/sr_unix/jnl_output_sp.c
Examining data/fis-gtm-6.3-007/sr_unix/jnl_prc_vector.c
Examining data/fis-gtm-6.3-007/sr_unix/jnlext_merge_sort_prepare.c
Examining data/fis-gtm-6.3-007/sr_unix/jnlext_write.c
Examining data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c
Examining data/fis-gtm-6.3-007/sr_unix/jnlsp.h
Examining data/fis-gtm-6.3-007/sr_unix/jobchild_init.c
Examining data/fis-gtm-6.3-007/sr_unix/jobchild_init.h
Examining data/fis-gtm-6.3-007/sr_unix/joberr.h
Examining data/fis-gtm-6.3-007/sr_unix/jobexam_signal_handler.c
Examining data/fis-gtm-6.3-007/sr_unix/jobexam_signal_handler.h
Examining data/fis-gtm-6.3-007/sr_unix/jobsp.h
Examining data/fis-gtm-6.3-007/sr_unix/laberror.c
Examining data/fis-gtm-6.3-007/sr_unix/list_file.c
Examining data/fis-gtm-6.3-007/sr_unix/lke.c
Examining data/fis-gtm-6.3-007/sr_unix/lke_cmd.c
Examining data/fis-gtm-6.3-007/sr_unix/lke_cmd_disallow.c
Examining data/fis-gtm-6.3-007/sr_unix/lke_cmd_disallow.h
Examining data/fis-gtm-6.3-007/sr_unix/lke_ctrlc_handler.c
Examining data/fis-gtm-6.3-007/sr_unix/lke_fileio.c
Examining data/fis-gtm-6.3-007/sr_unix/lke_fileio.h
Examining data/fis-gtm-6.3-007/sr_unix/lke_getansw.c
Examining data/fis-gtm-6.3-007/sr_unix/lke_help.c
Examining data/fis-gtm-6.3-007/sr_unix/load.h
Examining data/fis-gtm-6.3-007/sr_unix/lockdefs.h
Examining data/fis-gtm-6.3-007/sr_unix/lref_parse.c
Examining data/fis-gtm-6.3-007/sr_unix/m_zrupdate.c
Examining data/fis-gtm-6.3-007/sr_unix/m_ztrigger.c
Examining data/fis-gtm-6.3-007/sr_unix/make_cimode.c
Examining data/fis-gtm-6.3-007/sr_unix/make_dmode.c
Examining data/fis-gtm-6.3-007/sr_unix/make_mode.c
Examining data/fis-gtm-6.3-007/sr_unix/make_mode.h
Examining data/fis-gtm-6.3-007/sr_unix/map_sym.c
Examining data/fis-gtm-6.3-007/sr_unix/maskpass.c
Examining data/fis-gtm-6.3-007/sr_unix/mdefsa.h
Examining data/fis-gtm-6.3-007/sr_unix/mdefsp.h
Examining data/fis-gtm-6.3-007/sr_unix/mem_access.c
Examining data/fis-gtm-6.3-007/sr_unix/memprot.c
Examining data/fis-gtm-6.3-007/sr_unix/memprot.h
Examining data/fis-gtm-6.3-007/sr_unix/mmrhash.c
Examining data/fis-gtm-6.3-007/sr_unix/mmrhash.h
Examining data/fis-gtm-6.3-007/sr_unix/msg.h
Examining data/fis-gtm-6.3-007/sr_unix/mu_all_version_standalone.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_all_version_standalone.h
Examining data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_cre_structs.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_cre_structs.h
Examining data/fis-gtm-6.3-007/sr_unix/mu_decrypt.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_decrypt.h
Examining data/fis-gtm-6.3-007/sr_unix/mu_extract.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_getlst.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_gvis.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_int_ch.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_op_open.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_op_open.h
Examining data/fis-gtm-6.3-007/sr_unix/mu_outofband_setup.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_replpool_grab_sem.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_replpool_release_sem.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.h
Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.h
Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_repl_instance.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_repl_instance.h
Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_replpool.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_replpool.h
Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_rlnkctl.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_rndwn_rlnkctl.h
Examining data/fis-gtm-6.3-007/sr_unix/mu_signal_process.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_size_arsample.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_size_impsample.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_size_scan.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_swap_root.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_term_setup.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_term_setup.h
Examining data/fis-gtm-6.3-007/sr_unix/mu_trig_trgfile.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_trig_trgfile.h
Examining data/fis-gtm-6.3-007/sr_unix/mu_truncate.c
Examining data/fis-gtm-6.3-007/sr_unix/mu_truncate.h
Examining data/fis-gtm-6.3-007/sr_unix/mu_upgrd_sig_init.h
Examining data/fis-gtm-6.3-007/sr_unix/mubexpfilnam.c
Examining data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c
Examining data/fis-gtm-6.3-007/sr_unix/mubgetfil.c
Examining data/fis-gtm-6.3-007/sr_unix/mubinccpy.c
Examining data/fis-gtm-6.3-007/sr_unix/mucblkini.c
Examining data/fis-gtm-6.3-007/sr_unix/mumps_clitab.c
Examining data/fis-gtm-6.3-007/sr_unix/mup_bak_sys.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_cmd.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_cmd_disallow.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_cmd_disallow.h
Examining data/fis-gtm-6.3-007/sr_unix/mupip_crypt.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_crypt.h
Examining data/fis-gtm-6.3-007/sr_unix/mupip_ctrl.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_ctrl.h
Examining data/fis-gtm-6.3-007/sr_unix/mupip_cvtgbl.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_cvtpgm.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_dump_fhead.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_dump_fhead.h
Examining data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.h
Examining data/fis-gtm-6.3-007/sr_unix/mupip_exit.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_exit_handler.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_ftok.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_ftok.h
Examining data/fis-gtm-6.3-007/sr_unix/mupip_hash.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_hash.h
Examining data/fis-gtm-6.3-007/sr_unix/mupip_help.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_load_reg_list.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_load_reg_list.h
Examining data/fis-gtm-6.3-007/sr_unix/mupip_load_triggerfile.h
Examining data/fis-gtm-6.3-007/sr_unix/mupip_quit.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_rctldump.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_rctldump.h
Examining data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.h
Examining data/fis-gtm-6.3-007/sr_unix/mupip_restore.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_rundown.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_set_jnlfile.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_size.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_size.h
Examining data/fis-gtm-6.3-007/sr_unix/mupip_trigger.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_trigger.h
Examining data/fis-gtm-6.3-007/sr_unix/mupip_upgrade_standalone.c
Examining data/fis-gtm-6.3-007/sr_unix/mupip_upgrade_standalone.h
Examining data/fis-gtm-6.3-007/sr_unix/muprecsp.h
Examining data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c
Examining data/fis-gtm-6.3-007/sr_unix/mur_read_file_sp.c
Examining data/fis-gtm-6.3-007/sr_unix/murgetlst.c
Examining data/fis-gtm-6.3-007/sr_unix/mutex.c
Examining data/fis-gtm-6.3-007/sr_unix/mutex_sock_cleanup.c
Examining data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c
Examining data/fis-gtm-6.3-007/sr_unix/mutex_wake_proc.c
Examining data/fis-gtm-6.3-007/sr_unix/mutexsp.h
Examining data/fis-gtm-6.3-007/sr_unix/obj_code.c
Examining data/fis-gtm-6.3-007/sr_unix/obj_file.c
Examining data/fis-gtm-6.3-007/sr_unix/obj_filesp.h
Examining data/fis-gtm-6.3-007/sr_unix/obj_fileu.c
Examining data/fis-gtm-6.3-007/sr_unix/ojchildioclean.c
Examining data/fis-gtm-6.3-007/sr_unix/ojchildioset.c
Examining data/fis-gtm-6.3-007/sr_unix/ojchildparms.c
Examining data/fis-gtm-6.3-007/sr_unix/ojchkfs.c
Examining data/fis-gtm-6.3-007/sr_unix/ojparams.c
Examining data/fis-gtm-6.3-007/sr_unix/ojstartchild.c
Examining data/fis-gtm-6.3-007/sr_unix/op_currhd.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fgnlookup.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnextract.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnextract.h
Examining data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fngetdvi.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fngetjpi.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fngetlki.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fngetsyi.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnp1.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnpiece.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnpopulation.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnrandom.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnzcall.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnzconvert.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnzfile.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnzlkid.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnzparse.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnzpid.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnzpriv.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnzsearch.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnzsetprv.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnzsyslog.c
Examining data/fis-gtm-6.3-007/sr_unix/op_fnztrnlnm.c
Examining data/fis-gtm-6.3-007/sr_unix/op_horolog.c
Examining data/fis-gtm-6.3-007/sr_unix/op_job.c
Examining data/fis-gtm-6.3-007/sr_unix/op_setextract.c
Examining data/fis-gtm-6.3-007/sr_unix/op_setp1.c
Examining data/fis-gtm-6.3-007/sr_unix/op_setpiece.c
Examining data/fis-gtm-6.3-007/sr_unix/op_zattach.c
Examining data/fis-gtm-6.3-007/sr_unix/op_zedit.c
Examining data/fis-gtm-6.3-007/sr_unix/op_zhelp_xfr.c
Examining data/fis-gtm-6.3-007/sr_unix/op_zhorolog.c
Examining data/fis-gtm-6.3-007/sr_unix/op_zlink.c
Examining data/fis-gtm-6.3-007/sr_unix/op_zmess.c
Examining data/fis-gtm-6.3-007/sr_unix/op_zrupdate.c
Examining data/fis-gtm-6.3-007/sr_unix/op_ztrigger.c
Examining data/fis-gtm-6.3-007/sr_unix/op_zut.c
Examining data/fis-gtm-6.3-007/sr_unix/outc.c
Examining data/fis-gtm-6.3-007/sr_unix/parse_file.c
Examining data/fis-gtm-6.3-007/sr_unix/parse_file.h
Examining data/fis-gtm-6.3-007/sr_unix/pipeint_stats.c
Examining data/fis-gtm-6.3-007/sr_unix/pipeint_stats.h
Examining data/fis-gtm-6.3-007/sr_unix/probecrit_rec.h
Examining data/fis-gtm-6.3-007/sr_unix/process_reorg_encrypt_restart.c
Examining data/fis-gtm-6.3-007/sr_unix/process_reorg_encrypt_restart.h
Examining data/fis-gtm-6.3-007/sr_unix/put_cdidx.c
Examining data/fis-gtm-6.3-007/sr_unix/random.c
Examining data/fis-gtm-6.3-007/sr_unix/random.h
Examining data/fis-gtm-6.3-007/sr_unix/rc.h
Examining data/fis-gtm-6.3-007/sr_unix/rc_cpt.h
Examining data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c
Examining data/fis-gtm-6.3-007/sr_unix/recover_truncate.c
Examining data/fis-gtm-6.3-007/sr_unix/recover_truncate.h
Examining data/fis-gtm-6.3-007/sr_unix/recvpool_init.c
Examining data/fis-gtm-6.3-007/sr_unix/reg_cmcheck.c
Examining data/fis-gtm-6.3-007/sr_unix/rel_crit.c
Examining data/fis-gtm-6.3-007/sr_unix/rel_latch.c
Examining data/fis-gtm-6.3-007/sr_unix/rel_lock.c
Examining data/fis-gtm-6.3-007/sr_unix/rel_quant.c
Examining data/fis-gtm-6.3-007/sr_unix/relinkctl.c
Examining data/fis-gtm-6.3-007/sr_unix/relinkctl.h
Examining data/fis-gtm-6.3-007/sr_unix/remove_rms.c
Examining data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c
Examining data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c
Examining data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.h
Examining data/fis-gtm-6.3-007/sr_unix/repl_inst_edit.c
Examining data/fis-gtm-6.3-007/sr_unix/repl_inst_ftok_counter_halted.c
Examining data/fis-gtm-6.3-007/sr_unix/repl_inst_ftok_counter_halted.h
Examining data/fis-gtm-6.3-007/sr_unix/repl_instance.c
Examining data/fis-gtm-6.3-007/sr_unix/repl_instance.h
Examining data/fis-gtm-6.3-007/sr_unix/repl_ipc_cleanup.c
Examining data/fis-gtm-6.3-007/sr_unix/repl_log.c
Examining data/fis-gtm-6.3-007/sr_unix/repl_log_init.c
Examining data/fis-gtm-6.3-007/sr_unix/repl_logfileinfo_get.c
Examining data/fis-gtm-6.3-007/sr_unix/repl_msg.h
Examining data/fis-gtm-6.3-007/sr_unix/repl_sem.c
Examining data/fis-gtm-6.3-007/sr_unix/repl_sem.h
Examining data/fis-gtm-6.3-007/sr_unix/repl_sem_sp.h
Examining data/fis-gtm-6.3-007/sr_unix/repl_sp.h
Examining data/fis-gtm-6.3-007/sr_unix/resetterm.c
Examining data/fis-gtm-6.3-007/sr_unix/rmv_mul_slsh.c
Examining data/fis-gtm-6.3-007/sr_unix/rmv_mul_slsh.h
Examining data/fis-gtm-6.3-007/sr_unix/rtnhdr.h
Examining data/fis-gtm-6.3-007/sr_unix/rtnobj.c
Examining data/fis-gtm-6.3-007/sr_unix/rtnobj.h
Examining data/fis-gtm-6.3-007/sr_unix/rts_error.c
Examining data/fis-gtm-6.3-007/sr_unix/same_device_check.c
Examining data/fis-gtm-6.3-007/sr_unix/secshr_client.c
Examining data/fis-gtm-6.3-007/sr_unix/secshr_client.h
Examining data/fis-gtm-6.3-007/sr_unix/semstat2.c
Examining data/fis-gtm-6.3-007/sr_unix/send_msg.c
Examining data/fis-gtm-6.3-007/sr_unix/set_jnl_file_close.c
Examining data/fis-gtm-6.3-007/sr_unix/set_num_additional_processors.c
Examining data/fis-gtm-6.3-007/sr_unix/set_zstatus.c
Examining data/fis-gtm-6.3-007/sr_unix/setterm.c
Examining data/fis-gtm-6.3-007/sr_unix/sgtm_putmsg.c
Examining data/fis-gtm-6.3-007/sr_unix/sig_init.c
Examining data/fis-gtm-6.3-007/sr_unix/sig_init.h
Examining data/fis-gtm-6.3-007/sr_unix/simple_timeout_timer.c
Examining data/fis-gtm-6.3-007/sr_unix/sleep.c
Examining data/fis-gtm-6.3-007/sr_unix/sleep.h
Examining data/fis-gtm-6.3-007/sr_unix/source_file.c
Examining data/fis-gtm-6.3-007/sr_unix/ss_anal_shdw_file.c
Examining data/fis-gtm-6.3-007/sr_unix/ss_context_mgr.c
Examining data/fis-gtm-6.3-007/sr_unix/ss_get_block.c
Examining data/fis-gtm-6.3-007/sr_unix/ss_initiate.c
Examining data/fis-gtm-6.3-007/sr_unix/ss_lock_facility.c
Examining data/fis-gtm-6.3-007/sr_unix/ss_lock_facility.h
Examining data/fis-gtm-6.3-007/sr_unix/ss_read_block.c
Examining data/fis-gtm-6.3-007/sr_unix/ss_release.c
Examining data/fis-gtm-6.3-007/sr_unix/ss_shdw_mgr.c
Examining data/fis-gtm-6.3-007/sr_unix/ss_write_block.c
Examining data/fis-gtm-6.3-007/sr_unix/std_dev_outbndset.c
Examining data/fis-gtm-6.3-007/sr_unix/stop_image.c
Examining data/fis-gtm-6.3-007/sr_unix/stop_image_ch.c
Examining data/fis-gtm-6.3-007/sr_unix/str_match.c
Examining data/fis-gtm-6.3-007/sr_unix/str_match.h
Examining data/fis-gtm-6.3-007/sr_unix/suspend.c
Examining data/fis-gtm-6.3-007/sr_unix/suspsigs_handler.c
Examining data/fis-gtm-6.3-007/sr_unix/suspsigs_handler.h
Examining data/fis-gtm-6.3-007/sr_unix/t_recycled2free.c
Examining data/fis-gtm-6.3-007/sr_unix/t_recycled2free.h
Examining data/fis-gtm-6.3-007/sr_unix/tab_probecrit_rec.h
Examining data/fis-gtm-6.3-007/sr_unix/term_setup.c
Examining data/fis-gtm-6.3-007/sr_unix/timersp.h
Examining data/fis-gtm-6.3-007/sr_unix/trans_log_name.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_cmd.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_compare.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_compare_protos.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_delete.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_delete_protos.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_fill_xecute_buffer.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_fill_xecute_buffer.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_incr_cycle.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_incr_cycle.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_locate_andor_load.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_parse.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_parse_protos.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_read_andor_locate.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_scan_string.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_scan_string.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_select.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_select_protos.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_source_read_andor_verify.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_subs_def.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_tpwrap_ch.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_trgfile.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_trgfile_protos.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_update.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_update_protos.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_upgrade_protos.h
Examining data/fis-gtm-6.3-007/sr_unix/trigger_user_name.c
Examining data/fis-gtm-6.3-007/sr_unix/trigger_user_name.h
Examining data/fis-gtm-6.3-007/sr_unix/trmdef.h
Examining data/fis-gtm-6.3-007/sr_unix/upd_log_init.c
Examining data/fis-gtm-6.3-007/sr_unix/urx_remove.c
Examining data/fis-gtm-6.3-007/sr_unix/utfcgr.c
Examining data/fis-gtm-6.3-007/sr_unix/utfcgr.h
Examining data/fis-gtm-6.3-007/sr_unix/utfcgr_trc.h
Examining data/fis-gtm-6.3-007/sr_unix/util_exit_handler.c
Examining data/fis-gtm-6.3-007/sr_unix/util_help.c
Examining data/fis-gtm-6.3-007/sr_unix/util_help.h
Examining data/fis-gtm-6.3-007/sr_unix/util_in_open.c
Examining data/fis-gtm-6.3-007/sr_unix/util_input.c
Examining data/fis-gtm-6.3-007/sr_unix/util_out_print_gtmio.c
Examining data/fis-gtm-6.3-007/sr_unix/util_out_print_vaparm.h
Examining data/fis-gtm-6.3-007/sr_unix/util_output.c
Examining data/fis-gtm-6.3-007/sr_unix/util_output_cm.c
Examining data/fis-gtm-6.3-007/sr_unix/util_spawn.c
Examining data/fis-gtm-6.3-007/sr_unix/v15_filestruct.h
Examining data/fis-gtm-6.3-007/sr_unix/wait_for_disk_space.c
Examining data/fis-gtm-6.3-007/sr_unix/wait_for_disk_space.h
Examining data/fis-gtm-6.3-007/sr_unix/warn_db_sz.c
Examining data/fis-gtm-6.3-007/sr_unix/warn_db_sz.h
Examining data/fis-gtm-6.3-007/sr_unix/wcs_clean_dbsync.c
Examining data/fis-gtm-6.3-007/sr_unix/wcs_clean_dbsync.h
Examining data/fis-gtm-6.3-007/sr_unix/wcs_clean_dbsync_timer.c
Examining data/fis-gtm-6.3-007/sr_unix/wcs_flu.c
Examining data/fis-gtm-6.3-007/sr_unix/wcs_get_space.c
Examining data/fis-gtm-6.3-007/sr_unix/wcs_write_in_progress_wait.c
Examining data/fis-gtm-6.3-007/sr_unix/wcs_write_in_progress_wait.h
Examining data/fis-gtm-6.3-007/sr_unix/wcs_wt.h
Examining data/fis-gtm-6.3-007/sr_unix/wcs_wt_restart.c
Examining data/fis-gtm-6.3-007/sr_unix/wcs_wterror.c
Examining data/fis-gtm-6.3-007/sr_unix/wcs_wtfini.c
Examining data/fis-gtm-6.3-007/sr_unix/wcs_wtfini_nocrit.c
Examining data/fis-gtm-6.3-007/sr_unix/wcs_wtstart.c
Examining data/fis-gtm-6.3-007/sr_unix/wcs_wtstart_fini.c
Examining data/fis-gtm-6.3-007/sr_unix/zbreaksp.h
Examining data/fis-gtm-6.3-007/sr_unix/zcall_package.c
Examining data/fis-gtm-6.3-007/sr_unix/zcall_package.h
Examining data/fis-gtm-6.3-007/sr_unix/zhist.c
Examining data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c
Examining data/fis-gtm-6.3-007/sr_unix/zlmov_lnames.c
Examining data/fis-gtm-6.3-007/sr_unix/zro_gettok.c
Examining data/fis-gtm-6.3-007/sr_unix/zro_load.c
Examining data/fis-gtm-6.3-007/sr_unix/zro_search.c
Examining data/fis-gtm-6.3-007/sr_unix/zro_shlibs.c
Examining data/fis-gtm-6.3-007/sr_unix/zro_shlibs.h
Examining data/fis-gtm-6.3-007/sr_unix/zroutinessp.h
Examining data/fis-gtm-6.3-007/sr_unix/zshow_devices.c
Examining data/fis-gtm-6.3-007/sr_unix/zshow_rctldump.c
Examining data/fis-gtm-6.3-007/sr_unix/zshow_zcalls.c
Examining data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c
Examining data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.h
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c
Examining data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm.h
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_bgn_net.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_cn_acpt.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_cn_disc.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_dmpstat.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_end_net.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_exit.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_exit_ch.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_init.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_loop.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_main.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_ping.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pkdisp.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_play.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_prsopt.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_rep_err.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_shmclean.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_sysenv.h
Examining data/fis-gtm-6.3-007/sr_unix_cm/gtcm_term.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi.h
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_buff_rsp.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_dbms_ch.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_dmp_pkt.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_extstr.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_gvextnam.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_lkextnam.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_conn.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_def.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_disc.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_get.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_incr.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_kill.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_lock.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_next.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_ordr.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_qry.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_rord.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_set.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_sete.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_setp.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_stat.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_unla.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_unlc.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_unlk.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/omi_srvc_xct.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_dbms_ch.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_fnd_file.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_frmt_lck.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_gbl_ord.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_iscan.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_iscan.h
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_mval2subsc.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_nspace.h
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_oflow.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_clsd.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getp.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getr.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_kill.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_lock.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_logn.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_opnd.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_set.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_setf.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_rundown.c
Examining data/fis-gtm-6.3-007/sr_unix_cm/rc_srvc_xct.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_alloc.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_close.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_debug.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_idle.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_init.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_open.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_peer_info.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_read.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_write.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmi_write_urg.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_async.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_clb_async.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_err.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_exception.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_fini.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_firstone.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_getdeferred.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_getsockaddr.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_handler.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_housekeeping.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_incoming_call.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_init_clb.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_netinit.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_postevent.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_read.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_select.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_setupfd.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_unit2clb.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmj_write.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmu_getclb.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/cmu_ntdroot.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_ch.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_exi_ch.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_clitab.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.h
Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_server.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_open_cmerrlog.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_open_cmerrlog.h
Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_urgread_ast.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c
Examining data/fis-gtm-6.3-007/sr_unix_gnp/gvcmz_errmsg.c
Examining data/fis-gtm-6.3-007/sr_unix_nsb/comp_lits.c
Examining data/fis-gtm-6.3-007/sr_unix_nsb/obj_code.c
Examining data/fis-gtm-6.3-007/sr_unix_nsb/obj_filesp.h
Examining data/fis-gtm-6.3-007/sr_unix_nsb/opcode_def.h
Examining data/fis-gtm-6.3-007/sr_unix_nsb/rtnhdr.h
Examining data/fis-gtm-6.3-007/sr_unix_nsb/shrink_jmps.c
Examining data/fis-gtm-6.3-007/sr_x86_64/cmerrors_ctl.c
Examining data/fis-gtm-6.3-007/sr_x86_64/cmierrors_ctl.c
Examining data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c
Examining data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.h
Examining data/fis-gtm-6.3-007/sr_x86_64/find_line_call.c
Examining data/fis-gtm-6.3-007/sr_x86_64/gdeerrors_ctl.c
Examining data/fis-gtm-6.3-007/sr_x86_64/incr_link_sp.h
Examining data/fis-gtm-6.3-007/sr_x86_64/make_mode_sp.h
Examining data/fis-gtm-6.3-007/sr_x86_64/merrors_ansi.h
Examining data/fis-gtm-6.3-007/sr_x86_64/merrors_ctl.c
Examining data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c
Examining data/fis-gtm-6.3-007/sr_x86_64/ttt.c
Examining data/fis-gtm-6.3-007/sr_x86_64/x86_64.h
Examining data/fis-gtm-6.3-007/sr_x86_64/zbreaksp.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_mod_16.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_mod_32.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_2b.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g1.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g2.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g3.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g4.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g5.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g6.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g7.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ops_g8.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_reg16.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_reg32.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_reg64.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_reg8.h
Examining data/fis-gtm-6.3-007/sr_x86_regs/i386_ss.h

FINAL RESULTS:

data/fis-gtm-6.3-007/sr_port/gtm_stat.h:19:15:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
#define CHMOD	chmod
data/fis-gtm-6.3-007/sr_port/gtm_unistd.h:20:16:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
#define CHOWN		chown
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:197:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy((char_ptr_t)psa->dbc_gv_cur_region->dyn.addr->fname, (char_ptr_t)dbfn);
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1295:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy((char_ptr_t)psa->util_cmd_buff, MUPIP_EXTEND);
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1296:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat((char_ptr_t)psa->util_cmd_buff, (char_ptr_t)psa->ofhdr.regname);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:257:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(emsg, (char_ptr_t)psa->tmprsltfile);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:413:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy((char_ptr_t)psa->util_cmd_buff, RESULT_ASGN);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:414:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat((char_ptr_t)psa->util_cmd_buff, (char_ptr_t)psa->tmprsltfile);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:418:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy((char_ptr_t)psa->util_cmd_buff, DSE_START_PIPE_RSLT1);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:419:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat((char_ptr_t)psa->util_cmd_buff, (char_ptr_t)psa->tmprsltfile);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:420:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat((char_ptr_t)psa->util_cmd_buff, DSE_START_PIPE_RSLT2);
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:164:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy((char_ptr_t)psa->util_cmd_buff, DSE_START_PIPE_RSLT1);
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:165:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat((char_ptr_t)psa->util_cmd_buff, (char_ptr_t)psa->tmprsltfile);
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:166:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat((char_ptr_t)psa->util_cmd_buff, DSE_START_PIPE_RSLT2);
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:168:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy((char_ptr_t)psa->util_cmd_buff, DSE_FIND_REG_ALL);
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:170:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat((char_ptr_t)psa->util_cmd_buff, (char_ptr_t)psa->regname);
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:350:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy((char_ptr_t)psa->ofhdr.regname, (char_ptr_t)psa->regname);
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:352:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy((char_ptr_t)psa->ofhdr.dbfn, (char_ptr_t)psa->dbc_gv_cur_region->dyn.addr->fname);
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:693:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy((char_ptr_t)intgerrmsg, emsg);
data/fis-gtm-6.3-007/sr_port/ext2jnl.c:270:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(rec->jrec_tcom.jnl_tid, ptr);
data/fis-gtm-6.3-007/sr_port/gdsbt.h:462:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(BLK_INFO_PTR->where, __FILE__);								\
data/fis-gtm-6.3-007/sr_port/gtm_stdlib.h:67:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#  define SYSTEM	system
data/fis-gtm-6.3-007/sr_port/gtm_string.h:22:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define	STRCPY(DEST, SOURCE)		strcpy((char *)(DEST), (char *)(SOURCE))
data/fis-gtm-6.3-007/sr_port/gtm_unistd.h:95:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define ACCESS		access
data/fis-gtm-6.3-007/sr_port/gtm_unistd.h:97:16:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define EXECL		execl
data/fis-gtm-6.3-007/sr_port/gtm_unistd.h:98:16:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define EXECV		execv
data/fis-gtm-6.3-007/sr_port/gtmrecv_changelog.c:113:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(recvpool.gtmrecv_local->log_file, gtmrecv_options.log_file);
data/fis-gtm-6.3-007/sr_port/gtmrecv_changelog.c:118:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(recvpool.gtmrecv_local->log_file, gtmrecv_options.log_file);
data/fis-gtm-6.3-007/sr_port/lv_tree.h:303:35:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#        define TREE_DEBUG1(p)			{printf(p);             FFLUSH(stdout);}
data/fis-gtm-6.3-007/sr_port/lv_tree.h:304:37:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#        define TREE_DEBUG2(p, q)		{printf(p, q);          FFLUSH(stdout);}
data/fis-gtm-6.3-007/sr_port/lv_tree.h:305:40:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#        define TREE_DEBUG3(p, q, r)		{printf(p, q, r);       FFLUSH(stdout);}
data/fis-gtm-6.3-007/sr_port/lv_tree.h:306:43:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#        define TREE_DEBUG4(p, q, r, s)		{printf(p, q, r, s);    FFLUSH(stdout);}
data/fis-gtm-6.3-007/sr_port/lv_tree.h:307:45:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#        define TREE_DEBUG5(p, q, r, s, t)	{printf(p, q, r, s, t); FFLUSH(stdout);}
data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:381:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(db_or_reg, REG_STR);
data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:387:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(db_or_reg, FILE_STR);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:535:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(cmd, filter_cmd);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:660:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(extract_buff, FILTER_EOT);
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:1045:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(val_buf, TAREF1(parm_ary, match_ind));
data/fis-gtm-6.3-007/sr_unix/err_init.c:80:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		rc = snprintf(procfn, SIZEOF(procfn), COREDUMPFILTERFN, getpid());
data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:123:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		system("trcstop");
data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:127:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(oldname, trcpath);	/* copy path name */
data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:129:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(newname, oldname);	/* copy 'to' file */
data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:150:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(newname, oldname);
data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:151:4:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			system(newname);
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:64:18:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define	POPEN				popen
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:84:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define FPRINTF			fprintf
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:85:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define PRINTF			printf
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:86:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#  define SPRINTF			sprintf
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:87:22:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define SNPRINTF			snprintf
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:101:20:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#  define SCANF				scanf
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:102:20:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#  define SSCANF			sscanf
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:103:20:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#  define FSCANF			fscanf
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:110:8:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		RC = vprintf(FORMAT, VALUE);			\
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:117:8:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		RC = vfprintf(STREAM, FORMAT, VALUE);		\
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:124:8:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
		RC = vsprintf(STRING, FORMAT, VALUE);		\
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:131:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		RC = vsnprintf(STRING, SIZE, FORMAT, VALUE);	\
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:140:8:  [4] (buffer) vscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		RC = vscanf(FORMAT, POINTER);			\
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:147:8:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		RC = vsscanf(STRING, FORMAT, POINTER);		\
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:154:8:  [4] (buffer) vfscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		RC = vfscanf(STREAM, FORMAT, POINTER);		\
data/fis-gtm-6.3-007/sr_unix/gtm_syslog.h:19:17:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
#define SYSLOG		syslog
data/fis-gtm-6.3-007/sr_unix/gtm_system.c:101:4:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			execl(sh, sh, opt, cmdline, NULL);
data/fis-gtm-6.3-007/sr_unix/gtm_system.c:103:4:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			execl(sh, sh, opt, rtn, cmdline, NULL);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:266:31:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define SSL_DPRINT(FP, ...)		{fprintf(FP, __VA_ARGS__); fflush(FP);}	/* BYPASSOK -- cannot use FFLUSH. */
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:774:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(env_name_ptr, GTMTLS_PASSWD_ENV_PREFIX);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:788:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(pwent->env_name, env_name);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1292:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy((char *)session_id_string, id);		/* default to tlsid */
data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:378:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(rtnname, rtnname_template);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:458:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							strcpy(curr->key_name, name_search_field_buff);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:460:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							strcpy(curr->key_name, path_array);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:1135:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(stderr, left ? "|" : "`");
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:210:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (-1 != (perms = access(pathname, R_OK | X_OK)))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:376:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(env_value, lpasswd);	/* Store the hexadecimal representation in environment */
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.h:100:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		rc = snprintf(SRC, LEN, __VA_ARGS__);	/* BYPASSOK */		\
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.h:20:22:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
# define DBGGSSHR(x) syslog x
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:112:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(gtmsecshr_sockpath, DEFAULT_GTMSECSHR_SOCK_DIR);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:144:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(gtmsecshr_sockpath + gtmsecshr_sockpath_len , GTMSECSHR_SOCK_PREFIX);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:192:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(gtmsecshr_cli_sock_name.sun_path + gtmsecshr_sockpath_len, (char *)mypid2ascx(pid_str, process_id));
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:342:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(gtm_tmp_val, env_var_ptr);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:421:10:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			ret = execl(REL_PATH_TO_GTMSECSHR, gtm_secshr_orig_path, NULL);
data/fis-gtm-6.3-007/sr_unix/iob_open_rd.c:67:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(file->path, path);
data/fis-gtm-6.3-007/sr_unix/iob_open_wt.c:53:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(file->path, path);
data/fis-gtm-6.3-007/sr_unix/iott_edit.c:425:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat((char *)string, (char *)str);
data/fis-gtm-6.3-007/sr_unix/maskpass.c:44:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(ENV_UNDEF_ERROR "\n", USER_ENV);
data/fis-gtm-6.3-007/sr_unix/maskpass.c:49:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(ENV_UNDEF_ERROR "\n", GTM_DIST_ENV);
data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:146:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	enum db_acc_method	access;
data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:310:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy((char *)gv_cur_region->dyn.addr->fname, db_name);
data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:170:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy((char *)gv_cur_region->dyn.addr->fname, db_name);
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:119:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	enum db_acc_method	access, access_new;
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:489:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if ((n_dba != access) && (pvt_csd->acc_meth != access))	/* n_dba is a proxy for no change */
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:489:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if ((n_dba != access) && (pvt_csd->acc_meth != access))	/* n_dba is a proxy for no change */
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:492:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				if (dba_mm == access)
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:515:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				if(dba_mm != access)
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:523:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				pvt_csd->acc_meth = access;
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:530:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			access_new = (n_dba == access ? pvt_csd->acc_meth : access);
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:530:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			access_new = (n_dba == access ? pvt_csd->acc_meth : access);
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:735:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		access_new = (n_dba == access ? csd->acc_meth : access);
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:735:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		access_new = (n_dba == access ? csd->acc_meth : access);
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:839:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if (n_dba != access)
data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:84:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(mutex_sock_path, DEFAULT_MUTEX_SOCK_DIR);
data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:97:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(mutex_sock_path + mutex_sock_path_len, MUTEX_SOCK_FILE_PREFIX);
data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:101:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(mutex_sock_path + mutex_sock_path_len, (char *)pid2ascx(pid_str, process_id));
data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:107:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(mutex_sock_address.sun_path, mutex_sock_path);
data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:166:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(mutex_wake_this_proc.sun_path, mutex_sock_path);
data/fis-gtm-6.3-007/sr_unix/mutex_wake_proc.c:65:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(mutex_wake_this_proc.sun_path + mutex_wake_this_proc_prefix_len,
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:791:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(c2, MUMPS_EXE_STR);
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:800:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(cbuff, MUMPS_DIRECT_STR);
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:485:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(shm_base->relinkctl_fname, linkctl->relinkctl_path);
data/fis-gtm-6.3-007/sr_unix/repl_log.c:45:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(fmt_str, time_str);
data/fis-gtm-6.3-007/sr_unix/repl_log.c:49:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(fmt_str + CTIME_BEFORE_NL + 3, fmt);
data/fis-gtm-6.3-007/sr_unix/repl_log_init.c:73:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(log_file_name, log);
data/fis-gtm-6.3-007/sr_unix/repl_log_init.c:84:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(log_file_name, NULL_DEVICE);
data/fis-gtm-6.3-007/sr_unix/repl_log_init.c:86:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(log, NULL_DEVICE);
data/fis-gtm-6.3-007/sr_unix/rtnobj.c:905:14:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		RTNOBJ_DBG(fprintf(stderr,											\
data/fis-gtm-6.3-007/sr_unix/rtnobj.c:1029:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	RTNOBJ_DBG(fprintf(stderr,												\
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:819:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(trig_cmds, cmd_str);
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:887:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(trig_options, option_str);
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:912:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(trig_cmds, cmd_str);
data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:50:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(log_file, recvpool.gtmrecv_local->log_file);
data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:58:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(file_suffix_str, UPDHELPER_READER_LOG_FILE_SUFFIX);
data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:60:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(file_suffix_str, UPDHELPER_WRITER_LOG_FILE_SUFFIX);
data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:63:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(file_suffix_str, pid_str);
data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:66:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(log_file, file_suffix);
data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:73:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(recvpool.upd_proc_local->log_file, log_file);
data/fis-gtm-6.3-007/sr_unix/zro_shlibs.c:51:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(oshlb->shlib_name, shlib_name);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_conn.c:159:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cptr->ag_name, ag_name);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_conn.c:224:16:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
	pw = (char *) crypt(ag_pass, syspw);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_qry.c:98:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bptr, grp);
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:36:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(newmsg, msg);
data/fis-gtm-6.3-007/sr_port/gtm_stdlib.h:20:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#  define GETENV	getenv
data/fis-gtm-6.3-007/sr_port/wcs_backoff.c:60:3:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srandom(seed);
data/fis-gtm-6.3-007/sr_port/wcs_backoff.c:62:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	randfloat = ((double)random()) / RAND_MAX;
data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:451:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
					getenv("gtm_dist"), src, getuid(), geteuid(), getpid(), cmd);
data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:124:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		trcpath = getenv("gtm_trace");
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:323:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		if (NULL == realpath(librarypath, real_path))
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:381:16:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
			if (NULL == realpath(temp_path, real_path) && (0 != Stat(real_path, &real_path_stat)))
data/fis-gtm-6.3-007/sr_unix/gtm_main.c:167:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if ((NULL != (ptr = (char *)getenv(GTM_PASSWD_ENV))) && (0 == strlen(ptr)))
data/fis-gtm-6.3-007/sr_unix/gtm_main.c:189:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (NULL != getenv("gtmcrypt_config"))
data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:82:14:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	real_dist = realpath(gtm_dist, real_gtm_dist_path);
data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:119:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		imagepath = realpath(image, image_real_path);
data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:142:26:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
int gtm_image_path(char *realpath)
data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:145:11:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	SNPRINTF(realpath, GTM_PATH_MAX, PROCSELF, process_id);
data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.h:25:26:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
int gtm_image_path(char *realpath);
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:65:20:  [3] (tmpfile) tempnam:
  Temporary file race condition (CWE-377).
#define TEMPNAM				tempnam
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:530:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (NULL == (config_env = getenv("gtmcrypt_config")))
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:810:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	assert((NULL != (env_value = getenv(env_name))) && (0 == STRLEN(env_value)));
data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:91:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (NULL == (save_libpath_ptr = getenv(LIBPATH_ENV)))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:430:17:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
				if (NULL == realpath(lcl_key_name, path_array))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:619:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (NULL != (config_env = getenv("gtmcrypt_config")))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:739:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		if (NULL == realpath(key_path, path_array))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:817:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		if (NULL == realpath(key_path, path_array))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:150:14:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	if (NULL == realpath(plugin_dir_path, resolved_plugin_dir_path))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:165:14:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	if (NULL == realpath(libpath, resolved_libpath))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:179:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (NULL == (save_libpath_ptr = getenv(LIBPATH_ENV)))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:88:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	assert(ret || (NULL != getenv("gtm_white_box_test_case_enable"))); /* || needed for "encryption/key_file_enc" subtest */
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:184:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!(ptr = getenv(GNUPGHOME)))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:187:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (!(ptr = getenv(HOME)))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:172:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		if (NULL == realpath(filename, real_db_path))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:262:14:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	if (NULL == realpath(filename, real_db_path))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:273:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		if (NULL == realpath(filename, real_key_path))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:235:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (NULL != (ptr = getenv(GTM_OBFUSCATION_KEY)))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:256:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (!(distptr = getenv(GTM_DIST_ENV)))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:268:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (!(ptr = getenv(USER_ENV)))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:307:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (!(lpasswd = getenv(name)))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.h:121:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (NULL != (ptr = getenv(GTMCRYPT_FIPS_ENV)))				\
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:360:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	chrrv = realpath(realpathbef, realpathaft);	/* Normalize dir name - eliminate all symlinks */
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:383:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	chrrv = realpath(path, gtmdist);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:1031:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		csrv = realpath(cmdbuf, rpcmdbuf);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:205:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	env_var_ptr = getenv(GTM_WHITE_BOX_TEST_CASE_ENABLE);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:211:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			env_var_ptr = getenv(GTM_WHITE_BOX_TEST_CASE_NUMBER);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:308:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (env_var_ptr = getenv(GTM_DIST))		/* Warning - assignment */
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:333:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (env_var_ptr = getenv(GTM_TMP))		/* Warning - assignment */
data/fis-gtm-6.3-007/sr_unix/gtmsource.c:455:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			srand(time(NULL));
data/fis-gtm-6.3-007/sr_unix/maskpass.c:42:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (NULL == (env_ptr = (char *)getenv(USER_ENV)))
data/fis-gtm-6.3-007/sr_unix/maskpass.c:47:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (NULL == (env_ptr = (char *)getenv(GTM_DIST_ENV)))
data/fis-gtm-6.3-007/sr_unix/mu_size_arsample.c:219:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	double		random, M0, accept[MAX_BT_DEPTH + 1];
data/fis-gtm-6.3-007/sr_unix/mu_size_arsample.c:231:11:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	random = drand48();
data/fis-gtm-6.3-007/sr_unix/mu_size_arsample.c:234:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		if (random < accept[j])
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:248:14:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	if (NULL == realpath(tempfilename, realpathname))
data/fis-gtm-6.3-007/sr_unix/mupip_size.c:246:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	int4				random;
data/fis-gtm-6.3-007/sr_unix/mupip_size.c:301:26:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		random = (int4)(rCnt * drand48());
data/fis-gtm-6.3-007/sr_unix/mupip_size.c:302:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		random = random & 0x7fffffff; /* to make sure that the sign bit(msb) is off */
data/fis-gtm-6.3-007/sr_unix/mupip_size.c:303:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		nBlkId = valBlk[random];
data/fis-gtm-6.3-007/sr_unix/mutex.c:432:38:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			timeout.tv_usec = (gtm_tv_usec_t)(nrand48(next_rand) & ((1U << MUTEX_NUM_WAIT_BITS) - 1)) + 1;
data/fis-gtm-6.3-007/sr_unix/op_fnrandom.c:21:17:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
double          drand48(void);
data/fis-gtm-6.3-007/sr_unix/op_fnrandom.c:28:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	int4		random;
data/fis-gtm-6.3-007/sr_unix/op_fnrandom.c:39:29:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	random	= (int4)(interval * drand48());
data/fis-gtm-6.3-007/sr_unix/op_fnrandom.c:40:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	random	= random & 0x7fffffff;  /* to make sure that the sign bit(msb) is off*/
data/fis-gtm-6.3-007/sr_unix/op_fnrandom.c:41:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	MV_FORCE_MVAL(ret, random);
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:118:12:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	pathptr = realpath(pathin, resolvedpath);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:109:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (gtm_dist=getenv("gtm_dist"))
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_shmclean.c:162:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt(argc, argv, "qds")) != -1)
data/fis-gtm-6.3-007/sr_i386/auto_zlink.c:71:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rname_local.c, rname.addr, rname.len);
data/fis-gtm-6.3-007/sr_i386/emit_code.c:78:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char code_buf[BUFFERED_CODE_SIZE];
data/fis-gtm-6.3-007/sr_i386/incr_link.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		module_name[SIZEOF(mident_fixed)];
data/fis-gtm-6.3-007/sr_i386/incr_link.c:130:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&module_name[0], hdr->routine_name.addr, hdr->routine_name.len);
data/fis-gtm-6.3-007/sr_i386/incr_link.c:248:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zlink_mname.c[0], code->routine_name.addr, code->routine_name.len);
data/fis-gtm-6.3-007/sr_i386/incr_link.c:307:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&rtnid.c[0], sym_temp, sym_size);
data/fis-gtm-6.3-007/sr_i386/incr_link.c:333:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&labid.c[0], sym_temp, sym_size);
data/fis-gtm-6.3-007/sr_i386/masscomp.h:59:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char name[1];
data/fis-gtm-6.3-007/sr_i386/obj_file.c:55:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char emit_buff[OBJ_EMIT_BUF_SIZE];	/* buffer for emit output */
data/fis-gtm-6.3-007/sr_i386/obj_file.c:75:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rhead->jsb[0], "GTM_CODE", SIZEOF(rhead->jsb));
data/fis-gtm-6.3-007/sr_i386/obj_file.c:222:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, source, size);
data/fis-gtm-6.3-007/sr_i386/obj_file.c:229:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(emit_buff + emit_buff_used, source, write);
data/fis-gtm-6.3-007/sr_i386/obj_file.c:285:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&newsym->name[0], name->addr, name->len);
data/fis-gtm-6.3-007/sr_linux/hugetlbfs_overrides.c:46:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char	 gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_linux/hugetlbfs_overrides.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	 	librarypath[GTM_PATH_MAX], *lpath = NULL;
data/fis-gtm-6.3-007/sr_linux/hugetlbfs_overrides.c:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		err_msg[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_port/add_atom.c:100:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(patmaskptr, strlit_buff, bytelen + PAT_STRLIT_PADDING * SIZEOF(uint4));
data/fis-gtm-6.3-007/sr_port/advancewindow.c:36:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF	char		ctypetab[NUM_CHARS];
data/fis-gtm-6.3-007/sr_port/advancewindow.c:56:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*error, errtxt[(3 + 1) UTF8_ONLY(* GTM_MB_LEN_MAX)], x;	/* up to 3 digits/byte & a comma */
data/fis-gtm-6.3-007/sr_port/advancewindow.c:219:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stringpool.free, (TREF(director_mval)).str.addr, (TREF(director_mval)).str.len);
data/fis-gtm-6.3-007/sr_port/advancewindow.c:323:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ident_buffer[(MAX_MIDENT_LEN * 2) + 1];
data/fis-gtm-6.3-007/sr_port/advancewindow.c:331:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ident_buffer, (TREF(window_ident)).addr, (TREF(window_ident)).len);
data/fis-gtm-6.3-007/sr_port/advancewindow.c:348:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((TREF(director_ident)).addr, ident_buffer, (TREF(director_ident)).len);
data/fis-gtm-6.3-007/sr_port/alloc_reg.c:51:65:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
STATICFNDCL void remove_backptr(triple *curtrip, oprtype *opnd, char (*tempcont)[MAX_TEMP_COUNT]);
data/fis-gtm-6.3-007/sr_port/alloc_reg.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tempcont[VALUED_REF_TYPES][MAX_TEMP_COUNT], dest_type;
data/fis-gtm-6.3-007/sr_port/alloc_reg.c:233:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void remove_backptr(triple *curtrip, oprtype *opnd, char (*tempcont)[MAX_TEMP_COUNT])
data/fis-gtm-6.3-007/sr_port/anticipatory_freeze.h:491:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */
data/fis-gtm-6.3-007/sr_port/backup_block.c:123:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((sblkh_p + 1), bkp_src_blk, bsiz);
data/fis-gtm-6.3-007/sr_port/backup_block.c:126:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((sblkh_p + 1), bkp_src_blk, bsiz);
data/fis-gtm-6.3-007/sr_port/bit_clear.c:15:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char	bit_clear_mask[8] = {127, 191, 223, 239, 247, 251, 253, 254};
data/fis-gtm-6.3-007/sr_port/bm_setmap.c:100:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(cse->new_buff, bmp, ((blk_hdr_ptr_t)bmp)->bsiz);
data/fis-gtm-6.3-007/sr_port/buddy_list.c:244:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, *ptrArrayCurr, copysize);
data/fis-gtm-6.3-007/sr_port/bx_boollit.c:158:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			(void)matchc(v[1]->str.len, (unsigned char *)v[1]->str.addr, v[0]->str.len,
data/fis-gtm-6.3-007/sr_port/bx_boollit.c:159:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				(unsigned char *)v[0]->str.addr, &dummy, &tvr);
data/fis-gtm-6.3-007/sr_port/cache_put.c:45:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(csp->obj.addr, object->addr, object->len);
data/fis-gtm-6.3-007/sr_port/ccp.h:106:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	txt[23];
data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:61:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF char *indents[11] =
data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 	mid[(SIZEOF(mident_fixed) * 2) + 1];	/* Sized to hold an labels name rtn.lbl */
data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:219:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(mid, opr->oprval.lab->mvname.addr, len);
data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:231:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(mid, opr->oprval.cdlt->addr, len);
data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:242:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(mid, opr->oprval.cdidx->addr, len);
data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:334:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, strp, len);
data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:345:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		return (char *)indents[indent];
data/fis-gtm-6.3-007/sr_port/cdbg_dump.c:364:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*buf, str, len);
data/fis-gtm-6.3-007/sr_port/ceprep_file.c:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		charspace, ceprep_name_buff[MAX_MIDENT_LEN + SIZEOF(".MCI") - 1], fname[255];
data/fis-gtm-6.3-007/sr_port/ceprep_file.c:73:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ceprep_name_buff, module_name.addr, mname_len);
data/fis-gtm-6.3-007/sr_port/cert_blk.c:124:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		ch, prior_expkey[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/cert_blk.c:131:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/cert_blk.c:139:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		key_buffer[MAX_ZWR_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/cert_blk.c:432:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(prior_expkey + rec_cmpc, key_base, key_size);
data/fis-gtm-6.3-007/sr_port/cert_blk.c:458:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(tmp_gvkey->base, prior_expkey, prior_expkeylen);
data/fis-gtm-6.3-007/sr_port/cli_port.c:289:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		two_num_qual_str[128];
data/fis-gtm-6.3-007/sr_port/cmd.c:135:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF unsigned char cmd_index[27] =
data/fis-gtm-6.3-007/sr_port/cmmdef.h:108:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char				filler[3];
data/fis-gtm-6.3-007/sr_port/cmmdef.h:200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	node[32];
data/fis-gtm-6.3-007/sr_port/cmmdef.h:206:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	filler[3];
data/fis-gtm-6.3-007/sr_port/cmmdef.h:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	lockname[256];
data/fis-gtm-6.3-007/sr_port/cmmdef.h:226:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	node[32];
data/fis-gtm-6.3-007/sr_port/cmmdef.h:232:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	line[256];
data/fis-gtm-6.3-007/sr_port/cmmdef.h:247:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[S_PROTSIZE];
data/fis-gtm-6.3-007/sr_port/cmmdef.h:353:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gv_currkey->base, (PTR), (LEN) - 6);						\
data/fis-gtm-6.3-007/sr_port/collseq.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	transbuf[MAX_TRANS_NAME_LEN];
data/fis-gtm-6.3-007/sr_port/collseq.c:39:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	filespec[SIZEOF(CT_PREFIX) + 4];	/* '4' to hold the chars in the max allowable
data/fis-gtm-6.3-007/sr_port/collseq.c:58:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(filespec, CT_PREFIX, SIZEOF(CT_PREFIX));
data/fis-gtm-6.3-007/sr_port/common_startup_init.c:35:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_port/common_startup_init.c:56:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gtm_dist, dist, len);
data/fis-gtm-6.3-007/sr_port/comp_init.c:45:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((TREF(source_buffer)).addr,src->addr,src->len);
data/fis-gtm-6.3-007/sr_port/compile_pattern.c:77:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, &retstr.buff[0], retmval.str.len);
data/fis-gtm-6.3-007/sr_port/compiler.h:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name[20];
data/fis-gtm-6.3-007/sr_port/compiler.h:408:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(TREF(side_effect_base), TMP_BASE, SIZEOF(boolean_t) * TREF(expr_depth));				\
data/fis-gtm-6.3-007/sr_port/compiler.h:572:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ident_buffer[(MAX_MIDENT_LEN * 2) + 1];
data/fis-gtm-6.3-007/sr_port/compiler.h:582:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(SAVE_PARSE_PTR->ident_buffer, (TREF(director_ident)).addr, SAVE_PARSE_PTR->director_ident_len);	\
data/fis-gtm-6.3-007/sr_port/compiler.h:596:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((TREF(director_ident)).addr, SAVE_PARSE_PTR->ident_buffer, SAVE_PARSE_PTR->director_ident_len);	\
data/fis-gtm-6.3-007/sr_port/compiler_startup.c:69:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		err_buf[45];
data/fis-gtm-6.3-007/sr_port/compiler_startup.c:168:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sl->str.addr, (TREF(source_buffer)).addr, n + 1);
data/fis-gtm-6.3-007/sr_port/compiler_startup.c:232:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cp, " error", SIZEOF(" error"));
data/fis-gtm-6.3-007/sr_port/cre_jnl_file.c:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*org_fn, rename_fn[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/cre_jnl_file.c:135:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(info->prev_jnl, rename_fn, rename_fn_len + 1);
data/fis-gtm-6.3-007/sr_port/cre_jnl_file.c:160:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		hdr_base[JNL_HDR_LEN + MAX_IO_BLOCK_SIZE];
data/fis-gtm-6.3-007/sr_port/cre_jnl_file.c:165:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		*create_fn, fn_buff[MAX_FN_LEN + STR_LIT_LEN(EXT_NEW) + 1];
data/fis-gtm-6.3-007/sr_port/cre_jnl_file.c:315:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((unsigned char*)&pini_record->process_vector[CURR_JPV], (unsigned char*)prc_vec, SIZEOF(jnl_process_vector));
data/fis-gtm-6.3-007/sr_port/cre_jnl_file_intrpt_rename.c:45:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ext_new_jnl_fn[MAX_FN_LEN + STR_LIT_LEN(EXT_NEW) + 1];
data/fis-gtm-6.3-007/sr_port/cre_private_code_copy.c:52:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_ptext, rtn->ptext_adr, code_size);
data/fis-gtm-6.3-007/sr_port/create_fatal_error_zshow_dmp.c:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	dump_fn[GTM_PATH_MAX], *dump_fn_ptr;
data/fis-gtm-6.3-007/sr_port/cryptdef.h:17:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	gtm_serial[8];
data/fis-gtm-6.3-007/sr_port/cryptdef.h:23:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	key[SIZEOF(gtm_id_block)];
data/fis-gtm-6.3-007/sr_port/cvtparm.c:123:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stringpool.free, cp, siz);
data/fis-gtm-6.3-007/sr_port/db_common_init.c:44:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(reg->jnl_file_name, csd->jnl_file_name, reg->jnl_file_len);	/* journal file name */
data/fis-gtm-6.3-007/sr_port/dbcertify.c:67:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_port/dbcertify.h:101:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	p1hdr_tag[8];		/* We are what we are */
data/fis-gtm-6.3-007/sr_port/dbcertify.h:109:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	regname[V4_MAX_RN_LEN + 1];	/* Region name for DSE */
data/fis-gtm-6.3-007/sr_port/dbcertify.h:110:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	dbfn[V4_MAX_FN_LEN + 1];	/* Database file name */
data/fis-gtm-6.3-007/sr_port/dbcertify.h:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fillx[32 - SIZEOF(unique_file_id)];	/* Fill out for variable size of unique_id */
data/fis-gtm-6.3-007/sr_port/dbcertify.h:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fill512[152];		/* Pad out to 512 for VMS oddities with fixed record IO and hdr rewrite */
data/fis-gtm-6.3-007/sr_port/dbcertify.h:136:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	base[1];	/* Base of the key */
data/fis-gtm-6.3-007/sr_port/dbcertify.h:224:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	util_cmd_buff[256];	/* Buffer for DSE and/or MUPIP command creation */
data/fis-gtm-6.3-007/sr_port/dbcertify.h:241:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	outfn[MAX_FN_LEN + 1];		/* File name argument (may be db or outfile depending on phase) */
data/fis-gtm-6.3-007/sr_port/dbcertify.h:242:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	regname[MAX_RN_LEN + 1]; 	/* Buffer for region name */
data/fis-gtm-6.3-007/sr_port/dbcertify.h:243:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	rslt_buff[MAX_ZWR_KEY_SZ + 1];	/* Buffer for reading from result file */
data/fis-gtm-6.3-007/sr_port/dbcertify.h:244:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	tmpcmdfile[MAX_FN_LEN + 1];	/* Temporary command file name */
data/fis-gtm-6.3-007/sr_port/dbcertify.h:245:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	tmprsltfile[MAX_FN_LEN + 1];	/* Temporary command result file name */
data/fis-gtm-6.3-007/sr_port/dbcertify.h:246:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	tmpfiledir[MAX_FN_LEN + 1];	/* Directory where temp files created (defaults to current dir */
data/fis-gtm-6.3-007/sr_port/dbcertify_base_ch.c:57:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	msginfo[4];
data/fis-gtm-6.3-007/sr_port/dbcertify_base_ch.c:58:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	msg_buff[MAX_MSG_SIZE + 1];
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ans[2];
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:118:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	dbfn[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:247:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((char *)&psa->rhdr, (char *)&psa->gvtroot_rchildren[psa->gvtroot_rchildren_cnt],
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:741:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(blk_set_p->prev_blk_key, blk_set_p->curr_blk_key, (SIZEOF(dbc_gv_key) + blk_set_p->curr_blk_key->end));
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:870:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cp1, blk_set_p->ins_rec.ins_key->base + blk_set_p->prev_match,
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1036:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(blk_set_prnt_p->ins_rec.ins_key, last_rec_key,
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1073:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(cp1, blk_set_p->curr_blk_key->base, curr_rec_cmpc);
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1175:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(blk_set_prnt_p->ins_rec.ins_key, blk_set_p->prev_blk_key,
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1297:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat((char_ptr_t)psa->util_cmd_buff, " "OPTDELIM"B=");
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1421:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(new_blk_p, blk_sega_p->addr, blk_sega_p->len);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		gtm_dist_path_buff[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:116:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psa->util_cmd_buff + SIZEOF(SETDISTLOGENV) - 1, gtm_dist_path.addr, gtm_dist_path.len);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:163:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	cmdbuf1[MAX_FN_LEN + 256], cmdbuf2[MAX_FN_LEN + 1], *cp;
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:169:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cp, psa->tmpcmdfile, psa->tmpcmdfile_len);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:182:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cp, psa->tmprsltfile, psa->tmprsltfile_len);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:238:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		emsg[MAX_FN_LEN + 256];
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:256:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(emsg, "Temporary results file (");
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:258:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat(emsg, " had unexpected values");
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:329:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cp, psa->tmpfiledir, len);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:345:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cp, regname_p, len);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:356:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cp, psa->tmpcmdfile, dir_len);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:363:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cp, regname_p, len);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:453:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dbfn, rptr, len);
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:544:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(blk_set_new_p->old_buff,
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:677:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psa->gvn_key, key, SIZEOF(dbc_gv_key) + key->gvn_len);	/* Make key with GVN only (including trailing null) */
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:779:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(blk_set_p->prev_blk_key, blk_set_p->curr_blk_key,
data/fis-gtm-6.3-007/sr_port/dbcertify_funcs.c:952:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (psa->dbc_gv_cur_region->open)
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:116:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	dbfn[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:187:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(badfn, dbfn, len);
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:188:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(badfn + len, DEFAULT_OUTFILE_SUFFIX, SIZEOF(DEFAULT_OUTFILE_SUFFIX));
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:247:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(psa->ofhdr.p1hdr_tag, P1HDR_TAG, SIZEOF(psa->ofhdr.p1hdr_tag));
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:348:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&psa->ofhdr.unique_id, &FILE_INFO(psa->dbc_gv_cur_region)->fileid, SIZEOF(unique_file_id));
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:664:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	intgerrmsg[256];
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:694:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat((char_ptr_t)intgerrmsg, " in block 0x");
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:766:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gv_target->clue.base, psa->first_rec_key->base, psa->first_rec_key->end + 1);
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:801:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gv_altkey->base, psa->first_rec_key->base, psa->first_rec_key->gvn_len + 1);
data/fis-gtm-6.3-007/sr_port/ddphdr.h:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro*/							\
data/fis-gtm-6.3-007/sr_port/ddphdr.h:148:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	txt[1];
data/fis-gtm-6.3-007/sr_port/ddphdr.h:156:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	destination_address[ETHERADDR_LENGTH];
data/fis-gtm-6.3-007/sr_port/ddphdr.h:157:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	source_address[ETHERADDR_LENGTH];
data/fis-gtm-6.3-007/sr_port/ddphdr.h:158:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	protocol_type[2];
data/fis-gtm-6.3-007/sr_port/ddphdr.h:170:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	code[DDP_ANNOUNCE_CODE_LEN];	/* position 17: "WI", or "II" */
data/fis-gtm-6.3-007/sr_port/ddphdr.h:171:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ether_addr[ETHERADDR_LENGTH];	/* position 19: Ethernet physical address for this node */
data/fis-gtm-6.3-007/sr_port/ddphdr.h:187:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	filler3[32 + 4 + 8];		/* position 75: at position 107 we write literal 0x01ff00ff */
data/fis-gtm-6.3-007/sr_port/ddphdr.h:201:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	global[1]; /* actually, global_len bytes of formatted global reference */
data/fis-gtm-6.3-007/sr_port/desired_db_format_set.c:70:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(reg->open);
data/fis-gtm-6.3-007/sr_port/deviceparameters.c:315:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		parstr[MAXDEVPARLEN];
data/fis-gtm-6.3-007/sr_port/deviceparameters.c:617:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(parptr, tmpmval.str.addr, tmpmval.str.len);
data/fis-gtm-6.3-007/sr_port/do_indir_do.c:44:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ident.c, v->str.addr, v->str.len);
data/fis-gtm-6.3-007/sr_port/do_patsplit.c:80:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&min[0], patptr, SIZEOF(*patptr) * count);
data/fis-gtm-6.3-007/sr_port/do_patsplit.c:82:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&max[0], patptr, SIZEOF(*patptr) * count);
data/fis-gtm-6.3-007/sr_port/do_patsplit.c:84:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&size[0], patptr, SIZEOF(*patptr) * count);
data/fis-gtm-6.3-007/sr_port/do_patsplit.c:187:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(patptr, patptr_start, (char *)fixed_patptr - (char *)patptr_start);
data/fis-gtm-6.3-007/sr_port/do_patsplit.c:210:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(patptr, fixed_patptr, (char *)right_patptr - (char *)fixed_patptr);
data/fis-gtm-6.3-007/sr_port/do_patsplit.c:228:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(patptr, right_patptr, (char *)patptr_end - (char *)right_patptr);
data/fis-gtm-6.3-007/sr_port/do_pattern.c:70:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*stridx[MAX_PATTERN_ATOMS];
data/fis-gtm-6.3-007/sr_port/do_pattern.c:146:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(repeat, min, count * SIZEOF(*min));
data/fis-gtm-6.3-007/sr_port/dollar_quit.c:165:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		ZOS_ONLY(memcpy(&instr_RR, sf->mpc, SIZEOF(instr_RR)));
data/fis-gtm-6.3-007/sr_port/dollar_quit.c:170:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&instr_LG, ptrs.instr, SIZEOF(instr_LG));
data/fis-gtm-6.3-007/sr_port/dollar_quit.c:196:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&instr_LDX, ptrs.instr, SIZEOF(instr_LDX));
data/fis-gtm-6.3-007/sr_port/dollar_system_init.c:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_TRANS_NAME_LEN];
data/fis-gtm-6.3-007/sr_port/dollar_system_init.c:39:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stringpool.free, "47,", dollar_system.str.len);
data/fis-gtm-6.3-007/sr_port/dollar_system_init.c:46:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, tn.addr, tn.len);
data/fis-gtm-6.3-007/sr_port/dollar_system_init.c:51:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, svec->sysid_ptr->addr, svec->sysid_ptr->len);
data/fis-gtm-6.3-007/sr_port/dpgbldir.c:44:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF	char gde_labels[GDE_LABEL_NUM][GDE_LABEL_SIZE];
data/fis-gtm-6.3-007/sr_port/dpgbldir.c:94:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(name->name.addr, v->str.addr, v->str.len);
data/fis-gtm-6.3-007/sr_port/dpgbldir.c:183:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		regname[MAX_MIDENT_LEN + 1];
data/fis-gtm-6.3-007/sr_port/dse.h:42:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dollarh_buffer, dollarh_mval.str.addr, dollarh_mval.str.len);							\
data/fis-gtm-6.3-007/sr_port/dse.h:49:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(zdate_buffer, zdate_mval.str.addr, zdate_mval.str.len);								\
data/fis-gtm-6.3-007/sr_port/dse.h:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		confirm[256];							\
data/fis-gtm-6.3-007/sr_port/dse.h:185:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(save_bp, bp, SIZEOF(blk_hdr));									\
data/fis-gtm-6.3-007/sr_port/dse.h:197:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(save_bp, bp, bp->bsiz);										\
data/fis-gtm-6.3-007/sr_port/dse.h:229:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	GBLREF char	patch_comp_key[MAX_KEY_SZ + 1];			\
data/fis-gtm-6.3-007/sr_port/dse_adrec.c:42:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char		patch_comp_key[MAX_KEY_SZ + 1], *update_array, *update_array_ptr;
data/fis-gtm-6.3-007/sr_port/dse_adrec.c:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		data[MAX_LINE], key[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/dse_adrec.c:91:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lbp, blkhist.buffaddr, blk_size);
data/fis-gtm-6.3-007/sr_port/dse_adrec.c:199:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size);
data/fis-gtm-6.3-007/sr_port/dse_adrec.c:219:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rp, new_bp, new_len);
data/fis-gtm-6.3-007/sr_port/dse_adstar.c:81:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lbp, blkhist.buffaddr, blk_size);
data/fis-gtm-6.3-007/sr_port/dse_all.c:134:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!reg->open)
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	mask, util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:100:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			{	memcpy(util_buff, "Block ", 6);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:103:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&util_buff[util_len], "   Size ", 8);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:106:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&util_buff[util_len], "   Level !UL   TN ", 18);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:109:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&util_buff[util_len], " ", 1);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:113:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&util_buff[util_len], gtm_dbversion_table[ondsk_blkver], len);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:115:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&util_buff[util_len], "!/", 2);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:145:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(util_buff, "Block ", 6);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:148:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&util_buff[util_len], "   Size ", 8);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:151:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&util_buff[util_len], "   Master Status: Cannot Determine (bplmap == 0)!/", 50);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:161:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(util_buff, "Block ", 6);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:164:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&util_buff[util_len], "  Size ", 7);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:167:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&util_buff[util_len], "  Level !SB  TN ", 16);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:170:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&util_buff[util_len], " ", 1);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:174:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&util_buff[util_len], gtm_dbversion_table[ondsk_blkver], len);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:179:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&util_buff[util_len], "   Master Status: !AD!/",23);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:190:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				{	memcpy(util_buff, "Block ", 6);
data/fis-gtm-6.3-007/sr_port/dse_b_dmp.c:194:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&util_buff[util_len], ":!_|  ", 6);
data/fis-gtm-6.3-007/sr_port/dse_cache.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			dollarh_buffer[MAXNUMLEN], zdate_buffer[SIZEOF(DSE_DMP_TIME_FMT)];
data/fis-gtm-6.3-007/sr_port/dse_cache.c:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			temp_str[OUT_LINE], temp_str1[OUT_LINE];
data/fis-gtm-6.3-007/sr_port/dse_cache.c:98:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!reg->open || reg->was_open)
data/fis-gtm-6.3-007/sr_port/dse_chng_fhead.c:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		temp_str[OUT_LINE], temp_str1[OUT_LINE], buf[MAX_LINE], *fname_ptr;
data/fis-gtm-6.3-007/sr_port/dse_chng_fhead.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		hash_buff[GTMCRYPT_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/dse_chng_fhead.c:674:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cs_data->encryption_hash, hash_buff, GTMCRYPT_HASH_LEN);
data/fis-gtm-6.3-007/sr_port/dse_crit.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/dse_crit.c:149:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(util_buff, "!/Critical section crash count is ", 34);
data/fis-gtm-6.3-007/sr_port/dse_crit.c:152:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&util_buff[util_len], "!/", 2);
data/fis-gtm-6.3-007/sr_port/dse_crit.c:165:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!r_local->open || r_local->was_open)
data/fis-gtm-6.3-007/sr_port/dse_data.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_LINE],*src,*bot,*top;
data/fis-gtm-6.3-007/sr_port/dse_dmp_fhead.c:59:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF	char		*jrt_label[JRT_RECTYPES];
data/fis-gtm-6.3-007/sr_port/dse_dmp_fhead.c:90:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		util_buff[MAX_UTIL_LEN], buffer[MAXNUMLEN];
data/fis-gtm-6.3-007/sr_port/dse_dmp_fhead.c:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			dollarh_buffer[MAXNUMLEN], zdate_buffer[SIZEOF(DSE_DMP_TIME_FMT)], fullblockwrite_buffer[255], *k;
data/fis-gtm-6.3-007/sr_port/dse_dmp_fhead.c:106:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		outbuf[GTMCRYPT_HASH_HEX_LEN + 1];
data/fis-gtm-6.3-007/sr_port/dse_eval.c:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/dse_eval.c:41:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(util_buff, "Hex:  ", 6);
data/fis-gtm-6.3-007/sr_port/dse_eval.c:44:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&util_buff[util_len],"   Dec:  !@UQ", 13);
data/fis-gtm-6.3-007/sr_port/dse_exhaus.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/dse_exhaus.c:138:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(util_buff, "	", 1);
data/fis-gtm-6.3-007/sr_port/dse_exhaus.c:141:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(&util_buff[util_len], ":", 1);
data/fis-gtm-6.3-007/sr_port/dse_exhaus.c:155:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(util_buff, "	", 1);
data/fis-gtm-6.3-007/sr_port/dse_exhaus.c:158:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&util_buff[util_len], ":", 1);
data/fis-gtm-6.3-007/sr_port/dse_exhaus.c:164:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(util_buff, "	", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			targ_key[MAX_KEY_SZ + 1], util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:154:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(util_buff, "	", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:158:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(&util_buff[util_len], ":", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:162:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(&util_buff[util_len], ",", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:175:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(util_buff, "	", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:179:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(&util_buff[util_len], ":", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:183:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(&util_buff[util_len], ",", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:188:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(util_buff, "	", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:428:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(util_buff, "	", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:431:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&util_buff[util_len], ":", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:434:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&util_buff[util_len], ",", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:449:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(util_buff, "	", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:452:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&util_buff[util_len], ":", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:455:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&util_buff[util_len], ",", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:462:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(util_buff, "	", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_blk.c:466:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&util_buff[util_len], "!/", 2);
data/fis-gtm-6.3-007/sr_port/dse_f_free.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/dse_f_free.c:78:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	{	memcpy(util_buff, "Error: bit map in block ", 24);
data/fis-gtm-6.3-007/sr_port/dse_f_free.c:81:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&util_buff[util_len], " incorrectly marked free in master map.", 39);
data/fis-gtm-6.3-007/sr_port/dse_f_free.c:88:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(util_buff, "!/Next free block is ", 21);
data/fis-gtm-6.3-007/sr_port/dse_f_free.c:91:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&util_buff[util_len], ".!/", 3);
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		targ_key[MAX_KEY_SZ + 1], targ_key_root[MAX_KEY_SZ + 1], *key_top, util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:88:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&targ_key_root[0], &targ_key[0], size_root);
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:111:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	{	memcpy(util_buff, "!/Key not found, would be in block  ", 36);
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:114:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&util_buff[util_len], ".", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:120:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	{	memcpy(util_buff, "!/Key found in block  ", 22);
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:123:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&util_buff[util_len], ".", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:130:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	{	memcpy(util_buff, "	", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:133:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&util_buff[util_len], ":", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:136:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&util_buff[util_len], ", ", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:144:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		{	memcpy(util_buff, "	", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:147:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&util_buff[util_len], ":", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:150:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&util_buff[util_len], ", ", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:157:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	{	memcpy(util_buff, "	", 1);
data/fis-gtm-6.3-007/sr_port/dse_f_key.c:160:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&util_buff[util_len], "!/", 2);
data/fis-gtm-6.3-007/sr_port/dse_f_reg.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		rn[MAX_RN_LEN];
data/fis-gtm-6.3-007/sr_port/dse_f_reg.c:88:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!statsDBreg->open)
data/fis-gtm-6.3-007/sr_port/dse_f_reg.c:111:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!regptr->open)
data/fis-gtm-6.3-007/sr_port/dse_fdmp.c:49:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char	 	patch_comp_key[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/dse_find_gvt.c:39:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(reg->open);
data/fis-gtm-6.3-007/sr_port/dse_getki.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		buf[MAX_ZWR_KEY_SZ], *src, *temp_dst, *bot, *top, *tmp, slit[MAX_KEY_SZ + 1], key_buf[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/dse_getki.c:201:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, &gv_currkey->base[0], *len);
data/fis-gtm-6.3-007/sr_port/dse_getki.c:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		lcl_buf[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/dse_integ.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/dse_integ.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		key_buff[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/dse_integ.c:54:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(util_buff, "!/Checking integrity of block ", 30);
data/fis-gtm-6.3-007/sr_port/dse_integ.c:57:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&util_buff[util_len], ":", 1);
data/fis-gtm-6.3-007/sr_port/dse_is_blk_in.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		targ_key[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/dse_is_blk_in.c:36:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(targ_key, rp + SIZEOF(rec_hdr), size);
data/fis-gtm-6.3-007/sr_port/dse_is_blk_in.c:53:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(targ_key, rp + SIZEOF(rec_hdr), size);
data/fis-gtm-6.3-007/sr_port/dse_ksrch.c:33:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char		patch_comp_key[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/dse_ksrch.c:93:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size);
data/fis-gtm-6.3-007/sr_port/dse_m_rest.c:59:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/dse_m_rest.c:110:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		{	memcpy(util_buff,"Invalid pointer in block ",25);
data/fis-gtm-6.3-007/sr_port/dse_m_rest.c:113:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&util_buff[util_len], " record offset ",15);
data/fis-gtm-6.3-007/sr_port/dse_maps.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/dse_maps.c:211:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&util_buff[util_len], " is marked !AD in its local bit map.!/",
data/fis-gtm-6.3-007/sr_port/dse_order.c:33:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char		patch_comp_key[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/dse_order.c:104:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size);
data/fis-gtm-6.3-007/sr_port/dse_over.c:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		chset_name[MAX_CHSET_NAME + 1];
data/fis-gtm-6.3-007/sr_port/dse_over.c:186:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data, stringpool.free, cvt_len);
data/fis-gtm-6.3-007/sr_port/dse_over.c:197:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (lbp, blkhist.buffaddr, blk_size);
data/fis-gtm-6.3-007/sr_port/dse_over.c:198:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lbp + offset, &data[0], data_len);
data/fis-gtm-6.3-007/sr_port/dse_range.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char		level, lower[MAX_KEY_SZ + 1], targ_key[MAX_KEY_SZ + 1], upper[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/dse_rest.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		util_buff[MAX_UTIL_LEN], rn[MAX_RN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/dse_rest.c:112:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!region->open)
data/fis-gtm-6.3-007/sr_port/dse_rest.c:154:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(util_buff, "!/Restoring block ", 18);
data/fis-gtm-6.3-007/sr_port/dse_rest.c:157:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&util_buff[util_len], " from version !UL", 17);
data/fis-gtm-6.3-007/sr_port/dse_rest.c:164:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(util_buff, " of block ", 10);
data/fis-gtm-6.3-007/sr_port/dse_rmrec.c:43:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char		patch_comp_key[MAX_KEY_SZ + 1], *update_array, *update_array_ptr;
data/fis-gtm-6.3-007/sr_port/dse_rmrec.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		comp_key[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/dse_rmrec.c:85:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lbp, blkhist.buffaddr, blk_size);
data/fis-gtm-6.3-007/sr_port/dse_rmrec.c:107:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&comp_key[0], &patch_comp_key[0], SIZEOF(patch_comp_key));
data/fis-gtm-6.3-007/sr_port/dse_rmrec.c:160:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size);
data/fis-gtm-6.3-007/sr_port/dse_rmrec.c:173:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rp_base + SIZEOF(rec_hdr), &patch_comp_key[i], patch_comp_count - i);
data/fis-gtm-6.3-007/sr_port/dse_rmsb.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/dse_rmsb.c:88:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(util_buff, "!/Removing version !UL of block ", util_len);
data/fis-gtm-6.3-007/sr_port/dse_save.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[MAX_COMMENT_LEN], *ptr, util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/dse_save.c:58:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(util_buff, "!/Saved versions of block ", util_len);
data/fis-gtm-6.3-007/sr_port/dse_save.c:82:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(util_buff, "Block ", util_len);
data/fis-gtm-6.3-007/sr_port/dse_save.c:115:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(util_buff, "!/Saving version !UL of block ", util_len);
data/fis-gtm-6.3-007/sr_port/dse_save.c:131:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(patch_save_set[patch_save_count].bp, bp, cs_addrs->hdr->blk_size);
data/fis-gtm-6.3-007/sr_port/dse_save.c:140:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(patch_save_set[patch_save_count].comment, &buff[0], j);
data/fis-gtm-6.3-007/sr_port/dump_record.c:45:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF char             patch_comp_key[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/dump_record.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		key_buf[MAX_KEY_SZ + 1], *temp_ptr, *temp_key, util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/dump_record.c:119:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size);
data/fis-gtm-6.3-007/sr_port/dumptable.c:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	outbuf[256];
data/fis-gtm-6.3-007/sr_port/dumptable.c:41:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(c,argtype[i],5);
data/fis-gtm-6.3-007/sr_port/dumptable.c:47:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		{	memcpy(c, &start8[0], SIZEOF(start8) - 1);
data/fis-gtm-6.3-007/sr_port/dumptable.c:51:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		{	memcpy(c, &start9[0], SIZEOF(start9) - 1);
data/fis-gtm-6.3-007/sr_port/ebc_xlat.c:31:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF unsigned char e2a[256] =
data/fis-gtm-6.3-007/sr_port/ebc_xlat.c:71:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF unsigned char a2e[256] =
data/fis-gtm-6.3-007/sr_port/ecode_add.c:31:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dollar_ecode.end, str, strlen);						\
data/fis-gtm-6.3-007/sr_port/ecode_add.c:61:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dollar_stack.end, mvalptr->str.addr, mvalptr->str.len);
data/fis-gtm-6.3-007/sr_port/ecode_add.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		eclostmid_buf[MAX_DIGITS_IN_INT + STR_LIT_LEN(",Z,")], *dest;
data/fis-gtm-6.3-007/sr_port/ecode_set.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ecode_buff[ECODE_MAX_LEN_WITH_BUFFER];
data/fis-gtm-6.3-007/sr_port/emit_code.c:57:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char	vdat_bdisp[VDAT_BDISP_SIZE + 1] = "B^";
data/fis-gtm-6.3-007/sr_port/emit_code.c:58:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char	vdat_wdisp[VDAT_WDISP_SIZE + 1] = "W^";
data/fis-gtm-6.3-007/sr_port/emit_code.c:59:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char	vdat_r9[VDAT_R9_SIZE + 1] = "(r9)";
data/fis-gtm-6.3-007/sr_port/emit_code.c:60:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char	vdat_r8[VDAT_R8_SIZE + 1] = "(r8)";
data/fis-gtm-6.3-007/sr_port/emit_code.c:61:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char	vdat_gr[VDAT_GR_SIZE + 1] = "G^";
data/fis-gtm-6.3-007/sr_port/emit_code.c:62:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char	vdat_immed[VDAT_IMMED_SIZE + 1] = "I^#";
data/fis-gtm-6.3-007/sr_port/emit_code.c:63:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char	vdat_r11[VDAT_R11_SIZE + 1] = "(R11)";
data/fis-gtm-6.3-007/sr_port/emit_code.c:64:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char	vdat_gtmliteral[VDAT_GTMLITERAL_SIZE + 1] = "GTM$LITERAL";
data/fis-gtm-6.3-007/sr_port/emit_code.c:65:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char	vdat_def[VDAT_DEF_SIZE + 1] = "@";
data/fis-gtm-6.3-007/sr_port/emit_code.c:69:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF unsigned char	outbuf[ASM_OUT_BUFF];	/* assembly language output buffer */
data/fis-gtm-6.3-007/sr_port/emit_code.c:116:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		value[PUSH_LIST_SIZE];
data/fis-gtm-6.3-007/sr_port/emit_code.c:382:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(obpt, &vxi_opcode[instr][0], 6);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1247:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(obpt, &vdat_def[0], VDAT_DEF_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1249:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(obpt, &vdat_gtmliteral[0], VDAT_GTMLITERAL_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1269:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(obpt, &vdat_gr[0], VDAT_GR_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1272:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(obpt, ct->operand[0].oprval.cdlt->addr,
data/fis-gtm-6.3-007/sr_port/emit_code.c:1293:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(obpt, &vdat_immed[0], VDAT_IMMED_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1302:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(obpt, &vdat_immed[0], VDAT_IMMED_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1328:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(obpt, &vdat_bdisp[0], VDAT_BDISP_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1332:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(obpt, &vdat_wdisp[0], VDAT_WDISP_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1336:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(obpt, &vdat_r9[0], VDAT_R9_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1360:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(obpt, &vdat_def[0], VDAT_DEF_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1365:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(obpt, &vdat_bdisp[0], VDAT_BDISP_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1369:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(obpt, &vdat_wdisp[0], VDAT_WDISP_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1375:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(obpt, &vdat_r8[0], VDAT_R8_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1379:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(obpt, &vdat_r9[0], VDAT_R9_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1804:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(obpt, &vdat_def[0], VDAT_DEF_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1808:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(obpt, &vdat_bdisp[0], VDAT_BDISP_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1812:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(obpt, &vdat_wdisp[0], VDAT_WDISP_SIZE);
data/fis-gtm-6.3-007/sr_port/emit_code.c:1816:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		for (c = (unsigned char *)xfer_name[offset]; *c ; )
data/fis-gtm-6.3-007/sr_port/emit_code.c:1818:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(obpt, &vdat_r11[0], VDAT_R11_SIZE);
data/fis-gtm-6.3-007/sr_port/entryref.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		rtn_text[SIZEOF(mident_fixed)], lab_text[SIZEOF(mident_fixed)];
data/fis-gtm-6.3-007/sr_port/entryref.c:100:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(labname.addr, (TREF(window_ident)).addr, (TREF(window_ident)).len);
data/fis-gtm-6.3-007/sr_port/eval_expr.c:118:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(tmp_mval.str.addr, m1->v.str.addr, m1->v.str.len);
data/fis-gtm-6.3-007/sr_port/eval_expr.c:119:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(tmp_mval.str.addr + m1->v.str.len, m2->v.str.addr, m2->v.str.len);
data/fis-gtm-6.3-007/sr_port/expritem.c:132:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF unsigned char svn_index[27] = {
data/fis-gtm-6.3-007/sr_port/expritem.c:307:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF unsigned char fun_index[27] =
data/fis-gtm-6.3-007/sr_port/expritem.c:657:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy((char *)stringpool.free, v.str.addr, v.str.len);
data/fis-gtm-6.3-007/sr_port/ext2jnl.c:97:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tmp, origbuf, tmpsize);
data/fis-gtm-6.3-007/sr_port/ext2jnl.c:301:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rec->jrec_set_kill.mumps_node.text, gv_currkey->base, gv_currkey->end);
data/fis-gtm-6.3-007/sr_port/fgn_glopref.c:33:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stringpool.free,v->str.addr,v->str.len);
data/fis-gtm-6.3-007/sr_port/fileinfo.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			usr[FI_USR_SZ];		/* user name */
data/fis-gtm-6.3-007/sr_port/fileinfo.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			trm[FI_TRM_SZ];		/* terminal identification */
data/fis-gtm-6.3-007/sr_port/fileinfo.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			filler[2];		/* used for longword alignment */
data/fis-gtm-6.3-007/sr_port/fnpc.h:56:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	unibytes_val[4];
data/fis-gtm-6.3-007/sr_port/format2zwr.c:128:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(&des[dstlen], cp, chlen);
data/fis-gtm-6.3-007/sr_port/format2zwr.c:179:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(&des[dstlen], cp, chlen);
data/fis-gtm-6.3-007/sr_port/format2zwr.c:232:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(&des[dstlen], cp, chlen);
data/fis-gtm-6.3-007/sr_port/format_key_lv_val.c:77:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buff, tempmv.str.addr, size);
data/fis-gtm-6.3-007/sr_port/format_key_lv_val.c:81:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buff, tempmv.str.addr, tempmv.str.len);
data/fis-gtm-6.3-007/sr_port/format_key_mvals.c:56:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buff, (keys)->str.addr, (keys)->str.len);
data/fis-gtm-6.3-007/sr_port/format_key_mvals.c:63:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buff, (keys)->str.addr, size);
data/fis-gtm-6.3-007/sr_port/format_lvname.c:60:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buff, vent->addr, len);
data/fis-gtm-6.3-007/sr_port/format_targ_key.c:27:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char			ch, *gvkey_char_ptr, *out_top, *work_char_ptr, work_buff[MAX_ZWR_KEY_SZ], *work_top;
data/fis-gtm-6.3-007/sr_port/gbldefs.c:274:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF	unsigned char	t_fail_hist[CDB_MAX_TRIES];	/* type has to be unsigned char and not enum cdb_sc to ensure single byte */
data/fis-gtm-6.3-007/sr_port/gbldefs.c:346:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF	char			muext_code[MUEXT_MAX_TYPES][2] =
data/fis-gtm-6.3-007/sr_port/gbldefs.c:397:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF	char			cli_err_str[MAX_CLI_ERR_STR] = "";   /* Parse Error message buffer */
data/fis-gtm-6.3-007/sr_port/gbldefs.c:615:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF	char	*jrt_label[JRT_RECTYPES] =
data/fis-gtm-6.3-007/sr_port/gbldefs.c:639:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF	char	*jnl_file_state_lit[JNL_FILE_STATES] =
data/fis-gtm-6.3-007/sr_port/gbldefs.c:742:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static	char		routine_name_buff[SIZEOF(mident_fixed)], module_name_buff[SIZEOF(mident_fixed)];
data/fis-gtm-6.3-007/sr_port/gbldefs.c:743:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static	char		int_module_name_buff[SIZEOF(mident_fixed)];
data/fis-gtm-6.3-007/sr_port/gbldefs.c:747:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF	char		rev_time_buf[REV_TIME_BUFF_LEN];
data/fis-gtm-6.3-007/sr_port/gbldefs.c:750:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF unsigned char	source_file_name[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/gbldefs.c:751:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF unsigned char	object_file_name[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/gbldefs.c:926:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF	char		dl_err[MAX_ERRSTR_LEN];
data/fis-gtm-6.3-007/sr_port/gbldefs.c:1066:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF	char		repl_instfilename[MAX_FN_LEN + 1];	/* save first instance */
data/fis-gtm-6.3-007/sr_port/gbldefs.c:1067:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF	char		repl_inst_name[MAX_INSTNAME_LEN];	/* for syslog */
data/fis-gtm-6.3-007/sr_port/gbldefs.c:1075:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF	char		gtm_dist[GTM_PATH_MAX];		/* Value of $gtm_dist env variable */
data/fis-gtm-6.3-007/sr_port/gbldefs.c:1183:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF	char		io_setup_errstr[IO_SETUP_ERRSTR_ARRAYSIZE];
data/fis-gtm-6.3-007/sr_port/gds_blk_downgrade.c:80:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(trg_p, src_p, movesize);
data/fis-gtm-6.3-007/sr_port/gds_map_moved.c:89:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(baseDBreg->open);
data/fis-gtm-6.3-007/sr_port/gds_map_moved.c:90:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (baseDBreg->open)	/* be safe in pro even though we have an assert above */
data/fis-gtm-6.3-007/sr_port/gdsblkops.h:247:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lcl_ptr, (ADDR), lcl_len);					\
data/fis-gtm-6.3-007/sr_port/gdsbt.h:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_8byte[8];	/* previously header_open_tn but no longer used.
data/fis-gtm-6.3-007/sr_port/gdsbt.h:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler[3];
data/fis-gtm-6.3-007/sr_port/gdsbt.h:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler[3];
data/fis-gtm-6.3-007/sr_port/gdsbt.h:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		lock_op[OP_LOCK_SIZE];	/* Operation performed (either OBTN or RLSE) */
data/fis-gtm-6.3-007/sr_port/gdsbt.h:318:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		pre_block[32];
data/fis-gtm-6.3-007/sr_port/gdsbt.h:319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		post_block[32];
data/fis-gtm-6.3-007/sr_port/gdsbt.h:326:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            hash[GTMCRYPT_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/gdsbt.h:327:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            hash2[GTMCRYPT_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/gdsbt.h:346:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            hash[GTMCRYPT_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/gdsbt.h:347:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            hash2[GTMCRYPT_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/gdsbt.h:348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		region[100];
data/fis-gtm-6.3-007/sr_port/gdsbt.h:349:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		where[100];
data/fis-gtm-6.3-007/sr_port/gdsbt.h:460:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(BLK_INFO_PTR->hash, (CSD)->encryption_hash, GTMCRYPT_HASH_LEN);				\
data/fis-gtm-6.3-007/sr_port/gdsbt.h:461:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(BLK_INFO_PTR->hash2, (CSD)->encryption_hash2, GTMCRYPT_HASH_LEN);			\
data/fis-gtm-6.3-007/sr_port/gdsbt.h:465:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(BLK_INFO_PTR->region, (char *)(CSA)->region->dyn.addr->fname,			\
data/fis-gtm-6.3-007/sr_port/gdsbt.h:469:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(BLK_INFO_PTR->region, "UNKNOWN");						\
data/fis-gtm-6.3-007/sr_port/gdsbt.h:480:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(blk_info_ptr->info.block_update.pre_block, PRE_BLK, 32);						\
data/fis-gtm-6.3-007/sr_port/gdsbt.h:481:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(blk_info_ptr->info.block_update.post_block, POST_BLK, 32);					\
data/fis-gtm-6.3-007/sr_port/gdsbt.h:517:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(blk_info_ptr->info.trans_update.hash, TRANS_INFO->encryption_hash, GTMCRYPT_HASH_LEN);	\
data/fis-gtm-6.3-007/sr_port/gdsbt.h:518:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(blk_info_ptr->info.trans_update.hash2, TRANS_INFO->encryption_hash2, GTMCRYPT_HASH_LEN);	\
data/fis-gtm-6.3-007/sr_port/gdsbt.h:534:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   label[GDS_LABEL_SZ];			/* 12	signature for GDS shared memory */
data/fis-gtm-6.3-007/sr_port/gdsbt.h:535:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	fname[MAX_FN_LEN + 1];			/* 256	filename of corresponding database */
data/fis-gtm-6.3-007/sr_port/gdsbt.h:536:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		now_running[MAX_REL_NAME];		/* 36	current active GT.M version stamp */
data/fis-gtm-6.3-007/sr_port/gdsbt.h:537:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		machine_name[MAX_MCNAMELEN];		/* 256	machine name for clustering */
data/fis-gtm-6.3-007/sr_port/gdsbt.h:623:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		replinstfilename[MAX_FN_LEN + 1];/* 256 : Name of the replication instance file corresponding to this db */
data/fis-gtm-6.3-007/sr_port/gdsbt.h:624:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		statsdb_fname[MAX_FN_LEN + 1];	/* Is empty-string if IS_RDBF_STATSDB(csd) is FALSE.
data/fis-gtm-6.3-007/sr_port/gdsbt.h:717:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(statsDBreg->dyn.addr->fname, statsDBfname, fnameLen + 1);	/* copy trailing '\0' too */	\
data/fis-gtm-6.3-007/sr_port/gdsbt.h:730:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(statsDBcsd->basedb_fname, baseDBreg->dyn.addr->fname, fname_len + 1);	/* copy trailing '\0' too */	\
data/fis-gtm-6.3-007/sr_port/gdscc.h:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			key_contents[DBKEYSIZE(MAX_KEY_SZ)];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:341:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_KEY, old_KEY, SIZEOF(gv_key) - 1 + old_KEY->end);		\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:564:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!baseDBreg->open)										\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:566:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!statsDBreg->open)										\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:599:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(baseDBreg->open);				\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:600:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(statsDBreg->open);				\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:638:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(!REG->open);											\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:702:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!REG->open && IS_REG_BG_OR_MM(REG))								\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:954:55:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == gv_cur_region || FALSE == gv_cur_region->open)				\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:992:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				assert(reg->open);						\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1277:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char			instfilename_copy[MAX_FN_LEN + 1];							\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1320:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&instfilename_copy[0], jnlpool_instfilename, SIZEOF(instfilename_copy));			\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1897:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	label[GDS_LABEL_SZ];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1935:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_created[52];	/* Now unused .. was "file_info created" */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1952:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_256[8];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1954:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		now_running[MAX_REL_NAME];/* for active version stamp */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1961:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_320[4];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1994:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_384[12];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:1997:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_trans_hist[8];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2027:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_unixonly[40];	/* to ensure this section has 64-byte multiple size */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2040:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_accounting_64_align[4];	/* to ensure this section has 64-byte multiple size */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2055:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_ccp_rc[8];	/* to ensure this section has 64-byte multiple size */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2067:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_repl[16];	/* to ensure this section has 64-byte multiple size */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2088:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_jnl[8];		/* to ensure this section has 64-byte multiple size */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_1k[24];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2102:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	jnl_file_name[JNL_NAME_SIZE];	/* journal file name */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2103:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	reorg_restart_key[OLD_MAX_KEY_SZ + 1];	/* 1st key of a leaf block where reorg was done last time.
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		machine_name[MAX_MCNAMELEN];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            encryption_hash[GTMCRYPT_RESERVED_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		encryption_hash2[GTMCRYPT_RESERVED_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_encrypt[80];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		bg_trc_rec_tn_filler  [1200 - (SIZEOF(bg_trc_rec_tn) * n_bg_trc_rec_types)];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		bg_trc_rec_cntr_filler[600 - (SIZEOF(bg_trc_rec_cntr) * n_bg_trc_rec_types)];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		db_csh_acct_rec_filler_4k[248 - (SIZEOF(db_csh_acct_rec) * n_db_csh_acct_rec_types)];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		gvstats_rec_filler_4k_plus_512[512 - SIZEOF(gvstats_rec_t)];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_4k_plus_512[368];	/* Note: this filler array should START at offset 4K+512. So any additions
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2184:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	basedb_fname[256]; /* full path filaneme of corresponding baseDB if this is a statsDB */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_7k[440];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2187:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_8k[1024];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2314:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            encryption_hash[GTMCRYPT_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2315:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		encryption_hash2[GTMCRYPT_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2329:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((DST)->encryption_hash, (SRC)->encryption_hash, GTMCRYPT_HASH_LEN);			\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2330:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((DST)->encryption_hash2, (SRC)->encryption_hash2, GTMCRYPT_HASH_LEN);			\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2424:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		label[12];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2440:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		instfilename[MAX_FN_LEN + 1];	/* + 1 for null */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2467:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				filler[2];	/* filler to store runtime structures without changing gdeget/gdeput.m */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2469:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				filler[6];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2478:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		sname[MAX_SN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2480:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		fname[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2485:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		defext[4];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2501:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			filler[12];	/* filler to store runtime structures without changing gdeget/gdeput.m */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2513:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		rname[MAX_RN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2518:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	bool			open;
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2546:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		jnl_file_name[JNL_NAME_SIZE];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2564:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			filler[39];	/* filler to store runtime structures without changing gdeget/gdeput.m */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2749:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char   gblname[MAX_NM_LEN + 1];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2870:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	base[1];	/* Base of the key */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2926:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		last_split_direction[MAX_BT_DEPTH - 1];	/* maintain last split direction for each level in the GVT */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:2927:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_8byte_align1[6];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3225:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		|| ((FALSE == gv_cur_region->open) && (dba_bg == REG_ACC_METH(gv_cur_region))));	\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3378:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*endBuff, fmtBuff[MAX_ZWR_KEY_SZ];						\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3396:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buff[MAX_ZWR_KEY_SZ], *end;							\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3423:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((gv_currkey->base + gv_currkey->end), mvarg->str.addr, len);			\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3492:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(GVT->clue.base, GVKEY->base, keyend - 1);					\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3499:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(GVT->clue.base, GVKEY->base, keyend + 1);					\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3510:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((TARG_KEY), (SRC_KEY), OFFSETOF(gv_key, base[0]) + (SRC_KEY)->end + 1);		\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3519:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(((sm_uc_ptr_t)(TARG_KEY) + 2), ((sm_uc_ptr_t)(SRC_KEY) + 2), OFFSETOF(gv_key, base[0]) + (SRC_KEY)->end - 1);	\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3753:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	label[GDS_LABEL_SZ];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3755:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		now_running[MAX_REL_NAME];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:3757:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		instfilename[MAX_FN_LEN + 1];	/* Identify which instance file this shared pool corresponds to */
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:4417:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:4428:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	t_fail_hist_dbg[T_FAIL_HIST_DBG_SIZE];
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:4444:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gv_currkey->base, gvent->var_name.addr, gvent->var_name.len);	\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:4548:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES]; /* for LAST_RESTART_CODE */			\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:4746:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!REG->open)									\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:4840:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	DEBUG_ONLY(GBLREF unsigned char		t_fail_hist[CDB_MAX_TRIES];)							\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:5048:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&SAVE_KEY[0], gv_currkey, SIZEOF(gv_key) + gv_currkey->end);	\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:5053:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gv_currkey, &SAVE_KEY[0], SIZEOF(gv_key) + SAVE_KEY[0].end);	\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:5059:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&SAVE_KEY[0], gv_altkey, SIZEOF(gv_key) + gv_altkey->end);	\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:5064:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gv_altkey, &SAVE_KEY[0], SIZEOF(gv_key) + SAVE_KEY[0].end);	\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:5072:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&SAVE_KEY[0], &gv_currkey->base[PREV], OLDEND - PREV + 1);	\
data/fis-gtm-6.3-007/sr_port/gdsfhead.h:5079:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gv_currkey->base[PREV], &SAVE_KEY[0], OLDEND - PREV + 1);	\
data/fis-gtm-6.3-007/sr_port/gdsroot.h:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dvi[16];
data/fis-gtm-6.3-007/sr_port/gdsroot.h:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		file_id[UNIQUE_ID_SIZE];
data/fis-gtm-6.3-007/sr_port/get_cmd_qlf.c:24:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(QUALIF->FIELD.str.addr, glb_cmd_qlf.FIELD.str.addr, glb_cmd_qlf.FIELD.str.len);			\
data/fis-gtm-6.3-007/sr_port/get_cmd_qlf.c:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	inbuf[255];
data/fis-gtm-6.3-007/sr_port/get_cmd_qlf.c:61:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(s->addr, glb_cmd_qlf.object_file.str.addr,
data/fis-gtm-6.3-007/sr_port/get_cmd_qlf.c:112:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(s->addr, glb_cmd_qlf.list_file.str.addr,
data/fis-gtm-6.3-007/sr_port/get_cmd_qlf.c:153:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(s->addr, glb_cmd_qlf.ceprep_file.str.addr, s->len);
data/fis-gtm-6.3-007/sr_port/get_dlr_key.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128], *cp, *cend;
data/fis-gtm-6.3-007/sr_port/get_dlr_zkey.c:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128], *cp, *cend;
data/fis-gtm-6.3-007/sr_port/get_frame_place_mcode.c:39:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	pos_str[MAX_ENTRYREF_LEN];
data/fis-gtm-6.3-007/sr_port/get_log_name.c:31:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char	buf[LOGNAME_LEN];
data/fis-gtm-6.3-007/sr_port/get_log_name.c:60:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(new->dollar_io, buf, v_len);
data/fis-gtm-6.3-007/sr_port/get_symb_line.c:73:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out, gtmImageNames[image_type].imageName, gtmImageNames[image_type].imageNameLen);
data/fis-gtm-6.3-007/sr_port/getjobname.c:29:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static	char	djbuff[10];	/* storage for dollar job's string form */
data/fis-gtm-6.3-007/sr_port/getjobname.c:37:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(djbuff,dollar_job.str.addr,dollar_job.str.len);
data/fis-gtm-6.3-007/sr_port/getzdir.c:34:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dollar_zdir.str.addr, cwd.str.addr, cwd.str.len);
data/fis-gtm-6.3-007/sr_port/glvn_pool.c:63:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pool, old_pool, slotoff + old_pool->top * SIZEOF(glvn_pool_entry));
data/fis-gtm-6.3-007/sr_port/glvn_pool.c:85:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mval_stack, old_mval_stack, pool->mval_top * SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:104:38:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define MEMCPY_LIT(TARGET, LITERAL)		memcpy(TARGET, LITERAL, SIZEOF(LITERAL) - 1)
data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:133:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mcs_ptr, SRC, mcs_len);		\
data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:144:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mcs_ptr, SRC, mcs_len);		\
data/fis-gtm-6.3-007/sr_port/gtm_env_init.c:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[MAX_TRANS_NAME_LEN];
data/fis-gtm-6.3-007/sr_port/gtm_env_init.c:176:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy((TREF(mprof_env_gbl_name)).str.addr, trans.addr, trans.len);
data/fis-gtm-6.3-007/sr_port/gtm_env_init.c:194:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy((TREF(gbuff_limit)).str.addr, trans.addr, trans.len);
data/fis-gtm-6.3-007/sr_port/gtm_env_init.c:316:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((TREF(gtmprompt)).addr, trans.addr, trans.len);
data/fis-gtm-6.3-007/sr_port/gtm_env_xlate_init.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_port/gtm_env_xlate_init.c:52:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(env_gtm_env_xlate.addr, buf, tn.len);
data/fis-gtm-6.3-007/sr_port/gtm_fcntl.h:20:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#	define	OPEN	open
data/fis-gtm-6.3-007/sr_port/gtm_fcntl.h:21:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#	define	OPEN3	open
data/fis-gtm-6.3-007/sr_port/gtm_malloc.h:35:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	GTM64_ONLY(char filler[4];) 			/* Explicit filler to align the length - may be repurposed */
data/fis-gtm-6.3-007/sr_port/gtm_malloc.h:43:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	headMarker[GTM64_ONLY(8)NON_GTM64_ONLY(4)];	/* Header that should not be modified during usage */
data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:339:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nullHMark[4];
data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:340:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nullStr[1];
data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:341:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nullTMark[4];
data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:363:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
STATICD readonly unsigned char markerChar[8] = {0xde, 0xad, 0xbe, 0xef, 0xef, 0xbe, 0xad, 0xde};
data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:365:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
STATICD readonly unsigned char markerChar[4] = {0xde, 0xad, 0xbe, 0xef};
data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:383:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
STATICD readonly unsigned char backfillMarkC[8] = {0xde, 0xad, 0xbe, 0xef, 0xde, 0xad, 0xbe, 0xef};
data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:385:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
STATICD readonly unsigned char backfillMarkC[4] = {0xde, 0xad, 0xbe, 0xef};
data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:572:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(uStor2->headMarker, markerChar, SIZEOF(uStor2->headMarker));	/* Put header tag in place */
data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:615:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(uStor2->headMarker, markerChar, SIZEOF(uStor2->headMarker));
data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:755:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(uStor->headMarker, markerChar, SIZEOF(uStor->headMarker));
data/fis-gtm-6.3-007/sr_port/gtm_malloc_src.h:757:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(trailerMarker, markerChar, SIZEOF(markerChar));	/* Small trailer */
data/fis-gtm-6.3-007/sr_port/gtm_maxstr.c:66:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(maxstr_buff[maxstr_stack_level].addr, *buff, space_occupied);
data/fis-gtm-6.3-007/sr_port/gtm_maxstr.c:71:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(maxstr_buff[maxstr_stack_level].addr, *buff, space_occupied);
data/fis-gtm-6.3-007/sr_port/gtm_maxstr.h:76:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define MAXSTR_BUFF_DECL(var)	char var[MAX_STRBUFF_INIT];
data/fis-gtm-6.3-007/sr_port/gtm_memcpy_validate_and_execute.c:41:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(target, src, len);
data/fis-gtm-6.3-007/sr_port/gtm_repl.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			id[MAX_TLSID_LEN];
data/fis-gtm-6.3-007/sr_port/gtm_stdlib.h:25:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
#define ATOI		atoi
data/fis-gtm-6.3-007/sr_port/gtm_stdlib.h:26:15:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
#define ATOL		atol
data/fis-gtm-6.3-007/sr_port/gtm_stdlib.h:63:16:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
	mkstemp_res = mkstemp(template);				\
data/fis-gtm-6.3-007/sr_port/gtm_string.h:39:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  ifdef memcpy
data/fis-gtm-6.3-007/sr_port/gtm_string.h:40:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#    undef memcpy	/* Some platforms like AIX create memcpy as a #define which needs removing before re-define */
data/fis-gtm-6.3-007/sr_port/gtm_string.h:42:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(TARGET, SRC, LEN) gtm_memcpy_validate_and_execute((void *)(TARGET), (const void *)(SRC), (LEN))
data/fis-gtm-6.3-007/sr_port/gtm_string.h:64:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(DST, STR, local_len);						\
data/fis-gtm-6.3-007/sr_port/gtm_tempnam.c:36:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fullname, SCRATCH_DIR, len);
data/fis-gtm-6.3-007/sr_port/gtm_tempnam.c:40:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fullname, dir, len);
data/fis-gtm-6.3-007/sr_port/gtm_tempnam.c:49:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, prefix, len);
data/fis-gtm-6.3-007/sr_port/gtmrecv_comm_init.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			port_buffer[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_port/gtmrecv_get_opt.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		statslog_val[4]; /* "ON" or "OFF" */
data/fis-gtm-6.3-007/sr_port/gtmrecv_helpers_init.c:64:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_port/gtmrecv_helpers_init.c:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			helper_cmd[UPDHELPER_CMD_MAXLEN];
data/fis-gtm-6.3-007/sr_port/gtmrecv_start_helpers.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			err_str[BUFSIZ];
data/fis-gtm-6.3-007/sr_port/gtmrecv_upd_proc_init.c:62:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char		gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_port/gtmrecv_upd_proc_init.c:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	upd_proc_cmd[UPDPROC_CMD_MAXLEN];
data/fis-gtm-6.3-007/sr_port/gtmsource_ch.c:77:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (reg_local->open && !reg_local->was_open)
data/fis-gtm-6.3-007/sr_port/gtmsource_comm_init.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	error_string[1024];
data/fis-gtm-6.3-007/sr_port/gtmsource_comm_init.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	port_buffer[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_port/gtmsource_comm_init.c:108:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((struct sockaddr*)(&gtmsource_local->secondary_inet_addr), ai_ptr->ai_addr, ai_ptr->ai_addrlen);
data/fis-gtm-6.3-007/sr_port/gtmsource_ctl_init.c:125:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp_ctl->jnl_fn, jnl_fn, jnl_fn_len);
data/fis-gtm-6.3-007/sr_port/gtmsource_ctl_init.c:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			lcl_jnl_fn[JNL_NAME_SIZE];
data/fis-gtm-6.3-007/sr_port/gtmsource_ctl_init.c:268:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tmp_ctl->jnl_fn, csd->jnl_file_name, tmp_ctl->jnl_fn_len);
data/fis-gtm-6.3-007/sr_port/gtmsource_ctl_init.c:314:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(lcl_jnl_fn, tmp_ctl->jnl_fn, lcl_jnl_fn_len);
data/fis-gtm-6.3-007/sr_port/gtmsource_ctl_init.c:397:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);
data/fis-gtm-6.3-007/sr_port/gtmsource_poll_actions.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			time_str[CTIME_BEFORE_NL + 1];
data/fis-gtm-6.3-007/sr_port/gtmsource_poll_actions.c:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			print_msg[REPL_MSG_SIZE], msg_str[OUT_LINE];
data/fis-gtm-6.3-007/sr_port/gtmsource_poll_actions.c:133:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(time_str, time_ptr, CTIME_BEFORE_NL);
data/fis-gtm-6.3-007/sr_port/gv_bind_name.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			format_key[MAX_MIDENT_LEN + 1];	/* max key length + 1 byte for '^' */
data/fis-gtm-6.3-007/sr_port/gv_bind_name.c:71:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!reg->open)
data/fis-gtm-6.3-007/sr_port/gv_bind_name.c:108:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!reg->open)
data/fis-gtm-6.3-007/sr_port/gv_bind_name.c:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&format_key[1], gvname->var_name.addr, gvname->var_name.len);
data/fis-gtm-6.3-007/sr_port/gv_bind_name.c:129:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gv_currkey->base, gvname->var_name.addr, keylen);
data/fis-gtm-6.3-007/sr_port/gv_init_reg.c:52:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!reg->open)
data/fis-gtm-6.3-007/sr_port/gv_init_reg.c:58:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(reg->open);
data/fis-gtm-6.3-007/sr_port/gv_match.c:36:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!gv_region->open)
data/fis-gtm-6.3-007/sr_port/gv_rundown.c:93:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (r_local->open && (dba_cm != r_local->dyn.addr->acc_meth))
data/fis-gtm-6.3-007/sr_port/gv_select.c:216:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(gmap_ptr, gmap_ptr_base, SIZEOF(mstr) * gmap_size);
data/fis-gtm-6.3-007/sr_port/gv_xform_key.c:54:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(TREF(gv_sparekey), keyp, SIZEOF(gv_key) + keyp->end);
data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.c:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[OUT_LINE], crbuff[SIZEOF(blk_hdr_ptr_t) + 1], regbuff[MAX_RN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.c:153:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(regbuff, gv_cur_region->rname, gv_cur_region->rname_len);
data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.h:150:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(gv_altkey->base, prevKey->base, prevKey->end - 1);
data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.h:249:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(prevKeyStart + prevKeyCmpLen, prevKeyUnCmp, nTmp - prevKeyCmpLen);
data/fis-gtm-6.3-007/sr_port/gvcst_blk_search.h:365:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(prevKeyStart, prevKeyUnCmp, prevKeyUnCmpLen);
data/fis-gtm-6.3-007/sr_port/gvcst_bmp_mark_free.c:68:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/gvcst_dataget.c:235:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(stringpool.free, (sm_uc_ptr_t)rp + rsiz - data_len, data_len);
data/fis-gtm-6.3-007/sr_port/gvcst_dataget.c:240:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(sn_ptr, (sm_uc_ptr_t)rp + rsiz - data_len, data_len);
data/fis-gtm-6.3-007/sr_port/gvcst_delete_blk.c:99:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(cse, old_cse, SIZEOF(cw_set_element));
data/fis-gtm-6.3-007/sr_port/gvcst_delete_blk.c:112:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(cse->new_buff, old_cse->new_buff, ((blk_hdr_ptr_t)old_cse->new_buff)->bsiz);
data/fis-gtm-6.3-007/sr_port/gvcst_expand_any_key.c:68:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		expanded_star_key[MAX_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/gvcst_expand_any_key.c:147:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(expanded_key, expanded_star_key, star_keylen + star_keycmpc);
data/fis-gtm-6.3-007/sr_port/gvcst_expand_free_subtree.c:67:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		temp_buff[MAX_DB_BLK_SIZE];
data/fis-gtm-6.3-007/sr_port/gvcst_expand_free_subtree.c:138:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(temp_buff, bp, bsiz);
data/fis-gtm-6.3-007/sr_port/gvcst_expand_key.c:83:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(expKeyStart + expKeyCmpLen, expKeyUnCmp, nTmp - expKeyCmpLen);
data/fis-gtm-6.3-007/sr_port/gvcst_expand_key.c:125:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmpPtr, expKeyUnCmp, expKeyUnCmpLen);
data/fis-gtm-6.3-007/sr_port/gvcst_expand_key.h:121:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dstEnd, src, match);
data/fis-gtm-6.3-007/sr_port/gvcst_get.c:220:49:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                                memcpy(stringpool.free, (sm_uc_ptr_t)rp + rsiz - data_len, data_len);
data/fis-gtm-6.3-007/sr_port/gvcst_get.c:222:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(sn_ptr, (sm_uc_ptr_t)rp + rsiz - data_len, data_len);
data/fis-gtm-6.3-007/sr_port/gvcst_init.c:349:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			trans_buff[MAX_FN_LEN + 1], statsdb_path[MAX_FN_LEN + 1], *errrsn_text;
data/fis-gtm-6.3-007/sr_port/gvcst_init.c:380:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(!reg->open);
data/fis-gtm-6.3-007/sr_port/gvcst_init.c:385:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!baseDBreg->open)
data/fis-gtm-6.3-007/sr_port/gvcst_init.c:389:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			assert(baseDBreg->open);
data/fis-gtm-6.3-007/sr_port/gvcst_init.c:390:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (reg->open)	/* statsDB was opened as part of opening baseDB. No need to do anything more here */
data/fis-gtm-6.3-007/sr_port/gvcst_init.c:564:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(statsdb_path, reg->dyn.addr->fname, reg->dyn.addr->fname_len);
data/fis-gtm-6.3-007/sr_port/gvcst_init.c:774:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(!statsDBreg->open);
data/fis-gtm-6.3-007/sr_port/gvcst_init.c:873:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(reg->dyn.addr->fname, prev_reg->dyn.addr->fname, prev_reg->dyn.addr->fname_len);
data/fis-gtm-6.3-007/sr_port/gvcst_init.c:886:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(reg->jnl_file_name, csd->jnl_file_name, reg->jnl_file_len);	/* journal file name */
data/fis-gtm-6.3-007/sr_port/gvcst_init.c:1072:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(reg->open);
data/fis-gtm-6.3-007/sr_port/gvcst_init.c:1211:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((TREF(gbuff_limit)).str.addr, REORG_GBUFF_LIMIT, SIZEOF(REORG_GBUFF_LIMIT));
data/fis-gtm-6.3-007/sr_port/gvcst_kill.c:107:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/gvcst_kill.c:480:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(gv_altkey, gv_currkey, SIZEOF(gv_key) + end);
data/fis-gtm-6.3-007/sr_port/gvcst_kill_blk.c:313:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(skb, &search_key->base[targ_base], targ_len);
data/fis-gtm-6.3-007/sr_port/gvcst_order.c:201:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(c1, gv_currkey->base, bh->curr_rec.match);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:115:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:238:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dbg_valbuff, val->str.addr, MIN(ARRAYSIZE(dbg_valbuff), dbg_vallen));	\
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:279:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char			mychars[MAX_NSBCTRL_SZ];
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:453:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*va, last_split_direction[MAX_BT_DEPTH];
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:465:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buff[MAX_ZWR_KEY_SZ], *end, old_ch, new_ch;
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:512:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			dbg_valbuff[256];
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:837:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cp1, temp_key->base, temp_key->end + 1);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:842:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(va, value.addr, value.len);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1164:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(ztold_mval->str.addr, (sm_uc_ptr_t)rp + cur_val_offset, data_len);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1243:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cp1, temp_key->base + prev_rec_match, target_key_size - prev_rec_match);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1248:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(va, value.addr, value.len);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1290:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(va, ((sm_uc_ptr_t)rp + rec_size) - value.len, value.len);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1308:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(va, value.addr, value.len);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1456:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(tempkv->key.base, gv_currkey->base, gv_currkey->end + 1);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1470:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					tempkv->value.addr = (char *)bs1[4].addr;/* 	but not used in that case, so ok */
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1660:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cp1, temp_key->base, target_key_size);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1665:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(va, value.addr, value.len);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1696:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(va, ((sm_uc_ptr_t)rp + rec_size) - value.len, value.len);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1776:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(cp1, temp_key->base + prev_rec_match, target_key_size - prev_rec_match);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1781:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(va, value.addr, value.len);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1819:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(cp1, temp_key->base + prev_rec_match, target_key_size - prev_rec_match);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1823:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(va, value.addr, value.len);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1832:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(va, ((sm_uc_ptr_t)rp + rec_size) - value.len, value.len);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1856:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(va, ((sm_uc_ptr_t)rp + rec_size) - value.len, value.len);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1909:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(gv_altkey, temp_key, SIZEOF(gv_key) + temp_key->end);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:1918:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cp1, temp_key->base, rec_cmpc);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:2348:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				cp2 = (unsigned char *)bs1[2].addr;
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:2357:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					cp2 = (unsigned char *)bs1[3].addr;
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:2394:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							cp2 = (unsigned char *)bs1[3].addr;
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:2497:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(cse_new->new_buff, cse->new_buff, ((blk_hdr_ptr_t)cse->new_buff)->bsiz);
data/fis-gtm-6.3-007/sr_port/gvcst_put.c:2525:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cp1, temp_key->base, target_key_size);
data/fis-gtm-6.3-007/sr_port/gvcst_queryget.c:207:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(stringpool.free, (sm_uc_ptr_t)rp + rsiz - data_len, data_len);
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:116:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *)&cur_region, reg, SIZEOF(gd_region));
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:117:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *)&cur_segment, reg->dyn.addr, SIZEOF(gd_segment));
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:157:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				statsDBinitrec[SIZEOF(gvstats_rec_t) * 2];	/* Gives chunk large enuf to hold pad */
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:176:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(baseDBreg->open);
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:198:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (statsDBreg_located->open)		/* do the check just in case */
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:359:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(statsDBinitrec + padsize, baseDBcsa->gvstats_rec_p, SIZEOF(gvstats_rec_t));
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:441:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buffer[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:466:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buffer, TREF(util_outbuff_ptr), msglen);		/* save message that got us here */
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:503:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			statsDBinitrec[SIZEOF(gvstats_rec_t) * 2];	/* Gives us a chunk large enuf to hold padding */
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:575:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (baseDBreg->open)
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:592:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&baseDBcsa->gvstats_rec, gvstats_rec_p, SIZEOF(gvstats_rec_t));
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:635:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (statsDBreg->open && IS_STATSDB_REG(statsDBreg) && statsDBreg->statsDB_setup_completed)
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:686:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(baseDBreg->open);
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:697:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:705:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, TREF(util_outbuff_ptr), msglen);
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:727:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp_fname[MAX_FN_LEN + 1], save_basedb_fname[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:752:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(save_basedb_fname, baseDBseg->fname, save_basedb_fname_len + 1);	/* copy trailing '\0' too */
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:834:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(statsBuf, baseBuf, baseBufLen);
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:843:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp_fname, statsBuf, statsBufLen);
data/fis-gtm-6.3-007/sr_port/gvcst_reservedDB_funcs.c:873:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(baseDBseg->fname, save_basedb_fname, save_basedb_fname_len + 1);
data/fis-gtm-6.3-007/sr_port/gvcst_root_search.c:61:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF	unsigned char	t_fail_hist_dbg[T_FAIL_HIST_DBG_SIZE];
data/fis-gtm-6.3-007/sr_port/gvcst_root_search.c:65:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char	t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/gvcst_root_search.c:307:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(global_collation_mstr.addr, rp + hdr_len + SIZEOF(block_id),
data/fis-gtm-6.3-007/sr_port/gvcst_search.c:144:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pHist, &pTarg->hist, hist_size);
data/fis-gtm-6.3-007/sr_port/gvcst_search.c:560:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(c2, pKey->base, n1);
data/fis-gtm-6.3-007/sr_port/gvincr_compute_post_incr.c:83:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pre_incr_mval.str.addr, (sm_uc_ptr_t)rp + rec_size - data_len, data_len);
data/fis-gtm-6.3-007/sr_port/gvincr_recompute_upd_array.c:158:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cp1, gv_currkey->base + bh->prev_rec.match, target_key_size - bh->prev_rec.match);
data/fis-gtm-6.3-007/sr_port/gvincr_recompute_upd_array.c:162:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(va, value.addr, value.len);
data/fis-gtm-6.3-007/sr_port/gvn2gds.c:117:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 	memcpy(key, gvn->str.addr + start[contains_env], stop[contains_env] - start[contains_env]);
data/fis-gtm-6.3-007/sr_port/gvn2gds.c:164:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		strbuff[MAX_KEY_SZ + 1], *str, *str_top;
data/fis-gtm-6.3-007/sr_port/gvn2gds.c:165:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		fnname[MAX_LEN_FOR_CHAR_FUNC], *c;
data/fis-gtm-6.3-007/sr_port/gvn2gds.c:227:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(str, dollarcharmval.str.addr, dollarcharmval.str.len);
data/fis-gtm-6.3-007/sr_port/gvn2gds.c:329:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gvkey->base[0], gds->str.addr, gds->str.len);
data/fis-gtm-6.3-007/sr_port/gvnh_spanreg_subs_gvt_init.c:87:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if ((NULL == parmblk) && !reg->open)
data/fis-gtm-6.3-007/sr_port/gvstats_rec.c:25:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&csa->nl->gvstats_rec, &csa->hdr->gvstats_rec, SIZEOF(gvstats_rec_t));
data/fis-gtm-6.3-007/sr_port/gvstats_rec.c:30:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&csa->hdr->gvstats_rec, &csa->nl->gvstats_rec, SIZEOF(gvstats_rec_t));
data/fis-gtm-6.3-007/sr_port/gvsub2str.c:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buf[MAX_KEY_SZ + 1], buf1[MAX_KEY_SZ + 1], ch, *ptr, trail_ch, *str, *targ, *targ_end;
data/fis-gtm-6.3-007/sr_port/gvsub2str.c:96:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(targ, mstr_targ.addr, targ_len);	/* mstr_targ.addr is used just in case it is
data/fis-gtm-6.3-007/sr_port/gvzwr_fini.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		m[SIZEOF(mident_fixed)];
data/fis-gtm-6.3-007/sr_port/gvzwr_fini.c:66:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gvzwrite_block->old_key, gv_currkey, SIZEOF(gv_key) + gv_currkey->end);
data/fis-gtm-6.3-007/sr_port/gvzwr_fini.c:137:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&m[0], local.str.addr, local.str.len);
data/fis-gtm-6.3-007/sr_port/gvzwr_out.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port/gvzwrite_clnup.c:52:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gv_currkey->base[0], &old->base[0], old->end + 1);
data/fis-gtm-6.3-007/sr_port/hashtab_implementation.h:738:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bufptr, table, SIZEOF(HASH_TABLE));
data/fis-gtm-6.3-007/sr_port/hashtab_implementation.h:741:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bufptr, table->entry_passed_thru, ROUND_UP(table->size, BITS_PER_UCHAR));
data/fis-gtm-6.3-007/sr_port/hashtab_implementation.h:743:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bufptr, table->base, table->size * SIZEOF(HT_ENT));
data/fis-gtm-6.3-007/sr_port/have_crit.c:81:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (r_local->open && !r_local->was_open)
data/fis-gtm-6.3-007/sr_port/i2asc.c:21:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ar[MAX_DIGITS_IN_INT], *q;
data/fis-gtm-6.3-007/sr_port/i2asc.c:43:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, q, len);
data/fis-gtm-6.3-007/sr_port/i2asc.c:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ar[MAX_DIGITS_IN_INT8], *q;
data/fis-gtm-6.3-007/sr_port/i2asc.c:66:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, q, len);
data/fis-gtm-6.3-007/sr_port/i2asc.c:72:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ar[MAX_HEX_DIGITS_IN_INT8], *q;
data/fis-gtm-6.3-007/sr_port/i2asc.c:93:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, q, len);
data/fis-gtm-6.3-007/sr_port/i2asc.c:99:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ar[24], *q;
data/fis-gtm-6.3-007/sr_port/i2asc.c:135:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, q, len);
data/fis-gtm-6.3-007/sr_port/i2hex_blkfill.c:18:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[8];
data/fis-gtm-6.3-007/sr_port/i2hex_blkfill.c:29:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr, buff, len);
data/fis-gtm-6.3-007/sr_port/i2hex_blkfill.c:34:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[16];
data/fis-gtm-6.3-007/sr_port/i2hex_blkfill.c:45:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr, buff, len);
data/fis-gtm-6.3-007/sr_port/i2hex_nofill.c:18:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[8];
data/fis-gtm-6.3-007/sr_port/i2hex_nofill.c:27:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr, &buff[i], len - i);
data/fis-gtm-6.3-007/sr_port/i2hex_nofill.c:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[16];
data/fis-gtm-6.3-007/sr_port/i2hex_nofill.c:42:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr, &buff[i], len - i);
data/fis-gtm-6.3-007/sr_port/indirection.c:87:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stringpool.free, (TREF(indirection_mval)).str.addr, oldlen);
data/fis-gtm-6.3-007/sr_port/indirection.c:98:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stringpool.free, start, len);
data/fis-gtm-6.3-007/sr_port/insert_region.c:81:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (tr->reg->open)
data/fis-gtm-6.3-007/sr_port/insert_region.c:86:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (reg->open)
data/fis-gtm-6.3-007/sr_port/insert_region.c:103:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((reg->open) && ((tr->reg->open)))
data/fis-gtm-6.3-007/sr_port/insert_region.c:103:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((reg->open) && ((tr->reg->open)))
data/fis-gtm-6.3-007/sr_port/insert_region.c:121:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (tr->reg->open)
data/fis-gtm-6.3-007/sr_port/insert_region.c:126:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (reg->open)
data/fis-gtm-6.3-007/sr_port/insert_region.c:150:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!reg->open)
data/fis-gtm-6.3-007/sr_port/insert_region.c:158:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (tr->reg->open)
data/fis-gtm-6.3-007/sr_port/insert_region.c:176:57:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((CDB_STAGNATE <= t_tries) && dollar_tlevel && reg->open && !csa->now_crit && (&tp_reg_list == reg_list))
data/fis-gtm-6.3-007/sr_port/int_label.c:28:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((TREF(window_ident)).addr, (TREF(window_mval)).str.addr, len);
data/fis-gtm-6.3-007/sr_port/int_namelook.c:32:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		temp[NAME_ENTRY_SZ], x;
data/fis-gtm-6.3-007/sr_port/io.h:137:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	zb[ESC_LEN];
data/fis-gtm-6.3-007/sr_port/io.h:138:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 		char		key[DD_BUFLEN];
data/fis-gtm-6.3-007/sr_port/io.h:139:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 		char		device[DD_BUFLEN];
data/fis-gtm-6.3-007/sr_port/io.h:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dollar_io[1];	/* _$IO hidden variable	*/
data/fis-gtm-6.3-007/sr_port/io.h:201:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	short	(*open)(io_log_name *, mval *, int, mval *, int4);
data/fis-gtm-6.3-007/sr_port/io.h:260:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ioxx(open);
data/fis-gtm-6.3-007/sr_port/io.h:537:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(writebuffer, ERRSTR, errlen);							\
data/fis-gtm-6.3-007/sr_port/io.h:548:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(writebuffer, ONE_COMMA, prefixlen);						\
data/fis-gtm-6.3-007/sr_port/io.h:549:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&writebuffer[prefixlen], ERRSTR, errlen);					\
data/fis-gtm-6.3-007/sr_port/io.h:561:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(writebuffer, ONE_COMMA, prefixlen);						\
data/fis-gtm-6.3-007/sr_port/io.h:562:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&writebuffer[prefixlen], ERRSTR1, errlen1);					\
data/fis-gtm-6.3-007/sr_port/io.h:563:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&writebuffer[prefixlen + errlen1], ERRSTR2, errlen2);				\
data/fis-gtm-6.3-007/sr_port/io.h:575:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(writebuffer, ONE_COMMA, prefixlen);						\
data/fis-gtm-6.3-007/sr_port/io.h:576:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&writebuffer[prefixlen], errstring, errlen);					\
data/fis-gtm-6.3-007/sr_port/io_init.c:51:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static readonly unsigned char open_params_list[2] =
data/fis-gtm-6.3-007/sr_port/io_init.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf1[MAX_TRANS_NAME_LEN]; /* buffer to hold translated name */
data/fis-gtm-6.3-007/sr_port/ionl_use.c:31:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF unsigned char filter_index[27];
data/fis-gtm-6.3-007/sr_port/iorm_wtone.c:27:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	uni_buf[GTM_MB_LEN_MAX], *endptr;
data/fis-gtm-6.3-007/sr_port/iosocket_bind.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			port_buffer[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_port/iosocket_bind.c:294:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dsocketptr->iod->dollar.key[0], BOUND, len);
data/fis-gtm-6.3-007/sr_port/iosocket_bind.c:296:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dsocketptr->iod->dollar.key[len], socketptr->handle, socketptr->handle_len);
data/fis-gtm-6.3-007/sr_port/iosocket_close.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sock_handle[MAX_HANDLE_LEN], *errp;
data/fis-gtm-6.3-007/sr_port/iosocket_close.c:88:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sock_handle, (char *)(pp->str.addr + p_offset + 1), handle_len);
data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ipaddr[SA_MAXLEN + 1];
data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		port_buffer[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:140:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(remote_ai_ptr, sockptr->remote.ai_head, SIZEOF(struct addrinfo));
data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:179:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(remote_ai_ptr, raw_ai_ptr, SIZEOF(struct addrinfo));
data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:483:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy (stringpool.free, (unsigned char *)newdsocket, d_socket_struct_len);
data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:501:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&iod->dollar.key[0], ESTABLISHED, len);
data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:503:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&iod->dollar.key[len], sockptr->handle, sockptr->handle_len);
data/fis-gtm-6.3-007/sr_port/iosocket_create.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 			temp_addr[SA_MAXLITLEN], protocolstr[6], *adptr;
data/fis-gtm-6.3-007/sr_port/iosocket_create.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			host_buffer[NI_MAXHOST];
data/fis-gtm-6.3-007/sr_port/iosocket_create.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			port_buffer[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_port/iosocket_create.c:175:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ai_ptr, addr_info_ptr, SIZEOF(struct addrinfo));
data/fis-gtm-6.3-007/sr_port/iosocket_create.c:200:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(temp_addr, &sockaddr[1], addrlen);
data/fis-gtm-6.3-007/sr_port/iosocket_create.c:202:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(temp_addr, sockaddr, addrlen);
data/fis-gtm-6.3-007/sr_port/iosocket_create.c:235:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sa_un_ptr->sun_path, transpath.addr, transpath.len);
data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*c, *top, delimiter[MAX_DELIM_LEN + 1];
data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:70:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(socketptr->delimiter[ii].addr, delimiter, counter - 1);
data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:106:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(socketptr->delimiter[ii].addr, delimiter, counter);
data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:151:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(socketptr->idelimiter[delim_index].addr, conv_buff, new_delim_len);
data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:190:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(socketptr->odelimiter0.addr, conv_buff, new_len);
data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:209:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(to->delimiter[delim_index].addr, from->delimiter[delim_index].addr, from->delimiter[delim_index].len);
data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:214:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(to->idelimiter[delim_index].addr, from->idelimiter[delim_index].addr,
data/fis-gtm-6.3-007/sr_port/iosocket_delimiter.c:222:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(to->odelimiter0.addr, from->odelimiter0.addr, from->odelimiter0.len);
data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		action[MAX_DEVCTL_LENGTH];
data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:251:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(d->addr, iod->dollar.key, len);
data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:302:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(stringpool.free, d->addr, totlen);
data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:318:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(zkeyptr, LISTENING, len);
data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:322:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(zkeyptr, READ, len);
data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:327:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(zkeyptr, socketptr->handle, socketptr->handle_len);
data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:341:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(zkeyptr, socketptr->remote.saddr_ip, len);
data/fis-gtm-6.3-007/sr_port/iosocket_iocontrol.c:356:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(zkeyptr, charptr, len);
data/fis-gtm-6.3-007/sr_port/iosocket_listen.c:90:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dsocketptr->iod->dollar.key[0], LISTENING, len);
data/fis-gtm-6.3-007/sr_port/iosocket_listen.c:92:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dsocketptr->iod->dollar.key[len], socketptr->handle, socketptr->handle_len);
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			addr[SA_MAXLITLEN], *errptr, sockaddr[SA_MAXLITLEN],
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:104:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char 		delimiter_buffer[MAX_N_DELIMITER * (MAX_DELIM_LEN + 1)], zff_buffer[MAX_ZFF_LEN];
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ioerror,
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ipaddr[SA_MAXLEN];
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:174:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(newdsocket, (d_socket_struct *)mv_zintdev->mv_st_cont.mvs_zintdev.curr_sp_buffer.addr,
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:193:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newdsocket, dsocketptr, d_socket_struct_len);
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:194:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ioptr->dollar.device, "0", SIZEOF("0"));
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:208:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(delimiter_buffer, (pp->str.addr + p_offset + 1), delimiter_len);
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:306:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(sockaddr, pp->str.addr + p_offset + 1, len);
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:317:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(sockaddr, pp->str.addr + p_offset + 1, len);
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:334:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(sock_handle, pp->str.addr + p_offset + 1, handle_len);
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:341:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(zff_buffer, (char *)(pp->str.addr + p_offset + 1), zff_len);
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:471:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(socketptr->handle, sock_handle, handle_len);
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:529:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(curr_socketptr->zff.addr, zff_buffer, zff_len);
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:552:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ioptr->dollar.key[0], ESTABLISHED, len);
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:555:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ioptr->dollar.key[len], socketptr->handle, MIN(socketptr->handle_len, DD_BUFLEN - len - 2));
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:666:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(localsocketptr->ozff.addr, conv_buff, new_ozff_len);
data/fis-gtm-6.3-007/sr_port/iosocket_open.c:676:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dsocketptr, newdsocket, d_socket_struct_len);
data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c:110:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iod->dollar.zb, delimptr, MIN(delimlen, ESC_LEN - 1));
data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c:112:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iod->dollar.key, delimptr, MIN(delimlen, DD_BUFLEN - 1));
data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c:297:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stringpool.free, buffer_start, bytes_read);	/* BYPASSOK */
data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c:659:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(iod->dollar.zb, socketptr->delimiter[ii].addr,
data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c:662:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(iod->dollar.key, socketptr->delimiter[ii].addr,
data/fis-gtm-6.3-007/sr_port/iosocket_readfl.c:894:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iod->dollar.device, "0", SIZEOF("0"));
data/fis-gtm-6.3-007/sr_port/iosocket_snr.c:106:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buffer, (void *)(socketptr->buffer + socketptr->buffered_offset), bytesread);
data/fis-gtm-6.3-007/sr_port/iosocket_snr.c:136:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buffer, socketptr->buffer, bytesread);
data/fis-gtm-6.3-007/sr_port/iosocket_snr.c:139:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buffer, socketptr->buffer, maxlength);
data/fis-gtm-6.3-007/sr_port/iosocket_snr.c:373:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(socketptr->buffer, (socketptr->buffer + socketptr->buffered_offset), socketptr->buffered_length);
data/fis-gtm-6.3-007/sr_port/iosocket_snr.c:436:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_buff, buffer, len);
data/fis-gtm-6.3-007/sr_port/iosocket_snr.c:438:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(new_buff + len, socketptr->buffer + socketptr->buffered_offset, socketptr->buffered_length);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:50:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF	unsigned char		filter_index[27];
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		handlea[MAX_HANDLE_LEN], handles[MAX_HANDLE_LEN], handled[MAX_HANDLE_LEN];
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		addr[SA_MAXLITLEN], *errptr, sockaddr[SA_MAXLITLEN],
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:86:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	delimiter_buffer[MAX_N_DELIMITER * (MAX_DELIM_LEN + 1)];
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:87:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	zff_buffer[MAX_ZFF_LEN];
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:184:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(handlea, (char *)(pp->str.addr + p_offset + 1), handlea_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:190:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(handled, (char *)(pp->str.addr + p_offset + 1), handled_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:198:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(sockaddr, (char *)(pp->str.addr + p_offset + 1), int_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:208:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(delimiter_buffer, (pp->str.addr + p_offset + 1), delimiter_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:244:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(sockaddr, (char *)(pp->str.addr + p_offset + 1), int_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:254:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(handles, (char *)(pp->str.addr + p_offset + 1), handles_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:295:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(zff_buffer, (char *)(pp->str.addr + p_offset + 1), zff_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:388:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(newdsocket, dsocketptr, d_socket_struct_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:400:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(newdsocket, dsocketptr, d_socket_struct_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:403:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dsocketptr, newdsocket, d_socket_struct_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:429:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dsocketptr, newdsocket, d_socket_struct_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:453:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(socketptr->handle, handles, handles_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:544:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newsocket.zff.addr, zff_buffer, zff_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:612:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(localsocketptr->ozff.addr, conv_buff, new_ozff_len);
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:669:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(newsocket.buffer, socketptr->buffer + socketptr->buffered_offset,
data/fis-gtm-6.3-007/sr_port/iosocket_use.c:702:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dsocketptr, newdsocket, d_socket_struct_len);
data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:435:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&iod->dollar.key[0], READ, len);
data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:437:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&iod->dollar.key[len], socketptr->handle, socketptr->handle_len);
data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:469:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			port_buffer[NI_MAXSERV], ipaddr[SA_MAXLEN + 1];
data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:599:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dsocketptr->iod->dollar.key[0], CONNECTED, len);
data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:601:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dsocketptr->iod->dollar.key[len], newsocketptr->handle, newsocketptr->handle_len);
data/fis-gtm-6.3-007/sr_port/iosocket_write.c:349:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)(socketptr->obuffer + socketptr->obuffer_offset), buffer, length);
data/fis-gtm-6.3-007/sr_port/iosocket_write.c:458:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(socketptr->ozff.addr, stringpool.free, new_len);
data/fis-gtm-6.3-007/sr_port/iosocket_write.c:477:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(iod->dollar.device, "0", SIZEOF("0"));
data/fis-gtm-6.3-007/sr_port/iosocket_wtone.c:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	c, uni_c[4], *endptr;
data/fis-gtm-6.3-007/sr_port/iosocketdef.h:135:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(SOCKADDRESS.sa, SOCKADDRPTR, SOCKADDRLEN);			\
data/fis-gtm-6.3-007/sr_port/iosocketdef.h:188:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(NEWSOCKPTR->zff.addr, SOCKPTR->zff.addr, SOCKPTR->zff.len);				\
data/fis-gtm-6.3-007/sr_port/iosocketdef.h:192:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(NEWSOCKPTR->ozff.addr, SOCKPTR->ozff.addr, SOCKPTR->ozff.len);			\
data/fis-gtm-6.3-007/sr_port/iosocketdef.h:204:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(NEWSOCKPTR->local.sa, SOCKPTR->local.sa, SOCKPTR->local.ai.ai_addrlen);			\
data/fis-gtm-6.3-007/sr_port/iosocketdef.h:210:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(NEWSOCKPTR->remote.sa, SOCKPTR->remote.sa, SOCKPTR->remote.ai.ai_addrlen);		\
data/fis-gtm-6.3-007/sr_port/iosocketdef.h:310:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                            handle[MAX_HANDLE_LEN];
data/fis-gtm-6.3-007/sr_port/iott_wtone.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	p[1];
data/fis-gtm-6.3-007/sr_port/iott_wtone.c:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	utf_buf[GTM_MB_LEN_MAX], *up;
data/fis-gtm-6.3-007/sr_port/is_ident.c:15:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF	char	ctypetab[NUM_CHARS];
data/fis-gtm-6.3-007/sr_port/jfh_from_jnl_info.c:40:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header->label, JNL_LABEL_TEXT, STR_LIT_LEN(JNL_LABEL_TEXT));
data/fis-gtm-6.3-007/sr_port/jfh_from_jnl_info.c:44:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&header->who_created, (unsigned char*)prc_vec, SIZEOF(jnl_process_vector));
data/fis-gtm-6.3-007/sr_port/jfh_from_jnl_info.c:45:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&header->who_opened,  (unsigned char*)prc_vec, SIZEOF(jnl_process_vector));
data/fis-gtm-6.3-007/sr_port/jfh_from_jnl_info.c:63:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header->data_file_name, info->fn, info->fn_len);
data/fis-gtm-6.3-007/sr_port/jfh_from_jnl_info.c:71:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header->prev_jnl_file_name, info->prev_jnl, info->prev_jnl_len);
data/fis-gtm-6.3-007/sr_port/jnl.h:355:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		jpv_node[JPV_LEN_NODE],		/* Node name */
data/fis-gtm-6.3-007/sr_port/jnl.h:525:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buff[1];		/* Actually buff[size] */
data/fis-gtm-6.3-007/sr_port/jnl.h:671:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			label[SIZEOF(JNL_LABEL_TEXT) - 1];
data/fis-gtm-6.3-007/sr_port/jnl.h:675:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			filler_align8[7];
data/fis-gtm-6.3-007/sr_port/jnl.h:714:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		data_file_name[JNL_NAME_SIZE];		/* Database file name */
data/fis-gtm-6.3-007/sr_port/jnl.h:715:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		prev_jnl_file_name[JNL_NAME_SIZE];	/* Previous generation journal file name */
data/fis-gtm-6.3-007/sr_port/jnl.h:716:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		next_jnl_file_name[JNL_NAME_SIZE];	/* Next generation journal file name */
data/fis-gtm-6.3-007/sr_port/jnl.h:719:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			encryption_hash[GTMCRYPT_RESERVED_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/jnl.h:720:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			encryption_hash2[GTMCRYPT_RESERVED_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/jnl.h:724:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			encr_filler[80];
data/fis-gtm-6.3-007/sr_port/jnl.h:732:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			filler[432];
data/fis-gtm-6.3-007/sr_port/jnl.h:743:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		jnl[JNL_NAME_SIZE],
data/fis-gtm-6.3-007/sr_port/jnl.h:767:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			encryption_hash[GTMCRYPT_RESERVED_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/jnl.h:768:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			encryption_hash2[GTMCRYPT_RESERVED_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/jnl.h:818:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		text[1];		/* Actually text[length] */
data/fis-gtm-6.3-007/sr_port/jnl.h:913:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			blk_contents[1];	/* Actually blk_contents[bsiz] */
data/fis-gtm-6.3-007/sr_port/jnl.h:945:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			jnl_tid[TID_STR_SIZE];
data/fis-gtm-6.3-007/sr_port/jnl.h:1156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			unique_id[UNIQUE_ID_SIZE];
data/fis-gtm-6.3-007/sr_port/jnl.h:1762:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	iv[GTM_MAX_IV_LEN];									\
data/fis-gtm-6.3-007/sr_port/jnl2ext.c:88:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp, origbuf, tmpsize);
data/fis-gtm-6.3-007/sr_port/jnl2ext.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		key_buff[SIZEOF(gv_key) + MAX_KEY_SZ + 7];
data/fis-gtm-6.3-007/sr_port/jnl2ext.c:175:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(curr, ptr, tid_len);
data/fis-gtm-6.3-007/sr_port/jnl2ext.c:249:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key->base, &keystr->text[0], keystr->length);
data/fis-gtm-6.3-007/sr_port/jnl_file_close.c:62:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		hdr_base[REAL_JNL_HDR_LEN + MAX_IO_BLOCK_SIZE];
data/fis-gtm-6.3-007/sr_port/jnl_file_open_common.c:82:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		hdr_buff[REAL_JNL_HDR_LEN + MAX_IO_BLOCK_SIZE];
data/fis-gtm-6.3-007/sr_port/jnl_file_open_common.c:85:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		eof_rec[(DISK_BLOCK_SIZE * 2) + MAX_IO_BLOCK_SIZE];
data/fis-gtm-6.3-007/sr_port/jnl_file_open_common.c:153:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&eof_record, (unsigned char *)eof_rec_buffer + adjust, EOF_RECLEN);
data/fis-gtm-6.3-007/sr_port/jnl_file_open_common.c:231:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&jb->buff[ROUND_DOWN2(jb->free, jnl_fs_block_size) + jb->buff_off], eof_rec_buffer, adjust);
data/fis-gtm-6.3-007/sr_port/jnl_file_open_common.c:260:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&header->who_opened, prc_vec, SIZEOF(jnl_process_vector));
data/fis-gtm-6.3-007/sr_port/jnl_file_open_switch.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			prev_jnl_fn[JNL_NAME_SIZE];
data/fis-gtm-6.3-007/sr_port/jnl_flush.c:40:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!reg || !reg->open)
data/fis-gtm-6.3-007/sr_port/jnl_format.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			iv[GTM_MAX_IV_LEN];
data/fis-gtm-6.3-007/sr_port/jnl_format.c:305:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(local_buffer, (uchar_ptr_t)key->base, keystrlen);
data/fis-gtm-6.3-007/sr_port/jnl_format.c:318:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(local_buffer, (uchar_ptr_t)val->str.addr, valstrlen);
data/fis-gtm-6.3-007/sr_port/jnl_format.c:353:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(jfb->alt_buff, rec, jrec_size);
data/fis-gtm-6.3-007/sr_port/jnl_pool_write.c:151:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(local_jnlpool->jnldata_base + write, jnlrecptr, rlen);
data/fis-gtm-6.3-007/sr_port/jnl_pool_write.c:154:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(local_jnlpool->jnldata_base + write, jnlrecptr, dstlen);
data/fis-gtm-6.3-007/sr_port/jnl_pool_write.c:155:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(local_jnlpool->jnldata_base, jnlrecptr + dstlen, rlen - dstlen);
data/fis-gtm-6.3-007/sr_port/jnl_wait.c:31:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((NULL != reg) && (TRUE == reg->open))
data/fis-gtm-6.3-007/sr_port/jnl_write.c:75:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&lcl_buff[lcl_free], src, len);				\
data/fis-gtm-6.3-007/sr_port/jnl_write.c:81:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&lcl_buff[lcl_free], src, size_before_wrap);		\
data/fis-gtm-6.3-007/sr_port/jnl_write.c:83:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&lcl_buff[0], src + size_before_wrap, lcl_free);		\
data/fis-gtm-6.3-007/sr_port/jnl_write.c:339:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(lcl_buff + lcl_free, (uchar_ptr_t)jnl_rec, rlen);
data/fis-gtm-6.3-007/sr_port/jnl_write.c:377:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(lcl_buff + lcl_free, (uchar_ptr_t)jnl_rec, FIXED_BLK_RECLEN);
data/fis-gtm-6.3-007/sr_port/jnl_write.c:380:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(lcl_buff + lcl_free, (uchar_ptr_t)blk_ptr, jrec_blk->bsiz);
data/fis-gtm-6.3-007/sr_port/jnl_write.c:408:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(lcl_buff + lcl_free, (uchar_ptr_t)jrec_align, FIXED_ALIGN_RECLEN);
data/fis-gtm-6.3-007/sr_port/jnl_write.c:443:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(lcl_buff + lcl_free, (uchar_ptr_t)jfb->buff, rlen);
data/fis-gtm-6.3-007/sr_port/jnl_write_aimg_rec.c:80:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pvt_crypt_buf.addr, buffer, SIZEOF(blk_hdr));	/* copy the block header */
data/fis-gtm-6.3-007/sr_port/jnl_write_epoch_rec.c:51:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		hdr_base[REAL_JNL_HDR_LEN + MAX_IO_BLOCK_SIZE];
data/fis-gtm-6.3-007/sr_port/jnl_write_pini.c:75:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((unsigned char*)&pini_record.process_vector[ORIG_JPV],
data/fis-gtm-6.3-007/sr_port/jnl_write_pini.c:85:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((unsigned char*)&pini_record.process_vector[ORIG_JPV],
data/fis-gtm-6.3-007/sr_port/jnl_write_pini.c:93:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((unsigned char*)&pini_record.process_vector[CURR_JPV], (unsigned char*)prc_vec, SIZEOF(jnl_process_vector));
data/fis-gtm-6.3-007/sr_port/jnl_write_reserve.c:49:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(JRS->jrs_array, jre, usedlen * SIZEOF(jrec_rsrv_elem_t));		\
data/fis-gtm-6.3-007/sr_port/jobexam_process.c:47:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char dumpable_error_dump_file_parms[2] = {iop_newversion, iop_eol};
data/fis-gtm-6.3-007/sr_port/jobexam_process.c:48:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char dumpable_error_dump_file_noparms[1] = {iop_eol};
data/fis-gtm-6.3-007/sr_port/jobexam_process.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			saved_util_outbuff[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_port/jobexam_process.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			save_dump_file_name_buff[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_port/jobexam_process.c:149:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(saved_util_outbuff, TREF(util_outbuff_ptr), saved_util_outbuff_len);
data/fis-gtm-6.3-007/sr_port/jobexam_process.c:155:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(TREF(util_outbuff_ptr), saved_util_outbuff, saved_util_outbuff_len);
data/fis-gtm-6.3-007/sr_port/jobexam_process.c:188:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		dump_file_name[DEFAULT_DUMP_FILE_TOTSIZE], *dump_file_name_ptr;
data/fis-gtm-6.3-007/sr_port/jobexam_process.c:218:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fatal_file_name_buff, dump_file_spec->str.addr, dump_file_spec->str.len);
data/fis-gtm-6.3-007/sr_port/jobinterrupt_init.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	trans_bufr[MAX_TRANS_NAME_LEN];
data/fis-gtm-6.3-007/sr_port/jobinterrupt_process.c:96:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mv_st_ent->mv_st_cont.mvs_zintr.savextref.addr, extnam_str.addr, extnam_str.len);
data/fis-gtm-6.3-007/sr_port/jobinterrupt_process.c:103:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&mv_st_ent->mv_st_cont.mvs_zintr.dollar_ecode_save, &dollar_ecode, SIZEOF(dollar_ecode));
data/fis-gtm-6.3-007/sr_port/jobinterrupt_process.c:104:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&mv_st_ent->mv_st_cont.mvs_zintr.dollar_stack_save, &dollar_stack, SIZEOF(dollar_stack));
data/fis-gtm-6.3-007/sr_port/jobinterrupt_process_cleanup.c:42:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	msgbuf[OUT_BUFF_SIZE], *mbptr;
data/fis-gtm-6.3-007/sr_port/jobinterrupt_process_cleanup.c:83:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mbptr, zstptr, zstlen);
data/fis-gtm-6.3-007/sr_port/jobparameters.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		parastr[3000];
data/fis-gtm-6.3-007/sr_port/lb_init.c:27:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF char	ctypetab[NUM_CHARS];
data/fis-gtm-6.3-007/sr_port/lb_init.c:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char			original_source[MAX_SRCLINE + 1];
data/fis-gtm-6.3-007/sr_port/lb_init.c:48:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(original_source, (TREF(source_buffer)).addr, (TREF(source_buffer)).len + 1);	/* include NUL term chars */
data/fis-gtm-6.3-007/sr_port/lke_clean.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			regbuf[MAX_RN_LEN], nodebuf[32], one_lockbuf[MAX_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/lke_clean.c:95:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				&& reg->open)
data/fis-gtm-6.3-007/sr_port/lke_clean.c:132:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(sub->data, "A12345670123456776543210", 24);
data/fis-gtm-6.3-007/sr_port/lke_clean.c:170:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(sub->data, "A12345678901234567890123456789012", 33);
data/fis-gtm-6.3-007/sr_port/lke_clean.c:278:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char name_buffer[MAX_ZWR_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/lke_clear.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		regbuf[MAX_RN_LEN], nodebuf[32], one_lockbuf[MAX_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/lke_clear.c:85:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		    reg->open)
data/fis-gtm-6.3-007/sr_port/lke_clearlock.c:100:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(reply.lockname, name->addr, len);
data/fis-gtm-6.3-007/sr_port/lke_cleartree.c:58:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	subscript_offset[KDIM];
data/fis-gtm-6.3-007/sr_port/lke_cleartree.c:59:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	name_buffer[MAX_ZWR_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/lke_getcli.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		one_lockbuf[MAX_ZWR_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/lke_getcli.c:121:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(one_lock->addr, one_lockbuf, keylen);
data/fis-gtm-6.3-007/sr_port/lke_getki.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	one_lockbuf[MAX_ZWR_KEY_SZ + 1], *one_char;
data/fis-gtm-6.3-007/sr_port/lke_getki.c:51:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(outbuff, src, srclen);
data/fis-gtm-6.3-007/sr_port/lke_getki.c:56:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(outptr, src, inptr - src);
data/fis-gtm-6.3-007/sr_port/lke_getki.c:95:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(outptr, inptr, nextptr - inptr);
data/fis-gtm-6.3-007/sr_port/lke_getki.c:131:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(outptr, subsc.str.addr, subsc.str.len);
data/fis-gtm-6.3-007/sr_port/lke_getki.c:137:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(outptr, inptr, nextptr - inptr);
data/fis-gtm-6.3-007/sr_port/lke_growhash.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			regbuf[MAX_RN_LEN], nodebuf[32], one_lockbuf[MAX_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/lke_growhash.c:70:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			&& reg->open)
data/fis-gtm-6.3-007/sr_port/lke_show.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 			regbuf[MAX_RN_LEN], nodebuf[32], one_lockbuf[MAX_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/lke_show.c:96:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			&& reg->open)
data/fis-gtm-6.3-007/sr_port/lke_show.c:134:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((uchar_ptr_t)ctl, (uchar_ptr_t)csa->mlkctl, ls_len);
data/fis-gtm-6.3-007/sr_port/lke_show.c:140:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(pctl2.shrhash, pctl.shrhash, SIZEOF(mlk_shrhash) * pctl.shrhash_size);
data/fis-gtm-6.3-007/sr_port/lke_showlock.c:85:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(name->addr, value->data, value->length);
data/fis-gtm-6.3-007/sr_port/lke_showlock.c:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		format[NODE_SIZE], gtcmbuf[NODE_SIZE]; /* gtcmbuf[] holds ": CLNTNODE = %s : CLNTPID = %d" */
data/fis-gtm-6.3-007/sr_port/lke_showlock.c:185:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&gtcmbuf[gtcmbufidx], CLNTNODE_LIT, STR_LIT_LEN(CLNTNODE_LIT));
data/fis-gtm-6.3-007/sr_port/lke_showlock.c:187:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&gtcmbuf[gtcmbufidx], node->auxnode, SIZEOF(node->auxnode));
data/fis-gtm-6.3-007/sr_port/lke_showlock.c:189:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&gtcmbuf[gtcmbufidx], CLNTPID_LIT, STR_LIT_LEN(CLNTPID_LIT));
data/fis-gtm-6.3-007/sr_port/lke_showlock.c:209:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(format, msg, len1);
data/fis-gtm-6.3-007/sr_port/lke_showlock.c:220:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(format + len1, msg, len2);
data/fis-gtm-6.3-007/sr_port/lke_showtree.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			temp[MAX_ZWR_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/lke_showtree.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			new_prefix[KDIM + 2];
data/fis-gtm-6.3-007/sr_port/lke_showtree.c:56:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(temp, dsub->data, dsub->length);
data/fis-gtm-6.3-007/sr_port/lke_showtree.c:118:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	subscript_offset[KDIM];
data/fis-gtm-6.3-007/sr_port/lke_showtree.c:119:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	name_buffer[MAX_ZWR_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/lkglvn.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*lknam, lkname_buf[MAX_MIDENT_LEN + 1], x;
data/fis-gtm-6.3-007/sr_port/lkglvn.c:96:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lknam, (TREF(window_ident)).addr, (TREF(window_ident)).len);
data/fis-gtm-6.3-007/sr_port/logical_truth_value.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[1024];
data/fis-gtm-6.3-007/sr_port/lv_tree.c:679:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&cloneNode->key_mvtype, &node->key_mvtype, 8);	/* Asserts above keep the 8 byte length secure */
data/fis-gtm-6.3-007/sr_port/lv_tree.h:289:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cloneTree, (LVT), OFFSETOF(lvTree, avl_height) + SIZEOF(LVT->avl_height));				\
data/fis-gtm-6.3-007/sr_port/lvmon_pull_values.c:42:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(lvmon_val_ent_p->varvalue.addr, (VALUE), len);					\
data/fis-gtm-6.3-007/sr_port/lvzwr_fini.c:88:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&m.c[0], local.str.addr, local.str.len);
data/fis-gtm-6.3-007/sr_port/lvzwr_key.c:34:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buff, lvzwrite_block->curr_name->addr, len);
data/fis-gtm-6.3-007/sr_port/lvzwr_key.c:50:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buff, sub.addr, sub.len);
data/fis-gtm-6.3-007/sr_port/lvzwr_out.c:302:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(gv_currkey->base, mglvnp->gblp[IND1]->s_gv_currkey->base, mglvnp->gblp[IND1]->s_gv_currkey->end + 1);
data/fis-gtm-6.3-007/sr_port/lvzwr_var.c:275:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char buff[512], *end;
data/fis-gtm-6.3-007/sr_port/m_close.c:24:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static readonly unsigned char empty_plist[1] = { iop_eol };
data/fis-gtm-6.3-007/sr_port/m_job.c:37:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static		readonly unsigned char empty_plist[1] = { jp_eol };
data/fis-gtm-6.3-007/sr_port/m_open.c:31:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static readonly unsigned char empty_plist[1] = { iop_eol };
data/fis-gtm-6.3-007/sr_port/m_set.c:143:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	unibytes_val[4];
data/fis-gtm-6.3-007/sr_port/m_set.c:570:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
									memcpy(unichar.unibytes_val,
data/fis-gtm-6.3-007/sr_port/m_tstart.c:35:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static readonly unsigned char tst_param_index[27] =
data/fis-gtm-6.3-007/sr_port/m_use.c:25:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static readonly unsigned char empty_plist[1] = { iop_eol };
data/fis-gtm-6.3-007/sr_port/m_write.c:129:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(cp, msp->addr, lnx);
data/fis-gtm-6.3-007/sr_port/m_xecute.c:85:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((TREF(source_buffer)).addr,src->addr,src->len);
data/fis-gtm-6.3-007/sr_port/m_zstep.c:34:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static readonly unsigned char zstep_index[27] =
data/fis-gtm-6.3-007/sr_port/md5hash.c:118:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(p, buf, len);
data/fis-gtm-6.3-007/sr_port/md5hash.c:121:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, buf, t);
data/fis-gtm-6.3-007/sr_port/md5hash.c:130:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->in, buf, 64);
data/fis-gtm-6.3-007/sr_port/md5hash.c:138:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->in, buf, len);
data/fis-gtm-6.3-007/sr_port/md5hash.c:147:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     unsigned char digest[16];
data/fis-gtm-6.3-007/sr_port/md5hash.c:209:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     const unsigned char inraw[64];
data/fis-gtm-6.3-007/sr_port/md5hash.h:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	in[MD5_BLOCK_LENGTH];
data/fis-gtm-6.3-007/sr_port/md5hash.h:34:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void cvs_MD5Final(unsigned char digest[MD5_DIGEST_LENGTH], struct cvs_MD5Context *context);
data/fis-gtm-6.3-007/sr_port/md5hash.h:35:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void cvs_MD5Transform(cvs_uint32 buf[4], const unsigned char in[MD5_BLOCK_LENGTH]);
data/fis-gtm-6.3-007/sr_port/mdb_condition_handler.c:266:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			src_line[MAX_ENTRYREF_LEN];
data/fis-gtm-6.3-007/sr_port/mdb_condition_handler.c:424:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(sig, tp_restart_fail_sig, (tp_restart_fail_sig->chf$l_sig_args + 1) * SIZEOF(int));
data/fis-gtm-6.3-007/sr_port/mdb_condition_handler.c:463:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				assert(gv_cur_region->open);
data/fis-gtm-6.3-007/sr_port/mdb_condition_handler.c:595:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					if (reg_local->open && !reg_local->was_open)
data/fis-gtm-6.3-007/sr_port/mdb_condition_handler.c:612:88:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if ((NULL != local_jnlpool->jnlpool_dummy_reg) && local_jnlpool->jnlpool_dummy_reg->open)
data/fis-gtm-6.3-007/sr_port/mdef.h:332:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	c[PRE_V5_MAX_MIDENT_LEN];
data/fis-gtm-6.3-007/sr_port/mdef.h:339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	c[MAX_MIDENT_LEN + 1];
data/fis-gtm-6.3-007/sr_port/mdef.h:1267:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst+start,src,count);					\
data/fis-gtm-6.3-007/sr_port/mdef.h:1537:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	created_nodename[MAX_NODENAME_LEN];	/* Nodename on which instance file was created */
data/fis-gtm-6.3-007/sr_port/mdef.h:1538:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	this_instname[MAX_INSTNAME_LEN];	/* Instance name that this file corresponds to */
data/fis-gtm-6.3-007/sr_port/mdef.h:1601:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	root_primary_instname[MAX_INSTNAME_LEN];/* the root primary instance that generated this history record */
data/fis-gtm-6.3-007/sr_port/mdef.h:1626:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_8[2];				/* Filler for 8-byte alignment */
data/fis-gtm-6.3-007/sr_port/mdef.h:1726:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_16[12];
data/fis-gtm-6.3-007/sr_port/merge_desc_check.c:65:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buff1[MAX_ZWR_KEY_SZ], buff2[MAX_ZWR_KEY_SZ], *end1, *end2;
data/fis-gtm-6.3-007/sr_port/merge_desc_check.c:147:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					if (!reg->open)
data/fis-gtm-6.3-007/sr_port/merge_desc_check.c:154:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					if (!reg->open)
data/fis-gtm-6.3-007/sr_port/mlabel2xtern.c:30:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pt, rtn->addr, rtn->len);
data/fis-gtm-6.3-007/sr_port/mlabel2xtern.c:38:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pt, lab->addr, lab->len);
data/fis-gtm-6.3-007/sr_port/mlk_lock.c:172:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(d->auxnode,
data/fis-gtm-6.3-007/sr_port/mlk_pvtblk_create.c:138:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cp, (mp_temp)->str.addr, len);
data/fis-gtm-6.3-007/sr_port/mlk_region_lookup.c:49:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!reg->open)
data/fis-gtm-6.3-007/sr_port/mlk_region_lookup.c:64:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!reg->open)
data/fis-gtm-6.3-007/sr_port/mlk_region_lookup.c:73:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!reg->open)
data/fis-gtm-6.3-007/sr_port/mlk_shrblk_create.c:88:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(subptr->data, val, len);
data/fis-gtm-6.3-007/sr_port/mlk_shrclean.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dead_table[PROC_TABLE_SIZE];
data/fis-gtm-6.3-007/sr_port/mlkdef.h:62:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	auxnode[16];	/* If non-zero auxowner, this is the nodename of the client that is holding the lock */
data/fis-gtm-6.3-007/sr_port/mlkdef.h:111:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	data[1];	/* the data itself, actually data[length] */
data/fis-gtm-6.3-007/sr_port/mlkdef.h:215:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		filler[5];		/* Fill out to align data on word boundary */
data/fis-gtm-6.3-007/sr_port/mlkdef.h:222:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		value[1];		/* Actually, an array unsigned char value[N], where N is based on the
data/fis-gtm-6.3-007/sr_port/mmemory.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		data[1];		/* beginning of the allocatable area (NOTE: should be last member) */
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:257:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((TREF(mprof_ptr))->gbl_to_fill.str.addr, gvn->str.addr, gvn->str.len);
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:556:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(e.label_name->addr, (TREF(prof_fp))->label_name->addr, (TREF(prof_fp))->label_name->len);
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:560:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(e.rout_name->addr, (TREF(prof_fp))->rout_name->addr, (TREF(prof_fp))->rout_name->len);
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:703:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dataval[96];		/* Big enough for data value. */
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:704:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	subsval[12];		/* See i2asc + 1 for null char. */
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:705:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	asc_line_num[12];	/* To hold the ascii equivalent of the line_num. */
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:719:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(spt->str.addr, p->e.rout_name->addr, spt->str.len);
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:726:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(spt->str.addr, p->e.label_name->addr, spt->str.len);
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:731:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(spt->str.addr, MPROF_NULL_LABEL, spt->str.len);
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:740:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(spt->str.addr, asc_line_num, spt->str.len);
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:751:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(spt->str.addr, MPROF_FOR_LOOP, spt->str.len);
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:758:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(spt->str.addr, subsval, spt->str.len);
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:796:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data.str.addr, dataval, data.str.len);
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:807:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dataval[96];		/* Big enough for data value. */
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:820:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(spt->str.addr, PROCESS_TIME, spt->str.len);
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:825:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(spt->str.addr, CHILDREN_TIME, spt->str.len);
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:856:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data.str.addr, dataval, data.str.len);
data/fis-gtm-6.3-007/sr_port/mprof_funcs.c:1037:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(mpsp, dollar_job.str.addr, dollar_job.str.len);
data/fis-gtm-6.3-007/sr_port/mprof_tree.c:52:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(arg->rout_name->addr, tmp_rout_name->addr, tmp_rout_name->len);
data/fis-gtm-6.3-007/sr_port/mprof_tree.c:61:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(arg->label_name->addr, tmp_label_name->addr, tmp_label_name->len);
data/fis-gtm-6.3-007/sr_port/mrout2xtern.h:18:37:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#	define MROUT2XTERN(src, dst, len)	memcpy(dst, src, len)
data/fis-gtm-6.3-007/sr_port/mtables.c:45:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF char ctypetab[NUM_CHARS] =
data/fis-gtm-6.3-007/sr_port/mtables.c:203:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static readonly unsigned char localpool[15] = {'-', '1', '1', '1', '0', '1', '0', '0', '5', '2', '4', '2', '8', '6'};
data/fis-gtm-6.3-007/sr_port/mu_clsce.c:97:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	oldblk1_prev_key[MAX_KEY_SZ+1],
data/fis-gtm-6.3-007/sr_port/mu_clsce.c:199:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&old_levelp_cur_key[0], &old_levelp_cur_prev_key[0], tkeycmpc);
data/fis-gtm-6.3-007/sr_port/mu_clsce.c:221:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(old_levelp_cur_next_key, &old_levelp_cur_key[0], tkeycmpc);
data/fis-gtm-6.3-007/sr_port/mu_clsce.c:252:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy (oldblk1_last_key, &old_levelp_cur_key[0], old_levelp_cur_keysz);
data/fis-gtm-6.3-007/sr_port/mu_clsce.c:416:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(newblk2_first_key, newblk1_last_key, tkeycmpc); /* copy the compressed piece */
data/fis-gtm-6.3-007/sr_port/mu_clsce.c:466:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(newblk1_last_key, new_blk2_ances_first_key, newblk1_last_keysz);
data/fis-gtm-6.3-007/sr_port/mu_clsce.c:582:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bn_ptr1, old_blk1_base + old_blk1_sz - SIZEOF(block_id), SIZEOF(block_id));
data/fis-gtm-6.3-007/sr_port/mu_clsce.c:666:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bn_ptr2, old_levelp_blk_base + old_levelp_rec_offset + SIZEOF(rec_hdr) + old_levelp_cur_keylen, SIZEOF(block_id));
data/fis-gtm-6.3-007/sr_port/mu_clsce.c:779:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gv_currkey_next_reorg->base[0], newblk2_first_key, newblk2_first_keysz);
data/fis-gtm-6.3-007/sr_port/mu_dwngrd_header.c:81:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(v15_csd->now_running, gtm_release_name, gtm_release_name_len + 1);	/* GT.M release name */
data/fis-gtm-6.3-007/sr_port/mu_dwngrd_header.c:158:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(v15_csd->jnl_file_name, csd->jnl_file_name, JNL_NAME_SIZE);
data/fis-gtm-6.3-007/sr_port/mu_dwngrd_header.c:163:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(v15_csd->reorg_restart_key, csd->reorg_restart_key, SIZEOF(csd->reorg_restart_key));
data/fis-gtm-6.3-007/sr_port/mu_dwngrd_header.c:164:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(v15_csd->machine_name, csd->machine_name, MAX_MCNAMELEN);
data/fis-gtm-6.3-007/sr_port/mu_extr_gblout.c:120:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(beg_gv_currkey->base, gv_currkey->base, (SIZEOF(gv_key) + gv_currkey->end));
data/fis-gtm-6.3-007/sr_port/mu_extr_gblout.c:215:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(encrypted_bp, bp, SIZEOF(blk_hdr));
data/fis-gtm-6.3-007/sr_port/mu_extr_gblout.c:280:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(beg_gv_currkey->base, gv_currkey->base, gv_currkey->end + 1);
data/fis-gtm-6.3-007/sr_port/mu_extr_gblout.c:337:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(zwr_buffer, key_buffer, fmtd_key_len);
data/fis-gtm-6.3-007/sr_port/mu_extr_gblout.c:338:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(zwr_buffer + fmtd_key_len, "=", 1);
data/fis-gtm-6.3-007/sr_port/mu_extr_getblk.c:105:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, bp, bsiz);
data/fis-gtm-6.3-007/sr_port/mu_extr_getblk.c:123:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(encr_ptr, (sm_uc_ptr_t)encrypted_bp, bsiz);
data/fis-gtm-6.3-007/sr_port/mu_extr_getblk.c:134:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(encr_ptr, (sm_uc_ptr_t)encrypted_bp, bsiz);
data/fis-gtm-6.3-007/sr_port/mu_extr_getblk.c:153:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(gv_target->hist.h, rt_history->h, SIZEOF(srch_blk_status) * (rt_history->depth + 1));
data/fis-gtm-6.3-007/sr_port/mu_extr_getblk.c:166:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(private_blk, ptr, SIZEOF(blk_hdr));
data/fis-gtm-6.3-007/sr_port/mu_freeze_ch.c:47:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!gv_cur_region->open)
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:52:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF unsigned char		muint_temp_buff[MAX_MIDENT_LEN + 1];
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:191:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_KEY_SZ + 1], old_buff[MAX_KEY_SZ + 1], temp_buff[MAX_MIDENT_LEN + 1], util_buff[MAX_UTIL_SIZE];
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:315:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buff, bot_key, bot_len);
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:418:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(trees->key, key_base, name_len);
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:471:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(old_buff, buff, comp_length);
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:472:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buff + rec_cmpc, key_base, key_size);
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:610:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
									memcpy(&check_vals, &buff[b_index], 1);
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:626:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
									memcpy(&check_vals, &buff[b_index], 1);
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:728:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(sndata->span_node_buf, buff, buff_length);
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:743:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(sndata->span_node_buf, buff, buff_length);
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:799:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(sndata->span_node_buf, buff, buff_length);
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:937:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(muint_temp_buff, temp_buff, SIZEOF(temp_buff));
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:960:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(trees_tail->path, mu_int_path, SIZEOF(block_id) * (MAX_BT_DEPTH + 1));
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:961:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(trees_tail->offset, mu_int_offset, SIZEOF(uint4) * (MAX_BT_DEPTH + 1));
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:963:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(trees_tail->key, muint_temp_buff, SIZEOF(muint_temp_buff));
data/fis-gtm-6.3-007/sr_port/mu_int_err.c:72:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/mu_int_err.c:73:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char 	span_key[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/mu_int_err.c:75:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	key_buffer[MAX_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/mu_int_getkey.c:44:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*top, *startsrc, *src, *dest, slit[MAX_KEY_SZ + 1], *tmp;
data/fis-gtm-6.3-007/sr_port/mu_int_init.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			msgbuff[MSGBUF_SIZE], *msgptr;
data/fis-gtm-6.3-007/sr_port/mu_int_init.c:108:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&mu_int_data, (TREF(dio_buff)).aligned, SGMNT_HDR_LEN);
data/fis-gtm-6.3-007/sr_port/mu_int_init.c:143:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mu_int_master, (TREF(dio_buff)).aligned, mu_int_data.master_map_len);
data/fis-gtm-6.3-007/sr_port/mu_int_reg.c:179:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uchar_ptr_t)&mu_int_data, (uchar_ptr_t)csd, SIZEOF(sgmnt_data));
data/fis-gtm-6.3-007/sr_port/mu_int_reg.c:182:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mu_int_master, MM_ADDR(csd), MASTER_MAP_SIZE(csd));
data/fis-gtm-6.3-007/sr_port/mu_int_write.c:91:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pvt_crypt_buf.addr, ptr, SIZEOF(blk_hdr));
data/fis-gtm-6.3-007/sr_port/mu_int_write.c:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((TREF(dio_buff)).aligned, write_buff, orig_write_len);
data/fis-gtm-6.3-007/sr_port/mu_interactive.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		res[8];
data/fis-gtm-6.3-007/sr_port/mu_reduce_level.c:75:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(save_blk, old_blk_base + SIZEOF(blk_hdr), old_blk_sz - SIZEOF(blk_hdr));
data/fis-gtm-6.3-007/sr_port/mu_reorg.c:107:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&cs_data->reorg_restart_key[0], &gv_currkey->base[0], gv_currkey->end + 1);				\
data/fis-gtm-6.3-007/sr_port/mu_reorg.c:111:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&cs_data->reorg_restart_key[0], &gv_currkey->base[0], OLD_MAX_KEY_SZ + 1);				\
data/fis-gtm-6.3-007/sr_port/mu_reorg.c:262:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gv_currkey->base, cs_data->reorg_restart_key, tkeysize);
data/fis-gtm-6.3-007/sr_port/mu_reorg.c:272:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gv_currkey->base[0], gn->addr, gn->len);
data/fis-gtm-6.3-007/sr_port/mu_reorg.c:279:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gv_currkey->base[0], gn->addr, gn->len);
data/fis-gtm-6.3-007/sr_port/mu_reorg.c:284:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 	memcpy(&gv_currkey_next_reorg->base[0], &gv_currkey->base[0], gv_currkey->end + 1);
data/fis-gtm-6.3-007/sr_port/mu_reorg.c:485:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(&(gv_currkey_next_reorg->base[0]), rtsib_hist->h[0].buffaddr
data/fis-gtm-6.3-007/sr_port/mu_reorg.c:626:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&gv_currkey->base[0], &gv_currkey_next_reorg->base[0], gv_currkey_next_reorg->end + 1);
data/fis-gtm-6.3-007/sr_port/mu_reorg.c:633:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&gv_currkey->base[0], gn->addr, gn->len);
data/fis-gtm-6.3-007/sr_port/mu_reorg_upgrd_dwngrd.c:82:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/mu_reorg_upgrd_dwngrd.c:376:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(bml_lcl_buff, (blk_hdr_ptr_t)bml_sm_buff, BM_SIZE(BLKS_PER_LMAP));
data/fis-gtm-6.3-007/sr_port/mu_split.c:80:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	curr_prev_key[MAX_KEY_SZ+1], new_blk1_last_key[MAX_KEY_SZ+1];
data/fis-gtm-6.3-007/sr_port/mu_split.c:153:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(newblk2_first_key, &new_blk1_last_key[0], tkeycmpc); /* copy the compressed key piece */
data/fis-gtm-6.3-007/sr_port/mu_split.c:196:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bn_ptr1, old_blk1_base + new_leftblk_top_off - SIZEOF(block_id), SIZEOF(block_id));
data/fis-gtm-6.3-007/sr_port/mu_split.c:218:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_ins_key, &new_blk1_last_key[0], new_blk1_last_keysz);
data/fis-gtm-6.3-007/sr_port/mu_split.c:271:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ances_currkey, &curr_prev_key[0], old_ances_currkeycmpc);
data/fis-gtm-6.3-007/sr_port/mu_split.c:275:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ances_currkey + old_ances_currkeycmpc, key_base, old_ances_currkeylen);
data/fis-gtm-6.3-007/sr_port/mu_split.c:334:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(newblk2_first_key, &new_blk1_last_key[0], tkeycmpc); /* compressed piece */
data/fis-gtm-6.3-007/sr_port/mu_split.c:415:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bn_ptr1, old_blk1_base + old_blk1_hist_ptr->curr_rec.offset +
data/fis-gtm-6.3-007/sr_port/mu_split.c:479:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(save_blk_piece, old_blk_after_currec, save_blk_piece_len);
data/fis-gtm-6.3-007/sr_port/mu_split.c:484:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(bn_ptr2, new_blk1_top - SIZEOF(block_id), SIZEOF(block_id));
data/fis-gtm-6.3-007/sr_port/mu_split.c:511:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(bn_ptr2, new_blk2_top - SIZEOF(block_id), SIZEOF(block_id));
data/fis-gtm-6.3-007/sr_port/mu_split.c:525:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(save_blk_piece, new_blk2_rem, save_blk_piece_len);
data/fis-gtm-6.3-007/sr_port/mu_split.c:549:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(save_blk_piece, old_blk1_base + SIZEOF(blk_hdr), save_blk_piece_len);
data/fis-gtm-6.3-007/sr_port/mu_split.c:553:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(bn_ptr2, old_blk1_base + new_leftblk_top_off - SIZEOF(block_id), SIZEOF(block_id));
data/fis-gtm-6.3-007/sr_port/mu_split.c:581:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(save_blk_piece, new_blk2_rem, save_blk_piece_len);
data/fis-gtm-6.3-007/sr_port/mu_split.c:602:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(save_blk_piece, old_blk_after_currec, save_blk_piece_len);
data/fis-gtm-6.3-007/sr_port/mu_split.c:615:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_ins_key, &new_blk1_last_key[0], new_blk1_last_keysz);
data/fis-gtm-6.3-007/sr_port/mu_split.c:646:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&gv_currkey_next_reorg->base[0], next_gv_currkey, next_gv_currkeysz);
data/fis-gtm-6.3-007/sr_port/mu_swap_blk.c:264:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&((TREF(gv_reorgkey))->base[0]), rec_base + SIZEOF(rec_hdr), key_len_dir);
data/fis-gtm-6.3-007/sr_port/mu_swap_blk.c:306:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&((TREF(gv_reorgkey))->base[0]), rec_base + SIZEOF(rec_hdr), key_len);
data/fis-gtm-6.3-007/sr_port/mu_swap_blk.c:377:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(saved_blk, dest_parent_ptr, dest_parent_size);
data/fis-gtm-6.3-007/sr_port/mu_swap_blk.c:405:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(saved_blk, work_blk_ptr, work_blk_size);
data/fis-gtm-6.3-007/sr_port/mu_upgrd_header.c:87:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(csd->now_running, gtm_release_name, gtm_release_name_len + 1);	/* GT.M release name */
data/fis-gtm-6.3-007/sr_port/mu_upgrd_header.c:217:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(csd->jnl_file_name, v15_csd->jnl_file_name, JNL_NAME_SIZE);
data/fis-gtm-6.3-007/sr_port/mu_upgrd_header.c:224:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(csd->reorg_restart_key, v15_csd->reorg_restart_key, SIZEOF(csd->reorg_restart_key));	/* New from V4.2 */
data/fis-gtm-6.3-007/sr_port/mu_upgrd_header.c:225:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(csd->machine_name, v15_csd->machine_name, MAX_MCNAMELEN);
data/fis-gtm-6.3-007/sr_port/mubclnup.c:157:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			&& jnlpool->jnlpool_dummy_reg->open)
data/fis-gtm-6.3-007/sr_port/mucregini.c:276:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(baseDBreg->open);
data/fis-gtm-6.3-007/sr_port/muextr.h:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	gbl_name_buff[MAX_MIDENT_LEN + 2 + SPANREG_REGION_LITLEN + MAX_RN_LEN + 1];		\
data/fis-gtm-6.3-007/sr_port/muextr.h:39:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&gbl_name_buff[1], GNAME(GL_PTR).addr, GNAME(GL_PTR).len);				\
data/fis-gtm-6.3-007/sr_port/muextr.h:45:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gbl_name_buff[gbl_buff_index], gl_ptr->reg->rname, gl_ptr->reg->rname_len);	\
data/fis-gtm-6.3-007/sr_port/mupfndfil.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 	filename[MAX_FN_LEN];
data/fis-gtm-6.3-007/sr_port/mupfndfil.c:86:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(reg->dyn.addr->fname, retptr->addr, retptr->len + 1);
data/fis-gtm-6.3-007/sr_port/mupint.h:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				key[MAX_MIDENT_LEN + 1];	/* max key length plus one for printf terminator */
data/fis-gtm-6.3-007/sr_port/mupint.h:70:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char	span_node_buf[MAX_KEY_SZ];	/* Spanning node key */
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:233:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		since_buff[50];
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:236:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tempdir_trans_buffer[MAX_TRANS_NAME_LEN],
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:238:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*jnl_str_ptr, jnl_str[256], entry[256], prev_jnl_fn[JNL_NAME_SIZE];
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:254:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*errptr, scndry_msg[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:261:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char 		command[(STR_LIT_LEN(UNALIAS)) + (GTM_PATH_MAX) * 2 + 5];
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:262:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cp_cmd[MAX_FN_LEN] = "cp ";
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:275:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			time_str[CTIME_BEFORE_NL + 2];	/* for GET_CUR_TIME macro */
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:572:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tempnam_prefix, gv_cur_region->rname, gv_cur_region->rname_len);
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:582:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tempdir_trans_buffer, SCRATCH_DIR, tempdir_trans.len);
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:595:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(tempdir_trans_buffer, rptr->backup_file.addr, tempdir_trans.len);
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:681:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&rptr->backup_tempfile[0], tempdir_full.addr, tempdir_full.len);
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:779:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((char *)seg->fname, replpool_id.instfilename, full_len);
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:786:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				assert(!jnlpool->jnlpool_dummy_reg->open);
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1044:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cmdptr, cp_cmd, STRLEN(cp_cmd));
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1046:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cmdptr, seg->fname, seg->fname_len);
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1049:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cmdptr, mu_repl_inst_reg_list->backup_file.addr, mu_repl_inst_reg_list->backup_file.len);
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1180:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rptr->backup_hdr, cs_data, SIZEOF_FILE_HDR(cs_data));
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1189:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&sbufh_p->shadow_file_header, cs_data, SGMNT_HDR_LEN);
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1307:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(cs_data->jnl_file_name, jnl_info.jnl, jnl_info.jnl_len);
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1375:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&(sbufh_p->tempfilename[0]), &(rptr->backup_tempfile[0]),
data/fis-gtm-6.3-007/sr_port/mupip_create.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[MAX_RN_LEN + 1], create_stat, exit_stat;
data/fis-gtm-6.3-007/sr_port/mupip_downgrade.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		db_fn[MAX_FN_LEN + 1], ver_spec[MAX_VERSION_LEN + 1],
data/fis-gtm-6.3-007/sr_port/mupip_downgrade.c:101:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	new_master_map[MASTER_MAP_SIZE_V4];
data/fis-gtm-6.3-007/sr_port/mupip_downgrade.c:357:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(v15_csd.master_map, new_master_map, MASTER_MAP_SIZE_V4);
data/fis-gtm-6.3-007/sr_port/mupip_downgrade.c:390:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dwngrd_ver + dwngrd_ver_len, ver_spec, ver_spec_len);
data/fis-gtm-6.3-007/sr_port/mupip_extend.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		regionname[MAX_RN_LEN];
data/fis-gtm-6.3-007/sr_port/mupip_freeze.c:243:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (record && gv_cur_region->open)
data/fis-gtm-6.3-007/sr_port/mupip_freeze.c:284:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (FALSE == gv_cur_region->open)
data/fis-gtm-6.3-007/sr_port/mupip_integ.c:177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*temp, util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/mupip_integ.c:179:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		key_buff[2048];
data/fis-gtm-6.3-007/sr_port/mupip_integ.c:194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ss_filename[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_port/mupip_integ.c:543:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(gv_altkey->base, trees->key, gv_altkey->end);
data/fis-gtm-6.3-007/sr_port/mupip_integ.c:661:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(util_buff, "!/Free blocks counter in file header:  ", util_len);
data/fis-gtm-6.3-007/sr_port/mupip_integ.c:867:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy((TREF(dio_buff)).aligned, &mu_int_data, SGMNT_HDR_LEN);
data/fis-gtm-6.3-007/sr_port/mupip_recover.c:169:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			histdetail[HIST_LEN];
data/fis-gtm-6.3-007/sr_port/mupip_reorg.c:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cli_buff[MAX_LINE], *ptr;
data/fis-gtm-6.3-007/sr_port/mupip_reorg.c:261:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((TREF(gbuff_limit)).str.addr, REORG_GBUFF_LIMIT, SIZEOF(REORG_GBUFF_LIMIT));
data/fis-gtm-6.3-007/sr_port/mupip_set.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		db_fn[MAX_FN_LEN + 1], jnl_fn[JNL_NAME_SIZE + 1];
data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[JNL_NAME_SIZE], full_buf[GTM_PATH_MAX], prev_buf[JNL_NAME_SIZE];
data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		jnl_fn[JNL_NAME_SIZE];
data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:67:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)gv_cur_region->dyn.addr->fname, header->data_file_name, header->data_file_name_length);
data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:106:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(prev_buf, header->prev_jnl_file_name, prev_buf_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:110:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(prev_buf, "NULL", prev_buf_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header->prev_jnl_file_name, full_buf, full_buf_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:129:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(prev_buf, "NULL", prev_buf_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:133:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(prev_buf, header->prev_jnl_file_name, prev_buf_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:160:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(prev_buf, header->data_file_name, prev_buf_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_jnlfile_aux.c:161:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header->data_file_name, full_buf, full_buf_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:104:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		tmp_full_jnl_fn[MAX_FN_LEN + 1], prev_jnl_fn[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*db_reg_name, db_or_reg[DB_OR_REG_SIZE];
data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			s[JNLBUFFUPDAPNDX_SIZE];	/* JNLBUFFUPDAPNDX_SIZE is defined in jnl.h */
data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:197:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(seg->fname, db_fn, db_fn_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:321:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(csd, (TREF(dio_buff)).aligned, SGMNT_HDR_LEN);
data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:533:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(jnl_info.jnl, tmpjnlfile.addr, tmpjnlfile.len);
data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:727:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(prev_jnl_fn, csd->jnl_file_name, jnl_info.prev_jnl_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:791:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(csd->jnl_file_name, jnl_info.jnl, jnl_info.jnl_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_journal.c:833:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((TREF(dio_buff)).aligned, csd, SGMNT_HDR_LEN);
data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ext_name[MAX_FN_LEN], *ctop;
data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:58:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(jnl_info->jnl, jnl_info->fn, jnl_info->fn_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:69:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(ext_name, ctop + 1, ext_name_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:79:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(jnl_info->jnl, gds_info->nam->nam$l_esa, jnl_info->jnl_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:81:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ext_name, gds_info->nam->nam$l_esa + jnl_info->jnl_len + 1, ext_name_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:88:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(jnl_info->jnl + jnl_info->jnl_len, ext_name, ext_name_len);
data/fis-gtm-6.3-007/sr_port/mupip_set_journal_fname.c:95:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(jnl_info->jnl, csd->jnl_file_name, csd->jnl_file_len);
data/fis-gtm-6.3-007/sr_port/mupip_upgrade.c:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		db_fn[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/mupip_upgrade.c:99:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	new_v5_master_map[MASTER_MAP_SIZE_DFLT - MASTER_MAP_SIZE_V5_OLD];
data/fis-gtm-6.3-007/sr_port/mupip_upgrade.c:102:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	new_master_map[MASTER_MAP_SIZE_V4];
data/fis-gtm-6.3-007/sr_port/mupip_upgrade.c:304:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_master_map, v15_csd.master_map, MASTER_MAP_SIZE_V4);
data/fis-gtm-6.3-007/sr_port/mupipbckup.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				backup_tempfile[256];
data/fis-gtm-6.3-007/sr_port/muprec.h:78:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(murgbl.extr_buff + extract_len, jrt_label[rec->prefix.jrec_type], LAB_LEN);	\
data/fis-gtm-6.3-007/sr_port/muprec.h:80:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(murgbl.extr_buff + extract_len, LAB_TERM, LAB_TERM_SZ);				\
data/fis-gtm-6.3-007/sr_port/muprec.h:87:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (&murgbl.extr_buff[extract_len], T, actual);		\
data/fis-gtm-6.3-007/sr_port/muprec.h:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	time_str[CTIME_BEFORE_NL + 2];										\
data/fis-gtm-6.3-007/sr_port/muprec.h:260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		errstr[1024];									\
data/fis-gtm-6.3-007/sr_port/muprec.h:468:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char			jnl_fn[JNL_NAME_SIZE];	/* Journal file name */
data/fis-gtm-6.3-007/sr_port/muprec.h:716:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*extr_fn[TOT_EXTR_TYPES];
data/fis-gtm-6.3-007/sr_port/muprec.h:764:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fn[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/muprec.h:1126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			strbuff[256], *ptr;										\
data/fis-gtm-6.3-007/sr_port/muprec.h:1127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			time_str[CTIME_BEFORE_NL + 2];	/* for GET_CUR_TIME macro */					\
data/fis-gtm-6.3-007/sr_port/muprec.h:1149:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, time_str, CTIME_BEFORE_NL);										\
data/fis-gtm-6.3-007/sr_port/mur_apply_pblk.c:440:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmpbuf, pblkcontents, fbw_size);
data/fis-gtm-6.3-007/sr_port/mur_back_process.c:620:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			s[TRANS_OR_SEQ_NUM_CONT_CHK_FAILED_SZ];	/* for appending sequence or transaction number */
data/fis-gtm-6.3-007/sr_port/mur_close_files.c:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 			*head_jnl_fn, *rename_fn, fn[MAX_FN_LEN + STR_LIT_LEN(PREFIX_ROLLED_BAK) + 1];
data/fis-gtm-6.3-007/sr_port/mur_close_files.c:135:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		ipcs_buff[MAX_IPCS_ID_BUF], *ipcs_ptr;
data/fis-gtm-6.3-007/sr_port/mur_close_files.c:235:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (reg->open)
data/fis-gtm-6.3-007/sr_port/mur_close_files.c:460:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(head_jnl_fn, jctl->jnl_fn, head_jnl_fn_len);
data/fis-gtm-6.3-007/sr_port/mur_close_files.c:467:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(jctl->jnl_fn, csd->jnl_file_name, jctl->jnl_fn_len);
data/fis-gtm-6.3-007/sr_port/mur_close_files.c:498:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(jctl->jnl_fn, jctl->jfh->prev_jnl_file_name, jctl->jnl_fn_len);
data/fis-gtm-6.3-007/sr_port/mur_close_files.c:710:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(jnlpool->jnlpool_ctl->strm_seqno, inst_hdr->strm_seqno,
data/fis-gtm-6.3-007/sr_port/mur_close_files.c:787:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (reg->open)
data/fis-gtm-6.3-007/sr_port/mur_db_files_from_jnllist.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 			*cptr, *ctop, *cptr_last, db_fname[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_port/mur_db_files_from_jnllist.c:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(seg->fname, &db_fname[0], db_fname_len);
data/fis-gtm-6.3-007/sr_port/mur_db_files_from_jnllist.c:156:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(seg->fname, jfh->data_file_name, seg->fname_len);
data/fis-gtm-6.3-007/sr_port/mur_forward.c:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			errstr[256];
data/fis-gtm-6.3-007/sr_port/mur_forward.c:343:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				assert(!rctl->gd->open);
data/fis-gtm-6.3-007/sr_port/mur_forward.c:355:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			assert(!reg->open || (NULL != cs_addrs->dir_tree));
data/fis-gtm-6.3-007/sr_port/mur_forward_play_cur_jrec.c:283:48:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(!mur_options.update || (gv_cur_region->open && (NULL != rctl->csa)));
data/fis-gtm-6.3-007/sr_port/mur_forward_play_cur_jrec.c:288:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gv_currkey->base, &keystr->text[0], keystr->length);
data/fis-gtm-6.3-007/sr_port/mur_forward_play_cur_jrec.c:291:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (gv_cur_region->open)
data/fis-gtm-6.3-007/sr_port/mur_forward_play_cur_jrec.c:302:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				assert(gv_cur_region->open);
data/fis-gtm-6.3-007/sr_port/mur_forward_play_multireg_tp.c:150:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(tcom_record.jnl_tid, rec->jrec_tcom.jnl_tid, TID_STR_SIZE);
data/fis-gtm-6.3-007/sr_port/mur_gbldefs.c:45:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF	char	first_zerobit_position[256] =	{        /* 0x0 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xA 0xB 0xC 0xD 0xE 0xF */
data/fis-gtm-6.3-007/sr_port/mur_get_options.c:349:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(file_name_specified, entry, file_name_specified_len);
data/fis-gtm-6.3-007/sr_port/mur_get_options.c:372:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rl_ptr->org_name, file_name_expanded, rl_ptr->org_name_len);
data/fis-gtm-6.3-007/sr_port/mur_get_options.c:382:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(file_name_specified, entry_ptr, file_name_specified_len);
data/fis-gtm-6.3-007/sr_port/mur_get_options.c:405:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rl_ptr->new_name, file_name_expanded, rl_ptr->new_name_len);
data/fis-gtm-6.3-007/sr_port/mur_get_options.c:562:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sl_ptr->buff, entry_ptr, length);
data/fis-gtm-6.3-007/sr_port/mur_get_options.c:636:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sl_ptr->buff, entry_ptr, length);
data/fis-gtm-6.3-007/sr_port/mur_get_pini.c:129:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&plst->jpv,     &pinirec->process_vector[CURR_JPV], SIZEOF(jnl_process_vector));
data/fis-gtm-6.3-007/sr_port/mur_get_pini.c:130:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&plst->origjpv, &pinirec->process_vector[ORIG_JPV], SIZEOF(jnl_process_vector));
data/fis-gtm-6.3-007/sr_port/mur_init.c:43:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char	t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/mur_insert_prev.c:60:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_jctl->jnl_fn, jctl->jfh->prev_jnl_file_name, jctl->jfh->prev_jnl_file_name_length);
data/fis-gtm-6.3-007/sr_port/mur_jctl_from_next_gen.c:72:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(temp_jctl->jnl_fn, jctl->jfh->next_jnl_file_name, jctl->jfh->next_jnl_file_name_length);
data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:47:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF	char		*jrt_label[JRT_RECTYPES];
data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:89:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(murgbl.extr_buff + extract_len, "TSTART \\");
data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:93:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(murgbl.extr_buff + extract_len, "ZTSTART\\");
data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:138:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(murgbl.extr_buff, "                       ", 23);
data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:142:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(murgbl.extr_buff + extract_len, "       \\");
data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:143:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(murgbl.extr_buff + extract_len, jrt_label[rectype], LAB_LEN);
data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:145:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(murgbl.extr_buff + extract_len, LAB_TERM, LAB_TERM_SZ);
data/fis-gtm-6.3-007/sr_port/mur_jnl_ext.c:275:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char*)&pblk_head, (char*)&rec->jrec_pblk.blk_contents[0], SIZEOF(blk_hdr));
data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c:268:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*buff, extr_fn[MAX_FN_LEN + 1], *fn, *fn_out;
data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c:269:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			rename_fn[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			errstr[1024];
data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c:341:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(file_info->fn, mur_shm_hdr->extr_fn[recstat].fn, mur_shm_hdr->extr_fn_len[recstat]);
data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c:354:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(ptr, reg->rname, reg->rname_len);
data/fis-gtm-6.3-007/sr_port/mur_merge_sort_extfmt.c:483:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(fn_out, fn, extr_fn_len);
data/fis-gtm-6.3-007/sr_port/mur_open_files.c:272:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char			jnl_file_list[MAX_LINE];
data/fis-gtm-6.3-007/sr_port/mur_open_files.c:296:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */
data/fis-gtm-6.3-007/sr_port/mur_open_files.c:416:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(curr->gd->dyn.addr->fname, rl_ptr->new_name, curr->gd->dyn.addr->fname_len);
data/fis-gtm-6.3-007/sr_port/mur_open_files.c:529:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			assert(rctl->gd->open); /* region should have been opened by now */
data/fis-gtm-6.3-007/sr_port/mur_open_files.c:884:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(jctl->jnl_fn, csd->jnl_file_name, csd->jnl_file_len);
data/fis-gtm-6.3-007/sr_port/mur_output_record.c:318:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tcom_record.jnl_tid, rec->jrec_tcom.jnl_tid, TID_STR_SIZE);
data/fis-gtm-6.3-007/sr_port/mur_output_show.c:44:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF	char		*jrt_label[JRT_RECTYPES];
data/fis-gtm-6.3-007/sr_port/mur_output_show.c:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	jpv_time_str[LENGTH_OF_TIME + 1];
data/fis-gtm-6.3-007/sr_port/mur_output_show.c:118:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		time_str[LENGTH_OF_TIME + 1];
data/fis-gtm-6.3-007/sr_port/mur_output_show.c:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		outbuf[GTMCRYPT_HASH_HEX_LEN + 1];
data/fis-gtm-6.3-007/sr_port/mur_process_intrpt_recov.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				prev_jnl_fn[MAX_FN_LEN + 1], rename_fn[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/mur_process_intrpt_recov.c:276:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(jctl->jnl_fn, rename_fn, rename_fn_len + 1);
data/fis-gtm-6.3-007/sr_port/mur_process_intrpt_recov.c:308:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(jfh->next_jnl_file_name, jctl->next_gen->jnl_fn, jctl->next_gen->jnl_fn_len);
data/fis-gtm-6.3-007/sr_port/mur_process_intrpt_recov.c:365:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(jnl_info.prev_jnl, rctl->jctl_turn_around->jnl_fn, rctl->jctl_turn_around->jnl_fn_len);
data/fis-gtm-6.3-007/sr_port/mur_process_intrpt_recov.c:368:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(jnl_info.jnl, rctl->csd->jnl_file_name, jnl_info.jnl_len);
data/fis-gtm-6.3-007/sr_port/mur_process_seqno_table.c:42:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF char		first_zerobit_position[256];
data/fis-gtm-6.3-007/sr_port/mur_process_timequal.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				time_str1[LENGTH_OF_TIME + 1], time_str2[LENGTH_OF_TIME + 1];
data/fis-gtm-6.3-007/sr_port/mur_read_file.c:338:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(mur_desc->seq_buff[1].top, mur_desc->seq_buff[0].base, partial_reclen);
data/fis-gtm-6.3-007/sr_port/mur_read_file.c:531:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(mur_desc->seq_buff[0].base - partial_reclen, (char *)prefix, partial_reclen);
data/fis-gtm-6.3-007/sr_port/mur_read_file.c:941:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		jrecbuf[PINI_RECLEN + EPOCH_RECLEN + PFIN_RECLEN + EOF_RECLEN];
data/fis-gtm-6.3-007/sr_port/mur_select_rec.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			key_buff[MAX_KEY_SZ + 1 + SIZEOF(uint4) * 2], asc_key_buff[MAX_ZWR_KEY_SZ], *ptr;
data/fis-gtm-6.3-007/sr_port/mur_select_rec.c:82:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key->base, &keystr->text[0], keystr->length);
data/fis-gtm-6.3-007/sr_port/mur_write_header_extfmt.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		errstr[1024];
data/fis-gtm-6.3-007/sr_port/mur_write_header_extfmt.c:72:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&murgbl.extr_buff[extrlen], ptr, tmplen);
data/fis-gtm-6.3-007/sr_port/mur_write_header_extfmt.c:83:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&murgbl.extr_buff[extrlen], ptr, tmplen);
data/fis-gtm-6.3-007/sr_port/mur_write_header_extfmt.c:94:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&murgbl.extr_buff[extrlen], ptr, tmplen);
data/fis-gtm-6.3-007/sr_port/murest.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		label[INC_HDR_LABEL_SZ];
data/fis-gtm-6.3-007/sr_port/murest.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		date[INC_HDR_DATE_SZ];
data/fis-gtm-6.3-007/sr_port/murest.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		reg[MAX_RN_LEN];
data/fis-gtm-6.3-007/sr_port/murest.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            encryption_hash[GTMCRYPT_RESERVED_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/murest.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		encryption_hash2[GTMCRYPT_RESERVED_HASH_LEN];
data/fis-gtm-6.3-007/sr_port/mutex_deadlock_check.c:101:81:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(!jnlpool || !jnlpool->jnlpool_dummy_reg || jnlpool->jnlpool_dummy_reg->open
data/fis-gtm-6.3-007/sr_port/mutex_deadlock_check.c:130:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (!tr->reg->open)
data/fis-gtm-6.3-007/sr_port/mval2fao.c:75:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(buf, (fao)->str.addr, (fao)->str.len);
data/fis-gtm-6.3-007/sr_port/mval2fao.c:97:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(buf, (fao)->str.addr, (fao)->str.len);
data/fis-gtm-6.3-007/sr_port/mval2subsc.c:29:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static readonly unsigned char pos_code[100] =
data/fis-gtm-6.3-007/sr_port/mval2subsc.c:43:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static readonly unsigned char neg_code[100] =
data/fis-gtm-6.3-007/sr_port/mval2subsc.c:60:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buf1[MAX_KEY_SZ + 1], ch, *cvt_table, *in_ptr, *out_ptr;
data/fis-gtm-6.3-007/sr_port/mval2subsc.c:61:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*tm, temp_mantissa[NUM_DEC_DG_2L / 2 + 3];	/* Need 1 byte for each two digits.  Add 3 bytes slop */
data/fis-gtm-6.3-007/sr_port/mval_nongraphic.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[10];	/* sufficient to hold all possible UTF8 code point values */
data/fis-gtm-6.3-007/sr_port/mvalconv.c:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    buf[BUFF_LEN];	/* [possible] sign, [up to] 19L/20UL digits, and terminator. */
data/fis-gtm-6.3-007/sr_port/mvalconv.c:214:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stringpool.free, buf, len);
data/fis-gtm-6.3-007/sr_port/mvalconv.c:261:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    buf[BUFF_LEN];	/* The maximum-length value in the 'F' representation would look like -0.123457 (that is,
data/fis-gtm-6.3-007/sr_port/mvalconv.c:280:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    buf[BUFF_LEN];		/* The maximum-length value in the 'F' representation would look like -0.123456789012345
data/fis-gtm-6.3-007/sr_port/n2s.c:28:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	lcl_buf[MAX_DIGITS_IN_INT];
data/fis-gtm-6.3-007/sr_port/n2s.c:76:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cp, cp1, n0);
data/fis-gtm-6.3-007/sr_port/namelook.c:25:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		temp[NAME_ENTRY_SZ], x;
data/fis-gtm-6.3-007/sr_port/nametabtyp.h:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAME_ENTRY_SZ];
data/fis-gtm-6.3-007/sr_port/one_job_param.c:42:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const static readonly unsigned char job_param_index[27] =
data/fis-gtm-6.3-007/sr_port/one_job_param.c:51:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const static readonly unsigned char job_param_index[27] =
data/fis-gtm-6.3-007/sr_port/one_job_param.c:133:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(*parptr, (TREF(window_mval)).str.addr, len);
data/fis-gtm-6.3-007/sr_port/op_bindparm.c:134:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(vname.c, tabent->key.var_name.addr, tabent->key.var_name.len);
data/fis-gtm-6.3-007/sr_port/op_break.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[MAX_ENTRYREF_LEN];
data/fis-gtm-6.3-007/sr_port/op_break.c:66:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(line, line_start, MIN(line_length, SIZEOF(line)));
data/fis-gtm-6.3-007/sr_port/op_cat.c:74:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cp, in->str.addr, in->str.len);
data/fis-gtm-6.3-007/sr_port/op_close.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_TRANS_NAME_LEN];  /* buffer to hold translated name */
data/fis-gtm-6.3-007/sr_port/op_exp.c:49:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(u1_p, u, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_fnfnumber.c:146:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cp, ch, 3);
data/fis-gtm-6.3-007/sr_port/op_fnfnumber.c:151:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cp, ch, xx);
data/fis-gtm-6.3-007/sr_port/op_fnfnumber.c:156:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cp, ch, ct);
data/fis-gtm-6.3-007/sr_port/op_fnincr.c:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port/op_fnj2.c:51:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cp + n, src->str.addr, src->str.len);
data/fis-gtm-6.3-007/sr_port/op_fnj2.c:78:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cp + n, src->str.addr, src->str.len);
data/fis-gtm-6.3-007/sr_port/op_fnlvname.c:67:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, min->key.var_name.addr, n);
data/fis-gtm-6.3-007/sr_port/op_fnlvprvname.c:64:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, max->key.var_name.addr, n);
data/fis-gtm-6.3-007/sr_port/op_fnname.c:65:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, arg->str.addr, arg->str.len);		\
data/fis-gtm-6.3-007/sr_port/op_fnname.c:235:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, arg->str.addr, arg->str.len);
data/fis-gtm-6.3-007/sr_port/op_fnquery.c:279:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stringpool.free, varname->str.addr, varname->str.len);
data/fis-gtm-6.3-007/sr_port/op_fnquery.c:346:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(stringpool.free, v2->str.addr, v2->str.len);
data/fis-gtm-6.3-007/sr_port/op_fnstack2.c:62:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 	unsigned char	info_upper[SIZEOF("MCODE")];
data/fis-gtm-6.3-007/sr_port/op_fntext.c:130:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(cp, &ret->str.addr[i], ret->str.len - i);
data/fis-gtm-6.3-007/sr_port/op_fnview.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		instfilename[MAX_FN_LEN + 1 + 1];	/* 1 for possible flag character */
data/fis-gtm-6.3-007/sr_port/op_fnview.c:140:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/op_fnview.c:223:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!parmblk.gv_ptr->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:225:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			assert(parmblk.gv_ptr->open);
data/fis-gtm-6.3-007/sr_port/op_fnview.c:278:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!parmblk.gv_ptr->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:316:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (!parmblk.gv_ptr->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:330:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (!parmblk.gv_ptr->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:390:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!reg->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:407:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!reg->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:452:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!reg->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:541:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!parmblk.gv_ptr->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:551:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!parmblk.gv_ptr->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:563:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!parmblk.gv_ptr->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:573:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!parmblk.gv_ptr->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:725:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!parmblk.gv_ptr->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:734:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!parmblk.gv_ptr->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:743:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!parmblk.gv_ptr->open)
data/fis-gtm-6.3-007/sr_port/op_fnview.c:797:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!(n = parmblk.gv_ptr->open))
data/fis-gtm-6.3-007/sr_port/op_fnzahandle.c:54:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_fnzatransform.c:90:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_KEY_SZ + 1], msrcbuff[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/op_fnzatransform.c:159:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(msrcbuff, src->str.addr, src->str.len);
data/fis-gtm-6.3-007/sr_port/op_fnzbitcoun.c:22:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char mask[8] = {128, 64, 32, 16, 8, 4, 2, 1};
data/fis-gtm-6.3-007/sr_port/op_fnzbitfind.c:21:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const unsigned char mask[8] = {0x80,0x40,0x20,0x10,0x8,0x4,0x2,0x1};
data/fis-gtm-6.3-007/sr_port/op_fnzbitor.c:75:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(byte_n, short1 ? byte2_n : byte1_n, n - n0);
data/fis-gtm-6.3-007/sr_port/op_fnzbitset.c:21:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char	mask[8] = {1,128,64,32,16,8,4,2};
data/fis-gtm-6.3-007/sr_port/op_fnzbitset.c:45:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dist_byte, byte_1, bitstr->str.len);
data/fis-gtm-6.3-007/sr_port/op_fnzbitstr.c:24:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const unsigned char mask[8]={0xFF,0xFE,0xFC,0xF8,0xF0,0xE0,0xC0,0x80};
data/fis-gtm-6.3-007/sr_port/op_fnzbitxor.c:18:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char mask[8]={0xFF,0xFE,0xFC,0xF8,0xF0,0xE0,0xC0,0x80};
data/fis-gtm-6.3-007/sr_port/op_fnzcollate.c:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buff[MAX_ZWR_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf1[MAX_TRANS_NAME_LEN];	/* buffer to hold translated name */
data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:282:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			dst->str.addr = (char *)zsocket_howcreated_names[socketptr->howcreated];
data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:439:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			dst->str.addr = (char *)zsocket_state_names[socketptr->state];
data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:486:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(buf1, TLSOPTIONLIT, len2);
data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:487:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(&buf1[len2], &charptr[optionoffset], optionlen);
data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:526:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(charptr, ONE_COMMA, len);
data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:538:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(charptr, tls_sock->tlsid, len);
data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:548:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(charptr, conn_info.protocol, len2);
data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:553:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(charptr, conn_info.session_algo, len2);
data/fis-gtm-6.3-007/sr_port/op_fnzsocket.c:583:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(charptr, conn_info.session_id, len2);
data/fis-gtm-6.3-007/sr_port/op_fnztrigger.c:97:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF unsigned char ztrprm_index[27] =
data/fis-gtm-6.3-007/sr_port/op_fnztrigger.c:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				filename[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/op_fnztrigger.c:265:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, (failed ? &literal_zero : &literal_one), SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_getindx.c:42:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buff[512], *end;
data/fis-gtm-6.3-007/sr_port/op_gvextnam.c:118:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(extnam_str.addr, tmp_mstr_ptr->addr, tmp_mstr_ptr->len);
data/fis-gtm-6.3-007/sr_port/op_gvincr.c:41:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port/op_gvkill.c:92:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (gv_cur_region->open)
data/fis-gtm-6.3-007/sr_port/op_gvname.c:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		varstr[MAX_MIDENT_LEN + 1];
data/fis-gtm-6.3-007/sr_port/op_gvname.c:111:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(varstr, val->str.addr, gvname.var_name.len);
data/fis-gtm-6.3-007/sr_port/op_gvorder.c:173:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (!gv_cur_region->open)
data/fis-gtm-6.3-007/sr_port/op_gvorder.c:265:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&gv_currkey->base[0], map->gvkey.addr, gv_currkey->end);
data/fis-gtm-6.3-007/sr_port/op_gvorder.c:282:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy (stringpool.free, gvname.var_name.addr, gvname.var_name.len);
data/fis-gtm-6.3-007/sr_port/op_gvput.c:46:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port/op_gvput.c:92:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (gv_cur_region->open && !gv_cur_region->read_only
data/fis-gtm-6.3-007/sr_port/op_gvquery.c:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buff[MAX_ZWR_KEY_SZ], *end, *glob_begin;
data/fis-gtm-6.3-007/sr_port/op_gvquery.c:142:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(extnamdst, glob_begin, size);
data/fis-gtm-6.3-007/sr_port/op_gvqueryget.c:62:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gv_currkey, save_key, SIZEOF(*save_key) + save_key->end);
data/fis-gtm-6.3-007/sr_port/op_gvrectarg.c:93:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gvsavtarg, c, GVSAVTARG_FIXED_SIZE);
data/fis-gtm-6.3-007/sr_port/op_gvrectarg.c:141:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gv_currkey->base, c, end);
data/fis-gtm-6.3-007/sr_port/op_gvsavtarg.c:106:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(c, gv_currkey->base, end);
data/fis-gtm-6.3-007/sr_port/op_gvzwithdraw.c:85:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (gv_cur_region->open)
data/fis-gtm-6.3-007/sr_port/op_indname.c:37:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out, target->str.addr, target->str.len);
data/fis-gtm-6.3-007/sr_port/op_indname.c:52:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out, subs->str.addr, subs->str.len);
data/fis-gtm-6.3-007/sr_port/op_indtext.c:76:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stringpool.free, lab->str.addr, lab->str.len);
data/fis-gtm-6.3-007/sr_port/op_indtext.c:82:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stringpool.free, rtn->str.addr, rtn->str.len);
data/fis-gtm-6.3-007/sr_port/op_merge.c:103:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char  		buff[MAX_ZWR_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/op_merge.c:164:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mergekey2->base, gv_currkey->base, gv_currkey->end + 1);
data/fis-gtm-6.3-007/sr_port/op_merge.c:260:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(gblp2->s_gv_currkey->base + org_glvn2_keysz - 2,
data/fis-gtm-6.3-007/sr_port/op_merge.c:309:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(gv_currkey->base + org_glvn1_keysz - 2,
data/fis-gtm-6.3-007/sr_port/op_merge.c:417:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(gv_currkey->base + org_glvn2_keysz - 2, mkey->str.addr + org_glvn2_keysz - 2, delta2 + 2);
data/fis-gtm-6.3-007/sr_port/op_merge_arg.c:75:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port/op_newvar.c:191:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(vname.c, tabent->key.var_name.addr, tabent->key.var_name.len);
data/fis-gtm-6.3-007/sr_port/op_open.c:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf1[MAX_TRANS_NAME_LEN];	/* buffer to hold translated name */
data/fis-gtm-6.3-007/sr_port/op_rdone.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*start_ptr,temp_buf[TMP_BUF_LEN];
data/fis-gtm-6.3-007/sr_port/op_rfrshlvn.c:47:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buff[512], *end;
data/fis-gtm-6.3-007/sr_port/op_rhdaddr.c:32:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)&BUFFER, (NEWMVAL)->str.addr, (NEWMVAL)->str.len);	\
data/fis-gtm-6.3-007/sr_port/op_setalsin2alsct.c:59:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dstlv->v, &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_setzbrk.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*cp, zbloc_buff[MAX_ENTRYREF_LEN], *zbloc_end;
data/fis-gtm-6.3-007/sr_port/op_setzextract.c:88:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(straddr, pfx, pfxlen);
data/fis-gtm-6.3-007/sr_port/op_setzextract.c:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(straddr, expr->str.addr, expr->str.len);
data/fis-gtm-6.3-007/sr_port/op_setzextract.c:103:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(straddr, pfx + sfxoff, sfxlen);
data/fis-gtm-6.3-007/sr_port/op_setzp1.c:232:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str_addr, src->str.addr, pfx_str_len);
data/fis-gtm-6.3-007/sr_port/op_setzp1.c:241:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str_addr, expr->str.addr, expr->str.len);
data/fis-gtm-6.3-007/sr_port/op_setzp1.c:247:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str_addr, start_pfx + sfx_start_offset, sfx_str_len);
data/fis-gtm-6.3-007/sr_port/op_setzp1.c:277:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&cfnpc->pstart[0], &pfnpc->pstart[0], (cfnpc->npcs + 1) * SIZEOF(unsigned int));
data/fis-gtm-6.3-007/sr_port/op_setzpiece.c:133:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str_addr, src->str.addr, first_src_ind);
data/fis-gtm-6.3-007/sr_port/op_setzpiece.c:139:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str_addr, del->str.addr, del->str.len);
data/fis-gtm-6.3-007/sr_port/op_setzpiece.c:143:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(str_addr, expr->str.addr, expr->str.len);
data/fis-gtm-6.3-007/sr_port/op_setzpiece.c:150:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str_addr, tmp_str, len);
data/fis-gtm-6.3-007/sr_port/op_svget.c:187:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(stringpool.free, (char *)tl->dollar_io, tl->len);
data/fis-gtm-6.3-007/sr_port/op_svget.c:190:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(stringpool.free, dollar_zpin.addr, dollar_zpin.len);
data/fis-gtm-6.3-007/sr_port/op_svget.c:205:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(stringpool.free, (char *)tl->dollar_io, tl->len);
data/fis-gtm-6.3-007/sr_port/op_svget.c:208:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(stringpool.free, dollar_zpout.addr, dollar_zpout.len);
data/fis-gtm-6.3-007/sr_port/op_svget.c:496:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(v, &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_svget.c:513:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(v, (NULL != dollar_ztdata) ? dollar_ztdata : &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_svget.c:522:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(v, &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_svget.c:524:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(v, dollar_ztdelim, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_svget.c:535:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(v, (NULL != dollar_ztoldval) ? dollar_ztoldval : &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_svget.c:544:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(v, (NULL != dollar_ztriggerop) ? dollar_ztriggerop : &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_svget.c:554:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(v, ((NULL != dollar_ztupdate && (MV_STR & dollar_ztupdate->mvtype)) ? dollar_ztupdate
data/fis-gtm-6.3-007/sr_port/op_svget.c:566:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(v, (NULL != dollar_ztvalue) ? dollar_ztvalue : &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_svget.c:578:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(v, mvp, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_svget.c:580:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(v, &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_svget.c:592:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(v, mvp, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_svput.c:129:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((TREF(dollar_zcompile)).addr, v->str.addr, v->str.len);
data/fis-gtm-6.3-007/sr_port/op_svput.c:178:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((TREF(dollar_zroutines)).addr, v->str.addr, v->str.len);
data/fis-gtm-6.3-007/sr_port/op_svput.c:252:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((TREF(gtmprompt)).addr, v->str.addr, (TREF(gtmprompt)).len);
data/fis-gtm-6.3-007/sr_port/op_svput.c:375:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dollar_ztvalue, v, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_svput.c:403:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)&dollar_ztslate, v, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_tcommit.c:92:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/op_tcommit.c:187:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port/op_trestart.c:31:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char	t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/op_trollback.c:125:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!curreg->open)
data/fis-gtm-6.3-007/sr_port/op_tstart.c:79:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		*msp, *stacktop, *stackwarn, *tpstackbase, *tpstacktop, *tp_sp, t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/op_tstart.c:145:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		tp_bat[TP_BATCH_LEN];
data/fis-gtm-6.3-007/sr_port/op_tstart.c:183:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (r_local->open && !r_local->was_open && IS_REG_BG_OR_MM(r_local))
data/fis-gtm-6.3-007/sr_port/op_tstart.c:213:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		GTMTRIG_ONLY(memcpy(&dollar_ztslate, &literal_null, SIZEOF(mval)));	/* Zap $ZTSLate at start of lvl 1 trans */
data/fis-gtm-6.3-007/sr_port/op_tstart.c:295:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tcom_record.jnl_tid, (char *)tid->str.addr, tid->str.len);
data/fis-gtm-6.3-007/sr_port/op_tstart.c:388:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&mv_st_ent->mv_st_cont.mvs_tp_holder.ztwormhole_save, &dollar_ztwormhole, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/op_tstart.c:450:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ptr, extnam_str.addr, len);
data/fis-gtm-6.3-007/sr_port/op_use.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf1[MAX_TRANS_NAME_LEN];  /* buffer to hold translated name */
data/fis-gtm-6.3-007/sr_port/op_view.c:165:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*chptr, label_type[SIZEOF("lower") - 1];
data/fis-gtm-6.3-007/sr_port/op_view.c:388:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					if (!reg->open)
data/fis-gtm-6.3-007/sr_port/op_view.c:454:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(TREF(view_ydirt_str), parmblk.value->str.addr, TREF(view_ydirt_str_len));
data/fis-gtm-6.3-007/sr_port/op_view.c:834:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(lvmon_var_p->lvmv.var_name.addr, arg->str.addr, arg->str.len);
data/fis-gtm-6.3-007/sr_port/op_view.c:917:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);			/* taken care of by view_arg_convert */
data/fis-gtm-6.3-007/sr_port/op_wtone.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	temp_ch[1];
data/fis-gtm-6.3-007/sr_port/op_wttab.c:19:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF unsigned char spaces_block[TAB_BUF_SZ] =
data/fis-gtm-6.3-007/sr_port/op_wttab.c:30:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF unsigned char ebcdic_spaces_block[TAB_BUF_SZ] =
data/fis-gtm-6.3-007/sr_port/op_zcompile.c:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ceprep_file[MAX_FN_LEN + 1],
data/fis-gtm-6.3-007/sr_port/op_zgoto.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		rtnname_buff[SIZEOF(mident_fixed)], lblname_buff[SIZEOF(mident_fixed)];
data/fis-gtm-6.3-007/sr_port/op_zgoto.c:85:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rtnname_buff, rtnname.str.addr, rtnname.str.len);
data/fis-gtm-6.3-007/sr_port/op_zgoto.c:87:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lblname_buff, lblname.str.addr, lblname.str.len);
data/fis-gtm-6.3-007/sr_port/op_zgoto.c:104:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rtnname_buff, rtnhdr->routine_name.addr, rtnhdr->routine_name.len);
data/fis-gtm-6.3-007/sr_port/op_zprevious.c:182:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (!gv_cur_region->open)
data/fis-gtm-6.3-007/sr_port/op_zprevious.c:254:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(gv_currkey->base, prev_map->gvkey.addr, gv_currkey->end);
data/fis-gtm-6.3-007/sr_port/op_zprevious.c:271:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stringpool.free, gvname.var_name.addr, gvname.var_name.len);
data/fis-gtm-6.3-007/sr_port/op_zsystem.c:87:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cmd_buf, v->str.addr, v->str.len);
data/fis-gtm-6.3-007/sr_port/op_zsystem.c:119:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cmd_buf, filtered_command.address, filtered_command.length);
data/fis-gtm-6.3-007/sr_port/parm_pool.c:223:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pool_ptr->parms, (TREF(parm_pool_ptr))->parms, SIZEOF(lv_val *) * slots_copied * LV_VALS_PER_SLOT);
data/fis-gtm-6.3-007/sr_port/parse_trctbl_groups.c:21:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF char *gtm_trcgrp_names[LAST_TRACE_GROUP + 1] =
data/fis-gtm-6.3-007/sr_port/patcode.h:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name[2]; /* must be last entity in structure */
data/fis-gtm-6.3-007/sr_port/patcode.h:187:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_PATTERN_LENGTH - 2];
data/fis-gtm-6.3-007/sr_port/patcode.h:269:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 	BUF[CHAR_CLASSES];									\
data/fis-gtm-6.3-007/sr_port/patstr.c:30:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF	char		ctypetab[NUM_CHARS];
data/fis-gtm-6.3-007/sr_port/patstr.c:688:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(strlit.buff, &cur_alt->altpat.buff[PAT_MASK_BEGIN_OFFSET
data/fis-gtm-6.3-007/sr_port/pattab.c:102:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static	unsigned char	ident[MAXPATNAM + 1];
data/fis-gtm-6.3-007/sr_port/pattab.c:106:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static	char		patline[MAXPATNAM + 2];
data/fis-gtm-6.3-007/sr_port/pattab.c:172:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[MAX_TRANS_NAME_LEN];
data/fis-gtm-6.3-007/sr_port/pattab.c:206:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	newtabnam[MAXPATNAM + 1], newYZnam[PAT_YZMAXNUM][PAT_YZMAXLEN];
data/fis-gtm-6.3-007/sr_port/pattab.c:233:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(newtabnam, ident, newnamlen + 1);
data/fis-gtm-6.3-007/sr_port/pattab.c:276:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(newYZnam[newYZnum], ident, idlen);
data/fis-gtm-6.3-007/sr_port/pattab.c:348:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(newpat->name, newtabnam, newnamlen + 1);
data/fis-gtm-6.3-007/sr_port/pattab.c:350:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(newpat->typemask, newtable, max_patents * SIZEOF(typemask[0]));
data/fis-gtm-6.3-007/sr_port/pattab.c:352:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(newpat->patYZnam, newYZnam, SIZEOF(newYZnam));
data/fis-gtm-6.3-007/sr_port/pattab.c:354:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(newpat->patYZlen, newYZlen, SIZEOF(newYZlen));
data/fis-gtm-6.3-007/sr_port/pattab.c:384:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name_copy, file_name, name_len);
data/fis-gtm-6.3-007/sr_port/pattab.c:486:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ptnam[MAXPATNAM + 1];
data/fis-gtm-6.3-007/sr_port/pattab.c:492:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ptnam, table_name->addr, table_name->len);
data/fis-gtm-6.3-007/sr_port/preemptive_db_clnup.c:102:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (reg->open && !reg->was_open)
data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*filename_begin, append_char[MAX_CHARS_APPEND] = {'0', '1', '2', '3', '4', '5', '6', '7', '8', '9'};
data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:70:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(rename_fn, org_fn, length);
data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:75:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rename_fn + length, prefix, prefix_len);
data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:76:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rename_fn + length + prefix_len, org_fn, org_fn_len);
data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:84:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rename_fn, org_fn, org_fn_len);
data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:85:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rename_fn + org_fn_len, suffix, suffix_len);
data/fis-gtm-6.3-007/sr_port/prepare_unique_name.c:105:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rename_fn, org_fn, org_fn_len); /* Copy original file name to "rename_fn" */
data/fis-gtm-6.3-007/sr_port/print_exit_stats.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				pmap_buf[64];
data/fis-gtm-6.3-007/sr_port/print_exit_stats.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				systembuff[MAX_FN_LEN];
data/fis-gtm-6.3-007/sr_port/print_exit_stats.c:85:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cmdptr, pmap_buf, STRLEN(pmap_buf));
data/fis-gtm-6.3-007/sr_port/print_target.c:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ + SIZEOF("?.0")];
data/fis-gtm-6.3-007/sr_port/process_deferred_stale.c:70:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (r_cur->open)
data/fis-gtm-6.3-007/sr_port/process_gvt_pending_list.c:99:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				assert(!reg->open);
data/fis-gtm-6.3-007/sr_port/push_stck.c:38:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(msp + mvs_size[MVST_STCK], val, val_size);
data/fis-gtm-6.3-007/sr_port/put_cdlt.c:34:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(str->addr, x->addr, x->len);
data/fis-gtm-6.3-007/sr_port/put_str.c:27:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stringpool.free, pt, n);
data/fis-gtm-6.3-007/sr_port/read_db_files_from_gld.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 			filename[MAX_FN_LEN];
data/fis-gtm-6.3-007/sr_port/read_db_files_from_gld.c:71:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(seg->fname, filename, retptr->len + 1);
data/fis-gtm-6.3-007/sr_port/region_freeze.c:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			time_str[CTIME_BEFORE_NL + 2];       /* for GET_CUR_TIME macro */
data/fis-gtm-6.3-007/sr_port/region_init.c:47:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (gv_cur_region->open)
data/fis-gtm-6.3-007/sr_port/region_init.c:57:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (gv_cur_region->open)
data/fis-gtm-6.3-007/sr_port/region_init.c:78:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (baseDBreg->open)
data/fis-gtm-6.3-007/sr_port/region_init.c:87:43:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (baseDBnl->statsdb_created && !reg->open)
data/fis-gtm-6.3-007/sr_port/region_init.c:91:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				assert(reg->open);
data/fis-gtm-6.3-007/sr_port/repl_comm.c:94:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			dl_err[MAX_ERRSTR_LEN];
data/fis-gtm-6.3-007/sr_port/repl_comm.c:129:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(TRACE_BUFF, IO_BUFF + IO_SIZE - MAX_TRACE_SIZE, MAX_TRACE_SIZE);			\
data/fis-gtm-6.3-007/sr_port/repl_comm.c:136:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(TRACE_BUFF + TRACE_BUFF_POS, IO_BUFF, space_to_end);			\
data/fis-gtm-6.3-007/sr_port/repl_comm.c:137:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(TRACE_BUFF, IO_BUFF + space_to_end, IO_SIZE - space_to_end);		\
data/fis-gtm-6.3-007/sr_port/repl_comm.c:139:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(TRACE_BUFF + TRACE_BUFF_POS, IO_BUFF, IO_SIZE);				\
data/fis-gtm-6.3-007/sr_port/repl_comm.c:483:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*errptr, local_ip[SA_MAXLEN], remote_ip[SA_MAXLEN];
data/fis-gtm-6.3-007/sr_port/repl_comm.c:484:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			port_buffer[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_port/repl_comm.c:485:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			local_port_buffer[NI_MAXSERV], remote_port_buffer[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_port/repl_comm.c:498:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(local_port_buffer, "*UNKNOWN*");
data/fis-gtm-6.3-007/sr_port/repl_comm.c:499:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(local_ip, "*UNKNOWN*");
data/fis-gtm-6.3-007/sr_port/repl_comm.c:506:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(local_port_buffer, "*UNKNOWN*");
data/fis-gtm-6.3-007/sr_port/repl_comm.c:507:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(local_ip, "*UNKNOWN*");
data/fis-gtm-6.3-007/sr_port/repl_comm.c:516:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(remote_port_buffer, "*UNKNOWN*");
data/fis-gtm-6.3-007/sr_port/repl_comm.c:517:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(remote_ip, "*UNKNOWN*");
data/fis-gtm-6.3-007/sr_port/repl_comm.c:524:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(remote_port_buffer, "*UNKNOWN*");
data/fis-gtm-6.3-007/sr_port/repl_comm.c:525:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(remote_ip, "*UNKNOWN*");
data/fis-gtm-6.3-007/sr_port/repl_ctl.h:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			jnl_fn[JNL_NAME_SIZE];
data/fis-gtm-6.3-007/sr_port/repl_filter.c:199:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cb, jb, tail_minus_suffix_len);									\
data/fis-gtm-6.3-007/sr_port/repl_filter.c:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp_jnl_tid[TID_STR_SIZE];								\
data/fis-gtm-6.3-007/sr_port/repl_filter.c:212:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp_jnl_tid, jb, SIZEOF(((struct_jrec_tcom *)NULL)->jnl_tid));					\
data/fis-gtm-6.3-007/sr_port/repl_filter.c:231:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cb, tmp_jnl_tid, SIZEOF(((struct_jrec_tcom *)NULL)->jnl_tid));					\
data/fis-gtm-6.3-007/sr_port/repl_filter.c:264:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cb, jb, tail_minus_suffix_len);									\
data/fis-gtm-6.3-007/sr_port/repl_filter.c:294:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cb, jb, SIZEOF(((struct_jrec_tcom *)NULL)->jnl_tid));						\
data/fis-gtm-6.3-007/sr_port/repl_filter.c:503:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		cmd[4096], *delim_p, *strtokptr;
data/fis-gtm-6.3-007/sr_port/repl_filter.c:721:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(line, srv_line_start, l_len);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:879:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(recv_extract_buff, extr_rec, firstrec_len); /* note: includes terminating null */
data/fis-gtm-6.3-007/sr_port/repl_filter.c:912:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tmp, recv_extract_buff, extr_len);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:917:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(recv_extract_buff + extr_len, extr_rec, extr_reclen);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:977:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*tr, (char *)&null_jnlrec, NULL_RECLEN);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:1331:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cb, jb, t_len);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:1433:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cb, jb, t_len);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:1643:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, V19_UPDATE_NUM_OFFSET);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:1647:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb + V19_UPDATE_NUM_OFFSET + 8, jb + V19_UPDATE_NUM_OFFSET,
data/fis-gtm-6.3-007/sr_port/repl_filter.c:1673:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, V19_TCOM_FILLER_SHORT_OFFSET);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:1677:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb + V19_TCOM_FILLER_SHORT_OFFSET + 8, jb + V19_TCOM_FILLER_SHORT_OFFSET,
data/fis-gtm-6.3-007/sr_port/repl_filter.c:1684:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, conv_reclen);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:1686:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, V19_NULL_FILLER_OFFSET);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:1690:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb + V19_NULL_FILLER_OFFSET + 8, jb + V19_NULL_FILLER_OFFSET,
data/fis-gtm-6.3-007/sr_port/repl_filter.c:1816:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cb, jb, t_len);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:1858:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb + t_len, jb + t_len + 8, conv_reclen - t_len);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:1883:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb + t_len, jb + t_len + 8, conv_reclen - t_len);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:1890:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb + t_len, jb + t_len + 8, conv_reclen - t_len);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2039:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, V19_UPDATE_NUM_OFFSET);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2043:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb + V19_UPDATE_NUM_OFFSET + 8, jb + V19_UPDATE_NUM_OFFSET,
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2070:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, V19_TCOM_FILLER_SHORT_OFFSET);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2074:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb + V19_TCOM_FILLER_SHORT_OFFSET + 8, jb + V19_TCOM_FILLER_SHORT_OFFSET,
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2081:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, conv_reclen);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2083:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, V19_NULL_FILLER_OFFSET);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2087:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb + V19_NULL_FILLER_OFFSET + 8, jb + V19_NULL_FILLER_OFFSET,
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2200:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cb, jb, t_len);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2247:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb + t_len, jb + t_len + 8, conv_reclen - t_len);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2272:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb + t_len, jb + t_len + 8, conv_reclen - t_len);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2279:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb + t_len, jb + t_len + 8, conv_reclen - t_len);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2424:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, conv_reclen);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2448:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, conv_reclen);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2454:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, conv_reclen);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2598:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, conv_reclen);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2622:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, conv_reclen);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2628:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, conv_reclen);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2767:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, conv_reclen);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2791:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, conv_reclen);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:2797:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cb, jb, conv_reclen);
data/fis-gtm-6.3-007/sr_port/repl_phase2_salvage.c:91:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(jnldata_base + write, &null_rec, rlen);
data/fis-gtm-6.3-007/sr_port/repl_phase2_salvage.c:94:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(jnldata_base + write, jnlrecptr, dstlen);
data/fis-gtm-6.3-007/sr_port/repl_phase2_salvage.c:95:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(jnldata_base, jnlrecptr + dstlen, rlen - dstlen);
data/fis-gtm-6.3-007/sr_port/repl_sort_tr_buff.c:164:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(private_tr_buff, tr_buff, tr_bufflen);
data/fis-gtm-6.3-007/sr_port/repl_sort_tr_buff.c:230:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst_addr, working_record_addr, copy_len);
data/fis-gtm-6.3-007/sr_port/resolve_optimize.c:74:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(source_line->addr, routine_name.addr, source_line->len);
data/fis-gtm-6.3-007/sr_port/resolve_optimize.c:130:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(source_line->addr, routine_name.addr, source_line->len);
data/fis-gtm-6.3-007/sr_port/resolve_optimize.c:140:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(source_line->addr, cur_line->str.addr, cur_line->str.len);
data/fis-gtm-6.3-007/sr_port/resolve_optimize.c:150:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp_mval.str.addr, source_line->addr, tmp_mval.str.len);
data/fis-gtm-6.3-007/sr_port/restrict.c:78:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char				gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_port/restrict.c:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		rfpath[GTM_PATH_MAX], rcfpath[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_port/restrict.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		logger_info[MAX_LOGGER_INFO_LEN + 1];
data/fis-gtm-6.3-007/sr_port/restrict.c:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		linebuf[MAX_READ_SZ + 1], *lbp, facility[MAX_FACILITY_LEN + 1], group_or_flname[MAX_GROUP_LEN + 1];
data/fis-gtm-6.3-007/sr_port/restrict.c:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		errstr[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/rtn_src_chksum.c:83:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&hdr->checksum_128[0], &ctx->digest[0], MD5_DIGEST_LENGTH);
data/fis-gtm-6.3-007/sr_port/rtn_src_chksum.c:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_ROUTINE_CHECKSUM_DIGITS];
data/fis-gtm-6.3-007/sr_port/rtn_src_chksum.c:190:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out, (unsigned char *)buf, len);
data/fis-gtm-6.3-007/sr_port/rtn_src_chksum.h:35:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	digest[MD5_DIGEST_LENGTH];
data/fis-gtm-6.3-007/sr_port/rtnlaboff2entryref.c:24:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, lab->addr, lab->len);
data/fis-gtm-6.3-007/sr_port/rtnlaboff2entryref.c:32:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, rtn->addr, rtn->len);
data/fis-gtm-6.3-007/sr_port/s2pool.c:29:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stringpool.free,a->addr,al);
data/fis-gtm-6.3-007/sr_port/s2pool_align.c:34:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stringpool.free, string->addr, length);
data/fis-gtm-6.3-007/sr_port/s2pool_concat.c:34:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, a->addr, alen);
data/fis-gtm-6.3-007/sr_port/s2pool_concat.c:39:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, dstaddr, dstlen);
data/fis-gtm-6.3-007/sr_port/s2pool_concat.c:40:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free + dstlen, a->addr, alen);
data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.c:262:65:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	} else if ((NULL != save_gv_cur_region) && save_gv_cur_region->open && (NULL != cs_addrs))
data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.c:277:47:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		repl_csa = ((NULL != repl_reg) && repl_reg->open) ? REG2CSA(repl_reg) : NULL;
data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.c:324:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (!reg->open || reg->was_open)
data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.c:546:72:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if ((NULL != (repl_reg = jnlpool->jnlpool_dummy_reg)) && repl_reg->open)	/* assignment */
data/fis-gtm-6.3-007/sr_port/secshr_db_clnup.c:564:60:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if ((NULL != save_gv_cur_region) && save_gv_cur_region->open && IS_REG_BG_OR_MM(save_gv_cur_region))
data/fis-gtm-6.3-007/sr_port/secshr_finish_CMT08_to_CMT14.c:194:50:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					repl_csa = ((NULL != repl_reg) && repl_reg->open) ? REG2CSA(repl_reg) : NULL;
data/fis-gtm-6.3-007/sr_port/secshr_finish_CMT08_to_CMT14.c:549:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(csa->region->open);
data/fis-gtm-6.3-007/sr_port/secshr_rel_crit.c:54:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);
data/fis-gtm-6.3-007/sr_port/secshr_rel_crit.c:57:45:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (is_repl_reg && ((NULL == reg) || !reg->open))
data/fis-gtm-6.3-007/sr_port/secshr_send_DBCLNUPINFO_msg.c:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	secshr_string[SECSHR_STRINGSIZE];
data/fis-gtm-6.3-007/sr_port/secshr_send_DBCLNUPINFO_msg.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	secshr_string_delta[SECSHR_STR_DELTASIZE];
data/fis-gtm-6.3-007/sr_port/secshr_send_DBCLNUPINFO_msg.c:42:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(secshr_string, " : ");
data/fis-gtm-6.3-007/sr_port/set_jnl_info.c:70:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(jnl_info->jnl, csd->jnl_file_name, jnl_info->jnl_len);
data/fis-gtm-6.3-007/sr_port/setzdir.c:25:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	directory_buffer[GTM_MAX_DIR_LEN];
data/fis-gtm-6.3-007/sr_port/setzdir.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		directory[GTM_MAX_DIR_LEN], *getcwd_res, *err_str;
data/fis-gtm-6.3-007/sr_port/setzdir.c:45:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(directory, newdir->str.addr, newdir->str.len);
data/fis-gtm-6.3-007/sr_port/sgnl_gvnulsubsc.c:32:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port/sgnl_gvreplerr.c:26:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port/sgnl_gvundef.c:26:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port/shmpool.h:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_8byte[8];	/* Main queue fields */
data/fis-gtm-6.3-007/sr_port/shmpool.h:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            	tempfilename[256];	/* Name of temporary file we are using (backup only) */
data/fis-gtm-6.3-007/sr_port/show_source_line.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		source_line_buff[MAX_SRCLINE + SIZEOF(ARROW)];
data/fis-gtm-6.3-007/sr_port/show_source_line.c:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(b, ARROW, STR_LIT_LEN(ARROW));
data/fis-gtm-6.3-007/sr_port/skan_offset.c:33:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char		patch_comp_key[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/skan_offset.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/skan_offset.c:63:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(util_buff, "Error: offset greater than blk size of ", 39);
data/fis-gtm-6.3-007/sr_port/skan_offset.c:106:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size);
data/fis-gtm-6.3-007/sr_port/skan_rnum.c:33:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char		patch_comp_key[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_port/skan_rnum.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		util_buff[MAX_UTIL_LEN];
data/fis-gtm-6.3-007/sr_port/skan_rnum.c:95:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&patch_comp_key[cc], rp + SIZEOF(rec_hdr), size);
data/fis-gtm-6.3-007/sr_port/skan_rnum.c:101:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(util_buff, "Error: last record in blk is ", 29);
data/fis-gtm-6.3-007/sr_port/stp_expand_array.c:31:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((uchar_ptr_t)stp_array, (uchar_ptr_t)a, n * SIZEOF(mstr *));
data/fis-gtm-6.3-007/sr_port/stp_gcol_src.h:293:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, begaddr, blklen);							\
data/fis-gtm-6.3-007/sr_port/stp_init.c:25:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*na_page[2];
data/fis-gtm-6.3-007/sr_port/str2gvkey_nogvfunc.c:46:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key->base, op_gvargs.args[0]->str.addr, key->end);
data/fis-gtm-6.3-007/sr_port/stringpool.h:103:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stringpool.free, (KEYSTART), keylen);				\
data/fis-gtm-6.3-007/sr_port/strpiecediff.c:101:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static	char	pcdiff_buff[PIECEDIFF_START_BUFSIZ], *pcdiff_start = &pcdiff_buff[0], *pcdiff_top = ARRAYTOP(pcdiff_buff);
data/fis-gtm-6.3-007/sr_port/strpiecediff.c:182:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tmpbuff, pcdiff_start, bufflen);
data/fis-gtm-6.3-007/sr_port/stx_error.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		msgbuf[MAX_SRCLINE];
data/fis-gtm-6.3-007/sr_port/stx_error.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_SRCLINE + LISTTAB + SIZEOF(ARROW)];
data/fis-gtm-6.3-007/sr_port/symb_line.c:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	temp[OFFSET_LEN], *adjusted_in_addr;
data/fis-gtm-6.3-007/sr_port/symb_line.c:79:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out, max_label->lab_name.addr, len);
data/fis-gtm-6.3-007/sr_port/symb_line.c:115:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy (out, &temp[ct], len);
data/fis-gtm-6.3-007/sr_port/symb_line.c:124:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out, routine->routine_name.addr, len);
data/fis-gtm-6.3-007/sr_port/t_commit_cleanup.c:238:97:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (update_jnlpool && update_jnlpool->jnlpool_dummy_reg && update_jnlpool->jnlpool_dummy_reg->open)
data/fis-gtm-6.3-007/sr_port/t_commit_cleanup.c:298:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					assert(tr->reg->open);
data/fis-gtm-6.3-007/sr_port/t_end.c:91:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/t_end.c:210:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		cw_depth, cw_bmp_depth, buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:351:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(db_addr[0], cs->new_buff, ((blk_hdr_ptr_t)cs->new_buff)->bsiz);
data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:369:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(db_addr[0], cs->new_buff, ((blk_hdr_ptr_t)cs->new_buff)->bsiz);
data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:730:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(GDS_REL2ABS(cr_new->buffaddr), GDS_REL2ABS(cr->buffaddr),
data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:1086:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(blk_ptr, cs->new_buff, ((blk_hdr_ptr_t)cs->new_buff)->bsiz);
data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:1113:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(blk_ptr, cs->new_buff, ((blk_hdr_ptr_t)cs->new_buff)->bsiz);
data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:1229:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(reg->open); /* there is no reason we know of why a region should be closed at this point */
data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:1230:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!reg->open)    /* in pro, be safe though and don't touch an already closed region */
data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:1311:64:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	check_csaddrs = (NULL == save_region || FALSE == save_region->open) ? NULL : &FILE_INFO(save_region)->s_addrs;
data/fis-gtm-6.3-007/sr_port/t_end_sysops.c:1314:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(reg->open);
data/fis-gtm-6.3-007/sr_port/t_retry.c:85:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		cw_set_depth, cw_map_depth, t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/t_retry.c:101:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF	unsigned char		t_fail_hist_dbg[T_FAIL_HIST_DBG_SIZE];
data/fis-gtm-6.3-007/sr_port/t_retry.c:126:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		*end, buff[MAX_ZWR_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/t_write.c:149:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cse, old_cse, SIZEOF(cw_set_element));
data/fis-gtm-6.3-007/sr_port/targ_alloc.c:63:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gvt->gvname.var_name.addr, gvent->var_name.addr, gvent->var_name.len);
data/fis-gtm-6.3-007/sr_port/targ_alloc.c:84:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	csa = ((NULL != reg) && reg->open) ? &FILE_INFO(reg)->s_addrs : NULL;
data/fis-gtm-6.3-007/sr_port/targ_alloc.c:113:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gvt->gvname.var_name.addr, gvent->var_name.addr, gvent->var_name.len);
data/fis-gtm-6.3-007/sr_port/targ_alloc.c:146:50:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert((NULL != gvent) || (NULL == reg) || reg->open || (IS_MUPIP_IMAGE && !mupip_jnl_recover));
data/fis-gtm-6.3-007/sr_port/tcp_open.c:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			temp_addr[SA_MAXLEN + 1], addr[SA_MAXLEN + 1];
data/fis-gtm-6.3-007/sr_port/tcp_open.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ipname[SA_MAXLEN];
data/fis-gtm-6.3-007/sr_port/tcp_open.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			port_buffer[NI_MAXSERV], *brack_pos;
data/fis-gtm-6.3-007/sr_port/tcp_open.c:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char                    msg_buffer[1024];
data/fis-gtm-6.3-007/sr_port/tcp_open.c:112:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(addr, &host[1], addr_len);
data/fis-gtm-6.3-007/sr_port/tcp_open.c:126:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(addr, &host[0], addr_len);
data/fis-gtm-6.3-007/sr_port/tp.h:203:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (tr->reg->open)							\
data/fis-gtm-6.3-007/sr_port/tp.h:663:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	DBGTRIGR_ONLY(char	gvnamestr[MAX_MIDENT_LEN + 1];)									\
data/fis-gtm-6.3-007/sr_port/tp.h:731:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			DBGTRIGR_ONLY(memcpy(gvnamestr, gvnh->gvname.var_name.addr, gvnh->gvname.var_name.len);)		\
data/fis-gtm-6.3-007/sr_port/tp.h:851:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(tr->reg->open);						\
data/fis-gtm-6.3-007/sr_port/tp.h:852:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!tr->reg->open)						\
data/fis-gtm-6.3-007/sr_port/tp.h:911:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&SAVE_KEY[0], gv_currkey, SIZEOF(gv_key) + gv_currkey->end);			\
data/fis-gtm-6.3-007/sr_port/tp.h:919:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gv_currkey, &SAVE_KEY[0], SIZEOF(gv_key) + SAVE_KEY[0].end);			\
data/fis-gtm-6.3-007/sr_port/tp_clean_up.c:210:55:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					assert((NULL == si->kip_csa) || (!gv_cur_region->open || gv_cur_region->was_open));
data/fis-gtm-6.3-007/sr_port/tp_frame.h:36:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&restore_ent->key, (mnamekey), SIZEOF(mname_entry));				\
data/fis-gtm-6.3-007/sr_port/tp_hist.c:369:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(si->last_tp_hist, t1, SIZEOF(srch_blk_status));
data/fis-gtm-6.3-007/sr_port/tp_hist.c:503:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((uchar_ptr_t)new_first_tp_hist, (uchar_ptr_t)si->first_tp_hist,
data/fis-gtm-6.3-007/sr_port/tp_incr_commit.c:119:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(low_cse, cse, SIZEOF(cw_set_element));
data/fis-gtm-6.3-007/sr_port/tp_restart.c:82:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		*msp, *stackbase, *stacktop, t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/tp_restart.c:144:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		*end, buff[MAX_ZWR_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/tp_restart.c:202:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (reg->open)
data/fis-gtm-6.3-007/sr_port/tp_restart.c:377:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					if (reg->open)
data/fis-gtm-6.3-007/sr_port/tp_restart.c:395:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
							if (reg->open)
data/fis-gtm-6.3-007/sr_port/tp_restart.c:403:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
									&& jnlpool->jnlpool_dummy_reg->open)
data/fis-gtm-6.3-007/sr_port/tp_restart.c:557:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					if (!reg->open)
data/fis-gtm-6.3-007/sr_port/tp_restart.c:560:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
						assert(reg->open);
data/fis-gtm-6.3-007/sr_port/tp_restart.c:681:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(extnam_str.addr, (TREF(gv_tporig_extnam_str)).addr, len);
data/fis-gtm-6.3-007/sr_port/tp_restart.c:772:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dollar_ztwormhole, &mvc->mv_st_cont.mvs_tp_holder.ztwormhole_save, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/tp_restart.c:774:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&dollar_ztslate, &literal_null, SIZEOF(mval));	/* Zap $ZTSLate at (re)start of lvl 1 transaction */
data/fis-gtm-6.3-007/sr_port/tp_tend.c:98:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/tp_tend.c:279:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			upd_num_seen[256];
data/fis-gtm-6.3-007/sr_port/tp_tend.c:2063:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cp1, pKey->base + bh->prev_rec.match, target_key_size - bh->prev_rec.match);
data/fis-gtm-6.3-007/sr_port/tp_tend.c:2068:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(va, value.addr, value.len);
data/fis-gtm-6.3-007/sr_port/tp_timeout.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		asccurtime[10];							\
data/fis-gtm-6.3-007/sr_port/trans_numeric.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_TRANS_NAME_LEN], *endptr;
data/fis-gtm-6.3-007/sr_port/trap_env_init.c:45:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static readonly unsigned char init_break[1] = {'B'};
data/fis-gtm-6.3-007/sr_port/trap_env_init.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_SRCLINE + 1], *buf_ptr = &buf[0];
data/fis-gtm-6.3-007/sr_port/trap_env_init.c:66:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((TREF(dollar_etrap)).str.addr, trans.addr, trans.len);
data/fis-gtm-6.3-007/sr_port/trap_env_init.c:86:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((TREF(gtm_trigger_etrap)).str.addr, trans.addr, trans.len);
data/fis-gtm-6.3-007/sr_port/trap_env_init.c:101:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((TREF(dollar_zstep)).str.addr, trans.addr, trans.len);
data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:271:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vname.c, hte->key.var_name.addr, hte->key.var_name.len);
data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:293:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(vname.c, hte->key.var_name.addr, hte->key.var_name.len);
data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:335:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vname.c, hte->key.var_name.addr, hte->key.var_name.len);
data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:351:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(*(mv_st_ent->mv_st_cont.mvs_stck.mvs_stck_addr), (char*)mv_st_ent + mvs_size[MVST_STCK],
data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:450:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&dollar_ecode, &mv_st_ent->mv_st_cont.mvs_zintr.dollar_ecode_save, SIZEOF(dollar_ecode));
data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:451:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&dollar_stack, &mv_st_ent->mv_st_cont.mvs_zintr.dollar_stack_save, SIZEOF(dollar_stack));
data/fis-gtm-6.3-007/sr_port/unw_mv_ent.c:458:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(extnam_str.addr, mv_st_ent->mv_st_cont.mvs_trigr.savextref.addr, extnam_str.len);
data/fis-gtm-6.3-007/sr_port/unw_retarg.c:133:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&ret_value, &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char           		gv_mname[MAX_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			lcl_key[MAX_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:170:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char 		buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:255:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (reg->open)
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:330:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(lcl_key, keystr->text, key_len);
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:339:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(gv_currkey->base, lcl_key, key_len);
data/fis-gtm-6.3-007/sr_port/updhelper_writer.c:119:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			assert(reg->open); /* we called region_init() in the initialization code */
data/fis-gtm-6.3-007/sr_port/updhelper_writer.c:123:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (reg->open && !reg->read_only)
data/fis-gtm-6.3-007/sr_port/updproc.c:119:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_port/updproc.c:140:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF	char			*jrt_label[JRT_RECTYPES];
data/fis-gtm-6.3-007/sr_port/updproc.c:265:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		seq_num_str[32], *seq_num_ptr;
data/fis-gtm-6.3-007/sr_port/updproc.c:266:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		seq_num_strx[32], *seq_num_ptrx;
data/fis-gtm-6.3-007/sr_port/updproc.c:540:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			fn[MAX_FN_LEN];
data/fis-gtm-6.3-007/sr_port/updproc.c:549:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		*endBuff, fmtBuff[MAX_ZWR_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/updproc.c:557:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	           	gv_mname[MAX_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/updproc.c:558:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buff[MAX_ZWR_KEY_SZ], *end, scan_char, next_char;
data/fis-gtm-6.3-007/sr_port/updproc.c:581:98:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert((NULL != jnlpool) && (NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open);
data/fis-gtm-6.3-007/sr_port/updproc.c:778:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(histinfo.root_primary_instname, input_old_triple->instname, MAX_INSTNAME_LEN - 1);
data/fis-gtm-6.3-007/sr_port/updproc.c:1052:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(tcom_record.jnl_tid, rec->jrec_tcom.jnl_tid, TID_STR_SIZE);
data/fis-gtm-6.3-007/sr_port/updproc.c:1092:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(gv_currkey->base, keystr->text, keystr->length);
data/fis-gtm-6.3-007/sr_port/updproc.c:1307:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(gv_failed_key, gv_currkey, SIZEOF(gv_key) + gv_currkey->end);
data/fis-gtm-6.3-007/sr_port/updproc.c:1315:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if ((NULL != save_reg) && save_reg->open)
data/fis-gtm-6.3-007/sr_port/urx.h:20:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		name[1];
data/fis-gtm-6.3-007/sr_port/urx.h:28:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		name[1];
data/fis-gtm-6.3-007/sr_port/urx_putlab.c:62:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tmplp->name[0], lab, lablen);
data/fis-gtm-6.3-007/sr_port/urx_putrtn.c:56:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tmp->name[0], rtn, rtnlen);
data/fis-gtm-6.3-007/sr_port/util.h:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		text[OPER_LOG_SIZE];
data/fis-gtm-6.3-007/sr_port/util_base_ch.c:62:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	msginfo[4];
data/fis-gtm-6.3-007/sr_port/util_base_ch.c:63:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	msg_buff[MAX_MSG_SIZE + 1];
data/fis-gtm-6.3-007/sr_port/util_base_ch.c:79:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (r_local->open && !r_local->was_open)
data/fis-gtm-6.3-007/sr_port/v010_jnl.h:111:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buff[1];		/* Actually buff[size] */
data/fis-gtm-6.3-007/sr_port/v010_jnl.h:141:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		filler_char[2];
data/fis-gtm-6.3-007/sr_port/v010_jnl.h:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			filler1[2];		/* prior 3 fields are maintained by AST - preserve memory coherency */
data/fis-gtm-6.3-007/sr_port/v010_jnl.h:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			label[SIZEOF(JNL_LABEL_TEXT) - 1];
data/fis-gtm-6.3-007/sr_port/v010_jnl.h:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			data_file_name[255];
data/fis-gtm-6.3-007/sr_port/v010_jnl.h:233:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			text[1];		/* Actually text[length] */
data/fis-gtm-6.3-007/sr_port/v010_jnl.h:283:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			blk_contents[1];	/* Actually blk_contents[bsiz] */
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:22:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		sname[MAX_SN_LEN];
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:24:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		fname[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		defext[4];
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:50:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		rname[MAX_RN_LEN];
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:55:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	bool			open;
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:71:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		filler[1];
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:73:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		jnl_file_name[JNL_NAME_SIZE];
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:122:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	label[GDS_LABEL_SZ];
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:217:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	jnl_file_name[JNL_NAME_SIZE];	/* journal file name */
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:252:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		now_running[MAX_REL_NAME];	 /* for active version stamp */
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:264:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		common_filler[584 - SIZEOF(v15_bg_trc_rec) * v15_n_bg_trc_rec_variable_types
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:270:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	reorg_restart_key[256];         /* 1st key of a leaf block where reorg was done last time */
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_ino_t[8];	/* this filler is not needed for those platforms that have the
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:318:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler3[932];
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:322:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_3k_64[60];	/* get to 64 byte aligned */
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:323:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler1_wc_var_lock[16];	/* moved to node_local */
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:324:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_3k_128[48];	/* 3k + 128 - cache line on HPPA */
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:325:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler2_db_latch[16];	/* moved to node_local */
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:326:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_3k_192[48];	/* 3k + 192 - cache line on HPPA */
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:327:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char            filler_4096[832];	/* Fill out so map sits on 8K boundary */
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:328:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_unique_id[32];
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:329:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char            machine_name[MAX_MCNAMELEN];
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:337:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 	char		filler_rep[176];	/* Leave room for non-replication fields */
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:356:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_5104[452];
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:364:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_7k[1024];		/* Fill out so map sits on 8K boundary */
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:365:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_8k[1024];	/* Fill out so map sits on 8K boundary */
data/fis-gtm-6.3-007/sr_port/v15_gdsfhead.h:366:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   master_map[MASTER_MAP_SIZE_V4];	/* This map must be aligned on a block size boundary */
data/fis-gtm-6.3-007/sr_port/valid_mname.h:15:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF char 		ctypetab[NUM_CHARS];
data/fis-gtm-6.3-007/sr_port/view.h:17:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char keyword[16];
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:70:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char 		*c, *c_top, *dst, *dst_top, global_names[MAX_PARMS], *nextsrc, *src, *src_top, stashed, y;
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:132:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
						if (!r_ptr->open)
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:188:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
								if (!r_ptr->open)
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:245:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&parmblk->ident.c[0], parm->str.addr,
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:292:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(global_names, tmpstr.addr, tmpstr.len);
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:310:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(&lcl_buff.c[0], namestr.addr, namestr.len);
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:314:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(&lcl_buff.c[0], src, nextsrc - src - 1);
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:321:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(&lcl_buff.c[0], src, (n = nextsrc - src - 1));
data/fis-gtm-6.3-007/sr_port/view_jnlfile.c:51:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, jnl_name_addr, dst->str.len);
data/fis-gtm-6.3-007/sr_port/view_routines.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_ROUTINE_CHECKSUM_DIGITS];
data/fis-gtm-6.3-007/sr_port/viewkeys.c:42:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		cmpbuf[VT_KWSIZE];
data/fis-gtm-6.3-007/sr_port/wbox_test_init.c:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	trans_bufr[MAX_TRANS_NAME_LEN];
data/fis-gtm-6.3-007/sr_port/wcs_recover.c:805:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		*end, buff[MAX_ZWR_KEY_SZ];
data/fis-gtm-6.3-007/sr_port/zbreak.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler[SIZEOF(char *) - SIZEOF(zb_code)];
data/fis-gtm-6.3-007/sr_port/zco_init.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf1[MAX_TRANS_NAME_LEN]; /* buffer to hold translated name */
data/fis-gtm-6.3-007/sr_port/zco_init.c:52:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((TREF(dollar_zcompile)).addr, buf1, tn.len);
data/fis-gtm-6.3-007/sr_port/zdate_form_init.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_TRANS_NAME_LEN];
data/fis-gtm-6.3-007/sr_port/zlcompile.c:37:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(source_file_name, addr, len);
data/fis-gtm-6.3-007/sr_port/zlput_rname.c:90:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(new, rtn_names, (char *)mid - (char *)rtn_names);
data/fis-gtm-6.3-007/sr_port/zlput_rname.c:261:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(copy_rhead->labtab_adr, old_rhead->labtab_adr, sect_rw_nonrel_size);
data/fis-gtm-6.3-007/sr_port/zr_add_zbreak.c:39:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)zrecs->beg, (char *)temp.beg, (temp.free - temp.beg) * SIZEOF(zbrk_struct));
data/fis-gtm-6.3-007/sr_port/zro_init.c:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf1[MAX_NUMBER_FILENAMES]; /* buffer to hold translated name */
data/fis-gtm-6.3-007/sr_port/zro_init.c:55:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((TREF(dollar_zroutines)).addr, buf1, tn.len);
data/fis-gtm-6.3-007/sr_port/zshow_gvstats.c:46:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	valstr[MAX_DIGITS_IN_INT8];
data/fis-gtm-6.3-007/sr_port/zshow_gvstats.c:97:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!reg->open || reg->was_open || IS_STATSDB_REG(reg))
data/fis-gtm-6.3-007/sr_port/zshow_gvstats.c:119:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (!reg->open || IS_STATSDB_REG(reg))
data/fis-gtm-6.3-007/sr_port/zshow_locks.c:32:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	valstr[MAX_DIGITS_IN_INT8];
data/fis-gtm-6.3-007/sr_port/zshow_output.c:167:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(out->ptr, strbase, outlen);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:176:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(out->ptr, str->addr + str_processed, len);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:295:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(out->ptr, strbase, len);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:312:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(mv->str.addr, &out->buff[0], mv->str.len);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:319:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(out->ptr, str->addr + str_processed, len);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:337:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(mv->str.addr, &out->buff[0], mv->str.len);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:431:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(out->ptr, strbase, len);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:459:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(mv->str.addr, &out->buff[0], mv->str.len);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:474:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(out->ptr, str->addr + str_processed, len);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:503:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(mv->str.addr, &out->buff[0], mv->str.len);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:525:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(out->ptr, str->addr, len);
data/fis-gtm-6.3-007/sr_port/zshow_stack.c:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ENTRYREF_LEN + MAX_ROUTINE_CHECKSUM_DIGITS + SIZEOF(INDR_OVERFLOW)];
data/fis-gtm-6.3-007/sr_port/zshow_svn.c:232:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, (char *)tl->dollar_io, tl->len);					\
data/fis-gtm-6.3-007/sr_port/zshow_svn.c:236:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, DOLLARZ.addr, DOLLARZ.len);						\
data/fis-gtm-6.3-007/sr_port/zshow_svn.c:252:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		zdir_error[ZDIR_ERR_LEN];
data/fis-gtm-6.3-007/sr_port/zshow_svn.c:502:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(zdir_error, zdir.str.addr, zdir.str.len);
data/fis-gtm-6.3-007/sr_port/zshow_svn.c:503:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&zdir_error[zdir.str.len], arrow_text, STR_LIT_LEN(arrow_text));
data/fis-gtm-6.3-007/sr_port/zshow_svn.c:757:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&var, &literal_zero, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/zshow_svn.c:769:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&var, &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/zshow_svn.c:800:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&var, &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/zshow_svn.c:812:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&var, &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/zshow_svn.c:834:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&var, &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/zshow_svn.c:854:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&var, &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/zshow_svn.c:866:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&var, &literal_null, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_port/zshow_zbreaks.c:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		entryrefbuff[MAX_ENTRYREF_LEN];
data/fis-gtm-6.3-007/sr_port/zwr2format.c:32:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dstptr[des->len], cpstart, (cp) - cpstart);	\
data/fis-gtm-6.3-007/sr_port/zyerror_init.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[1024];
data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c:62:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(proto.msg + CM_CPU_OFFSET, encode_cpu(), 3);
data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c:63:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(proto.msg + CM_OS_OFFSET, encode_os(), 3);
data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c:64:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(proto.msg + CM_IMPLEMENTATION_OFFSET, "GTM", 3);
data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c:71:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(proto.msg + CM_TYPE_OFFSET, CMM_PROTOCOL_TYPE, 3);
data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c:75:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(proto.msg + CM_LEVEL_OFFSET, &cm_ver_name[1], 3);
data/fis-gtm-6.3-007/sr_port_cm/gtcm_protocol.c:84:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pro->msg, proto.msg, S_PROTSIZE);
data/fis-gtm-6.3-007/sr_port_cm/gtcml_lklist.c:65:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&new_entry->value[0], ptr, len);
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_bufflush.c:44:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_bufflush.c:66:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gv_currkey->base[cc], ptr, len);
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_get.c:66:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, v.str.addr, temp_short);
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_increment.c:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_increment.c:114:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, post_incr.str.addr, temp_short);
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_initproc.c:73:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((unsigned char *)originator_prc_vec, reply + S_HDRSIZE + S_PROTSIZE, jpv_size);
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_initproc.c:78:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(reply, &myproto, S_PROTSIZE);
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_initproc.c:87:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(reply, S_PROTOCOL, S_PROTSIZE);
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_initreg.c:38:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_clearreq.c:70:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(creq.node, node->addr, node->len);
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_showrep.c:79:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uchar_ptr_t)lke_ctl, pctl.ctl, ls_len);
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_showreq.c:61:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sreq.node, node->addr, node->len);
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_order.c:176:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr + SIZEOF(unsigned short) + SIZEOF(unsigned short) + SIZEOF(unsigned short), gv_altkey->base,
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_put.c:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_query.c:133:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, gv_altkey->base, key_len - SIZEOF(unsigned short) - SIZEOF(unsigned short) - SIZEOF(unsigned short));
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_query.c:140:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ptr, val.str.addr, tmp_len);
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_zprevious.c:169:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr + SIZEOF(unsigned short) + SIZEOF(unsigned short) + SIZEOF(unsigned short), gv_altkey->base,
data/fis-gtm-6.3-007/sr_port_cm/gvcmx_increment.c:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c:62:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[256], lbuff[MAX_HOST_NAME_LEN + GTCM_ENVVAR_PFXLEN];
data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c:83:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lbuff, GTCM_ENVVAR_PFX, GTCM_ENVVAR_PFXLEN);
data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c:84:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lbuff + GTCM_ENVVAR_PFXLEN, node.addr, node.len);
data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c:95:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(task2.addr, trans_name, task2.len);
data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c:135:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, fn, top - fn);
data/fis-gtm-6.3-007/sr_port_cm/gvcmy_open.c:171:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(libuff, li->buffer, li->buffer_used);
data/fis-gtm-6.3-007/sr_port_cm/gvcmy_remlkmgr.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		errbuf[CM_ERRBUFF_SIZE];
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_bunch.c:45:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	base[1];
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_bunch.c:191:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffptr + new_space, buffptr, bufftop - buffptr);	/* shuffle buffer to make room for new record */
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_bunch.c:192:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(insert_record, &nrec, SIZEOF(nrec) - 1);
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_bunch.c:194:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(insert_record, &gv_currkey->base[cc], nrec.len);
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_bunch.c:200:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(insert_record, v->str.addr, v->str.len);
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_doop.c:46:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_doop.c:112:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, gv_currkey->base, gv_currkey->end + 1);
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_doop.c:120:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr,v->str.addr, v->str.len);
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_doop.c:200:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(gv_altkey->base, ptr, len - 1 - SIZEOF(unsigned short) - SIZEOF(unsigned short) -
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_int_lkcancel.c:49:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char	temp[16];
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_int_lkcancel.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			errbuf[CM_ERRBUFF_SIZE];
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_lksublist.c:73:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, lk_walk->value, lk_walk->nref_length);
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_neterr.c:43:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*temp, buff[512];
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_neterr.c:113:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(err_buff, err, count * SIZEOF(INTPTR_T));
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:103:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((unsigned char *)&temp_vect, (unsigned char *)prc_vec, SIZEOF(jnl_process_vector));
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:108:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr + S_PROTSIZE, (unsigned char *)&temp_vect, SIZEOF(jnl_process_vector));
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:110:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr + S_PROTSIZE, (unsigned char *)prc_vec, prc_vec_size);
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:113:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, proto_str, S_PROTSIZE);
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:163:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c->nod.dsc$a_pointer, node->dsc$a_pointer, node->dsc$w_length);
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:166:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c->tnd.dsc$a_pointer, task->dsc$a_pointer, task->dsc$w_length);
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:177:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c->nod.addr, node->addr, node->len);
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_netopen.c:180:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c->tnd.addr, task->addr, task->len);
data/fis-gtm-6.3-007/sr_unix/aio_shim.c:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		err_buffer[GTM_PATH_MAX + SIZEOF(ERROR_LIT) + 3];		\
data/fis-gtm-6.3-007/sr_unix/aio_shim.c:526:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (reg->open && reg->dyn.addr->asyncio && (dba_cm != reg->dyn.addr->acc_meth))
data/fis-gtm-6.3-007/sr_unix/anticipatory_freeze.c:244:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				buff[MAX_READ_SZ], mnemonic_buf[MAX_TAG_LEN];
data/fis-gtm-6.3-007/sr_unix/auto_zlink.c:50:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rname_buff.c, rname.addr, rname.len);
data/fis-gtm-6.3-007/sr_unix/auto_zlink.c:106:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rtnname.c, rtnname_adr, rtnname_len);
data/fis-gtm-6.3-007/sr_unix/bin_load.c:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char zwrbuff[ZWR_BASE_STRIDE * MAX_ZWR_EXP_RATIO], savechar;
data/fis-gtm-6.3-007/sr_unix/bin_load.c:246:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		hdr_lvl, src_buff[MAX_KEY_SZ + 1], dest_buff[MAX_ZWR_KEY_SZ],
data/fis-gtm-6.3-007/sr_unix/bin_load.c:270:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			std_null_coll[BIN_HEADER_NUMSZ + 1], *sn_hold_buff = NULL, *sn_hold_buff_temp = NULL;
data/fis-gtm-6.3-007/sr_unix/bin_load.c:276:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			index_err_buf[1024];
data/fis-gtm-6.3-007/sr_unix/bin_load.c:284:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char	key_buffer[MAX_ZWR_KEY_SZ];
data/fis-gtm-6.3-007/sr_unix/bin_load.c:290:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			msg_buff[MAX_RECLOAD_ERR_MSG_SIZE];
data/fis-gtm-6.3-007/sr_unix/bin_load.c:355:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(std_null_coll, ptr + BIN_HEADER_NULLCOLLOFFSET, BIN_HEADER_NUMSZ);
data/fis-gtm-6.3-007/sr_unix/bin_load.c:360:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(std_null_coll, ptr + V5_BIN_HEADER_NULLCOLLOFFSET, V5_BIN_HEADER_NUMSZ);
data/fis-gtm-6.3-007/sr_unix/bin_load.c:379:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(encrypted_hash_array_ptr, ptr, encrypted_hash_array_len);
data/fis-gtm-6.3-007/sr_unix/bin_load.c:403:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(null_iv_array_ptr, ptr, null_iv_array_len);
data/fis-gtm-6.3-007/sr_unix/bin_load.c:707:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(gv_currkey->base, cmpc_str, next_cmpc);
data/fis-gtm-6.3-007/sr_unix/bin_load.c:713:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(cmpc_str, gv_currkey->base, next_cmpc);
data/fis-gtm-6.3-007/sr_unix/bin_load.c:718:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(dup_key_str, gv_currkey->base, gv_currkey->end + 1);
data/fis-gtm-6.3-007/sr_unix/bin_load.c:758:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(tmp_key_ptr, tmp_gvkey->base, tmp_gvkey->end + 1);
data/fis-gtm-6.3-007/sr_unix/bin_load.c:806:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(&subtocheck, &mych, 1);
data/fis-gtm-6.3-007/sr_unix/bin_load.c:822:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(&subtocheck, &mych, 1);
data/fis-gtm-6.3-007/sr_unix/bin_load.c:920:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(sn_gvkey->base, gv_currkey->base, sn_gvkey->end);
data/fis-gtm-6.3-007/sr_unix/bin_load.c:946:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(sn_hold_buff_temp, sn_hold_buff, sn_hold_buff_pos);
data/fis-gtm-6.3-007/sr_unix/bin_load.c:950:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(sn_hold_buff + sn_hold_buff_pos, v.str.addr, v.str.len);
data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.c:46:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF unsigned char    gtmvectortable_address[MAX_ADDR_SIZE];
data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.c:47:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF unsigned char    gtmvectortable_env[MAX_ADDR_ENV_SIZE];
data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.c:62:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((env_top + strlen(GTM_CALLIN_START_ENV)), gtmvectortable_address, address_len);
data/fis-gtm-6.3-007/sr_unix/ce_init.c:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[256];
data/fis-gtm-6.3-007/sr_unix/ce_substitute.c:22:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*cp, sub_buffer[MAX_SRCLINE];
data/fis-gtm-6.3-007/sr_unix/cenable.c:28:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static readonly unsigned char cenable_params_list[2] =
data/fis-gtm-6.3-007/sr_unix/cli.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	local_str[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	local_str[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	local_str[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_str[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_str[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_str[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_str[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:261:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:262:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_str[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:295:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, buf, copylen);
data/fis-gtm-6.3-007/sr_unix/cli.c:313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_LINE + 1], *cp, local_str[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:359:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:360:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_str[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:403:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_str[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:435:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.c:436:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_str[MAX_LINE + 1];
data/fis-gtm-6.3-007/sr_unix/cli.h:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[MAX_OPT_LEN];
data/fis-gtm-6.3-007/sr_unix/cli.h:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		prompt[MAX_OPT_LEN];
data/fis-gtm-6.3-007/sr_unix/cli.h:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[MAX_OPT_LEN];	/* name string */
data/fis-gtm-6.3-007/sr_unix/cli_disallow.c:42:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cli_err_str + lencli," ",1);
data/fis-gtm-6.3-007/sr_unix/cli_disallow.c:43:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cli_err_str + lencli + 1, str, lenstr);
data/fis-gtm-6.3-007/sr_unix/cli_lex.c:34:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF char	cli_token_buf[MAX_LINE + 1];	/* Token buffer */
data/fis-gtm-6.3-007/sr_unix/cli_lex.c:196:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cli_lex_in_ptr->in_str, addr, addrlen);
data/fis-gtm-6.3-007/sr_unix/cli_lex.c:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cli_fgets_buffer[MAX_LINE], *destbuffer, *retptr;
data/fis-gtm-6.3-007/sr_unix/cli_lex.c:485:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(destbuffer, cli_fgets_buffer, in_len);
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:311:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(TAREF1(parm_ary, TREF(parms_cnt)), cli_token_buf, TAREF1(parm_str_len, TREF(parms_cnt)));
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:579:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_str[MAX_LINE], tmp_str[MAX_LINE + 1], *tmp_str_ptr;
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:837:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_str[MAX_LINE], *tmp_ptr;
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:884:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_str[MAX_LINE];
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:917:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_str[MAX_LINE];
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:969:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_str[MAX_LINE];
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:982:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*gets_res, local_str[MAX_LINE], *sp;
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:1030:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(TAREF1(parm_ary, match_ind), input_line->str.addr, parm_len);
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:1062:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(TAREF1(parm_ary, match_ind), cli_token_buf, parm_len);
data/fis-gtm-6.3-007/sr_unix/cmidefsp.h:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char lenbuf[2];	    /* order. We maintain len in network byte order until the length bytes are successfully sent. */
data/fis-gtm-6.3-007/sr_unix/condstk_expand.c:56:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_chnd, chnd, old_len);				/* Copy occupied part of old stack */
data/fis-gtm-6.3-007/sr_unix/db_ipcs_reset.c:82:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(!reg->open);
data/fis-gtm-6.3-007/sr_unix/db_snapshot.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		shadow_file[GTM_PATH_MAX];	/* Temporary file that will contain the before images */
data/fis-gtm-6.3-007/sr_unix/db_snapshot.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			shadow_file[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/db_snapshot.h:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		label[SIZEOF(SNAPSHOT_HDR_LABEL) - 1];
data/fis-gtm-6.3-007/sr_unix/db_snapshot.h:97:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	filler[976];
data/fis-gtm-6.3-007/sr_unix/dec_err.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		msgbuff[2048];
data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:55:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			dl_err[MAX_ERRSTR_LEN];	/* This is maintained by gtm_tls_loadlibrary() */
data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:312:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			host[SA_MAXLEN + 1];
data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:314:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char			port_buffer[NI_MAXSERV + 1];
data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:318:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tlsid[MAX_TLSID_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:372:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(audit_conn->tls_id, tlsid, MAX_TLSID_LEN + 1);
data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:404:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	log_msg_pre[GTM_PATH_MAX + MAX_AUDIT_PROC_INFO_LEN + MAX_SRCLINE + 1], *log_msg;
data/fis-gtm-6.3-007/sr_unix/dm_audit_log.c:405:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		cmd_pre[MAX_SRCLINE + 1], *cmd, *errptr;
data/fis-gtm-6.3-007/sr_unix/dm_read.c:155:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*argv[3];
data/fis-gtm-6.3-007/sr_unix/dm_read.c:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		temp_str[MAX_RECALL_NUMBER_LENGTH + 1];
data/fis-gtm-6.3-007/sr_unix/dm_read.c:182:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	escape_sequence[ESC_LEN];
data/fis-gtm-6.3-007/sr_unix/dm_read.c:184:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	more_buf[GTM_MB_LEN_MAX + 1], *more_ptr;	/* to build up multi byte for character */
data/fis-gtm-6.3-007/sr_unix/dm_read.c:245:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(more_buf, tt_state->more_buf, SIZEOF(more_buf));
data/fis-gtm-6.3-007/sr_unix/dm_read.c:257:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(escape_sequence, tt_state->escape_sequence, ESC_LEN);
data/fis-gtm-6.3-007/sr_unix/dm_read.c:328:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(tt_state->more_buf, more_buf, SIZEOF(more_buf));
data/fis-gtm-6.3-007/sr_unix/dm_read.c:342:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tt_state->escape_sequence, escape_sequence, ESC_LEN);
data/fis-gtm-6.3-007/sr_unix/dm_read.c:565:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						write_str((unsigned char *)comline_base[cur_cl].addr,
data/fis-gtm-6.3-007/sr_unix/dm_read.c:599:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						write_str((unsigned char *)comline_base[histidx].addr,
data/fis-gtm-6.3-007/sr_unix/dm_read.c:606:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							outtop = (unsigned char *)comline_base[histidx].addr + len;
data/fis-gtm-6.3-007/sr_unix/dm_read.c:607:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							for (outptr = (unsigned char *)comline_base[histidx].addr;
data/fis-gtm-6.3-007/sr_unix/dm_read.c:624:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(buffer_start, comline_base[histidx].addr,
data/fis-gtm-6.3-007/sr_unix/dm_read.c:637:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						strlen((char *)recall_error_msg[err_recall]));
data/fis-gtm-6.3-007/sr_unix/dm_read.c:862:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						outtop = (unsigned char *)comline_base[cl].addr + len;
data/fis-gtm-6.3-007/sr_unix/dm_read.c:863:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						for (outptr = (unsigned char *)comline_base[cl].addr; outptr < outtop; )
data/fis-gtm-6.3-007/sr_unix/dm_read.c:879:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(buffer_start, comline_base[cl].addr, outlen);
data/fis-gtm-6.3-007/sr_unix/do_xform.c:76:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(output->addr, ba, *length);
data/fis-gtm-6.3-007/sr_unix/do_xform.c:110:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(output->addr, ba, *length);
data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c:41:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char LITDEF gde_labels[GDE_LABEL_NUM][GDE_LABEL_SIZE] =
data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	c[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c:76:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new->addr, pblk.buffer, pblk.b_esl);
data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c:90:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fp->v.addr, v->addr, v->len);
data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c:96:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, fp->v.addr, fp->v.len);
data/fis-gtm-6.3-007/sr_unix/dpgbldir_sysops.c:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		temp_buff[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/dse_help.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dse_rel_name[SIZEOF(GTM_RELEASE_NAME) - SIZEOF(GTM_PRODUCT)];
data/fis-gtm-6.3-007/sr_unix/dse_open.c:61:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	patch_ofile[PATCH_FILE_MAX + 1];
data/fis-gtm-6.3-007/sr_unix/dse_open.c:63:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	ch_set_name[MAX_CHSET_NAME + 1];
data/fis-gtm-6.3-007/sr_unix/dse_open.c:189:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buffer, addr, len);
data/fis-gtm-6.3-007/sr_unix/dse_puttime.c:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 	outbuf[TIME_SIZE * 4];		/* Leave room for unexpected values */
data/fis-gtm-6.3-007/sr_unix/dsk_read.c:180:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buff, enc_save_buff, SIZEOF(blk_hdr));
data/fis-gtm-6.3-007/sr_unix/dsk_read.c:199:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buff, enc_save_buff, size);
data/fis-gtm-6.3-007/sr_unix/dsk_read.c:205:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buff, enc_save_buff, size);
data/fis-gtm-6.3-007/sr_unix/dsk_read.c:238:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(save_buff, buff, size);
data/fis-gtm-6.3-007/sr_unix/dsk_write_nocache.c:116:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(!reg->open || !csa->acc_meth.bg.cache_state->cache_array || buff != (sm_uc_ptr_t)csd);
data/fis-gtm-6.3-007/sr_unix/dsk_write_nocache.c:143:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);	/* should be coming in through "gdsfilext" after having done a "gvcst_init" */
data/fis-gtm-6.3-007/sr_unix/dsk_write_nocache.c:148:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((TREF(dio_buff)).aligned, buff, size);
data/fis-gtm-6.3-007/sr_unix/dsk_write_nocache.c:152:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	DB_LSEEKWRITE(reg->open ? csa : NULL, udi, udi->fn, udi->fd,
data/fis-gtm-6.3-007/sr_unix/err_init.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		procfn[SIZEOF(COREDUMPFILTERFN) + MAX_DIGITS_IN_INT];	/* File name of file to update */
data/fis-gtm-6.3-007/sr_unix/err_init.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filter[FILTERPARMSIZE], *filterend;			/* Value read in & written out */
data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:39:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char 			gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:53:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
STATICDEF char	ext_source_line[MAX_SRC_LINE];
data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:271:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		nam[MAX_NAM_LEN];
data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:357:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		number[MAX_DIGITS_IN_INT];
data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:463:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst->addr, src->addr, dst->len);
data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:486:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				*end, str_buffer[MAX_TABLINE_LEN], str_temp_buffer[MAX_TABLINE_LEN + 1], *tbp;
data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:504:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tbp, package->str.addr, package->str.len);
data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:769:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			str_buffer[MAX_TABLINE_LEN], *tbp, *end, rcfpath[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:905:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[MAX_SRC_LINE], *b;
data/fis-gtm-6.3-007/sr_unix/exttab_parse.c:920:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(b, "^-----", POINTER_SIZE);
data/fis-gtm-6.3-007/sr_unix/f_piece.c:92:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(unichar.unibytes_val, delim_mval->str.addr, delim_mval->str.len);
data/fis-gtm-6.3-007/sr_unix/fake_enospc.c:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		enospc_enable_list[MAX_REGIONS];
data/fis-gtm-6.3-007/sr_unix/fgn_getinfo.c:35:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char		gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/fgn_getinfo.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		err_str[MAX_ERRSTR_LEN]; /* needed as util_out_print doesn't handle 64bit pointers */
data/fis-gtm-6.3-007/sr_unix/fgn_getinfo.c:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	 	librarypath[GTM_PATH_MAX], *lpath = NULL;
data/fis-gtm-6.3-007/sr_unix/fgn_getinfo.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		err_str[MAX_ERRSTR_LEN]; /* needed as util_out_print doesn't handle 64bit pointers */
data/fis-gtm-6.3-007/sr_unix/fgn_getinfo.c:150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		err_str[MAX_ERRSTR_LEN];
data/fis-gtm-6.3-007/sr_unix/file_input.c:47:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char		buff1[BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/file_input.c:139:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buff1_ptr, line1_ptr, line1_len);
data/fis-gtm-6.3-007/sr_unix/file_input.c:240:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(in_ptr, val.str.addr, rd_len);
data/fis-gtm-6.3-007/sr_unix/file_input.c:297:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp_ptr, mbuff, ret_len);
data/fis-gtm-6.3-007/sr_unix/file_input.c:303:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((unsigned char *)(mbuff + ret_len), val.str.addr, rd_len);
data/fis-gtm-6.3-007/sr_unix/gds_rundown.c:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */
data/fis-gtm-6.3-007/sr_unix/gds_rundown.c:190:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((reg->open) && (dba_usr == csd->acc_meth))
data/fis-gtm-6.3-007/sr_unix/gds_rundown.c:219:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (statsDBreg->open)
data/fis-gtm-6.3-007/sr_unix/gds_rundown.c:267:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(reg->open);			/* if we failed to open, dbinit_ch should have taken care of proper clean up */
data/fis-gtm-6.3-007/sr_unix/gds_rundown.c:775:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(db_ipcs.fn, seg->fname, seg->fname_len);
data/fis-gtm-6.3-007/sr_unix/gdsfilext_nojnl.c:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(aligned_buff, newmap, blk_size);
data/fis-gtm-6.3-007/sr_unix/genpat.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		source_buffer[MAX_SRCLINE];
data/fis-gtm-6.3-007/sr_unix/genpat.c:79:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(patbuf->str.addr, &pat_ptstr.buff[0], patbuf->str.len);
data/fis-gtm-6.3-007/sr_unix/get_command_line.c:54:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			cp = (unsigned char *)cmd_arg[1];
data/fis-gtm-6.3-007/sr_unix/get_command_line.c:83:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cp, cmd_arg[word_cnt], len);
data/fis-gtm-6.3-007/sr_unix/get_full_path.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cwdbuf[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/get_full_path.c:46:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(full_fn, orig_fn, length);
data/fis-gtm-6.3-007/sr_unix/get_full_path.c:74:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(full_fn, cwdbuf, c1 - cwdbuf);
data/fis-gtm-6.3-007/sr_unix/get_full_path.c:75:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(full_fn + (c1 - cwdbuf), cptr, orig_len - (cptr - orig_fn));
data/fis-gtm-6.3-007/sr_unix/get_full_path.c:85:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(full_fn, cwdbuf, cwd_len);
data/fis-gtm-6.3-007/sr_unix/get_full_path.c:87:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(full_fn + cwd_len + 1, cptr, orig_len - (cptr - orig_fn));
data/fis-gtm-6.3-007/sr_unix/get_src_line.c:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buff[MAX_SRCLINE], *cptr, *srcfile_name;
data/fis-gtm-6.3-007/sr_unix/get_src_line.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			srcnamebuf[SIZEOF(mident_fixed) + STR_LIT_LEN(DOTM)];
data/fis-gtm-6.3-007/sr_unix/get_src_line.c:278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buff[MAX_SRCLINE], *cptr, *fgets_rc, *srcfile_name;
data/fis-gtm-6.3-007/sr_unix/get_src_line.c:279:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			srcnamebuf[SIZEOF(mident_fixed) + STR_LIT_LEN(DOTM) + 1];
data/fis-gtm-6.3-007/sr_unix/get_src_line.c:292:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(srcfile_name, rtn_vector->src_full_name.addr, rtn_vector->src_full_name.len);
data/fis-gtm-6.3-007/sr_unix/get_src_line.c:305:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(srcnamebuf, rtn_vector->routine_name.addr, srcfilnamlen);
data/fis-gtm-6.3-007/sr_unix/get_src_line.c:328:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(srcfile_name, srcdir->str.addr, srcdir->str.len);
data/fis-gtm-6.3-007/sr_unix/get_src_line.c:331:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(cptr, src.addr, src.len);
data/fis-gtm-6.3-007/sr_unix/get_src_line.c:413:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(prev_srcptr, buff, size);
data/fis-gtm-6.3-007/sr_unix/get_ztimeout.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		full_ztimeout[ZTIMEOUTSTRLEN];
data/fis-gtm-6.3-007/sr_unix/get_ztimeout.c:72:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cp, full_ztimeout, time_len);
data/fis-gtm-6.3-007/sr_unix/get_ztimeout.c:74:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cp + time_len, ztimeout_vector_ptr, ztimeout_vector_len);
data/fis-gtm-6.3-007/sr_unix/getcaps.c:93:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static	char	gtm_cap_ascii[16 * 16];	/* ESC_LEN from io.h times number of tigetstr values */
data/fis-gtm-6.3-007/sr_unix/getcaps.c:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		cap_ebcdic[128];	/* more than enough for terminal name */
data/fis-gtm-6.3-007/sr_unix/geteditor.c:50:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(editor.addr, edt, len);
data/fis-gtm-6.3-007/sr_unix/go_load.c:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*ptr1, msg_buff[128];
data/fis-gtm-6.3-007/sr_unix/go_load.c:163:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		key[MAX_KEY_SZ], msg_buff[MAX_RECLOAD_ERR_MSG_SIZE];
data/fis-gtm-6.3-007/sr_unix/go_load.c:476:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((unsigned char *)(*in_ptr + ret_len), val.str.addr, rd_len);
data/fis-gtm-6.3-007/sr_unix/grab_lock.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			scndry_msg[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/gt_timer.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		hd_data[1];	/* Handler data */
data/fis-gtm-6.3-007/sr_unix/gt_timer.h:157:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		s_unknown[MAX_UNKNOWN_LEN];						\
data/fis-gtm-6.3-007/sr_unix/gt_timers.c:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[512];										\
data/fis-gtm-6.3-007/sr_unix/gt_timers.c:174:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&trc_timerpop_array[trc_timerpop_idx], TIMER_INFO, SIZEOF(GT_TIMER));	\
data/fis-gtm-6.3-007/sr_unix/gt_timers.c:829:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(deferred_tid, deferred_tids, offset * SIZEOF(TID));
data/fis-gtm-6.3-007/sr_unix/gt_timers.c:953:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ntp->hd_data, hdata, hdata_len);
data/fis-gtm-6.3-007/sr_unix/gtm.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		gtmshr_file[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm.c:107:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&gtmshr_file[0], fptr, dir_len);
data/fis-gtm-6.3-007/sr_unix/gtm.c:109:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&gtmshr_file[dir_len+1], GTMSHR_IMAGE_NAME, STR_LIT_LEN(GTMSHR_IMAGE_NAME));
data/fis-gtm-6.3-007/sr_unix/gtm_bintim.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		month[256];
data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace.c:71:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((TREF(gtm_waitstuck_script)).addr, trans.addr, trans.len);
data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace.c:85:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(trans.addr, (TREF(gtm_waitstuck_script)).addr, trans.len);
data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace.c:94:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(currpos, message, messagelen);
data/fis-gtm-6.3-007/sr_unix/gtm_c_stack_trace_semop.c:42:48:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((NULL != gv_cur_region) && gv_cur_region->open && (NULL != cs_addrs))
data/fis-gtm-6.3-007/sr_unix/gtm_compile.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ceprep_file[MAX_FN_LEN + 1], list_file[MAX_FN_LEN + 1], obj_file[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/gtm_compile.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			source_file_string[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/gtm_compile.c:99:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(orig_cmdstr.addr, cli_lex_in_ptr->in_str + strlen("MUMPS "), orig_cmdstr.len);
data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		pathbuf[MAX_FN_LEN];
data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:56:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cmd_ptr, path_tok, tok_len);
data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:60:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cmd_ptr, command, cmdlen - 1); /*Don't copy the trailing space in the command*/
data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:68:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(command , cmd_path, cmdlen);
data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:69:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(command + cmdlen, " ", 1);
data/fis-gtm-6.3-007/sr_unix/gtm_conv_init.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		mode[MAX_CHSET_LEN];
data/fis-gtm-6.3-007/sr_unix/gtm_dbjnl_dupfd_check.c:65:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(reg->open);
data/fis-gtm-6.3-007/sr_unix/gtm_dbjnl_dupfd_check.c:152:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!reg->open || reg->was_open)
data/fis-gtm-6.3-007/sr_unix/gtm_dump_core.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char                    newname[CORE_NAME_LEN];
data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:100:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			io_setup_errstr[IO_SETUP_ERRSTR_ARRAYSIZE];
data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:114:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static readonly unsigned char editing_index[27] =
data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_SRCLINE + 1], *token, cwd[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:155:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cwdptr, &cwd, cwdlen);
data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:159:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cwdptr, GTMCORENAME, SIZEOF(GTMCORENAME));       /* Also copys in trailing null */
data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:323:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((TREF(gtm_custom_errors)).addr, buf, trans.len);
data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:359:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((TREF(gtm_linktmpdir)).addr, trans.addr, trans.len);
data/fis-gtm-6.3-007/sr_unix/gtm_env_translate.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		pakname[PATH_MAX + 1];
data/fis-gtm-6.3-007/sr_unix/gtm_env_translate.c:47:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pakname, env_gtm_env_xlate.addr, env_gtm_env_xlate.len);
data/fis-gtm-6.3-007/sr_unix/gtm_fd_trace.c:102:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(pathname, flags);
data/fis-gtm-6.3-007/sr_unix/gtm_fd_trace.c:111:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(pathname, flags, mode);
data/fis-gtm-6.3-007/sr_unix/gtm_file_stat.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fbuff[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/gtm_file_stat.c:45:18:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	mstr		tmp_str, *tmpfile;
data/fis-gtm-6.3-007/sr_unix/gtm_file_stat.c:55:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fbuff, file->addr, file->len);
data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:77:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                    oldname[1024], newname[1024], *trcpath, *trcsuffix;
data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:128:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(oldname, "/systrace");	/* add file name */
data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:149:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(newname, "trace -a -L 8000000 -o ");
data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		outbuf[32];
data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:82:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cp, fac, j);
data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:104:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cp, tag, j);
data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:113:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cp, msgp, top - cp);
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:54:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char			gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp_errstr[SIZEOF(GTM_ICU_VERSION) + STR_LIT_LEN(GTM_ICU_VERSION_SUFFIX)]; /* "$gtm_icu_version is" */
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*locale, *chset, *libname, err_msg[MAX_ERRSTR_LEN];
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		icu_final_fname[MAX_ICU_FNAME_LEN + 1 + MAX_ICU_VERSION_STRLEN];	/* 1 for '_' in between */
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		icu_ver_buf[MAX_ICU_VERSION_STRLEN], icusymver[MAX_ICU_VERSION_STRLEN], iculibver[MAX_ICU_VERSION_STRLEN];
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp_errstr[SIZEOF(ICU_LIBNAME) + STR_LIT_LEN(ICU_LIBNAME_SUFFIX)]; /* "libicuio.so has version" */
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		icu_libname[SIZEOF(ICU_LIBNAME) + MAX_ICU_VERSION_STRLEN];
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		real_path[GTM_PATH_MAX], librarypath[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            buf[ICU_LIBNAME_LEN], temp_path[GTM_PATH_MAX], search_paths[MAX_SEARCH_PATH_LEN];
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:279:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&icu_libname[icu_libname_len], ICU_LIBNAME_ROOT, len);
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:281:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&icu_libname[icu_libname_len], iculibver, iculibver_len);
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:285:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&icu_libname[icu_libname_len], ICU_LIBNAME_EXT, len);
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:290:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&icu_libname[icu_libname_len], ICU_LIBNAME, len);
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:293:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&icu_libname[icu_libname_len], iculibver, iculibver_len);
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:398:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(ptr, ".so)");			/* buf = /usr/local/lib64/libicuio36.0.a(libicuio36.0.so) */
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:448:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&icu_final_fname[icu_final_fname_len], cur_icu_fname, len);
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:465:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&icu_final_fname[icu_final_fname_len], icusymver, icusymver_len);
data/fis-gtm-6.3-007/sr_unix/gtm_main.c:58:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char				gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_main.c:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			gtmlibxc[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_main.c:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tlsid_env_name[MAX_TLSID_LEN * 2];
data/fis-gtm-6.3-007/sr_unix/gtm_main.c:219:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(tlsid_env_name, ptr, (int)(eq - ptr));
data/fis-gtm-6.3-007/sr_unix/gtm_multi_proc.c:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			errstr[256];
data/fis-gtm-6.3-007/sr_unix/gtm_multi_proc.c:320:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			errstr[256];
data/fis-gtm-6.3-007/sr_unix/gtm_multi_proc.c:408:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mp_hdr->pvt_ret_array, mp_hdr->shm_ret_array, (SIZEOF(void *) * mp_hdr->ntasks));
data/fis-gtm-6.3-007/sr_unix/gtm_permissions.c:33:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF		char		gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_permissions.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			temp[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_permissions.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	file_perm[MAX_PERM_LEN];
data/fis-gtm-6.3-007/sr_unix/gtm_permissions.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	lib_perm[MAX_PERM_LEN];
data/fis-gtm-6.3-007/sr_unix/gtm_permissions.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	print_gid_list[MAX_PRINT_GID_LEN];	/* Can't imagine this getting any longer in the real world */
data/fis-gtm-6.3-007/sr_unix/gtm_putmsg_list.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		msg_buffer[1024];
data/fis-gtm-6.3-007/sr_unix/gtm_semutils.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				*sem_names[2] = {"FTOK", "access control"}; /* based on gtm_semtype enum order */
data/fis-gtm-6.3-007/sr_unix/gtm_startup.c:183:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(temp, (TREF(tpnotacidtime)).str.addr, (TREF(tpnotacidtime)).str.len);
data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:52:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char		gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		image_real_path[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		real_gtm_dist_path[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_startup_chk.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		comparison[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[buflen + 1];			/* C99: Variable Length Array, avoids malloc. */
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:46:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	VAR = fopen(PATH, MODE);						\
data/fis-gtm-6.3-007/sr_unix/gtm_stdio.h:57:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	VAR = fopen(PATH, MODE);			\
data/fis-gtm-6.3-007/sr_unix/gtm_text_alloc.c:286:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nullHMark[4];
data/fis-gtm-6.3-007/sr_unix/gtm_text_alloc.c:287:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nullStr[1];
data/fis-gtm-6.3-007/sr_unix/gtm_text_alloc.c:288:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nullTMark[4];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:760:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*env_name_ptr, env_name[PASSPHRASE_ENVNAME_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:790:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pwent->env_value, obs_passwd, obs_len + 1);	/* include null */
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:806:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*env_name_ptr, *env_value, prompt[GTM_PASSPHRASE_MAX_ASCII + 1];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:837:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cfg_path[MAX_CONFIG_LOOKUP_PATHLEN];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:877:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cfg_path[MAX_CONFIG_LOOKUP_PATHLEN];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:947:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cfg_path[MAX_CONFIG_LOOKUP_PATHLEN], input_env_name[PASSPHRASE_ENVNAME_MAX + 1], *env_name_ptr;
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:948:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			prompt[GTM_PASSPHRASE_MAX_ASCII + 1];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:951:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		session_id_string[SSL_MAX_SSL_SESSION_ID_LENGTH];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1175:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fp = fopen(private_key, "r");
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1453:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cfg_path[MAX_CONFIG_LOOKUP_PATHLEN];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1533:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cfg_path[MAX_CONFIG_LOOKUP_PATHLEN];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1541:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		session_id_string[SSL_MAX_SSL_SESSION_ID_LENGTH];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		protocol[MAX_ALGORITHM_LEN];	/* Descriptive name of the negoitiated protocol (for instance, TLSv1). */
data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		session_algo[MAX_ALGORITHM_LEN];/* Algorithm negoitated by the SSL/TLS session. */
data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		session_id[MAX_SESSION_ID_LEN + 1]; /* Hexadecimal representation of the negotiated Session-ID. */
data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		cert_algo[MAX_ALGORITHM_LEN];	/* Certificate's asymmetric cryptography algorithm. */
data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		subject[MAX_X509_LEN];		/* To whom the certificate belongs? */
data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		issuer[MAX_X509_LEN];		/* CA who issued the certificate. */
data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		not_before[MAX_TIME_STRLEN];	/* Date before which the certificate is not valid. */
data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		not_after[MAX_TIME_STRLEN];	/* Date after which the certificate is not valid. */
data/fis-gtm-6.3-007/sr_unix/gtm_tls_interface.h:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tlsid[MAX_TLSID_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:45:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char		dl_err[MAX_ERRSTR_LEN];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:46:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char		gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*err_str, libpath[GTM_PATH_MAX], util_libpath[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			new_libpath_env[GTM_PATH_MAX], *save_libpath_ptr, plugin_dir_path[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			save_libpath[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_tparm.c:25:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	gtm_tparm_buf[64];	/* static so it can be returned, room for expanded escape sequence */
data/fis-gtm-6.3-007/sr_unix/gtm_tparm.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ebcdicbuf[32];	/* ESC_LEN in io.h is 16, allow extra */
data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:307:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		rtnname[GTM_PATH_MAX], rtnname_template[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:308:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		objname[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:309:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		zcomp_parms[(GTM_PATH_MAX * 2) + SIZEOF(mident_fixed) + SIZEOF(OBJECT_PARM) + SIZEOF(NAMEOFRTN_PARM)
data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:319:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	DBGTRIGR_ONLY(memcpy(rtnname, trigdsc->rtn_desc.rt_name.addr, trigdsc->rtn_desc.rt_name.len));
data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:427:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(zcomp_parms_ptr, trigdsc->rtn_desc.rt_name.addr, trigdsc->rtn_desc.rt_name.len);
data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:613:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(mv_st_ent->mv_st_cont.mvs_trigr.savextref.addr, extnam_str.addr, extnam_str.len);
data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:681:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(extnam_str.addr, mv_st_ent->mv_st_cont.mvs_trigr.savextref.addr, extnam_str.len);
data/fis-gtm-6.3-007/sr_unix/gtm_utf8.c:267:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	errtxt[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/gtm_zlib.c:34:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char		gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtm_zlib.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		err_msg[MAX_ERRSTR_LEN];
data/fis-gtm-6.3-007/sr_unix/gtm_zlib.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		aix_err_msg[MAX_ERRSTR_LEN];
data/fis-gtm-6.3-007/sr_unix/gtm_zlib.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		librarypath[GTM_PATH_MAX], *lpath = NULL;
data/fis-gtm-6.3-007/sr_unix/gtmci.c:104:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmci.c:901:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(gtm_char_ptr, arg_ptr->str.addr, arg_ptr->str.len);
data/fis-gtm-6.3-007/sr_unix/gtmci.c:908:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(mstr_parm->address, arg_ptr->str.addr, mstr_parm->length);
data/fis-gtm-6.3-007/sr_unix/gtmci.c:1028:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			gtmsecshr_path[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmci.c:1031:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			file_perm[MAX_PERM_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmci.c:1064:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gtmsecshr_path, gtm_dist, dist_len);
data/fis-gtm-6.3-007/sr_unix/gtmci.c:1066:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gtmsecshr_path + dist_len + 1, GTMSECSHR_EXECUTABLE, STRLEN(GTMSECSHR_EXECUTABLE));
data/fis-gtm-6.3-007/sr_unix/gtmci.c:1084:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(gtm_dist, dist, dist_len);
data/fis-gtm-6.3-007/sr_unix/gtmci.c:1202:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg, dollar_zstatus.str.addr, msg_len);
data/fis-gtm-6.3-007/sr_unix/gtmci_ch.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	src_buf[MAX_ENTRYREF_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmci_isv.c:63:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dollar_ecode, &dollar_ecode_ci, SIZEOF(dollar_ecode));
data/fis-gtm-6.3-007/sr_unix/gtmci_isv.c:64:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dollar_stack, &dollar_stack_ci, SIZEOF(dollar_stack));
data/fis-gtm-6.3-007/sr_unix/gtmcrypt.h:175:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((DST)->encryption_hash, (SRC)->encryption_hash, GTMCRYPT_HASH_LEN);						\
data/fis-gtm-6.3-007/sr_unix/gtmcrypt.h:176:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((DST)->encryption_hash2, (SRC)->encryption_hash2, GTMCRYPT_HASH_LEN);						\
data/fis-gtm-6.3-007/sr_unix/gtmcrypt.h:356:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(HASH, hash_string.address, hash_string.length);						\
data/fis-gtm-6.3-007/sr_unix/gtmcrypt.h:465:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			c = ((char *)INBUF)[i];											\
data/fis-gtm-6.3-007/sr_unix/gtmcrypt.h:482:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				c = ((OUTBUF == NULL) ? (char *)INBUF : (char *)(OUTBUF))[i];					\
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:85:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((*target_node)->FIELD, VALUE, LENGTH);					\
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:106:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
STATICDEF char					gc_config_filename[GTM_PATH_MAX];	/* Path to the configuration file. */
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:116:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
STATICDEF char					path_array[GTM_PATH_MAX];		/* Array for temporary storage of keys or
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:118:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
STATICDEF unsigned char				key_hash_array[GTMCRYPT_HASH_LEN];	/* Array for temporary storage of keys'
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	save_err[MAX_GTMCRYPT_ERR_STRLEN + 1], hex_buff[GTMCRYPT_HASH_HEX_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:207:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(save_err, gtmcrypt_err_string, errorlen);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				lcl_keyname[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:376:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				*lcl_key_name, lcl_key_name_buff[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:377:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				name_search_field_buff[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:403:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(name_search_field_buff, search_field1, search_field_len - STRLEN(EXT_NEW));
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:545:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		raw_key[SYMMETRIC_KEY_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:581:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(node->key, raw_key, SYMMETRIC_KEY_MAX);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:846:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		iv_array[GTMCRYPT_IV_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:849:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(iv_array, iv, length);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:855:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->iv, iv_array, GTMCRYPT_IV_LEN);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:88:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char					key[SYMMETRIC_KEY_MAX];		/* Raw symmetric key contents. */
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:89:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char					key_hash[GTMCRYPT_HASH_LEN];	/* SHA-512 hash of symmetric key. */
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char						key_path[GTM_PATH_MAX];		/* Path to the key file. */
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:106:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char					iv[GTMCRYPT_IV_LEN];		/* Initialization vector. */
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char						key_name[GTM_PATH_MAX];		/* Logical entity that the symmetric key
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:143:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char						key_name[GTM_PATH_MAX];		/* Logical entity that the symmetric key
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.h:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char						key_path[GTM_PATH_MAX];		/* Path to the key file. */
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:53:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char		dl_err[MAX_ERRSTR_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:54:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char		gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*bufptr, *ptr, cmpptr[GTM_PATH_MAX], buf[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			new_libpath_env[GTM_PATH_MAX], *save_libpath_ptr, save_libpath[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			libpath[GTM_PATH_MAX], buf[MAX_GTMCRYPT_PLUGIN_STR_LEN], plugin_dir_path[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			resolved_libpath[GTM_PATH_MAX], resolved_plugin_dir_path[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lclarray[8192];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		null_buffer[SYMMETRIC_KEY_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		pathname[GTM_PATH_MAX], *ptr;
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.h:112:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(in_buff, symmetric_key, SYMMETRIC_KEY_MAX);								\
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.h:113:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(in_buff + SYMMETRIC_KEY_MAX, UNIQ_ENC_PARAM_STRING, UNIQ_ENC_PARAM_LEN);					\
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.h:119:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	in_buff[HASH_INPUT_BUFF_LEN];									\
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.h:128:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	in_buff[HASH_INPUT_BUFF_LEN];									\
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			filename[GTM_PATH_MAX], real_db_path[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:169:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(filename, db_path.address, db_path.length);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:217:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			keyname[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:225:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(keyname, key_name.address, key_name.length);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:251:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filename[GTM_PATH_MAX], real_db_path[GTM_PATH_MAX], real_key_path[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:259:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(filename, db_path.address, db_path.length);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:270:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(filename, key_path.address, key_path.length);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:346:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		iv_array[GTMCRYPT_IV_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_ref.c:358:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iv_array, iv.address, iv.length);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF	char	gtmcrypt_err_string[MAX_GTMCRYPT_ERR_STRLEN + 1];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:144:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tty_copy, &old_tty, SIZEOF(struct termios));
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[GTM_PASSPHRASE_MAX], mumps_exe[GTM_PATH_MAX], hash_in[GTM_PASSPHRASE_MAX], hash[GTMCRYPT_HASH_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:237:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (-1 != (fd = open(ptr, O_RDONLY)))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:299:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*env_name, *env_value, *passwd, *lpasswd, tmp_passwd[GTM_PASSPHRASE_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.h:216:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			env_name[PASSPHRASE_ENVNAME_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.h:228:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			gtmcrypt_err_string[MAX_GTMCRYPT_ERR_STRLEN + 1];
data/fis-gtm-6.3-007/sr_unix/gtmlink.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[MAX_KEYWORD_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmrecv.c:71:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmrecv.c:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			print_msg[REPL_MSG_SIZE], tmpmsg[REPL_MSG_SIZE];
data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		log_file[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:224:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filter_cmd[MAX_FILTER_CMD_LEN];	/* Receiver filters incoming records using this process */
data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		log_file[MAX_FN_LEN + 1];	/* File to log receiver progress */
data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		statslog_file[MAX_FN_LEN + 1];	/* File to log statistics */
data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name[MAX_GSEC_KEY_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:251:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			filler[3];
data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:370:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            log_file[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:371:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		updresync_instfilename[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:372:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            filter_cmd[MAX_FILTER_CMD_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		reuse_instname[MAX_INSTNAME_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmrecv_fetchresync.c:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				seq_num_str[32], *seq_num_ptr;
data/fis-gtm-6.3-007/sr_unix/gtmrecv_fetchresync.c:289:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(old_instinfo_msg.instname, jnlpool->repl_inst_filehdr->inst_info.this_instname,
data/fis-gtm-6.3-007/sr_unix/gtmrecv_fetchresync.c:304:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&need_instinfo_msg, &msg, MIN_REPL_MSGLEN);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_fetchresync.c:404:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(msgp, &msg, MIN_REPL_MSGLEN);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_poll_actions.c:233:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((uchar_ptr_t)&xoff_msg.msg[0], (uchar_ptr_t)&send_seqno, SIZEOF(seq_num));
data/fis-gtm-6.3-007/sr_unix/gtmrecv_poll_actions.c:239:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((uchar_ptr_t)&xoff_msg.msg[0], (uchar_ptr_t)&temp_send_seqno, SIZEOF(seq_num));
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:394:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		print_msg[1024];
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:619:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uchar_ptr_t)&xoff_msg.msg[0], (uchar_ptr_t)&upd_proc_local->read_jnl_seqno, SIZEOF(seq_num));
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:625:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uchar_ptr_t)&xoff_msg.msg[0], (uchar_ptr_t)&temp_seq_num, SIZEOF(seq_num));
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:646:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uchar_ptr_t)&xon_msg.msg[0], (uchar_ptr_t)&upd_proc_local->read_jnl_seqno, SIZEOF(seq_num));
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:652:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uchar_ptr_t)&xon_msg.msg[0], (uchar_ptr_t)&temp_seq_num, SIZEOF(seq_num));
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:682:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			print_msg[1024];
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:865:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(repl_filter_buff, old_filter_buff, repl_filter_bufsiz);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1367:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(instinfo_msg.instname, inst_hdr->inst_info.this_instname, MAX_INSTNAME_LEN - 1);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1417:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(jnlpool->jnlpool_ctl->primary_instname, need_instinfo_msg->instname, MAX_INSTNAME_LEN - 1);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1422:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			command[ONLN_RLBK_CMD_MAXLEN + 1], *errptr;
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1521:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(histinfo1_msg.instname, cur_histinfo->root_primary_instname, MAX_INSTNAME_LEN - 1);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1633:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(recvpool.recvdata_base + write_loc, databuff, datalen);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1836:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(repl_filter_buff, recvpool.recvdata_base + write_off, write_len);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1980:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((sm_uc_ptr_t)&old_triple_content, (recvpool.recvdata_base + write_off),
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1991:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cur_histinfo->root_primary_instname, old_triple_content.instname, MAX_INSTNAME_LEN - 1);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2154:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&recvpool_ctl->last_rcvd_strm_histinfo[histinfo_strm_num],
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2171:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&recvpool_ctl->last_valid_histinfo,
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2184:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(&recvpool_ctl->last_valid_strm_histinfo[idx],
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2242:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		print_msg[1024];
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2585:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(histinfo, &recvpool_ctl->last_valid_histinfo, SIZEOF(repl_histinfo));
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2589:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(histinfo, &recvpool_ctl->last_valid_strm_histinfo[0], SIZEOF(repl_histinfo));
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2640:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&recvpool_ctl->last_rcvd_strm_histinfo[need_histinfo_strm_num], histinfo, SIZEOF(repl_histinfo));
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:2766:77:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert((NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3076:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(gtmrecv_cmpmsgp + gtmrecv_cur_cmpmsglen, old_buffp, buffered_data_len);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3122:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(heartbeat.ack_seqno, buffp - msg_len, msg_len);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3128:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							 memcpy((uchar_ptr_t)&ack_seqno,
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3133:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							 memcpy((uchar_ptr_t)&temp_ack_seqno,
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3144:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy((uchar_ptr_t)&heartbeat.ack_seqno[0],
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3152:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy((uchar_ptr_t)&heartbeat.ack_seqno[0],
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3200:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(old_instinfo_msg.instname,
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3221:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(jnlpool->jnlpool_ctl->primary_instname, old_need_instinfo_msg->instname,
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:3402:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy((uchar_ptr_t)&recvd_jnl_seqno,
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:106:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*name_ptr, *rndir, *cp, realpathbef[GTM_PATH_MAX], *realpathaft, gtmdist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:358:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(realpathbef, rndir, rndirln);		/* Need to copy before we modify it */
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:370:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(realpathaft + rndirln, GTMSECSHR_DIR_SUFFIX, SIZEOF(GTMSECSHR_DIR_SUFFIX));	/* includes null terminator */
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:989:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	procpath[GTM_PATH_MAX],	cmdbuf[GTM_PATH_MAX], rpcmdbuf[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:998:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ppptr, PROCPATH_CMDLSUFFIX, SIZEOF(PROCPATH_CMDLSUFFIX));	/* Copy includes terminating null of literal */
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:1041:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ppptr_save, PROCPATH_MAPSSUFFIX, SIZEOF(PROCPATH_MAPSSUFFIX));	/* Copy includes terminating null of literal */
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.h:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fn[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.h:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char 		path[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:49:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char			gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:54:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char			gtmsecshr_sockpath[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:55:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char			gtmsecshr_path[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:175:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		id_str[MAX_ID_LEN+1], suffix;
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:176:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		pid_str[2 * SIZEOF(pid_t) + 1];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:191:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gtmsecshr_cli_sock_name.sun_path, gtmsecshr_sockpath, gtmsecshr_sockpath_len);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:197:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gtmsecshr_sockpath + gtmsecshr_sockpath_len, (char *)id_str, id_str_len);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_sock_init.c:200:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gtmsecshr_sock_name.sun_path, gtmsecshr_sockpath, gtmsecshr_sockpath_len);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		gtm_dist_val[MAX_ENV_VAR_VAL_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:174:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		gtm_tmp_val[MAX_ENV_VAR_VAL_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:175:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		gtm_secshrdir_path[MAX_ENV_VAR_VAL_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		gtm_secshrdir_path_display[MAX_ENV_VAR_VAL_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		gtm_secshr_path[MAX_ENV_VAR_VAL_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		gtm_secshr_path_display[MAX_ENV_VAR_VAL_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		gtm_secshr_orig_path[MAX_ENV_VAR_VAL_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		gtm_TZ_val[MAX_ENV_VAR_VAL_LEN + 1], *gtm_TZ_val_ptr;
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:208:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gtm_white_box_test_case_enabled = atoi(env_var_ptr);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:213:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				gtm_white_box_test_case_number = atoi(env_var_ptr);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:229:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		envfile = fopen(environfile, "r");
data/fis-gtm-6.3-007/sr_unix/gtmsource.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			print_msg[OUT_BUFF_SIZE - 1], tmpmsg[REPL_MSG_SIZE];
data/fis-gtm-6.3-007/sr_unix/gtmsource.c:346:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:203:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		primary_instname[MAX_INSTNAME_LEN];/* Name of the primary instance this secondary instance is
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:222:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			freeze_comment[MAX_FREEZE_COMMENT_LEN];	/* Text explaining reason for freeze */
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:224:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		merrors_array[MERRORS_ARRAY_SZ];
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			filler_16bytealign1[8];
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:419:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		secondary_instname[MAX_INSTNAME_LEN];/* Name of the secondary instance that is connected */
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:426:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		filler1_align_8[4];
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:459:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			secondary_host[MAX_HOST_NAME_LEN];	/* hostname of the secondary */
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:469:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			log_file[MAX_FN_LEN + 1];	/* log file name */
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:472:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			statslog_file[MAX_FN_LEN + 1];	/* stats log file name */
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:477:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			filter_cmd[MAX_FILTER_CMD_LEN];	/* command to run to invoke the external filter (if needed) */
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:535:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_8byte_align[4];
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:681:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            filter_cmd[MAX_FILTER_CMD_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:682:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            secondary_host[MAX_HOST_NAME_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:683:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            log_file[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:684:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		secondary_instname[MAX_INSTNAME_LEN];	/* instance name specified in -INSTSECONDARY qualifier */
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:685:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		freeze_comment[MAX_FREEZE_COMMENT_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:687:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tlsid[MAX_TLSKEY_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmsource_checkhealth.c:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			errtxt[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/gtmsource_flush_fh.c:35:98:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert((NULL != jnlpool) && (NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open);
data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp_connect_parms_str[GTMSOURCE_CONN_PARMS_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		freeze_comment[SIZEOF(gtmsource_options.freeze_comment)];
data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		freeze_val[SIZEOF("OFF")]; /* "ON" or "OFF", including null terminator */
data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		inst_name[MAX_FN_LEN + 1], *ip_end, *strtokptr;
data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		secondary_sys[MAX_SECONDARY_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		statslog_val[SIZEOF("OFF")]; /* "ON" or "OFF" */
data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		update_val[SIZEOF("DISABLE")]; /* "ENABLE" or "DISABLE" */
data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:161:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gtmsource_options.secondary_instname, inst_name, inst_name_len + 1);	/* copy terminating '\0' as well */
data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:186:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(gtmsource_options.secondary_host, c, index);
data/fis-gtm-6.3-007/sr_unix/gtmsource_heartbeat.c:138:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char			seq_num_str[32], *seq_num_ptr;
data/fis-gtm-6.3-007/sr_unix/gtmsource_heartbeat.c:152:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(overdue_heartbeat, &heartbeat_element->heartbeat, SIZEOF(repl_heartbeat_msg_t));
data/fis-gtm-6.3-007/sr_unix/gtmsource_heartbeat.c:172:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char			seq_num_str[32], *seq_num_ptr;
data/fis-gtm-6.3-007/sr_unix/gtmsource_heartbeat.c:227:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char			seq_num_str[32], *seq_num_ptr;
data/fis-gtm-6.3-007/sr_unix/gtmsource_mode_change.c:111:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&jnlpool->gtmsource_local->connect_parms[0], &gtmsource_options.connect_parms[0],
data/fis-gtm-6.3-007/sr_unix/gtmsource_process.c:388:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				err_string[1024];
data/fis-gtm-6.3-007/sr_unix/gtmsource_process.c:662:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				err_string[1024];
data/fis-gtm-6.3-007/sr_unix/gtmsource_process.c:685:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				histdetail[OUT_LINE];
data/fis-gtm-6.3-007/sr_unix/gtmsource_process.c:695:98:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert((NULL != jnlpool) && (NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open);
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			print_msg[PROC_OPS_PRINT_MSG_LEN], msg_str[1024], *errmsg;
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:339:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(repl_filter_buff, old_filter_buff, repl_filter_bufsiz);
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:371:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((unsigned char *)gtmsource_msgp, (unsigned char *)oldmsgp, gtmsource_msgbufsiz);
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:419:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char			seq_num_str[32], *seq_num_ptr, *buffp;
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:455:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buffp, &msg, MIN_REPL_MSGLEN);
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:540:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uchar_ptr_t)recvd_jnl_seqno, (uchar_ptr_t)&msg.msg[0], SIZEOF(seq_num));
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:635:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((uchar_ptr_t)&xoff_ack.msg[0], (uchar_ptr_t)recvd_jnl_seqno, SIZEOF(seq_num));
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:665:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		seq_num_str[32], *seq_num_ptr;
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:864:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		seq_num_str[32], *seq_num_ptr;
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1005:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			err_string[1024];
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1069:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			err_string[1024];
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1158:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((uchar_ptr_t)&xoff_ack.msg[0], (uchar_ptr_t)&gtmsource_msgp->msg[0], SIZEOF(seq_num));
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			inputdata[REPL_MSG_CMPDATALEN], cmpbuf[REPL_MSG_CMPEXPDATALEN];
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1244:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(test_msg.data, cmpbuf, test_msg.datalen);
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1376:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			print_msg[1024];
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1393:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(old_needinst_msg.instname, jnlpool->repl_inst_filehdr->inst_info.this_instname, MAX_INSTNAME_LEN - 1);
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1432:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(needinst_msg.instname, jnlpool->repl_inst_filehdr->inst_info.this_instname, MAX_INSTNAME_LEN - 1);
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1500:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			err_string[1024];
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1547:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(histinfo->root_primary_instname, histinfo1_msg.instname, MAX_INSTNAME_LEN - 1);
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1575:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			err_string[1024];
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1676:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		histdetail[MAX_REPL_OPMSG_LEN];
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1769:98:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert((NULL != jnlpool) && (NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open);
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1845:98:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert((NULL != jnlpool) && (NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open);
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1918:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(oldtriple_msg.triplecontent.instname, histinfo.root_primary_instname, MAX_INSTNAME_LEN - 1);
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1970:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			histdetail[256];
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:1975:98:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert((NULL != jnlpool) && (NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open);
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:256:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			err_string[BUFSIZ];
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:397:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			jnl_fn[JNL_NAME_SIZE];
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:445:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(jnl_fn, new_ctl->repl_buff->fc->jfh->prev_jnl_file_name, jnl_fn_len);
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:463:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(reg_ctl_end->jnl_fn, jnl_fn, jnl_fn_len);
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:464:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(reg_ctl_end->reg->jnl_file_name, jnl_fn, jnl_fn_len);
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:817:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		seq_num_str[32], *seq_num_ptr;  /* INT8_PRINT */
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:936:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		*seq_num_ptr, seq_num_str[32]; /* INT8_PRINT */
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:953:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*buff, b->recbuff, b->reclen);
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:989:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(*buff, b->recbuff, b->reclen);
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:996:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(tcombuffp, b->recbuff, b->reclen);
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:1466:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		*seq_num_ptr, seq_num_str[32]; /* INT8_PRINT */
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:1554:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buff, gtmsource_tcombuff_start, tot_tcom_len);
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:1569:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		seq_num_str[32], *seq_num_ptr;  /* INT8_PRINT */
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:1926:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		*orig_msgp, seq_num_str[32], *seq_num_ptr;  /* INT8_PRINT */
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:2104:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		seq_num_str[32], *seq_num_ptr;  /* INT8_PRINT */
data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:118:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buff, (sm_uc_ptr_t)jnl_header + SIZEOF(jnldata_hdr_struct), read_size);
data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:120:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(buff + read_size, jnldata_base, wrap_size);
data/fis-gtm-6.3-007/sr_unix/gtmsource_rootprimary_init.c:95:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(histinfo.root_primary_instname, jnlpool->repl_inst_filehdr->inst_info.this_instname, MAX_INSTNAME_LEN - 1);
data/fis-gtm-6.3-007/sr_unix/gtmsource_seqno_init.c:73:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);
data/fis-gtm-6.3-007/sr_unix/gtmsource_srv_latch.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			scndry_msg[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:81:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:103:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITREF	char	ctypetab[NUM_CHARS];
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:124:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(SAVE_RTN_NAME, TRIGDSC->rtn_desc.rt_name.addr, SAVE_RTN_NAME_LEN);	\
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:131:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(SAVE_VAR_NAME, GVT->gvname.var_name.addr, SAVE_VAR_NAME_LEN);		\
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:186:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst_mstr->addr, addr, len);										\
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:193:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		rt_name[MAX_TRIGNAME_LEN], save_var_name[MAX_MIDENT_LEN];				\
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:222:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		str_buff[MAX_ZWR_KEY_SZ], *str_end;			\
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:421:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		keybuff[SIZEOF(gv_key) + DBKEYSIZE(MAX_KEY_SZ)];
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:499:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dststart, out_key->base, len);
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:512:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(dststart, out_key->base, len);
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:528:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(dststart, out_key->base, len);
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:563:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		source_buffer[MAX_SRCLINE];
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:577:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(source_buffer, ptr, len);
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:585:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, pat_ptstr.buff, len);
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:627:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		util_buff[MAX_TRIG_UTIL_LEN];
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:645:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			save_rtn_name[MAX_TRIGNAME_LEN], save_var_name[MAX_MIDENT_LEN];
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:980:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(lvnamedsc->var_name.addr, ptr_start, len);
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:1473:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*keysub_start[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_unix/gv_trigger.c:1487:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		util_buff[MAX_TRIG_UTIL_LEN];
data/fis-gtm-6.3-007/sr_unix/gv_trigger.h:187:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	DBGTRIGR_ONLY(char 		gvnamestr[MAX_MIDENT_LEN + 1];)								\
data/fis-gtm-6.3-007/sr_unix/gv_trigger.h:207:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	DBGTRIGR_ONLY(memcpy(gvnamestr, GVT->gvname.var_name.addr, GVT->gvname.var_name.len);)					\
data/fis-gtm-6.3-007/sr_unix/gv_trigger.h:479:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key, HASHT_GBLNAME, HASHT_GBLNAME_FULL_LEN);	/* including terminating '\0' subscript */		\
data/fis-gtm-6.3-007/sr_unix/gv_trigger.h:501:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!reg->open)											\
data/fis-gtm-6.3-007/sr_unix/gv_trigger.h:544:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	buff[MAX_ZWR_KEY_SZ], *end;							\
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:186:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(now_running, csa->nl->now_running, SIZEOF(now_running));						\
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:418:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*fnptr, fbuff[MAX_FN_LEN + 1], tmpbuff[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:448:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fbuff, file.addr, file.len);
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:476:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(seg->fname, pblk.buffer, pblk.b_esl);
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:548:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(tmpbuff, seg->fname, seg->fname_len + 1); /* + 1 to include terminating '\0' */
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:679:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            	machine_name[MAX_MCNAMELEN];
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:704:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			now_running[MAX_REL_NAME];
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:712:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			s[JNLBUFFUPDAPNDX_SIZE];	/* JNLBUFFUPDAPNDX_SIZE is defined in jnl.h */
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1123:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tsdbuff, (sgmnt_data_ptr_t)(TREF(dio_buff)).aligned, SGMNT_HDR_LEN);
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1324:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(csd, tsd, SIZEOF(sgmnt_data));
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1348:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cnl->now_running, gtm_release_name, gtm_release_name_len + 1);	/* GT.M release name */
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1349:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cnl->label, GDS_LABEL, GDS_LABEL_SZ - 1);				/* GDS label */
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1350:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cnl->fname, reg->dyn.addr->fname, reg->dyn.addr->fname_len);		/* database filename */
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1420:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			assert(baseDBreg->open);
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:1657:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(db_ipcs.fn, reg->dyn.addr->fname, reg->dyn.addr->fname_len);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_data.c:124:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_kill.c:129:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_order.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            cumul_key[MAX_KEY_SZ];
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_order.c:157:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_order.c:174:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&cumul_key[0], &gv_altkey->base[prev], cumul_key_len);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_order.c:200:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gv_altkey->base[0], &gv_currkey->base[0], prev);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_order.c:201:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gv_altkey->base[prev], &cumul_key[0], cumul_key_len);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_query.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            cumul_key[MAX_KEY_SZ];
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_query.c:126:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_query.c:141:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&cumul_key[0], &gv_altkey->base[0], cumul_key_len);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_query.c:168:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gv_altkey->base[0], &cumul_key[0], cumul_key_len);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_queryget.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            cumul_key[MAX_KEY_SZ];
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_queryget.c:133:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_queryget.c:148:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&cumul_key[0], &gv_altkey->base[0], cumul_key_len);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_queryget.c:177:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gv_altkey->base[0], &cumul_key[0], cumul_key_len);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_zprevious.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            cumul_key[MAX_KEY_SZ], savech;
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_zprevious.c:161:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_zprevious.c:178:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&cumul_key[0], &gv_altkey->base[prev], cumul_key_len);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_zprevious.c:204:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gv_altkey->base[0], &gv_currkey->base[0], prev);
data/fis-gtm-6.3-007/sr_unix/gvcst_spr_zprevious.c:205:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gv_altkey->base[prev], &cumul_key[0], cumul_key_len);
data/fis-gtm-6.3-007/sr_unix/ident.h:12:38:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define CONVERT_IDENT(to, from, len)	memcpy(to, from, len)
data/fis-gtm-6.3-007/sr_unix/incr_link.c:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name_buf[PATH_MAX + 1], marker[SIZEOF(JSB_MARKER) - 1], *rw_rel_start;
data/fis-gtm-6.3-007/sr_unix/incr_link.c:172:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			rtnname_buf[MAX_MIDENT_LEN];
data/fis-gtm-6.3-007/sr_unix/incr_link.c:306:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(hdr, shdr, SIZEOF(rhdtyp));
data/fis-gtm-6.3-007/sr_unix/incr_link.c:654:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sect_rw_rel, shdr + (INTPTR_T)rw_rel_start, sect_rw_rel_size);
data/fis-gtm-6.3-007/sr_unix/incr_link.c:705:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newaddr, hdr->src_full_name.addr, hdr->src_full_name.len);
data/fis-gtm-6.3-007/sr_unix/incr_link.c:706:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newaddr + hdr->src_full_name.len, hdr->routine_name.addr, hdr->routine_name.len);
data/fis-gtm-6.3-007/sr_unix/incr_link.c:713:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(name_buf, hdr->src_full_name.addr, name_buf_len);
data/fis-gtm-6.3-007/sr_unix/incr_link.c:724:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(sect_rw_nonrel, shdr + (INTPTR_T)hdr->labtab_adr, sect_rw_nonrel_size);
data/fis-gtm-6.3-007/sr_unix/incr_link.c:747:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zlink_mname.c[0], hdr->routine_name.addr, hdr->routine_name.len);
data/fis-gtm-6.3-007/sr_unix/incr_link.c:767:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&module_name.c[0], hdr->routine_name.addr, hdr->routine_name.len);
data/fis-gtm-6.3-007/sr_unix/incr_link.c:982:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&string_size, shdr + hdr->sym_table_off, SIZEOF(string_size));
data/fis-gtm-6.3-007/sr_unix/incr_link.c:1044:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&rtnid.c[0], sym_temp, sym_size);
data/fis-gtm-6.3-007/sr_unix/incr_link.c:1070:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&labid.c[0], sym_temp, sym_size);
data/fis-gtm-6.3-007/sr_unix/io_init_name.c:36:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sys_input.addr,temp, i);
data/fis-gtm-6.3-007/sr_unix/io_init_name.c:50:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sys_output.addr,temp, i);
data/fis-gtm-6.3-007/sr_unix/io_is_rm.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[BUFSIZ];
data/fis-gtm-6.3-007/sr_unix/io_is_rm.c:28:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, name->addr, name->len);
data/fis-gtm-6.3-007/sr_unix/io_open_try.c:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*buf, namebuf[LOGNAME_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/io_open_try.c:88:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	dev_type[MAX_DEV_TYPE_LEN];
data/fis-gtm-6.3-007/sr_unix/io_open_try.c:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		port_buffer[NI_MAXSERV], *port_ptr;
data/fis-gtm-6.3-007/sr_unix/io_open_try.c:123:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(namebuf, tn.addr, tn.len);
data/fis-gtm-6.3-007/sr_unix/io_open_try.c:285:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
								sockport=atoi(port_buffer);
data/fis-gtm-6.3-007/sr_unix/io_open_try.c:608:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	status = (iod->disp_ptr->open)(naml, pp, file_des, mspace, msec_timeout);
data/fis-gtm-6.3-007/sr_unix/iob_read.c:56:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, bf->bptr, bf->remaining);
data/fis-gtm-6.3-007/sr_unix/iob_read.c:78:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, bf->bptr, nbytes);
data/fis-gtm-6.3-007/sr_unix/iob_write.c:51:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bf->bptr, buf, bf->remaining);
data/fis-gtm-6.3-007/sr_unix/iob_write.c:60:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(bf->bptr, buf, nbytes);
data/fis-gtm-6.3-007/sr_unix/iopi_iocontrol.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		action[MAX_DEVCTL_LENGTH];
data/fis-gtm-6.3-007/sr_unix/iopi_iocontrol.c:99:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(d->addr, iod->dollar.key, MIN(len, d->len));
data/fis-gtm-6.3-007/sr_unix/iopi_iocontrol.c:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tname[MAX_FIXED_STRING];
data/fis-gtm-6.3-007/sr_unix/iopi_iocontrol.c:170:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(d->addr, tname, MIN(len,d->len));
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:53:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *path, path_buff[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:149:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(path_buff, path, path_len + 1);	/* + 1 for null */
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:159:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(copy_cmd_string, cmd_string, cmd_string_size);
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:171:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(command2, token1, STRLEN(token1) + 1);
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:229:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(dir_in_path, path, path_len + 1);
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:250:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ret_token, token2, STRLEN(token2) + 1);
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:297:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		*sparams[3] = {0, 0, 0};
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:309:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ret_token[GTM_MAX_DIR_LEN];
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:310:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		error_str[MAXDEVPARLEN + STR_LIT_LEN(INVALID_CMD2)];
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:382:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pcommand, sparams[PCOMMAND], slen[PCOMMAND]);
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:419:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pcommand, filtered_command.address, filtered_command.length);
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:439:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pshell, sparams[PSHELL], slen[PSHELL]);
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:465:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pstderr, sparams[PSTDERR], slen[PSTDERR]);
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:686:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iod->dollar.device, "0", SIZEOF("0"));
data/fis-gtm-6.3-007/sr_unix/iorm_close.c:166:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(savepath2, path2, path2len);
data/fis-gtm-6.3-007/sr_unix/iorm_get.c:249:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*pad_ptr, *nextmb, padchar, padcharray[2];
data/fis-gtm-6.3-007/sr_unix/iorm_get.c:328:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rm_ptr->inbuf, &rm_ptr->bom_buf[rm_ptr->bom_buf_off], from_bom);
data/fis-gtm-6.3-007/sr_unix/iorm_get.c:647:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*pad_ptr, *nextmb, padchar, padcharray[2];
data/fis-gtm-6.3-007/sr_unix/iorm_get.c:714:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rm_ptr->inbuf, &rm_ptr->bom_buf[rm_ptr->bom_buf_off], from_bom);
data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:110:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iod->dollar.zb, delimptr, MIN(delimlen, ESC_LEN - 1));
data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:112:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iod->dollar.key, delimptr, MIN(delimlen, DD_BUFLEN - 1));
data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:444:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(stringpool.free, buffer_start, bytes_read);
data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:1122:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(stringpool.free, rm_ptr->inbuf_off, v->str.len);
data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:1255:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(rm_ptr->inbuf_pos, &rm_ptr->bom_buf[rm_ptr->bom_buf_off], from_bom);
data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:1466:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(rm_ptr->inbuf_pos,
data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:1672:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(temp, char_start, char_bytes_read);
data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:1868:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(io_ptr->dollar.device, "0", SIZEOF("0"));
data/fis-gtm-6.3-007/sr_unix/iorm_use.c:193:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		seek_str[LIMIT_SEEK_STR];
data/fis-gtm-6.3-007/sr_unix/iorm_use.c:204:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		error_str[MAX_ERROR_SIZE];
data/fis-gtm-6.3-007/sr_unix/iorm_use.c:738:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(seek_str, (char *)(pp->str.addr + p_offset + 1), seek_len);
data/fis-gtm-6.3-007/sr_unix/iorm_write.c:119:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*inptr, *top, *nextmb, *outptr, *nextoutptr, *outstart, temppad, temppadarray[2];
data/fis-gtm-6.3-007/sr_unix/iorm_write.c:176:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(outptr, UTF16BE_BOM, UTF16BE_BOM_LEN);
data/fis-gtm-6.3-007/sr_unix/iorm_write.c:374:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(iod->dollar.device, "0", SIZEOF("0"));
data/fis-gtm-6.3-007/sr_unix/iorm_wteol.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*outstr, temppad, temppadarray[2], *out_ptr;
data/fis-gtm-6.3-007/sr_unix/iormdef.h:264:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	bom_buf[4];	/* Buffer area for BOM assembly */
data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cmsg_buffer[SIZEOF(struct cmsghdr) * 2 + CMSG_SPACE(MAX_PASS_FDS * SIZEOF(int))];
data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			complete_buf[STR_LIT_LEN(ACCEPT_COMPLETE)];
data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:226:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(iod->dollar.device, "0", SIZEOF("0"));
data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:329:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cmsg_buffer[SIZEOF(struct cmsghdr) * 2 + CMSG_SPACE(MAX_PASS_FDS * SIZEOF(int))];
data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:341:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			complete_buf[STR_LIT_LEN(PASS_COMPLETE)];
data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:407:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(iod->dollar.device, "0", SIZEOF("0"));
data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:516:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(psocketptr->handle, handlestr.addr, handlestr.len);
data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:574:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hptr, handles[0].addr, handles[0].len);
data/fis-gtm-6.3-007/sr_unix/iosocket_pass_local.c:579:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(hptr, handles[fdn].addr, handles[fdn].len);
data/fis-gtm-6.3-007/sr_unix/iosocket_tls.c:43:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char			dl_err[MAX_ERRSTR_LEN];
data/fis-gtm-6.3-007/sr_unix/iosocket_tls.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			idstr[MAX_TLSID_LEN + SIZEOF(RENEGOTIATE) + 1], optionstr[MAX_TLSOPTION];
data/fis-gtm-6.3-007/sr_unix/iosocket_tls.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			passwordstr[GTM_PASSPHRASE_MAX_ASCII + 1];
data/fis-gtm-6.3-007/sr_unix/iosocket_tls.c:168:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(iod->dollar.device, "0", SIZEOF("0"));
data/fis-gtm-6.3-007/sr_unix/iosocket_tls.c:217:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(extraptr, tlsid->str.addr, tlsid->str.len);
data/fis-gtm-6.3-007/sr_unix/iott_edit.c:48:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*str, string[TTDEF_BUF_SZ], *outptr, *outtop;
data/fis-gtm-6.3-007/sr_unix/iott_edit.c:119:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*str, string[TTDEF_BUF_SZ], *outptr, *outtop, *strstart, *nextptr;
data/fis-gtm-6.3-007/sr_unix/iott_edit.c:407:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	string[1024];
data/fis-gtm-6.3-007/sr_unix/iott_iocontrol.c:46:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(d->addr, iod->dollar.key, len);
data/fis-gtm-6.3-007/sr_unix/iott_rdone.c:79:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	more_buf[GTM_MB_LEN_MAX + 1], *more_ptr;	/* to build up multi byte for character */
data/fis-gtm-6.3-007/sr_unix/iott_rdone.c:121:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(more_buf, tt_state->more_buf, SIZEOF(more_buf));
data/fis-gtm-6.3-007/sr_unix/iott_rdone.c:194:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(tt_state->more_buf, more_buf, SIZEOF(more_buf));
data/fis-gtm-6.3-007/sr_unix/iott_rdone.c:506:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tt_ptr->recall_buff.addr, &INPUT_CHAR, SIZEOF(INPUT_CHAR));
data/fis-gtm-6.3-007/sr_unix/iott_rdone.c:539:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(io_ptr->dollar.key, io_ptr->dollar.zb, (zb_ptr - io_ptr->dollar.zb));
data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:81:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static readonly unsigned char	eraser[3] = { NATIVE_BS, NATIVE_SP, NATIVE_BS };
data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:130:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iod->dollar.zb, delimptr, MIN(delimlen, ESC_LEN - 1));
data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:132:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(iod->dollar.key, delimptr, MIN(delimlen, DD_BUFLEN - 1));
data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:148:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	more_buf[GTM_MB_LEN_MAX + 1], *more_ptr;	/* to build up multi byte for character */
data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:225:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(more_buf, tt_state->more_buf, SIZEOF(more_buf));
data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:362:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(tt_state->more_buf, more_buf, SIZEOF(more_buf));
data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:1118:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(io_ptr->dollar.key, io_ptr->dollar.zb, (zb_ptr - io_ptr->dollar.zb));
data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:1166:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tt_ptr->recall_buff.addr, BUFF_ADDR(0), BUFF_CHAR_SIZE * outlen);
data/fis-gtm-6.3-007/sr_unix/iott_use.c:53:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LITDEF unsigned char filter_index[27] =
data/fis-gtm-6.3-007/sr_unix/iott_use.c:312:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&mask_term.mask[0], (pp->str.addr + p_offset), SIZEOF(io_termmask));
data/fis-gtm-6.3-007/sr_unix/iott_use.c:477:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&temp_ptr->mask_term, &mask_term, SIZEOF(io_termmask));
data/fis-gtm-6.3-007/sr_unix/iott_write.c:67:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)tt_ptr->tbuffp, text, textlen);
data/fis-gtm-6.3-007/sr_unix/iottdef.h:90:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	escape_sequence[ESC_LEN];	/* dm_read only */
data/fis-gtm-6.3-007/sr_unix/iottdef.h:91:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	more_buf[GTM_MB_LEN_MAX + 1];
data/fis-gtm-6.3-007/sr_unix/ious_open.c:39:51:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		else if (!(((d_us_struct*)(iod->dev_sp))->disp->open))
data/fis-gtm-6.3-007/sr_unix/ious_open.c:44:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		((void(*)())(((d_us_struct*)(iod->dev_sp))->disp->open))();
data/fis-gtm-6.3-007/sr_unix/ipcrmid.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[128];
data/fis-gtm-6.3-007/sr_unix/ipcrmid.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[128];
data/fis-gtm-6.3-007/sr_unix/jnl_file_close_timer.c:67:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (!r_local->open || r_local->was_open)
data/fis-gtm-6.3-007/sr_unix/jnl_file_extend.c:66:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		hdr_buff[REAL_JNL_HDR_LEN + MAX_IO_BLOCK_SIZE];
data/fis-gtm-6.3-007/sr_unix/jnl_file_extend.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			prev_jnl_fn[JNL_NAME_SIZE];
data/fis-gtm-6.3-007/sr_unix/jnl_file_extend.c:244:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy((TREF(dio_buff)).aligned, csd, SGMNT_HDR_LEN);
data/fis-gtm-6.3-007/sr_unix/jnl_file_open.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buff[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			instfilename[MAX_FN_LEN + 1], machine_name[MAX_MCNAMELEN], scndry_msg[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:311:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)seg->fname, instfilename, full_len);
data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:680:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(jnlpool->repl_inst_filehdr, &repl_instance, REPL_INST_HDR_SIZE);	/* Initialize FILE HEADER */
data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:1096:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(jnlpool->jnlpool_ctl->jnlpool_id.instfilename, seg->fname, seg->fname_len);
data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:1098:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(jnlpool->jnlpool_ctl->jnlpool_id.label, GDS_RPL_LABEL, GDS_LABEL_SZ);
data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:1099:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(jnlpool->jnlpool_ctl->jnlpool_id.now_running, gtm_release_name, gtm_release_name_len + 1);
data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:1199:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(gtmsourcelocal_ptr->secondary_instname, gtmsource_options.secondary_instname, MAX_INSTNAME_LEN - 1);
data/fis-gtm-6.3-007/sr_unix/jnlpool_init.c:1250:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(repl_inst_name, repl_instance.inst_info.this_instname, MAX_INSTNAME_LEN);
data/fis-gtm-6.3-007/sr_unix/jobchild_init.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		run_file_name[FILE_NAME_SIZE + 2], *c;
data/fis-gtm-6.3-007/sr_unix/jobsp.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[MAX_JOBPARM_LEN];
data/fis-gtm-6.3-007/sr_unix/jobsp.h:153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			data[MAX_JOB_LEN];
data/fis-gtm-6.3-007/sr_unix/list_file.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char print_time_buf[20];
data/fis-gtm-6.3-007/sr_unix/list_file.c:47:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	v_width[SIZEOF(int4)];
data/fis-gtm-6.3-007/sr_unix/list_file.c:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	chsetebcdic[8];
data/fis-gtm-6.3-007/sr_unix/list_file.c:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		charspace, cp, fname[MAX_FN_LEN + 1], list_name[MAX_MIDENT_LEN + STR_LIT_LEN(LISTEXT)], *p;
data/fis-gtm-6.3-007/sr_unix/list_file.c:84:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(list_name, &source_file_name[cp], pblk.def1_size);
data/fis-gtm-6.3-007/sr_unix/list_file.c:109:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (print_time_buf, p + 4, SIZEOF(print_time_buf));
data/fis-gtm-6.3-007/sr_unix/list_file.c:133:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char page_no_buf[10];
data/fis-gtm-6.3-007/sr_unix/list_file.c:216:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[8];
data/fis-gtm-6.3-007/sr_unix/lke_fileio.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ofnamebuf[1024];
data/fis-gtm-6.3-007/sr_unix/lke_getansw.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[11], *bp;
data/fis-gtm-6.3-007/sr_unix/make_mode.c:90:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char dyn_modes_type[2][3] = {
data/fis-gtm-6.3-007/sr_unix/map_sym.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char   		buffer[MAX_TRANS_NAME_LEN];
data/fis-gtm-6.3-007/sr_unix/maskpass.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			passwd[GTM_PASSPHRASE_MAX], hex_out[GTM_PASSPHRASE_MAX * 2], mumps_exe[GTM_PATH_MAX], *env_ptr;
data/fis-gtm-6.3-007/sr_unix/mem_access.c:16:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void set_noaccess(unsigned char *na_page[2], unsigned char *prvprt)
data/fis-gtm-6.3-007/sr_unix/mem_access.c:28:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void reset_access(unsigned char *na_page[2], unsigned char oldprt)
data/fis-gtm-6.3-007/sr_unix/mmrhash.c:144:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buff, key, len);
data/fis-gtm-6.3-007/sr_unix/mmrhash.c:237:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buff, key, len);
data/fis-gtm-6.3-007/sr_unix/mmrhash.c:369:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buff, key, len);
data/fis-gtm-6.3-007/sr_unix/mmrhash.c:796:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		bytes[16], n;
data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c:163:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		path[MAX_FN_LEN + 1], errbuff[OUT_LINE];
data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c:164:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[DISK_BLOCK_SIZE];
data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c:177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		hash[GTMCRYPT_HASH_LEN];
data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c:366:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cs_data->encryption_hash, hash, GTMCRYPT_HASH_LEN);
data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c:420:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(baseDBreg->open);
data/fis-gtm-6.3-007/sr_unix/mu_decrypt.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		hash[GTMCRYPT_HASH_LEN], iv[GTM_MAX_IV_LEN], *iv_ptr, *buff, *buff_ptr;
data/fis-gtm-6.3-007/sr_unix/mu_decrypt.c:229:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hash, jfh->encryption_hash, GTMCRYPT_HASH_LEN);
data/fis-gtm-6.3-007/sr_unix/mu_decrypt.c:233:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hash, dfh->encryption_hash, GTMCRYPT_HASH_LEN);
data/fis-gtm-6.3-007/sr_unix/mu_extract.c:108:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
STATICDEF char				outfilename[256];
data/fis-gtm-6.3-007/sr_unix/mu_extract.c:143:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(outptr, val.str.addr, val.str.len);			\
data/fis-gtm-6.3-007/sr_unix/mu_extract.c:173:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char			delete_params[2] = { (unsigned char)iop_delete, (unsigned char)iop_eol };
data/fis-gtm-6.3-007/sr_unix/mu_extract.c:203:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				format_buffer[FORMAT_STR_MAX_SIZE],  ch_set_name[MAX_CHSET_NAME + 1], cli_buff[MAX_LINE],
data/fis-gtm-6.3-007/sr_unix/mu_extract.c:296:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(format_buffer, ZWR_FORMAT_STRING, n_len);
data/fis-gtm-6.3-007/sr_unix/mu_extract.c:337:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (reg->open)
data/fis-gtm-6.3-007/sr_unix/mu_extract.c:358:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (reg->open)
data/fis-gtm-6.3-007/sr_unix/mu_extract.c:394:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(curr_hash_ptr, csd->encryption_hash, GTMCRYPT_HASH_LEN);
data/fis-gtm-6.3-007/sr_unix/mu_extract.c:400:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(curr_hash_ptr, csd->encryption_hash2, GTMCRYPT_HASH_LEN);
data/fis-gtm-6.3-007/sr_unix/mu_extract.c:478:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(outptr, val.str.addr, val.str.len);
data/fis-gtm-6.3-007/sr_unix/mu_extract.c:497:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&outptr[label_len], label_buff, buflen);
data/fis-gtm-6.3-007/sr_unix/mu_getlst.c:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*c1, *c2, *c3, *c4, fbuff[GTM_PATH_MAX], rbuff[GTM_PATH_MAX], fnbuff[GTM_PATH_MAX + 1];
data/fis-gtm-6.3-007/sr_unix/mu_gvis.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key_buff[MAX_ZWR_KEY_SZ], *key_end;
data/fis-gtm-6.3-007/sr_unix/mu_op_open.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf1[MAX_TRANS_NAME_LEN]; /* buffer to hold translated name */
data/fis-gtm-6.3-007/sr_unix/mu_op_open.c:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*buf, namebuf[LOGNAME_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/mu_op_open.c:126:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(namebuf, tn.addr, tn.len);
data/fis-gtm-6.3-007/sr_unix/mu_op_open.c:392:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	status = (iod->disp_ptr->open)(naml, pp, file_des, mspace, NO_M_TIMEOUT);
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:74:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ipcs_buff[MAX_IPCS_ID_BUF], *ipcs_ptr;								\
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:144:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		ipcs_buff[MAX_IPCS_ID_BUF], *ipcs_ptr;
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			entry[MAX_ENTRY_LEN];
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:259:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			msgbuff[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:277:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fname, nl_addr->fname, MAX_FN_LEN + 1);
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:423:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			msgbuff[OUT_BUFF_SIZE], *instfilename;
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:440:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)replpool_id, (void *)start_addr, SIZEOF(replpool_identifier));
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:669:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			entry[MAX_ENTRY_LEN];
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:671:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			fname[MAX_FN_LEN + 1], *fgets_res;
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:137:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(BUFF, TSD, TSD_SIZE);			\
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:322:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char                    now_running[MAX_REL_NAME];
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:354:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			basedb_fname[MAX_FN_LEN + 1], statsdb_fname[MAX_FN_LEN + 1], *statsdb_fname_ptr;
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:460:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tsd, buff, tsd_size);
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:503:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(basedb_fname, tsd->basedb_fname, basedb_fname_len + 1);	/* copy trailing '\0' too */
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:510:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(baseDBseg->fname, basedb_fname, basedb_fname_len + 1);	/* copy trailing '\0' too */
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:533:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(statsDBudi, udi, SIZEOF(*udi));
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_file.c:971:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(now_running, cnl->now_running, MAX_REL_NAME);
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_repl_instance.c:94:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		ipcs_buff[MAX_IPCS_ID_BUF], *ipcs_ptr;
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_repl_instance.c:145:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *)reg->dyn.addr->fname, instfilename, reg->dyn.addr->fname_len + 1);
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_repl_instance.c:355:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(jnlpool->repl_inst_filehdr, &repl_instance, SIZEOF(repl_inst_hdr));
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_replpool.c:108:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)replpool_id, (void *)start_addr, SIZEOF(replpool_identifier));
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_replpool.c:171:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(repl_inst_filehdr, jnlpool->repl_inst_filehdr, SIZEOF(repl_inst_hdr));
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_rlnkctl.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			objdir[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/mu_signal_process.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[256];
data/fis-gtm-6.3-007/sr_unix/mu_size_scan.c:123:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&gv_target->hist.h[0], &gv_target->hist.h[nLevl], SIZEOF(srch_blk_status));
data/fis-gtm-6.3-007/sr_unix/mu_size_scan.c:242:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&sibhist.h[0], &gv_target->hist.h[lvl], SIZEOF(srch_blk_status) * (gv_target->hist.depth - lvl + 2));
data/fis-gtm-6.3-007/sr_unix/mu_size_scan.c:250:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gv_target->alt_hist, &gv_target->hist, SIZEOF(srch_hist)); /* take a copy of most recently validated history */
data/fis-gtm-6.3-007/sr_unix/mu_swap_root.c:362:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(saved_blk, child_blk_ptr, child_blk_size);
data/fis-gtm-6.3-007/sr_unix/mu_trig_trgfile.c:51:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cli_lex_in_ptr_save->in_str, cli_lex_in_ptr->in_str, cli_lex_in_ptr->buflen);
data/fis-gtm-6.3-007/sr_unix/mu_truncate.c:109:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_unix/mubexpfilnam.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp_mstr_addr[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/mubexpfilnam.c:56:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(list->backup_file.addr, dirname, dirlen);
data/fis-gtm-6.3-007/sr_unix/mubexpfilnam.c:57:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(list->backup_file.addr + dirlen, c1, (file.len - (c1 - file.addr)));
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmpcmd[(MAX_FN_LEN) * 2 + STR_LIT_LEN(UNALIAS) + 1];				\
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:93:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tmpcmd[tmpcmdlen], fulpathcmd[2], cmdpathlen);				\
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tmpcmd[tmpcmdlen], tempdir, tmpdirlen);					\
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:134:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		cmdarray[COMMAND_ARRAY_SIZE], *command = &cmdarray[0];
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 			fulpathcmd[NUM_CMD][MAX_FN_LEN] = {{CP_CMD}, {MV_CMD}, {RMDIR_CMD}};
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tempfilename[MAX_FN_LEN + 1], tempdir[MAX_FN_LEN], prefix[MAX_FN_LEN];
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmpsrcfname[MAX_FN_LEN], tmpsrcdirname[MAX_FN_LEN], realpathname[PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:178:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tempdir, file->addr, ptr - file->addr + 1);
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:187:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(prefix, gv_cur_region->rname, gv_cur_region->rname_len);
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:228:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmpsrcfname, gv_cur_region->dyn.addr->fname, gv_cur_region->dyn.addr->fname_len);
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:233:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmpsrcdirname, gv_cur_region->dyn.addr->fname, gv_cur_region->dyn.addr->fname_len);
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:240:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tempdir, tempfilename, tempfilelen);
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:275:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&command[cmdlen], sourcedirname, sourcedirlen);
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:281:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&command[cmdlen], fulpathcmd[0], cmdpathlen);
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:285:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&command[cmdlen], sourcefilename, sourcefilelen);
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:288:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&command[cmdlen], realpathname, realpathlen);
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:314:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tempfilename[tempfilelen], sourcefilename, STRLEN(sourcefilename));
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:601:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&command[cmdlen], fulpathcmd[1], cmdpathlen);
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:603:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&command[cmdlen], tempfilename, tempfilelen);
data/fis-gtm-6.3-007/sr_unix/mubfilcpy.c:606:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&command[cmdlen], file->addr, tmplen);
data/fis-gtm-6.3-007/sr_unix/mubgetfil.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tcp[5], temp;
data/fis-gtm-6.3-007/sr_unix/mubgetfil.c:57:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(list->backup_file.addr, name + 1, len);
data/fis-gtm-6.3-007/sr_unix/mubgetfil.c:75:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(list->backup_file.addr, name, len);
data/fis-gtm-6.3-007/sr_unix/mubgetfil.c:94:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(list->backup_file.addr, name, len);
data/fis-gtm-6.3-007/sr_unix/mubgetfil.c:104:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(directory.addr, name, len);
data/fis-gtm-6.3-007/sr_unix/mubgetfil.c:112:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(list->backup_file.addr, name, len);
data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:120:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static	char			incbackupfile[MAX_FILENAME_LENGTH];
data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 			*c, addr[SA_MAXLEN + 1];
data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:224:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(incbackupfile, file->addr, file->len);
data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:281:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&outbuf->date[0], val.str.addr, val.str.len);
data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:282:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&outbuf->reg[0], gv_cur_region->rname, MAX_RN_LEN);
data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:417:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(bm_blk_buff, bptr, BM_SIZE(header->bplmap));
data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:479:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(data_ptr, bptr, blk_bsiz);
data/fis-gtm-6.3-007/sr_unix/mubinccpy.c:752:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	s[80];
data/fis-gtm-6.3-007/sr_unix/mupip_crypt.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			fname[GTM_PATH_MAX], type[32];	/* Type should not be too long */
data/fis-gtm-6.3-007/sr_unix/mupip_cvtgbl.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fn[MAX_FN_LEN + 1], *line1_ptr, *line3_ptr;
data/fis-gtm-6.3-007/sr_unix/mupip_cvtgbl.c:68:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ONERROR_VALUE_LEN];
data/fis-gtm-6.3-007/sr_unix/mupip_cvtgbl.c:95:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fn, sys_input.addr, sys_input.len);
data/fis-gtm-6.3-007/sr_unix/mupip_dump_fhead.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char			gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/mupip_dump_fhead.c:58:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	file[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/mupip_dump_fhead.c:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cmd_dmpfhead_string[DUMPFHEAD_CMD_STRING_SIZE];
data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:164:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			db_name[MAX_FN_LEN + 1], *t_name;
data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			outdb[MAX_FN_LEN + 1], conf_buff[MAX_CONF_RESPONSE + 1], *response;
data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:491:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_data, old_data, SIZEOF(sgmnt_data));
data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:909:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*blk_buff[2], *lbmap_buff[2], *errptr;
data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:969:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(lbmap_buff[buff_new], lbmap_buff[buff_old], bsize);
data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:1023:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(blk_buff[buff_new], blk_buff[buff_old], bsize);
data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:1242:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pvt_crypt_buf.addr, buff, SIZEOF(blk_hdr));
data/fis-gtm-6.3-007/sr_unix/mupip_endiancvt.c:1354:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	found_gv_key_buff[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_unix/mupip_exit_handler.c:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		err_log[1024];
data/fis-gtm-6.3-007/sr_unix/mupip_ftok.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fn[MAX_FN_LEN + 1], instfilename[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/mupip_hash.c:32:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		hash_hex[32], readbuf[4096];
data/fis-gtm-6.3-007/sr_unix/mupip_load_reg_list.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			msg_buff[128];
data/fis-gtm-6.3-007/sr_unix/mupip_rctldump.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			objdir[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.c:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			key[GTM_PATH_MAX], hash[GTMCRYPT_HASH_LEN];
data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.c:381:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(csd->encryption_hash2, hash, GTMCRYPT_HASH_LEN);
data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.c:408:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&csa->encr_key_handle2, &handles[i], SIZEOF(gtmcrypt_key_t));
data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.c:502:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(bml_lcl_buff, (blk_hdr_ptr_t)bml_sm_buff, BM_SIZE(BLKS_PER_LMAP));
data/fis-gtm-6.3-007/sr_unix/mupip_reorg_encrypt.c:749:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(csd->encryption_hash, csd->encryption_hash2, GTMCRYPT_RESERVED_HASH_LEN);
data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			db_name[MAX_FN_LEN + 1], *inbuf, *p, *blk_ptr;
data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			msg_buffer[1024], *newmap;
data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			addr[SA_MAXLEN + 1];
data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:136:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		tcp[5];
data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:208:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&old_data, csd, SGMNT_HDR_LEN);
data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:607:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((TREF(dio_buff)).aligned, blk_ptr, size);
data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:644:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((TREF(dio_buff)).aligned, csd, SGMNT_HDR_LEN);
data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:680:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((TREF(dio_buff)).aligned, inbuf, orig_size);
data/fis-gtm-6.3-007/sr_unix/mupip_rundown.c:100:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		ipcs_buff[MAX_IPCS_ID_BUF], *ipcs_ptr;
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			acc_spec[MAX_ACC_METH_LEN + 1], *command = "MUPIP SET VERSION", *errptr, exit_stat, *fn,
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:453:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gv_cur_region->dyn.addr->fname, fn, fn_len);
data/fis-gtm-6.3-007/sr_unix/mupip_set_jnlfile.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		hdr_buffer[REAL_JNL_HDR_LEN];
data/fis-gtm-6.3-007/sr_unix/mupip_size.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 			buff[MAX_LINE], cli_buff[MAX_LINE];
data/fis-gtm-6.3-007/sr_unix/mupip_trigger.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		trigger_file_name[MAX_FN_LEN + 1], select_list[MAX_LINE], select_file_name[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*ptr, rename_fn[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:153:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(mur_options.extr_fn[recstat], jctl->jnl_fn, base_len);
data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:155:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(mur_options.extr_fn[recstat] + base_len, fn_exten[recstat], fn_exten_size);
data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:166:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(file_info->fn, mur_options.extr_fn[recstat], mur_options.extr_fn_len[recstat]);
data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:172:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(mur_shm_hdr->extr_fn[recstat].fn, file_info->fn, file_info->fn_len);
data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:179:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(file_info->fn, mur_shm_hdr->extr_fn[recstat].fn, mur_shm_hdr->extr_fn_len[recstat]);
data/fis-gtm-6.3-007/sr_unix/mur_cre_file_extfmt.c:226:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ptr, reg->rname, reg->rname_len);
data/fis-gtm-6.3-007/sr_unix/murgetlst.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*c1, *c2, buff[MAX_LINE];
data/fis-gtm-6.3-007/sr_unix/murgetlst.c:48:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr->input_file.addr, c1, c2 - c1);
data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		mutex_sock_path[MAX_TRANS_NAME_LEN];
data/fis-gtm-6.3-007/sr_unix/mutex_sock_init.c:65:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   pid_str[2 * SIZEOF(pid_t) + 1];
data/fis-gtm-6.3-007/sr_unix/mutex_wake_proc.c:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   	mutex_wake_this_proc_str[2 * SIZEOF(pid_t) + 1];
data/fis-gtm-6.3-007/sr_unix/mutex_wake_proc.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			sendtomsg[256];
data/fis-gtm-6.3-007/sr_unix/obj_file.c:52:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char			emit_buff[OBJ_EMIT_BUF_SIZE];	/* buffer for emit output */
data/fis-gtm-6.3-007/sr_unix/obj_file.c:126:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stringpool.free, source, size);
data/fis-gtm-6.3-007/sr_unix/obj_file.c:135:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(emit_buff + emit_buff_used, source, write);
data/fis-gtm-6.3-007/sr_unix/obj_file.c:251:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&newsym->name[0], name->addr, name->len);
data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:75:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(TADR(tmp_object_file_name), object_fname, object_fname_len);
data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:77:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(TADR(tmp_object_file_name) + object_fname_len, MKSTEMP_MASK, SIZEOF(MKSTEMP_MASK));
data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		obj_name[SIZEOF(mident_fixed) + 5];
data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:142:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&obj_name[0], module_name.addr, rout_len);
data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:143:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&obj_name[rout_len], DOTOBJ, SIZEOF(DOTOBJ));    /* Includes null terminator */
data/fis-gtm-6.3-007/sr_unix/ojchildioclean.c:54:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (r_local->open && !r_local->was_open && IS_REG_BG_OR_MM(r_local))
data/fis-gtm-6.3-007/sr_unix/ojchildioset.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		fname_buf[MAX_STDIOE_LEN], buf[MAX_STDIOE_LEN];
data/fis-gtm-6.3-007/sr_unix/ojchildioset.c:82:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(jparms->input_prebuffer, socketptr->buffer + socketptr->buffered_offset,
data/fis-gtm-6.3-007/sr_unix/ojchildparms.c:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			parm_string[8];
data/fis-gtm-6.3-007/sr_unix/ojchildparms.c:174:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(stringpool.free, arg_msg.data, arg_msg.len);
data/fis-gtm-6.3-007/sr_unix/ojchkfs.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	es[MAX_FILSPC_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/ojparams.c:78:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(job_params->params.directory.buffer, p + 1, job_params->params.directory.len);
data/fis-gtm-6.3-007/sr_unix/ojparams.c:86:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(job_params->params.error.buffer, p + 1, job_params->params.error.len);
data/fis-gtm-6.3-007/sr_unix/ojparams.c:94:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(job_params->params.gbldir.buffer, p + 1, job_params->params.gbldir.len);
data/fis-gtm-6.3-007/sr_unix/ojparams.c:102:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(job_params->params.input.buffer, p + 1, job_params->params.input.len);
data/fis-gtm-6.3-007/sr_unix/ojparams.c:110:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(job_params->params.output.buffer, p + 1, job_params->params.output.len);
data/fis-gtm-6.3-007/sr_unix/ojparams.c:122:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(job_params->params.startup.buffer, p + 1, job_params->params.startup.len);
data/fis-gtm-6.3-007/sr_unix/ojparams.c:130:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(job_params->cmdline.buffer, p + 1, job_params->cmdline.len);
data/fis-gtm-6.3-007/sr_unix/ojparams.c:179:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(job_params->params.input.buffer, definput, job_params->params.input.len);
data/fis-gtm-6.3-007/sr_unix/ojparams.c:200:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy (&job_params->params.output.buffer[0], job_params->params.routine.buffer, job_params->params.routine.len);
data/fis-gtm-6.3-007/sr_unix/ojparams.c:201:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy (&job_params->params.output.buffer[job_params->params.routine.len], defoutext.addr, defoutext.len);
data/fis-gtm-6.3-007/sr_unix/ojparams.c:224:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&job_params->params.error.buffer[0], job_params->params.routine.buffer, job_params->params.routine.len);
data/fis-gtm-6.3-007/sr_unix/ojparams.c:225:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&job_params->params.error.buffer[job_params->params.routine.len], deferrext.addr, deferrext.len);
data/fis-gtm-6.3-007/sr_unix/ojparams.c:250:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(job_params->params.gbldir.buffer, dollar_zgbldir.str.addr, dollar_zgbldir.str.len);
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:87:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char		gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:233:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAX_STDIOE_LEN];
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:296:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[MAX_STRLEN];
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:354:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cbuff[TEMP_BUFF_SIZE], pbuff[TEMP_BUFF_SIZE], cmdbuff[TEMP_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:355:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tbuff[MAX_MUMPS_EXE_PATH_LEN], tbuff2[MAX_MUMPS_EXE_PATH_LEN], fname_buf[MAX_STDIOE_LEN];
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:375:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*argv[4];
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:518:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(params.output.buffer, jparms->params.output.buffer, jparms->params.output.len);
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:521:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(params.error.buffer, jparms->params.error.buffer, jparms->params.error.len);
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:596:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(arg_msg.data, jp->parm->str.addr, jp->parm->str.len);
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:789:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tbuff, c1, string_len);
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:812:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cmdbuff, jparms->cmdline.buffer, jparms->cmdline.len);
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:159:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p_list, buff_front_boarder, buff_boarder_len);
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:160:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((p_list + len + buff_boarder_len), buff_end_boarder, buff_boarder_len);
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:485:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		str_buffer[MAX_NAME_LENGTH], *tmp_buff_ptr, *jni_err_buf;
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:606:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char param_list_buff[(call_buff_size + 2*buff_boarder_len)];
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:627:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(free_string_pointer, v->str.addr, v->str.len);
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:702:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(free_string_pointer, v->str.addr, v->str.len);
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:800:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(str_buffer, PACKAGE_ENV_PREFIX, SIZEOF(PACKAGE_ENV_PREFIX));
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:806:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(tmp_buff_ptr, package->str.addr, package->str.len);
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:831:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		str_buffer[MAX_NAME_LENGTH], *tmp_buff_ptr, *xtrnl_table_name;
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:952:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char param_list_buff[(call_buff_size + 2*buff_boarder_len)];
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:988:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(free_string_pointer, v->str.addr, v->str.len);
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:1014:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(free_string_pointer, v->str.addr, v->str.len);
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:1051:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(free_string_pointer, v->str.addr, v->str.len);
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:1165:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(str_buffer, PACKAGE_ENV_PREFIX, SIZEOF(PACKAGE_ENV_PREFIX));
data/fis-gtm-6.3-007/sr_unix/op_fnfgncal.c:1171:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tmp_buff_ptr, package->str.addr, package->str.len);
data/fis-gtm-6.3-007/sr_unix/op_fngetjpi.c:34:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char	keyword[MAX_KEY] ;
data/fis-gtm-6.3-007/sr_unix/op_fngetjpi.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		upcase[MAX_KEY_LEN];
data/fis-gtm-6.3-007/sr_unix/op_fnpiece.c:73:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(unichar.unibytes_val, del->str.addr, del->str.len);
data/fis-gtm-6.3-007/sr_unix/op_fnzparse.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		field_buf[DIR_LEN], type_buf[SYN_LEN], result[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:184:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ar[MAX_DIGITS_IN_INT8], *q;
data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:202:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, q, len);
data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:214:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ar[MAX_HEX_DIGITS_IN_INT8], *q;
data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:228:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, q, fmtlen);
data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		timebuff[MAXNUMLEN + 1];
data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:261:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stringpool.free, zpeekadr, len);
data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:443:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		mnemonic[NAME_ENTRY_SZ], *nptr, *cptr, *cptrend, *argptr;
data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:448:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		argument_uc_buf[ARGUMENT_MAX_LEN];
data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:541:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(TADR(zpeek_regname), argptr, arglen);
data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:550:50:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if ((PO_GDRREG != mnemonic_opcode) && !r_ptr->open)
data/fis-gtm-6.3-007/sr_unix/op_fnzpeek.c:553:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (!r_ptr->open)
data/fis-gtm-6.3-007/sr_unix/op_fnzsearch.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		pblk_buf[GTM_PATH_MAX], sanitized_buf[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/op_fnzsearch.c:297:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		file_name[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/op_fnzsearch.c:308:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(file_name, res->str.addr, res->str.len);
data/fis-gtm-6.3-007/sr_unix/op_fnzsyslog.c:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		rebuff[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/op_fnzsyslog.c:43:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rebuff, src->str.addr, len);	/* Rebuffer to add null terminator */
data/fis-gtm-6.3-007/sr_unix/op_fnzsyslog.c:49:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, &literal_one, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_unix/op_fnztrnlnm.c:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_TRANS_NAME_LEN];
data/fis-gtm-6.3-007/sr_unix/op_fnztrnlnm.c:71:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, name->str.addr, name->str.len);
data/fis-gtm-6.3-007/sr_unix/op_fnztrnlnm.c:86:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ret->str.addr, status, retlen);
data/fis-gtm-6.3-007/sr_unix/op_job.c:105:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buff[128], *c;
data/fis-gtm-6.3-007/sr_unix/op_job.c:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			combuf[128];
data/fis-gtm-6.3-007/sr_unix/op_job.c:150:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(job_params.params.routine.buffer, routine->str.addr, job_params.params.routine.len);
data/fis-gtm-6.3-007/sr_unix/op_job.c:152:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(job_params.params.label.buffer, label->str.addr, job_params.params.label.len);
data/fis-gtm-6.3-007/sr_unix/op_job.c:262:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buff, joberrs[joberr_sig].msg, joberrs[joberr_sig].len);
data/fis-gtm-6.3-007/sr_unix/op_job.c:269:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buff, joberrs[joberr_stp].msg, joberrs[joberr_stp].len);
data/fis-gtm-6.3-007/sr_unix/op_setextract.c:109:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(straddr, srcbase, pfxlen);
data/fis-gtm-6.3-007/sr_unix/op_setextract.c:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(straddr, expr->str.addr, expr->str.len);
data/fis-gtm-6.3-007/sr_unix/op_setextract.c:124:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(straddr, srcbase + sfxoff, sfxlen);
data/fis-gtm-6.3-007/sr_unix/op_setp1.c:266:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str_addr, src->str.addr, pfx_str_len);
data/fis-gtm-6.3-007/sr_unix/op_setp1.c:274:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(str_addr, ldelim.unibytes_val, dlmlen);
data/fis-gtm-6.3-007/sr_unix/op_setp1.c:286:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str_addr, expr->str.addr, expr->str.len);
data/fis-gtm-6.3-007/sr_unix/op_setp1.c:292:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str_addr, start_pfx + sfx_start_offset, sfx_str_len);
data/fis-gtm-6.3-007/sr_unix/op_setp1.c:321:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&cfnpc->pstart[0], &pfnpc->pstart[0], (cfnpc->npcs + 1) * SIZEOF(unsigned int));
data/fis-gtm-6.3-007/sr_unix/op_setpiece.c:87:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(unichar.unibytes_val, del->str.addr, del->str.len);
data/fis-gtm-6.3-007/sr_unix/op_setpiece.c:137:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str_addr, src->str.addr, first_src_ind);
data/fis-gtm-6.3-007/sr_unix/op_setpiece.c:145:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(str_addr, del->str.addr, del->str.len);
data/fis-gtm-6.3-007/sr_unix/op_setpiece.c:154:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(str_addr, expr->str.addr, expr->str.len);
data/fis-gtm-6.3-007/sr_unix/op_setpiece.c:161:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str_addr, tmp_str, len);
data/fis-gtm-6.3-007/sr_unix/op_zedit.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		es[MAX_FN_LEN + 1], typ, *ptr;
data/fis-gtm-6.3-007/sr_unix/op_zedit.c:108:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&es[path_len], DOTM, STR_LIT_LEN(DOTM));
data/fis-gtm-6.3-007/sr_unix/op_zedit.c:154:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&es[0], srcdir->str.addr, srcdir->str.len);
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:104:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&objnamebuf[objdir->str.len + tslash], module_name.addr, module_name.len);				\
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:106:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&objnamebuf[objnamelen], DOTOBJ, SIZEOF(DOTOBJ));	/* Copies null terminator */			\
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:111:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cmd_qlf.object_file.str.addr, objnamebuf, objnamelen);								\
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*err_code, *fname,
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:217:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stringpool.free, file.addr, file.len);
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:238:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(objnamebuf, file.addr, objnamelen);
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:239:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&objnamebuf[objnamelen], DOTOBJ, SIZEOF(DOTOBJ));	/* Copies null terminator */
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:249:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&srcnamebuf[file.len], DOTM, SIZEOF(DOTM));		/* Copies null terminator */
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:252:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(objnamebuf, file.addr, file.len);
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:253:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&objnamebuf[file.len], DOTOBJ, SIZEOF(DOTOBJ));		/* Copies null terminator */
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:286:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(srcnamebuf, v->str.addr, v->str.len);
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:287:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&srcnamebuf[v->str.len], DOTM, SIZEOF(DOTM));
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:291:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(objnamebuf, srcnamebuf, v->str.len);
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:292:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&objnamebuf[v->str.len], DOTOBJ, SIZEOF(DOTOBJ));		/* Copies null terminator */
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:327:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(objnamebuf, objdir->str.addr, objdir->str.len);
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:361:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(srcnamebuf, srcdir->str.addr, srcdir->str.len);
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:390:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(objnamebuf, objdir->str.addr, objdir->str.len);
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:492:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(objnamebuf, object_file_name, object_name_len);
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:509:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(module_name.addr, v->str.addr, module_name.len);
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:510:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(routine_name.addr, v->str.addr, routine_name.len);
data/fis-gtm-6.3-007/sr_unix/op_zmess.c:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[FAO_BUFFER_SPACE];
data/fis-gtm-6.3-007/sr_unix/op_zrupdate.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			pblkbuf[MAX_FN_LEN + 1], statbuf[MAX_FN_LEN + 1], namebuf[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/op_zrupdate.c:193:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(namebuf, objpath.str.addr + plen.p.pblk.b_dir, plen.p.pblk.b_name);
data/fis-gtm-6.3-007/sr_unix/op_zrupdate.c:205:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(statbuf, objpath.str.addr, objpath.str.len);
data/fis-gtm-6.3-007/sr_unix/op_ztrigger.c:85:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_unix/parse_file.c:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			local_node_name[MAX_HOST_NAME_LEN + 1], query_node_name[MAX_HOST_NAME_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/parse_file.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			def_string[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/parse_file.c:137:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(query_node_name, trans.addr, query_node_len);
data/fis-gtm-6.3-007/sr_unix/parse_file.c:144:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy((sockaddr_ptr)&query_sas, ai_ptr->ai_addr, ai_ptr->ai_addrlen);
data/fis-gtm-6.3-007/sr_unix/parse_file.c:225:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ptr, def_trans.str.addr, def_trans.str.len);
data/fis-gtm-6.3-007/sr_unix/parse_file.c:336:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(name, def.l_name, def.b_name);
data/fis-gtm-6.3-007/sr_unix/parse_file.c:349:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ext, def.l_ext, def.b_ext);
data/fis-gtm-6.3-007/sr_unix/parse_file.c:364:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(name + diff, name, pblk->b_name + pblk->b_ext);
data/fis-gtm-6.3-007/sr_unix/parse_file.c:365:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(base, def.l_dir, def.b_dir);
data/fis-gtm-6.3-007/sr_unix/put_cdidx.c:41:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(str->addr, x->addr, x->len);
data/fis-gtm-6.3-007/sr_unix/random.c:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAX_RND_IDX+2];
data/fis-gtm-6.3-007/sr_unix/random.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c_seed[MAX_SEED_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/rc.h:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char		 octet[SIZEOF(unsigned char)];
data/fis-gtm-6.3-007/sr_unix/rc.h:87:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char		 octet[SIZEOF(unsigned short)];
data/fis-gtm-6.3-007/sr_unix/rc.h:92:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char		 octet[SIZEOF(uint4)];
data/fis-gtm-6.3-007/sr_unix/rc.h:116:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 filler1[5];
data/fis-gtm-6.3-007/sr_unix/rc.h:117:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 asm1[32];
data/fis-gtm-6.3-007/sr_unix/rc.h:126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	value[4];
data/fis-gtm-6.3-007/sr_unix/rc.h:154:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 key[1];
data/fis-gtm-6.3-007/sr_unix/rc.h:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 str[1];
data/fis-gtm-6.3-007/sr_unix/rc.h:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 pageaddr[4];
data/fis-gtm-6.3-007/sr_unix/rc.h:187:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 pageaddr[4];
data/fis-gtm-6.3-007/sr_unix/rc.h:196:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 page[1];
data/fis-gtm-6.3-007/sr_unix/rc.h:213:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 license_num[12];
data/fis-gtm-6.3-007/sr_unix/rc.h:214:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 license_blk[224];
data/fis-gtm-6.3-007/sr_unix/rc.h:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 time[4];
data/fis-gtm-6.3-007/sr_unix/rc.h:224:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	 license_blk[224];
data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c:154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[1024];
data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c:276:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[1024];
data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c:352:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[1024];
data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c:461:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[1024];
data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c:594:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)head + head->cpt_tab.value, ptr, copy_size);
data/fis-gtm-6.3-007/sr_unix/rc_cpt_ops.c:597:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)head + head->cpt_tab.value + copy_size,
data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:61:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			repl_instfilename[MAX_FN_LEN + 1];	/* save first instance */
data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:62:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			repl_inst_name[MAX_INSTNAME_LEN];	/* for syslog */
data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		instfilename[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:86:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char           	machine_name[MAX_MCNAMELEN];
data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		scndry_msg[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:147:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)reg->dyn.addr->fname, instfilename, full_len);
data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:385:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( (char *)recvpool.recvpool_ctl->recvpool_id.instfilename, instfilename, full_len);
data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:386:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(recvpool.recvpool_ctl->recvpool_id.label, GDS_RPL_LABEL, GDS_LABEL_SZ);
data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:387:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(recvpool.recvpool_ctl->recvpool_id.now_running, gtm_release_name, gtm_release_name_len + 1);
data/fis-gtm-6.3-007/sr_unix/recvpool_init.c:556:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(repl_inst_name, repl_instance.inst_info.this_instname, MAX_INSTNAME_LEN);
data/fis-gtm-6.3-007/sr_unix/reg_cmcheck.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fbuff[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/reg_cmcheck.c:59:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(seg->fname, pblk.buffer, pblk.b_esl);
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			pathin[GTM_PATH_MAX], resolvedpath[GTM_PATH_MAX];	/* Includes null terminator char */
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			relinkctl_path[GTM_PATH_MAX], *ptr;
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:116:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pathin, obj_container_name->addr, obj_container_name->len);
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:150:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(obj_container_name->addr, objdir.addr, objdir.len);
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:195:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_link_ptr, &new_link, SIZEOF(open_relinkctl_sgm));
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:197:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, new_link.zro_entry_name.addr, new_link.zro_entry_name.len + 1);
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:200:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, new_link.relinkctl_path, len);
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:233:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			errstr[256];
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:512:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(hdr->zro_entry_name, linkctl->zro_entry_name.addr, hdr->zro_entry_name_len);
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:574:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int relinkctl_get_key(char key[GTM_PATH_MAX], mstr *zro_entry_name)
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:579:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	hexstr[33];
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:597:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key_ptr, (TREF(gtm_linktmpdir)).addr, (TREF(gtm_linktmpdir)).len);
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:825:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&rec->rtnname_fixed.c[0], rtnname->addr, rtnname->len);
data/fis-gtm-6.3-007/sr_unix/relinkctl.h:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		zro_entry_name[ZRO_DIR_PATH_MAX + 1];	/* null-terminated full path of the directory in $zroutines
data/fis-gtm-6.3-007/sr_unix/relinkctl.h:225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		relinkctl_fname[GTM_PATH_MAX];	/* full path of the relinkctl file (mmr hash is in this name) */
data/fis-gtm-6.3-007/sr_unix/relinkctl.h:293:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int			relinkctl_get_key(char key[GTM_PATH_MAX], mstr *zro_entry_name);
data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			rename_fn[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			inst_fn[MAX_FN_LEN + 1], inst_name[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			machine_name[MAX_MCNAMELEN], buff_unaligned[REPL_INST_HDR_SIZE + GTMSRC_LCL_SIZE + 8];
data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c:175:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&repl_instance->label[0], GDS_REPL_INST_LABEL, GDS_REPL_INST_LABEL_SZ-1);
data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c:189:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(repl_instance->inst_info.created_nodename, machine_name, MAX_NODENAME_LEN);
data/fis-gtm-6.3-007/sr_unix/repl_inst_create.c:196:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(repl_instance->inst_info.this_instname, inst_name, inst_name_len);
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		time_str[LENGTH_OF_TIME + 1];							\
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dststr[MAX_DIGITS_IN_INT], dstlen;
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:382:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		time_str[LENGTH_OF_TIME + 1];
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:503:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		nodename_buff[MAX_NODENAME_LEN + 1], *created_nodename;
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:530:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(created_nodename, cur_histinfo->lms_group.created_nodename, MAX_NODENAME_LEN);
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:735:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			secondary_addr[SA_MAXLEN + 1];
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:785:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					? (char *)state_array[gtmsourcelocal_ptr->gtmsource_state] : "UNKNOWN";
data/fis-gtm-6.3-007/sr_unix/repl_inst_edit.c:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		temp_str[MAX_REPL_OPMSG_LEN], temp_str1[MAX_REPL_OPMSG_LEN];
data/fis-gtm-6.3-007/sr_unix/repl_inst_edit.c:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			inst_fn[MAX_FN_LEN + 1], buff_unaligned[REPL_INST_HDR_SIZE + GTMSRC_LCL_SIZE + 8];
data/fis-gtm-6.3-007/sr_unix/repl_inst_edit.c:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			instname[MAX_INSTNAME_LEN];
data/fis-gtm-6.3-007/sr_unix/repl_inst_edit.c:281:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(repl_instance->inst_info.this_instname, instname, instname_len + 1);
data/fis-gtm-6.3-007/sr_unix/repl_inst_edit.c:298:79:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			assert((NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open);
data/fis-gtm-6.3-007/sr_unix/repl_instance.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		temp_inst_fn[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/repl_instance.c:154:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(repl_instfilename, fn, *fn_len + 1);	/* include null from get_full_path */
data/fis-gtm-6.3-007/sr_unix/repl_instance.c:647:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		histdetail[MAX_REPL_OPMSG_LEN];
data/fis-gtm-6.3-007/sr_unix/repl_instance.c:915:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			histdetail[MAX_REPL_OPMSG_LEN];
data/fis-gtm-6.3-007/sr_unix/repl_instance.c:1010:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(inst_hdr->last_histinfo_num, nexthistinfo.last_histinfo_num,
data/fis-gtm-6.3-007/sr_unix/repl_instance.c:1131:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (jnlpool->jnlpool_dummy_reg->open)
data/fis-gtm-6.3-007/sr_unix/repl_instance.c:1163:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	assert(jnlpool->jnlpool_dummy_reg->open);	/* journal pool exists and this process has done "jnlpool_init" */
data/fis-gtm-6.3-007/sr_unix/repl_instance.c:1260:79:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(((NULL != jnlpool->jnlpool_dummy_reg) && jnlpool->jnlpool_dummy_reg->open)
data/fis-gtm-6.3-007/sr_unix/repl_instance.c:1326:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);
data/fis-gtm-6.3-007/sr_unix/repl_instance.c:1381:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		assert(reg->open);
data/fis-gtm-6.3-007/sr_unix/repl_instance.h:50:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	label[GDS_REPL_INST_LABEL_SZ];	/* format of instance file. initialized to GDS_REPL_INST_LABEL */
data/fis-gtm-6.3-007/sr_unix/repl_instance.h:54:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	filler_16[1];
data/fis-gtm-6.3-007/sr_unix/repl_instance.h:130:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   filler_1024[44];
data/fis-gtm-6.3-007/sr_unix/repl_instance.h:138:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	secondary_instname[MAX_INSTNAME_LEN];	/* Secondary instance corresponding to this structure */
data/fis-gtm-6.3-007/sr_unix/repl_instance.h:145:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	filler_64[32];				/* For future expansion */
data/fis-gtm-6.3-007/sr_unix/repl_instance.h:150:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(srclcl)->secondary_instname[0], &(sourcelocal)->secondary_instname[0], MAX_INSTNAME_LEN - 1);	\
data/fis-gtm-6.3-007/sr_unix/repl_instance.h:157:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(sourcelocal)->secondary_instname[0], &(srclcl)->secondary_instname[0], MAX_INSTNAME_LEN - 1);	\
data/fis-gtm-6.3-007/sr_unix/repl_log.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */
data/fis-gtm-6.3-007/sr_unix/repl_log.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fmt_str[BUFSIZ];
data/fis-gtm-6.3-007/sr_unix/repl_log_init.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char log_file_name[MAX_FN_LEN + 1], *err_code;
data/fis-gtm-6.3-007/sr_unix/repl_logfileinfo_get.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fullpath[GTM_PATH_MAX], *cwdptr;
data/fis-gtm-6.3-007/sr_unix/repl_logfileinfo_get.c:70:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msgp->fullpath, fullpath, fullpath_len);
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:126:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	msg[MIN_REPL_MSGLEN - REPL_MSG_HDRLEN];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:155:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	msg[MIN_REPL_MSGLEN - REPL_MSG_HDRLEN2];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:175:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	start_seqno[SIZEOF(seq_num)];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_32[8];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:189:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	start_seqno[SIZEOF(seq_num)];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:191:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		start_flags[4];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:196:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_32[8];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_32[13];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:215:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	instname[MAX_INSTNAME_LEN];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:220:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_32[5];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:227:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	instname[MAX_INSTNAME_LEN];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:234:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_32[4];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:241:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	instname[MAX_INSTNAME_LEN];	/* The name of this replication instance */
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_32[7];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:250:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	instname[MAX_INSTNAME_LEN];	/* The name of this replication instance */
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:263:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_32[7];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_16[3];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:273:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		data[REPL_MSG_CMPDATALEN]; /* compressed (if REPL_CMP_TEST) or uncompressed (if REPL_CMP_SOLVE) data */
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:274:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		overflowdata[(MAX_CMP_EXPAND_FACTOR - 1) * REPL_MSG_CMPDATALEN];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_32[8];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:295:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	instname[MAX_INSTNAME_LEN];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:305:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_32[8];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:328:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	instname[MAX_INSTNAME_LEN];	/* The instance name that generated this triple */
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:329:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	rcvd_from_instname[MAX_INSTNAME_LEN];	/* instance name this triple was received from (on the secondary) */
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:359:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_32[16];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:373:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ack_seqno[SIZEOF(seq_num)];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:374:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ack_time[SIZEOF(gtm_time4_t)];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:375:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	filler_32[12];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:393:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_32[16];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_32[16];
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:412:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filler_32[15]; /* to ensure that at least 32 bytes are sent across (gtmrecv_fetchresync relies on this) */
data/fis-gtm-6.3-007/sr_unix/repl_msg.h:413:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fullpath[REPL_LOGFILE_PATH_MAX + 1]; /* + 1 for null-terminator */
data/fis-gtm-6.3-007/sr_unix/repl_sp.h:22:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define F_COPY_GDID(to, from)			memcpy(&(to), &(from), SIZEOF(to))
data/fis-gtm-6.3-007/sr_unix/rtnhdr.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			jsb[RHEAD_JSB_SIZE];	/* GTM_CODE object marker */
data/fis-gtm-6.3-007/sr_unix/rtnhdr.h:139:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		checksum_128[16];	/* 16-byte MurmurHash3 checksum of routine source code */
data/fis-gtm-6.3-007/sr_unix/rtnhdr.h:274:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		name[1];
data/fis-gtm-6.3-007/sr_unix/rtnobj.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		errstr[256];												\
data/fis-gtm-6.3-007/sr_unix/rtnobj.c:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			errstr[256];
data/fis-gtm-6.3-007/sr_unix/same_device_check.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			port_buffer1[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_unix/same_device_check.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			port_buffer2[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_unix/same_device_check.c:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			pport_buffer1[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_unix/same_device_check.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			pport_buffer2[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_unix/same_device_check.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			host_buffer1[NI_MAXHOST];
data/fis-gtm-6.3-007/sr_unix/same_device_check.c:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			host_buffer2[NI_MAXHOST];
data/fis-gtm-6.3-007/sr_unix/same_device_check.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			phost_buffer1[NI_MAXHOST];
data/fis-gtm-6.3-007/sr_unix/same_device_check.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			phost_buffer2[NI_MAXHOST];
data/fis-gtm-6.3-007/sr_unix/secshr_client.c:72:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF char			gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/secshr_client.c:81:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char			gtmsecshr_path[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/secshr_client.c:189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			file_perm[MAX_PERM_LEN];
data/fis-gtm-6.3-007/sr_unix/secshr_client.c:208:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gtmsecshr_path, gtm_dist, len);
data/fis-gtm-6.3-007/sr_unix/secshr_client.c:210:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gtmsecshr_path + len + 1, GTMSECSHR_EXECUTABLE, STRLEN(GTMSECSHR_EXECUTABLE));
data/fis-gtm-6.3-007/sr_unix/secshr_client.c:244:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(mesg.mesg.path, path, path_len);
data/fis-gtm-6.3-007/sr_unix/secshr_client.c:250:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&mesg.mesg.db_ipcs, &db_ipcs, (offsetof(ipcs_mesg, fn[0]) + db_ipcs.fn_len + 1));
data/fis-gtm-6.3-007/sr_unix/semstat2.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		s[OUT_LINE];
data/fis-gtm-6.3-007/sr_unix/send_msg.c:84:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    	msg_buffer[1024];
data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:42:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	zstatus_buff[2*OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:70:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(zstatus_buff, val.str.addr, val.str.len);
data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:75:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(zstatus_bptr, src->addr, src->len);
data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:87:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&zstatus_buff[OUT_BUFF_SIZE], TREF(util_outbuff_ptr), util_len); /* save original message */
data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:91:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(zstatus_bptr, TREF(util_outbuff_ptr), TREF(util_outptr) - TREF(util_outbuff_ptr));
data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:94:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(zstatus_bptr, &zstatus_buff[OUT_BUFF_SIZE], util_len);
data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(TREF(util_outbuff_ptr), &zstatus_buff[OUT_BUFF_SIZE], util_len);
data/fis-gtm-6.3-007/sr_unix/set_zstatus.c:102:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(zstatus_bptr, TREF(util_outbuff_ptr), util_len);
data/fis-gtm-6.3-007/sr_unix/sgtm_putmsg.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	msg_buffer[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/sgtm_putmsg.c:100:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out_str, TREF(util_outbuff_ptr), out_str_len);
data/fis-gtm-6.3-007/sr_unix/source_file.c:94:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*p, source_file_string[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/source_file.c:113:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(source_file_string, faddr, flen);
data/fis-gtm-6.3-007/sr_unix/source_file.c:136:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(source_file_name, ret.str.addr, source_name_len);
data/fis-gtm-6.3-007/sr_unix/source_file.c:151:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(routine_name.addr, p, routine_name.len);
data/fis-gtm-6.3-007/sr_unix/source_file.c:152:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(module_name.addr, routine_name.addr, routine_name.len);
data/fis-gtm-6.3-007/sr_unix/source_file.c:163:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(int_module_name.addr, routine_name.addr, routine_name.len);
data/fis-gtm-6.3-007/sr_unix/source_file.c:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*p, buff[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/source_file.c:230:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(module_name.addr, p, n);
data/fis-gtm-6.3-007/sr_unix/source_file.c:231:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(routine_name.addr, p, n);
data/fis-gtm-6.3-007/sr_unix/source_file.c:238:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(int_module_name.addr, routine_name.addr, n);
data/fis-gtm-6.3-007/sr_unix/source_file.c:253:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rev_time_buf, p + 4, REV_TIME_BUFF_LEN);
data/fis-gtm-6.3-007/sr_unix/source_file.c:281:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((TREF(source_buffer)).addr, val.str.addr, val.str.len);
data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*tempfilename, eof_marker[EOF_MARKER_SIZE], tempdir_trans_buffer[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tempdir_full_buffer[GTM_PATH_MAX], tempnamprefix[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:203:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			time_str[CTIME_BEFORE_NL + 2]; /* for GET_CUR_TIME macro */
data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:284:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tempnamprefix, SNAPSHOT_TMP_PREFIX, STR_LIT_LEN(SNAPSHOT_TMP_PREFIX));
data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:286:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tempnamprefix + tempnamprefix_len, reg->rname, reg->rname_len);
data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:618:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(util_ss_ptr->header, csd, SGMNT_HDR_LEN);
data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:619:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(util_ss_ptr->master_map, MM_ADDR(csd), MASTER_MAP_SIZE(csd));
data/fis-gtm-6.3-007/sr_unix/ss_initiate.c:636:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ss_shm_ptr->shadow_file_header, csd, SGMNT_HDR_LEN);
data/fis-gtm-6.3-007/sr_unix/ss_release.c:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			shadow_file[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/trans_log_name.c:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
STATICDEF char	trans_log_name_startbuff[MAX_TRANS_NAME_LEN];
data/fis-gtm-6.3-007/sr_unix/trans_log_name.c:61:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(b_ptr, s_start, s_len);
data/fis-gtm-6.3-007/sr_unix/trans_log_name.c:79:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(trans_log_name_buff, s_start + 1, s_len);
data/fis-gtm-6.3-007/sr_unix/trans_log_name.c:96:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(b_ptr, s_start, s_len);
data/fis-gtm-6.3-007/sr_unix/trans_log_name.c:111:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(b_ptr, s_start, s_len);
data/fis-gtm-6.3-007/sr_unix/trigger.h:104:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	out_str[MAX_ZWR_EXP_RATIO * OUT_BUFF_SIZE];			\
data/fis-gtm-6.3-007/sr_unix/trigger.h:118:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(DST, SRC, LEN);							\
data/fis-gtm-6.3-007/sr_unix/trigger.h:155:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gv_currkey->base, HASHT_GBLNAME, HASHT_GBLNAME_LEN);		\
data/fis-gtm-6.3-007/sr_unix/trigger.h:561:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(DISP_TRIGVN, TRIGVN, TRIGVN_LEN);						\
data/fis-gtm-6.3-007/sr_unix/trigger.h:565:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&DISP_TRIGVN[DISP_TRIGVN_LEN], REG->rname, REG->rname_len);			\
data/fis-gtm-6.3-007/sr_unix/trigger_compare.c:49:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_unix/trigger_compare.c:69:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(PTR, values[SUB], len);	\
data/fis-gtm-6.3-007/sr_unix/trigger_compare.c:104:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, trigvn, trigvn_len);
data/fis-gtm-6.3-007/sr_unix/trigger_compare.c:125:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, trigvn, trigvn_len);
data/fis-gtm-6.3-007/sr_unix/trigger_compare.c:225:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		util_buff[MAX_TRIG_UTIL_LEN];	/* needed for HASHT_GVN_DEFINITION_RETRY_OR_ERROR macro */
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:71:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			trunc_name[MAX_TRIGNAME_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:150:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(trunc_name, trigvn, used_trigvn_len);
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name_and_index[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT];
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:222:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name_and_index, trig_gbl.str.addr, ++len); /* inline increment intended */
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:245:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp_str[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT];
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:280:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp_str, key_val.str.addr, len);
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:316:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp_str, key_val.str.addr, len);
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:330:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			curr_name[MAX_MIDENT_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:335:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			save_name[MAX_MIDENT_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:343:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			trigvn[MAX_MIDENT_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			utilprefix[1024];
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:354:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			disp_trigvn[MAX_MIDENT_LEN + SPANREG_REGION_LITLEN + MAX_RN_LEN + 1 + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:388:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(save_name, trigger_name, trigger_name_len);
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:408:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(curr_name, save_name, trigger_name_len);
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:430:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(trigvn, trig_gbl.str.addr, trigvn_len);
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:501:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(curr_name, mv_curr_nam.str.addr, mv_curr_nam.str.len);
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:563:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp_trig_str[MAX_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:565:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			trig_name[MAX_TRIGNAME_LEN];
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:568:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*tt_val[NUM_SUBS];
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:585:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr1, trigvn, trigvn_len);
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:615:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(trig_name, trigger_value.str.addr, trig_name_len);
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:627:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ptr1, trigger_value.str.addr, trig_len);
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:679:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ptr1, trigvn, trigvn_len);
data/fis-gtm-6.3-007/sr_unix/trigger_delete.c:741:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(ptr1, trigger_value.str.addr, trig_len);
data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.c:58:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.c:85:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		util_buff[MAX_TRIG_UTIL_LEN];
data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.c:106:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(xecute_buff, first_rec->str.addr, xecute_buff_len);
data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.c:117:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(xecute_buff, key_val.str.addr, xecute_buff_len);
data/fis-gtm-6.3-007/sr_unix/trigger_gbl_fill_xecute_buffer.c:198:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(xecute_buff_ptr, key_val.str.addr, key_val.str.len);
data/fis-gtm-6.3-007/sr_unix/trigger_incr_cycle.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*cycle_ptr, cycle_str[MAX_DIGITS_IN_INT + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_locate_andor_load.c:179:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!reg->open)
data/fis-gtm-6.3-007/sr_unix/trigger_locate_andor_load.c:250:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!reg->open)
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:79:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	out_str[64];		/* Plenty of room for $ZCH(xxx) */ 	\
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:89:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	out_str1[64];		/* Plenty of room for $ZCH(xxx) */ 	\
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:90:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	out_str2[MAX_ZWR_EXP_RATIO * OUT_BUFF_SIZE];			\
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:102:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	out_str[MAX_ZWR_EXP_RATIO * OUT_BUFF_SIZE];			\
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:172:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(DST_PTR, PTR, add_len);						\
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:194:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(DST_PTR, PTR, add_len);						\
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:294:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dst_string[MAX_DCHAR_LEN];
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:433:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dst_string[MAX_DELIM_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:438:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		src_string[MAX_DELIM_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:523:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(delim_str, dst_string, dst.len);
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:560:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_options[MAX_OPTIONS_LEN];
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:568:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(local_options, option_str, option_len);
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:620:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dst[MAX_GVSUBS_LEN];
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:632:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*lvn_str[MAX_LVN_COUNT];
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:1186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dst_string[MAX_SRCLINE];
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:1215:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(xecute_str, dst_string, ++dst_len);
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:1263:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ptr1, input, input_len);
data/fis-gtm-6.3-007/sr_unix/trigger_parse.c:1319:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(trigvn, ptr, trigvn_len);
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:76:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:103:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(OUT_PTR, (const void *)VAL, VAL_LEN);						\
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:124:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	tmp_buff[MAX_ZWR_EXP_RATIO * MAX_BUFF_SIZE];			\
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			dst[MAX_GVSUBS_LEN];
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:218:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			out_rec[MAX_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:232:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cycle[MAX_DIGITS_IN_INT + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:273:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cycle, trigger_value.str.addr, cycle_len);
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:426:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			save_name[MAX_MIDENT_LEN], curr_name[MAX_MIDENT_LEN], curr_gbl[MAX_MIDENT_LEN];
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:441:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(save_name, gbl_name, gbl_name_len);
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:448:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(curr_name, gbl_name, gbl_name_len);
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:463:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(curr_name, mv_curr_nam.str.addr, mv_curr_nam.str.len);
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:496:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(curr_gbl, mv_trigger_val.str.addr, trigvn_len);
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:517:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(curr_name, mv_curr_nam.str.addr, mv_curr_nam.str.len);
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:532:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			global[MAX_MIDENT_LEN];
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:562:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(global, curr_gbl_name.str.addr, gbl_len);
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:725:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			save_select_list[MAX_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/trigger_select.c:744:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(save_select_list, select_list, select_list_len);
data/fis-gtm-6.3-007/sr_unix/trigger_source_read_andor_verify.c:79:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_unix/trigger_source_read_andor_verify.c:352:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!reg->open)
data/fis-gtm-6.3-007/sr_unix/trigger_source_read_andor_verify.c:421:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!reg->open)
data/fis-gtm-6.3-007/sr_unix/trigger_trgfile.c:79:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_unix/trigger_trgfile.c:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*values[NUM_SUBS];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:90:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	unsigned char		t_fail_hist[CDB_MAX_TRIES];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		lcl_cmds[MAX_COMMANDS_LEN + 1];								\
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:151:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lcl_cmds, COMMANDS, STRLEN(COMMANDS) + 1);							\
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:221:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		lcl_options[MAX_OPTIONS_LEN + 1];							\
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:225:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lcl_options, OPTIONS, STRLEN(OPTIONS) + 1);							\
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:590:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			indx_str[MAX_DIGITS_IN_INT];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:594:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name_and_index[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:610:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name_and_index, trigvn, trigvn_len);
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:613:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, indx_str, num_len);
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:673:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		util_buff[MAX_TRIG_UTIL_LEN];	/* needed for HASHT_GVN_DEFINITION_RETRY_OR_ERROR macro */
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:770:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cmd_str[MAX_COMMANDS_LEN];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:864:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			option_str[MAX_OPTIONS_LEN];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:895:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cmd_str[MAX_COMMANDS_LEN];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:928:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			db_cmds[MAX_COMMANDS_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:933:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			trig_cmds[MAX_COMMANDS_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:934:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			trig_name[MAX_USER_TRIGNAME_LEN + 2];	/* One spot for # delimiter and one for trailing 0 */
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:935:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			trig_options[MAX_OPTIONS_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:936:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		util_buff[MAX_TRIG_UTIL_LEN];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:952:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(trig_cmds, val.str.addr, trig_cmds_len);
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:969:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(trig_options, val.str.addr, trig_options_len);
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:979:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(trig_name, val.str.addr, trig_name_len);
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1030:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(db_cmds, trig_cmds, SIZEOF(trig_cmds));
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1060:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name_and_index[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1065:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			trig_name[MAX_USER_TRIGNAME_LEN + 2];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1067:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			unique_seq_str[NUM_TRIGNAME_SEQ_CHARS + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1079:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(trig_name, trigvn, trigname_len);		/* immediate prior statement ensures trigname_len is OK */
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1113:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(seq_ptr, trig_name, trigname_len);
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1116:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(seq_ptr, uniq_ptr, uniq_ptr_len);
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1123:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr1, trigvn, trigvn_len);
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1127:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr1, trigger_count->str.addr, trigger_count->str.len);
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ans[2];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tfile_rec_val[MAX_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			trigvn[MAX_MIDENT_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			disp_trigvn[MAX_MIDENT_LEN + SPANREG_REGION_LITLEN + MAX_RN_LEN + 1 + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1157:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*values[NUM_SUBS], *save_values[NUM_SUBS];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp_str[MAX_HASH_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			xecute_buffer[MAX_BUFF_SIZE + MAX_XECUTE_LEN];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			utilprefix[1024];
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1301:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(trigjrecptr, trigjrec->str.addr, trigjreclen - 1);
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1448:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(save_value_len, value_len, SIZEOF(value_len));
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1450:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(save_values, values, SIZEOF(values));
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1453:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(disp_trigvn, trigvn, trigvn_len);
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1504:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(value_len, save_value_len, SIZEOF(save_value_len));
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1506:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(values, save_values, SIZEOF(save_values));
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1554:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			trig_name[MAX_USER_TRIGNAME_LEN + 2];	/* One spot for '#' delimiter and one for trailing '\0' */
data/fis-gtm-6.3-007/sr_unix/trigger_update.c:1918:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(trig_name, values[TRIGNAME_SUB], value_len[TRIGNAME_SUB] + 1);
data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name_and_index[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT];
data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		indx_str[MAX_DIGITS_IN_INT];
data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:156:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name_and_index, trigvn, trigvn_len);
data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:159:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, indx_str, num_len);
data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name_and_index[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT];
data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			trigvn[MAX_MIDENT_LEN + 1 + MAX_DIGITS_IN_INT], nullbyte[1];
data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buff[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:347:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&trigvn[0], gvname->str.addr, gvname->str.len);
data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:490:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(trigname, tmpmval.str.addr, tmpmval.str.len);
data/fis-gtm-6.3-007/sr_unix/trigger_upgrade.c:524:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(trigname, tmpmval.str.addr, trigname_len);
data/fis-gtm-6.3-007/sr_unix/upd_log_init.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	log_file[MAX_FN_LEN + 1], file_suffix_str[MAX_FN_LEN + 1], pid_str[11], *pid_end_ptr, *file_suffix;
data/fis-gtm-6.3-007/sr_unix/util_exit_handler.c:63:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if (reg->open && !reg->was_open)
data/fis-gtm-6.3-007/sr_unix/util_help.c:21:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLREF	char			gtm_dist[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix/util_help.c:35:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *utilImageGLDs[UTIL_HELP_IMAGES] =
data/fis-gtm-6.3-007/sr_unix/util_help.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mumps_cmd_string[MUMPS_CMD_STRING_SIZE];
data/fis-gtm-6.3-007/sr_unix/util_help.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char help_cmd_string[HELP_CMD_STRING_SIZE];
data/fis-gtm-6.3-007/sr_unix/util_out_print_gtmio.c:84:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(newdst, dst, dstlen);
data/fis-gtm-6.3-007/sr_unix/util_out_print_gtmio.c:91:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst + dstlen, src, srclen - 1);
data/fis-gtm-6.3-007/sr_unix/util_output.c:55:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF	char			facility[MAX_INSTNAME_LEN + 100];
data/fis-gtm-6.3-007/sr_unix/util_output.c:104:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(offset, strptr, STRLEN(strptr));						\
data/fis-gtm-6.3-007/sr_unix/util_output.c:194:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	numa[22];
data/fis-gtm-6.3-007/sr_unix/util_output.c:227:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(outptr, prefix, prefix_len);
data/fis-gtm-6.3-007/sr_unix/util_output.c:313:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(outptr, message, chlen);
data/fis-gtm-6.3-007/sr_unix/util_output.c:429:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(outptr, c, chlen);
data/fis-gtm-6.3-007/sr_unix/util_output.c:609:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(outptr, numa + SIZEOF(INTPTR_T), length/2);
data/fis-gtm-6.3-007/sr_unix/util_output.c:617:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(outptr, numa, length);
data/fis-gtm-6.3-007/sr_unix/util_output.c:645:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 			temp_inst_fn[MAX_FN_LEN + 1], fn[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/util_output.c:757:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		fmt_buff[OUT_BUFF_SIZE];	/* needs to be same size as that of the util out buffer */
data/fis-gtm-6.3-007/sr_unix/util_output.c:863:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(TREF(util_outbuff_ptr), fmt_buff, fmtc - fmt_buff);
data/fis-gtm-6.3-007/sr_unix/util_output.c:920:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, TREF(util_outbuff_ptr), srclen);
data/fis-gtm-6.3-007/sr_unix/util_output_cm.c:34:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char outbuff[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/util_output_cm.c:55:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(outptr, TREF(util_outbuff_ptr), msglen);
data/fis-gtm-6.3-007/sr_unix/wait_for_disk_space.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		wait_comment[MAX_FREEZE_COMMENT_LEN];
data/fis-gtm-6.3-007/sr_unix/wcs_clean_dbsync.c:87:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!reg->open)
data/fis-gtm-6.3-007/sr_unix/wcs_clean_dbsync.c:98:65:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	check_csaddrs = ((NULL == save_region || FALSE == save_region->open) ?  NULL : (&FILE_INFO(save_region)->s_addrs));
data/fis-gtm-6.3-007/sr_unix/wcs_wtstart.c:619:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(save_bp, bp, SIZEOF(blk_hdr));
data/fis-gtm-6.3-007/sr_unix/wcs_wtstart.c:637:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(save_bp, bp, bp->bsiz);
data/fis-gtm-6.3-007/sr_unix/zhist.c:120:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)zhent, (char *)&zhist_valent->zro_valent, SIZEOF(zro_validation_entry));
data/fis-gtm-6.3-007/sr_unix/zhist.c:163:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(zhist_valent->rtnname.c, rtnname->addr, rtnname->len);
data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:28:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cmd_qlf.object_file.str.addr, NAME, LEN);	\
data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		cbuf[MAX_LINE], inputf[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:68:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cbuf + SIZEOF(COMMAND) - 1, quals->addr, quals->len);
data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:117:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&pblk.l_name[pblk.b_name], DOTM, SIZEOF(DOTM));
data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:122:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(source_file_name, pblk.buffer, source_name_len);
data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:124:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(srcstr, source_file_name, source_name_len);
data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:129:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(routine_name.addr, file.addr, file.len);
data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:132:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(object_file_name, pblk.l_name, object_name_len);
data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:160:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(routine_name.addr, &object_file_name[ci], clen);
data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:173:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(object_file_name, routine_name.addr, clen);
data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:180:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(module_name.addr, routine_name.addr, clen);
data/fis-gtm-6.3-007/sr_unix/zl_cmd_qlf.c:191:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(int_module_name.addr, routine_name.addr, clen);
data/fis-gtm-6.3-007/sr_unix/zlmov_lnames.c:60:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(lab_ptr, lab_ent->lab_name.addr, lab_ent->lab_name.len);
data/fis-gtm-6.3-007/sr_unix/zro_load.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tranbuf[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/zro_load.c:273:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((uchar_ptr_t)TREF(zro_root), (uchar_ptr_t)array, total_ents * SIZEOF(zro_ent));
data/fis-gtm-6.3-007/sr_unix/zro_load.c:290:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(op->str.addr, pblk.buffer, pblk.b_esl);
data/fis-gtm-6.3-007/sr_unix/zro_load.c:310:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(op->str.addr, pblk.buffer, pblk.b_esl);
data/fis-gtm-6.3-007/sr_unix/zro_search.c:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			objfn[PATH_MAX], srcfn[PATH_MAX], *obp, *sbp, save_char;
data/fis-gtm-6.3-007/sr_unix/zro_search.c:96:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(objfn, objstr->addr, rtnname.len);
data/fis-gtm-6.3-007/sr_unix/zro_search.c:120:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(obp, op->str.addr, op->str.len);
data/fis-gtm-6.3-007/sr_unix/zro_search.c:124:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(obp, objstr->addr, objstr->len);
data/fis-gtm-6.3-007/sr_unix/zro_search.c:154:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy (sbp, sp->str.addr, sp->str.len);
data/fis-gtm-6.3-007/sr_unix/zro_search.c:158:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(sbp, srcstr->addr, srcstr->len);
data/fis-gtm-6.3-007/sr_unix/zro_search.c:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			obj_file[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/zro_shlibs.h:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		shlib_name[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix/zshow_devices.c:43:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			(V)->str.addr = (char *)dev_param_names[dev_param_index[zshow_param_index[(TEXT)].letter] + \
data/fis-gtm-6.3-007/sr_unix/zshow_devices.c:47:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			(V)->str.addr = (char *)dev_param_names[dev_param_index[zshow_param_index[(TEXT)].letter] + \
data/fis-gtm-6.3-007/sr_unix/zshow_devices.c:76:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	delim_buff_sm[MAX_DELIM_LEN];
data/fis-gtm-6.3-007/sr_unix/zshow_devices.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		delim_mstr_buff[(MAX_DELIM_LEN * MAX_ZWR_EXP_RATIO) + 11];
data/fis-gtm-6.3-007/sr_unix/zshow_devices.c:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char   csname[_CSNAME_LEN_MAX + 1], *csptr;
data/fis-gtm-6.3-007/sr_unix/zshow_devices.c:801:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(delim_buff_sm,
data/fis-gtm-6.3-007/sr_unix/zshow_rctldump.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buff[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/zshow_zcalls.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buff[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:95:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&(TREF(dollar_ztimeout)).ztimeout_vector, &literal_null, SIZEOF(mval));			\
data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:122:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(local_str_val, inp_val->str.addr, inp_val->str.len);
data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:140:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(vector_ptr, tok_ptr, max_read_len);
data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:156:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&ztimeout_seconds, &literal_minusone, SIZEOF(mval));
data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:201:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vector_ptr, tok_ptr, max_read_len);
data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:363:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(mv_st_ent->mv_st_cont.mvs_zintr.savextref.addr, extnam_str.addr, extnam_str.len);
data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:370:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&mv_st_ent->mv_st_cont.mvs_zintr.dollar_ecode_save, &dollar_ecode, SIZEOF(dollar_ecode));
data/fis-gtm-6.3-007/sr_unix/ztimeout_routines.c:371:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&mv_st_ent->mv_st_cont.mvs_zintr.dollar_stack_save, &dollar_stack, SIZEOF(dollar_stack));
data/fis-gtm-6.3-007/sr_unix_cm/gtcm.h:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char req[OMI_HIST_BUFSIZ];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm.h:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rsp[OMI_HIST_BUFSIZ];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm.h:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char req[RC_HIST_BUFSIZ];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm.h:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rsp[RC_HIST_BUFSIZ];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_bgn_net.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			port_buffer[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_bgn_net.c:114:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		port = atoi(omi_service);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_bgn_net.c:124:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		port = atoi(port_buffer);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_cn_acpt.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		pklog[MAX_LOG_LEN], *tmp_time;
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_cn_acpt.c:88:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&cptr->stats.sas, &sas, sln);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:64:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(omi_hist[omi_hist_num].req, buff, len);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:68:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(omi_hist[omi_hist_num].req, buff, OMI_HIST_BUFSIZ);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:76:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(omi_hist[omi_hist_num].rsp, buff, len);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:80:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(omi_hist[omi_hist_num].rsp, buff, OMI_HIST_BUFSIZ);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:98:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rc_hist[rc_hist_num].req, buff, len);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:102:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rc_hist[rc_hist_num].req, buff, RC_HIST_BUFSIZ);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:110:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rc_hist[rc_hist_num].rsp, buff, len);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:114:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rc_hist[rc_hist_num].rsp, buff, RC_HIST_BUFSIZ);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:120:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	msg[MAX_HIST_REC_LEN];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_hist.c:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	msg[MAX_HIST_REC_LEN + 1];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_init.c:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			msg[256];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_main.c:52:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF char		image_id[MAX_IMAGE_NAME_LEN];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_ping.c:93:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char pingrcv[IP_MAXPACKET], pingsend[256];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_ping.c:168:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char host[SA_MAXLEN];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_ping.c:218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char host[SA_MAXLEN];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pkdisp.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[OMI_BUFSIZ], *bptr, *xptr, *end, *chr;
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pkdisp.c:68:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		} else if (INV_FD_P((fd = open(argv[argc - 1], O_RDONLY))))
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pkdisp.c:78:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		else if (INV_FD_P((fd = open(argv[argc - 1], O_RDONLY))))
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pkdisp.c:169:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(chr, xptr, len);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:47:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char name[NI_MAXHOST + NI_MAXSERV + 4];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ipname[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char host[NI_MAXHOST];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char newmsg[512];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tbuf[16];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fileName[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:111:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    	char subdir[GTM_PATH_MAX];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:163:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(chr, ptr, len);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_play.c:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[OMI_BUFSIZ];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_play.c:85:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (INV_FD_P((conn.fd = open(argv[argc - 1], O_RDONLY))))
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_prsopt.c:131:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		  case opt_rc_id:	rc_server_id = atoi(*(argv + 1)); break;
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_prsopt.c:143:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    t = atoi(*(argv + 1));
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_prsopt.c:151:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    t = atoi(*(argv + 1));
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_rep_err.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	outbuf[OUT_BUFF_SIZE];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_shmclean.c:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buff[512];
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_shmclean.c:153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buff[512];
data/fis-gtm-6.3-007/sr_unix_cm/omi.h:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		octet[OMI_SI_SIZ];
data/fis-gtm-6.3-007/sr_unix_cm/omi.h:154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		octet[OMI_LI_SIZ];
data/fis-gtm-6.3-007/sr_unix_cm/omi.h:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		octet[OMI_VI_SIZ];
data/fis-gtm-6.3-007/sr_unix_cm/omi.h:339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ag_name[MAX_USER_NAME];
data/fis-gtm-6.3-007/sr_unix_cm/omi_dmp_pkt.c:89:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(chr, ptr, len);
data/fis-gtm-6.3-007/sr_unix_cm/omi_gvextnam.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*ptr, *end, c[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix_cm/omi_gvextnam.c:90:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cur_seg->fname, pblk.l_dir, pblk.b_dir);
data/fis-gtm-6.3-007/sr_unix_cm/omi_lkextnam.c:104:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&r->value[0], lck.str.addr - 1, elen);
data/fis-gtm-6.3-007/sr_unix_cm/omi_lkextnam.c:106:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(MLK_PVTBLK_TAIL(r) + 1, data, si.value);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_conn.c:157:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ag_name, cptr->xptr, ss_len.value);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_conn.c:172:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ag_pass, cptr->xptr, ss_len.value);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_conn.c:241:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(bptr, GTM_RELEASE_NAME, len);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_def.c:88:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(bptr, vo.str.addr, vo.str.len);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_def.c:105:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(bptr, vg.str.addr, vg.str.len);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_get.c:83:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(bptr, vo.str.addr, vo.str.len);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_get.c:96:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bptr, vg.str.addr, vg.str.len);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_next.c:68:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bptr, v.str.addr, v.str.len);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_ordr.c:86:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bptr, vo.str.addr, vo.str.len);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_ordr.c:113:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(gv_currkey, gv_altkey, gv_altkey->end + SIZEOF(gv_key));
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_ordr.c:136:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(bptr, vg.str.addr, vg.str.len);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_qry.c:89:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(bptr, eptr, len.value);
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_rord.c:68:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bptr, v.str.addr, v.str.len);
data/fis-gtm-6.3-007/sr_unix_cm/omi_srvc_xct.c:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[OMI_BUFSIZ], *bptr, *xend, *bend;
data/fis-gtm-6.3-007/sr_unix_cm/omi_srvc_xct.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		msg[OMI_MSG_SIZE];
data/fis-gtm-6.3-007/sr_unix_cm/rc_fnd_file.c:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[1024], *cp, *cp1, msg[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix_cm/rc_fnd_file.c:98:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dsid_list->fname, fpath2.addr, fpath2.len);
data/fis-gtm-6.3-007/sr_unix_cm/rc_fnd_file.c:104:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gv_cur_region->dyn.addr->fname, fpath2.addr, fpath2.len);
data/fis-gtm-6.3-007/sr_unix_cm/rc_fnd_file.c:198:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fdi_ptr->fname, cp, len);
data/fis-gtm-6.3-007/sr_unix_cm/rc_fnd_file.c:204:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(gv_cur_region->dyn.addr->fname, cp, len);
data/fis-gtm-6.3-007/sr_unix_cm/rc_frmt_lck.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buff[MAX_ZWR_KEY_SZ], *b_top, *b, *c_top, *sub_start;
data/fis-gtm-6.3-007/sr_unix_cm/rc_gbl_ord.c:97:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(rsp->page, bh->buffaddr, SIZEOF(blk_hdr));
data/fis-gtm-6.3-007/sr_unix_cm/rc_gbl_ord.c:99:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(rsp->page + SIZEOF(blk_hdr) + RC_BLKHD_PAD,
data/fis-gtm-6.3-007/sr_unix_cm/rc_gbl_ord.c:108:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(rc_overflow->buff,
data/fis-gtm-6.3-007/sr_unix_cm/rc_mval2subsc.c:31:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static readonly unsigned char pos_code[100] =
data/fis-gtm-6.3-007/sr_unix_cm/rc_mval2subsc.c:45:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static readonly unsigned char neg_code[100] =
data/fis-gtm-6.3-007/sr_unix_cm/rc_mval2subsc.c:61:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char            buf1[MAX_KEY_SZ + 1];
data/fis-gtm-6.3-007/sr_unix_cm/rc_mval2subsc.c:66:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[MAX_ZWR_KEY_SZ], *end;
data/fis-gtm-6.3-007/sr_unix_cm/rc_mval2subsc.c:72:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char temp_mantissa[NUM_DEC_DG_2L / 2 + 3];	/* Need 1 byte for each two digits.  Add 3 bytes slop */
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getp.c:96:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(rsp->page, rc_overflow->buff + (offset - rc_overflow->offset), size_return);
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getp.c:150:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(rsp->page, buffaddr, SIZEOF(blk_hdr));
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getp.c:153:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(rsp->page + SIZEOF(blk_hdr) + RC_BLKHD_PAD,
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getp.c:164:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			    memcpy(rc_overflow->buff,
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getr.c:107:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gv_currkey->base, req->key.key, req->key.len.value);
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getr.c:231:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(rsp->page, bh->buffaddr, SIZEOF(blk_hdr));
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getr.c:233:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(rsp->page + SIZEOF(blk_hdr) + RC_BLKHD_PAD, bh->buffaddr + SIZEOF(blk_hdr),
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_getr.c:241:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(rc_overflow->buff, bh->buffaddr + size_return - RC_BLKHD_PAD, rc_overflow->size);
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_kill.c:79:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gv_currkey->base, req->key.key, req->key.len.value);
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_lock.c:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		key_buff[KEY_BUFF_SIZE], *lkname;
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_lock.c:59:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buff[12], *cp;
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_lock.c:199:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mp->value, key_buff, mp->nref_length);
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_lock.c:203:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(MLK_PVTBLK_TAIL(mp) + 1, buff, pid_len);
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_set.c:79:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(gv_currkey->base, req->key.key, req->key.len.value);
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_setf.c:72:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(gv_currkey->base, req->key.key, req->key.len.value);
data/fis-gtm-6.3-007/sr_unix_cm/rc_prc_setf.c:105:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(v.str.addr + data_off, ptr, v.str.len - data_off - str_remain);
data/fis-gtm-6.3-007/sr_unix_cm/rc_srvc_xct.c:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char           *cpte, msg[OUT_LINE], *p, *tptr;
data/fis-gtm-6.3-007/sr_unix_cm/rc_srvc_xct.c:239:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tptr, cptr->xptr, ((rc_q_hdr
data/fis-gtm-6.3-007/sr_unix_gnp/cmi_open.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hn[MAX_HOST_NAME_LEN];
data/fis-gtm-6.3-007/sr_unix_gnp/cmi_open.c:134:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((struct sockaddr *)(&lnk->peer_sas), ai_ptr->ai_addr, ai_ptr->ai_addrlen);
data/fis-gtm-6.3-007/sr_unix_gnp/cmi_open.c:135:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&lnk->peer_ai, ai_ptr, SIZEOF(struct addrinfo));
data/fis-gtm-6.3-007/sr_unix_gnp/cmi_peer_info.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		hostname[SA_MAXLITLEN];
data/fis-gtm-6.3-007/sr_unix_gnp/cmi_peer_info.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		ipname[SA_MAXLEN];
data/fis-gtm-6.3-007/sr_unix_gnp/cmi_peer_info.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		port_str[NI_MAXSERV];
data/fis-gtm-6.3-007/sr_unix_gnp/cmj_getsockaddr.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		port_str[MAX_HOST_NAME_LEN], *port_str_ptr;
data/fis-gtm-6.3-007/sr_unix_gnp/cmj_getsockaddr.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		hn[MAX_HOST_NAME_LEN];
data/fis-gtm-6.3-007/sr_unix_gnp/cmj_getsockaddr.c:105:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(port_str, port_str_ptr, port_len);
data/fis-gtm-6.3-007/sr_unix_gnp/cmj_getsockaddr.c:125:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(hn, CMI_DESC_POINTER(nod), CMI_DESC_LENGTH(nod));
data/fis-gtm-6.3-007/sr_unix_gnp/cmj_incoming_call.c:63:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&lnk->peer_sas, &sas, sz);
data/fis-gtm-6.3-007/sr_unix_gnp/cmu_getclb.c:45:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			if (0 == memcpy(ai_ptr->ai_addr, (sockaddr_ptr)(&p->peer_sas), ai_ptr->ai_addrlen))
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_ch.c:59:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	msgnum, sevmsgbuf[2048];
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_ch.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		time_str[CTIME_BEFORE_NL + 2];	/* for GET_CUR_TIME macro */
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_ch.c:99:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sevmsgbuf, TREF(util_outbuff_ptr), msglen);
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_ch.c:121:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(mbfptr, msgptr, msglen);
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_exi_ch.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		time_str[CTIME_BEFORE_NL + 2];	/* for GET_CUR_TIME macro */
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:26:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char newmsg[512];
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:31:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    	strcpy(newmsg, "Client: ");
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:35:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(newmsg, " - ");
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linebuf[32 + 1 + 16 + 1];
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_server.c:130:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
GBLDEF char			gtcm_gnp_server_log[MAX_FN_LEN + 1];
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_server.c:363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*ptr, service[512];
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_server.c:364:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			time_str[CTIME_BEFORE_NL + 2];	/* for GET_CUR_TIME macro */
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_open_cmerrlog.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		lfn_path[MAX_TRANS_NAME_LEN + 1];
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_open_cmerrlog.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		new_lfn_path[MAX_TRANS_NAME_LEN + 1];
data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c:52:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	*fname, buff[256];
data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c:55:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ch, node[MAX_HOST_NAME_LEN], *tmp_ptr;
data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c:64:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buff, fname, len);
data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c:99:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr->reg->dyn.addr->fname, fname, len);
data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c:117:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ptr->reg->rname, node, retlen);
data/fis-gtm-6.3-007/sr_unix_gnp/gtcmd_ini_reg.c:124:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	} else if (!ptr->reg->open)
data/fis-gtm-6.3-007/sr_unix_gnp/gvcmz_errmsg.c:70:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(TREF(util_outptr), bufptr, msglen);
data/fis-gtm-6.3-007/sr_unix_gnp/gvcmz_errmsg.c:88:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(TREF(util_outptr), bufptr, msglen);
data/fis-gtm-6.3-007/sr_unix_nsb/rtnhdr.h:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		jsb[RHEAD_JSB_SIZE];
data/fis-gtm-6.3-007/sr_unix_nsb/rtnhdr.h:100:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	checksum_128[16];	/* 16-byte MurmurHash3 checksum of routine source code */
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:31:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define SET_OBPT_STR(str, len)	(memcpy(obpt, str, len), obpt += len)
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:467:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		instruction.source_operand_reg = (char *)register_list[modrm_byte.modrm.r_m + 8 * rex_prefix.Base];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:469:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		instruction.destination_operand_reg = (char *)register_list[modrm_byte.modrm.r_m + 8 * rex_prefix.Base];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:473:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			instruction.source_operand_reg = (char *)register_list[REG_RIP];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:475:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			instruction.destination_operand_reg = (char *)register_list[REG_RIP];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:483:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		instruction.source_operand_reg = (char *)register_list[modrm_byte.modrm.reg_opcode + 8 * rex_prefix.Reg];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:485:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		instruction.destination_operand_reg = (char *)register_list[modrm_byte.modrm.reg_opcode + 8 * rex_prefix.Reg];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:517:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				instruction.opcode_mnemonic = (char *)mnemonic_list[inst_curr_byte];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:648:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						instruction.source_operand_reg = (char *)
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:664:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						instruction.source_operand_reg = (char *)
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:722:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						instruction.destination_operand_reg = (char *)register_list[I386_REG_RAX];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:739:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						instruction.destination_operand_reg = (char *)
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:800:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						instruction.opcode_mnemonic = (char *) mnemonic_list_2b[inst_curr_byte];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:822:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								(char *)mnemonic_list_g1[modrm_byte.modrm.reg_opcode];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:831:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								(char *)mnemonic_list_g2[modrm_byte.modrm.reg_opcode];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:836:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								(char *)mnemonic_list_g3[modrm_byte.modrm.reg_opcode];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:840:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								(char *)mnemonic_list_g4[modrm_byte.modrm.reg_opcode];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:845:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								(char *)mnemonic_list_g5[modrm_byte.modrm.reg_opcode];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:864:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							(char *)register_list[sib_byte.sib.base + 8 * rex_prefix.Base];
data/fis-gtm-6.3-007/sr_x86_64/emit_code_sp.c:867:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							(char *)register_list[sib_byte.sib.base + 8 * rex_prefix.Base];
data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:129:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  	memcpy(rhead->jsb, (char *)jsb_action, SIZEOF(jsb_action)); 		/* Action instructions */
data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:130:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&rhead->jsb[SIZEOF(jsb_action)], JSB_MARKER,			/* Followed by GTM_CODE marker */
data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:158:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((string_tbl + symIndex), static_string_tbl, strEntrySize);
data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:161:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((string_tbl + symIndex), GTM_LANG, strEntrySize);
data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:164:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((string_tbl + symIndex), GTM_PRODUCT, strEntrySize);
data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:167:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((string_tbl + symIndex), GTM_RELEASE_NAME, strEntrySize);
data/fis-gtm-6.3-007/sr_x86_64/obj_filesp.c:238:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((string_tbl +  symIndex), module_name.addr, module_name.len);
data/fis-gtm-6.3-007/sr_i386/incr_link.c:80:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			zl_error(file_desc, ERR_INVOBJFILE, fname_len, fname, ERR_TEXT, strlen(STRERROR(save_errno)),
data/fis-gtm-6.3-007/sr_i386/incr_link.c:97:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			zl_error(file_desc, ERR_INVOBJFILE, fname_len, fname, ERR_TEXT, strlen(STRERROR(save_errno)),
data/fis-gtm-6.3-007/sr_linux/gtm_getenv.c:33:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(varname);
data/fis-gtm-6.3-007/sr_port/cvtparm.c:42:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int		siz, cnt, strlen;
data/fis-gtm-6.3-007/sr_port/cvtparm.c:118:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen >= 0)
data/fis-gtm-6.3-007/sr_port/cvtparm.c:120:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*stringpool.free++ = strlen;
data/fis-gtm-6.3-007/sr_port/dbcertify_certify_phase.c:1298:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		chr_p = psa->util_cmd_buff + strlen((char_ptr_t)psa->util_cmd_buff);
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:169:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat((char_ptr_t)psa->util_cmd_buff, "=");
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:202:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen((char_ptr_t)dbfn);
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:349:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert(SIZEOF(psa->ofhdr.regname) > strlen((char_ptr_t)psa->regname));
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:351:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert(SIZEOF(psa->ofhdr.dbfn) > strlen((char_ptr_t)psa->dbc_gv_cur_region->dyn.addr->fname));
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:537:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				rec1_gvn_len = strlen((char_ptr_t)rec1_ptr + SIZEOF(rec_hdr));
data/fis-gtm-6.3-007/sr_port/dbcertify_scan_phase.c:695:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen((char_ptr_t)intgerrmsg);
data/fis-gtm-6.3-007/sr_port/dse.h:105:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	Y = strlen(X);									\
data/fis-gtm-6.3-007/sr_port/ecode_add.c:29:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define		INCR_ECODE_INDEX(ecode_index, str, strlen)				\
data/fis-gtm-6.3-007/sr_port/ecode_add.c:31:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memcpy(dollar_ecode.end, str, strlen);						\
data/fis-gtm-6.3-007/sr_port/ecode_add.c:33:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dollar_ecode.array[ecode_index].ecode_str.len = strlen;				\
data/fis-gtm-6.3-007/sr_port/eintr_wrappers.h:276:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		RC = read(FD, BUF, SIZE);			\
data/fis-gtm-6.3-007/sr_port/ext2jnl.c:130:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ext_stop = ptr + strlen(ptr) + 1;
data/fis-gtm-6.3-007/sr_port/ext2jnl.c:289:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ptr += (strlen(ptr) + 1); /* get the key-value and data also; can't use strtok since there might be '\\' in the subscript */
data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:69:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#  define STRLEN(X)		((int)(strlen(X)))
data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:70:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#  define USTRLEN(X)		((unsigned int)(strlen(X)))
data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:75:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#  define STRLEN(X)		strlen(X)
data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:76:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#  define USTRLEN(X)		strlen(X)
data/fis-gtm-6.3-007/sr_port/gtm_common_defs.h:90:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define	LENGTH_AND_STRING(STRING)		(strlen((char *)(STRING))), (STRING)
data/fis-gtm-6.3-007/sr_port/gtm_string.h:23:40:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define	STRNCPY_STR(DEST, STRING, LEN)	strncpy((char *)(DEST), (char *)(STRING), LEN)
data/fis-gtm-6.3-007/sr_port/gtm_string.h:31:36:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
#define	STRNCAT(DEST, SOURCE, LEN)	strncat((char *)DEST, (const char *)SOURCE, (size_t)LEN)
data/fis-gtm-6.3-007/sr_port/gtm_un.h:19:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define SUN_LEN(ptr) ((size_t) (((struct sockaddr_un *) 0)->sun_path) + strlen ((ptr)->sun_path))
data/fis-gtm-6.3-007/sr_port/gtmrecv_statslog.c:68:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen("ON") : strlen("OFF"), gtmrecv_options.statslog ? "ON" : "OFF");
data/fis-gtm-6.3-007/sr_port/gtmrecv_statslog.c:68:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen("ON") : strlen("OFF"), gtmrecv_options.statslog ? "ON" : "OFF");
data/fis-gtm-6.3-007/sr_port/gvn2gds.c:202:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				assert(strlen(c) <= MAX_LEN_FOR_CHAR_FUNC - 1);
data/fis-gtm-6.3-007/sr_port/io.h:204:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int	(*read)(mval *, int4);
data/fis-gtm-6.3-007/sr_port/io.h:264:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ioxx(read);
data/fis-gtm-6.3-007/sr_port/iosocket_bind.c:302:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(&dsocketptr->iod->dollar.key[len], ((struct sockaddr_un *)(socketptr->local.sa))->sun_path,
data/fis-gtm-6.3-007/sr_port/iosocket_connect.c:562:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(&iod->dollar.key[len], sockptr->remote.saddr_ip, DD_BUFLEN - 1 - len);
data/fis-gtm-6.3-007/sr_port/iosocket_handle.c:58:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*len = (short)strlen(handle);
data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:442:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(&iod->dollar.key[len], socketptr->remote.saddr_ip, DD_BUFLEN - 1 - len);
data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:452:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(&dsocketptr->iod->dollar.key[len], charptr, DD_BUFLEN - len - 1);
data/fis-gtm-6.3-007/sr_port/iosocket_wait.c:605:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(&dsocketptr->iod->dollar.key[len], newsocketptr->remote.saddr_ip, DD_BUFLEN - 1 - len);
data/fis-gtm-6.3-007/sr_port/jobinterrupt_process_cleanup.c:71:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mbptr = msgbuf + strlen((char *)msgbuf);
data/fis-gtm-6.3-007/sr_port/lke_showlock.c:192:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					f[5] = strlen(gtcmbuf);
data/fis-gtm-6.3-007/sr_port/mdef.h:341:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define mid_len(name)		strlen(&(name)->c[0])	/* callers of mid_len should include gtm_string.h as well */
data/fis-gtm-6.3-007/sr_port/mu_int_blk.c:414:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							assert(strlen(trees->key) == trees->keysize);
data/fis-gtm-6.3-007/sr_port/mu_interactive.c:41:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(res);
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:623:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (orig_buff_size <= (tempdir_full.len + strlen(tempnam_prefix) + SIZEOF(uint4)))
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1376:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(rptr->backup_tempfile));
data/fis-gtm-6.3-007/sr_port/mupip_backup.c:1377:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sbufh_p->tempfilename[strlen(rptr->backup_tempfile)] = 0;
data/fis-gtm-6.3-007/sr_port/mupip_integ.c:540:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			assert(trees->keysize == strlen(trees->key));
data/fis-gtm-6.3-007/sr_port/mur_get_options.c:182:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(mur_options.extr_fn[extr_type], qual_buffer, length);
data/fis-gtm-6.3-007/sr_port/mur_output_show.c:92:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(LENGTH_OF_TIME >= strlen(string));
data/fis-gtm-6.3-007/sr_port/op_fnview.c:379:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					VARLSTCNT(4) ERR_VIEWFN, 2, strlen((const char *)vtp->keyword), vtp->keyword);
data/fis-gtm-6.3-007/sr_port/op_fnview.c:669:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					VARLSTCNT(4) ERR_VIEWFN, 2, strlen((const char *)vtp->keyword), vtp->keyword);
data/fis-gtm-6.3-007/sr_port/op_fnview.c:808:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			rts_error_csa(CSA_ARG(NULL) VARLSTCNT(4) ERR_VIEWFN, 2, strlen((const char *)vtp->keyword), vtp->keyword);
data/fis-gtm-6.3-007/sr_port/op_fnztrigger.c:237:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(filename, arg1->str.addr, arg1->str.len);
data/fis-gtm-6.3-007/sr_port/op_gvorder.c:262:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				assert(strlen(map->gvkey.addr) == map->gvname_len);
data/fis-gtm-6.3-007/sr_port/op_read.c:69:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	stat = (io_curr_device.in->disp_ptr->read)(v, msec_timeout);
data/fis-gtm-6.3-007/sr_port/op_rhdaddr.c:42:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			      ERR_ZLMODULE, 2, strlen(&zlink_mname.c[0]), zlink_mname.c);			\
data/fis-gtm-6.3-007/sr_port/op_rhdaddr.c:55:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			      ERR_ZLMODULE, 2, strlen(&zlink_mname.c[0]), &zlink_mname);			\
data/fis-gtm-6.3-007/sr_port/op_setzextract.c:40:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t		strlen, padlen;
data/fis-gtm-6.3-007/sr_port/op_setzextract.c:79:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (MAX_STRLEN < strlen)
data/fis-gtm-6.3-007/sr_port/op_setzextract.c:81:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ENSURE_STP_FREE_SPACE((int)strlen);
data/fis-gtm-6.3-007/sr_port/op_setzextract.c:106:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(IS_AT_END_OF_STRINGPOOL(straddr, -strlen));
data/fis-gtm-6.3-007/sr_port/op_view.c:849:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			rts_error_csa(CSA_ARG(NULL) VARLSTCNT(4) ERR_VIEWCMD, 2, strlen((const char *)vtp->keyword), vtp->keyword);
data/fis-gtm-6.3-007/sr_port/op_zprevious.c:251:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				assert(strlen(prev_map->gvkey.addr) == prev_map->gvname_len);
data/fis-gtm-6.3-007/sr_port/op_zsystem.c:100:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (!strlen(filtered_command.address)) /*empty command returned*/
data/fis-gtm-6.3-007/sr_port/parse_trctbl_groups.c:72:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((strlen(gtm_trcgrp_names[grpindx]) == grplen)
data/fis-gtm-6.3-007/sr_port/repl_filter.c:661:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			extr_len = strlen(FILTER_EOT);
data/fis-gtm-6.3-007/sr_port/repl_filter.c:797:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				r_len = read(repl_filter_srv_fd[READ_END], srv_read_end, buff_remaining);
data/fis-gtm-6.3-007/sr_port/secshr_send_DBCLNUPINFO_msg.c:45:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert(ARRAYSIZE(secshr_string) > strlen(secshr_string));
data/fis-gtm-6.3-007/sr_port/tcp_open.c:102:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		host_len = strlen(host);
data/fis-gtm-6.3-007/sr_port/tcp_open.c:120:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			addr_len = strlen(host);
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:193:46:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (recvpool_ctl->write == upd_proc_local->read)
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:196:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				pre_read_offset, upd_proc_local->read, recvpool_ctl->write);
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:243:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (pre_read_offset < upd_proc_local->read && !recvpool_ctl->wrapped)
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:246:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			pre_read_offset = upd_proc_local->read;
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:273:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
								pre_read_offset, upd_proc_local->read))
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:280:95:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			REPL_DPRINT3("First one::pre_read_offset = %x read %x\n", pre_read_offset, upd_proc_local->read);
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:285:95:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			REPL_DPRINT3("Non-first::pre_read_offset = %x read %x\n", pre_read_offset, upd_proc_local->read);
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:305:98:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (IS_GOOD_RECORD(rec, rec_len, readaddrs, limit_readaddrs, pre_read_offset, upd_proc_local->read))
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:357:75:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
						if ((readaddrs + rec_len > recvpool.recvdata_base + upd_proc_local->read
data/fis-gtm-6.3-007/sr_port/updhelper_reader.c:423:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				pre_read_offset, upd_proc_local->read, write_wrap, lcl_write, rec_len);
data/fis-gtm-6.3-007/sr_port/updproc.c:447:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
						assert(0 == upd_proc_local->read);
data/fis-gtm-6.3-007/sr_port/updproc.c:592:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	temp_read = upd_proc_local->read;
data/fis-gtm-6.3-007/sr_port/updproc.c:674:71:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				&& (temp_write = recvpool.recvpool_ctl->write) == upd_proc_local->read))
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:79:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword);
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:91:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword);
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:144:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword);
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:207:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword);
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:242:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword);
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:259:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword);
data/fis-gtm-6.3-007/sr_port/view_arg_convert.c:389:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					VARLSTCNT(4) ERR_VIEWARGCNT, 2, strlen((const char *)vtp->keyword), vtp->keyword);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:219:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					len = MIN(strlen(piecestr), MAX_MIDENT_LEN);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:224:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy(mv_child->str.addr, piecestr, len);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:368:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = MIN(strlen(piecestr), MAX_MIDENT_LEN);
data/fis-gtm-6.3-007/sr_port/zshow_output.c:372:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(mv_child->str.addr, piecestr, len);
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_lke_clearreq.c:105:10:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			res = getchar();
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_order.c:132:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((PRE_V5_MAX_MIDENT_LEN < strlen((char *)gv_altkey->base)) && !curr_entry->client_supports_long_names)
data/fis-gtm-6.3-007/sr_port_cm/gtcmtr_zprevious.c:127:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((PRE_V5_MAX_MIDENT_LEN < strlen((char *)gv_altkey->base)) && !curr_entry->client_supports_long_names)
data/fis-gtm-6.3-007/sr_port_cm/gvcmz_doop.c:50:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!((link_info *)lnk->usr)->server_supports_long_names && (PRE_V5_MAX_MIDENT_LEN < strlen((char *)gv_currkey->base)))
data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.c:62:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memcpy((env_top + strlen(GTM_CALLIN_START_ENV)), gtmvectortable_address, address_len);
data/fis-gtm-6.3-007/sr_unix/callintogtmxfer.c:63:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*(env_top + strlen(GTM_CALLIN_START_ENV) + address_len) = '\0';
data/fis-gtm-6.3-007/sr_unix/cli.c:48:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(entry) > 0);
data/fis-gtm-6.3-007/sr_unix/cli.c:49:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(local_str, entry, SIZEOF(local_str) - 1);
data/fis-gtm-6.3-007/sr_unix/cli.c:79:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(entry) > 0);
data/fis-gtm-6.3-007/sr_unix/cli.c:80:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(local_str, entry, SIZEOF(local_str) - 1);
data/fis-gtm-6.3-007/sr_unix/cli.c:110:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(entry) > 0);
data/fis-gtm-6.3-007/sr_unix/cli.c:111:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(local_str, entry, SIZEOF(local_str) - 1);
data/fis-gtm-6.3-007/sr_unix/cli.c:141:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(entry) > 0);
data/fis-gtm-6.3-007/sr_unix/cli.c:142:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(local_str, entry, SIZEOF(local_str) - 1);
data/fis-gtm-6.3-007/sr_unix/cli.c:172:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(entry) > 0);
data/fis-gtm-6.3-007/sr_unix/cli.c:173:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(local_str, entry, SIZEOF(local_str) - 1);
data/fis-gtm-6.3-007/sr_unix/cli.c:203:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(entry) > 0);
data/fis-gtm-6.3-007/sr_unix/cli.c:204:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(local_str, entry, SIZEOF(local_str) - 1);
data/fis-gtm-6.3-007/sr_unix/cli.c:235:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(entry) > 0);
data/fis-gtm-6.3-007/sr_unix/cli.c:236:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(local_str, entry, SIZEOF(local_str) - 1);
data/fis-gtm-6.3-007/sr_unix/cli.c:273:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(entry) > 0);
data/fis-gtm-6.3-007/sr_unix/cli.c:285:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	copylen = strlen(buf);
data/fis-gtm-6.3-007/sr_unix/cli.c:318:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(entry) > 0);
data/fis-gtm-6.3-007/sr_unix/cli.c:319:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(local_str, entry, SIZEOF(local_str) - 1);
data/fis-gtm-6.3-007/sr_unix/cli.c:324:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for (*dst = 0, factor = 10, cp = buf + strlen(buf) - 1; cp >= buf; cp--)
data/fis-gtm-6.3-007/sr_unix/cli.c:364:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert (strlen(entry) > 0);
data/fis-gtm-6.3-007/sr_unix/cli.c:365:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(local_str, entry, SIZEOF(local_str) - 1);
data/fis-gtm-6.3-007/sr_unix/cli.c:407:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert (strlen(entry) > 0);
data/fis-gtm-6.3-007/sr_unix/cli.c:408:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(local_str, entry, SIZEOF(local_str) - 1);
data/fis-gtm-6.3-007/sr_unix/cli.c:443:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(entry) > 0);
data/fis-gtm-6.3-007/sr_unix/cli.c:444:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(local_str, entry, SIZEOF(local_str) - 1);
data/fis-gtm-6.3-007/sr_unix/cli_disallow.c:184:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cli_err_str_ptr = cli_err_str + strlen(cli_err_str);
data/fis-gtm-6.3-007/sr_unix/cli_lex.c:468:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			in_len = strlen(cli_fgets_buffer);
data/fis-gtm-6.3-007/sr_unix/cli_lex.c:523:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((NULL == cli_lex_in_ptr->tp) || (1 > strlen(cli_lex_in_ptr->tp)))
data/fis-gtm-6.3-007/sr_unix/cli_lex.c:563:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (((char *) NULL == cli_lex_in_ptr->tp) || (!strlen(cli_lex_in_ptr->tp)))
data/fis-gtm-6.3-007/sr_unix/cli_lex.c:577:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strlen(cli_lex_in_ptr->tp))
data/fis-gtm-6.3-007/sr_unix/cli_lex.c:603:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
				strcat(cli_lex_in_ptr->in_str, " ");
data/fis-gtm-6.3-007/sr_unix/cli_lex.c:623:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((NULL == cli_lex_in_ptr->tp) || (1 > strlen(cli_lex_in_ptr->tp)))
data/fis-gtm-6.3-007/sr_unix/cli_lex.c:662:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bufend = local_p + strlen(p);
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:94:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (strlen(cmd_parms->name) > 0)
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:154:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_len = strlen(str);
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:155:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (0 < strlen(sp = (pparm + ind)->name))
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:176:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (str_len == strlen(sp))
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:237:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for(ind =0; 0 < strlen((pparm + ind)->name); ind++)
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:309:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		TAREF1(parm_str_len, TREF(parms_cnt)) = strlen(cli_token_buf) + 1;
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:854:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert (tmp_ptr + 1 < local_str + strlen(local_str));
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:940:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(parm_vals[ind].name);
data/fis-gtm-6.3-007/sr_unix/cli_parse.c:994:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (0 < strlen(sp = (gpcmd_parm_vals + ind)->name)) /* implicit assignment intended */
data/fis-gtm-6.3-007/sr_unix/cmidefsp.h:58:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define CMI_DESC_CONST(DESC,LIT) (DESC)->len = strlen(LEN);(DESC)->addr = (LIT)
data/fis-gtm-6.3-007/sr_unix/cmidefsp.h:83:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} read,write;
data/fis-gtm-6.3-007/sr_unix/dbfilop.c:85:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						CHECK_DB_ENDIAN((sgmnt_data_ptr_t)fc->op_buff, strlen(udi->fn),
data/fis-gtm-6.3-007/sr_unix/dm_read.c:370:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		else if (0 > (status = (int)read(tt_ptr->fildes, &inbyte, 1)))
data/fis-gtm-6.3-007/sr_unix/dm_read.c:471:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL));	/* BYPASSOK */
data/fis-gtm-6.3-007/sr_unix/dm_read.c:537:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (((strlen(REC) == match_length) || (strlen(RECALL) == match_length))
data/fis-gtm-6.3-007/sr_unix/dm_read.c:537:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (((strlen(REC) == match_length) || (strlen(RECALL) == match_length))
data/fis-gtm-6.3-007/sr_unix/dm_read.c:548:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL));	/* BYPASSOK */
data/fis-gtm-6.3-007/sr_unix/dm_read.c:549:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL));	/* BYPASSOK */
data/fis-gtm-6.3-007/sr_unix/dm_read.c:567:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL));	/* BYPASSOK */
data/fis-gtm-6.3-007/sr_unix/dm_read.c:569:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL));	/* BYPASSOK */
data/fis-gtm-6.3-007/sr_unix/dm_read.c:637:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen((char *)recall_error_msg[err_recall]));
data/fis-gtm-6.3-007/sr_unix/dm_read.c:638:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL));	/* BYPASSOK */
data/fis-gtm-6.3-007/sr_unix/dm_read.c:639:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL));	/* BYPASSOK */
data/fis-gtm-6.3-007/sr_unix/dm_read.c:957:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				DOWRITE(tt_ptr->fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL));	/* BYPASSOK */
data/fis-gtm-6.3-007/sr_unix/dse_open.c:103:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			util_out_print("Current output file:  !AD", TRUE, strlen(patch_ofile), &patch_ofile[0]);
data/fis-gtm-6.3-007/sr_unix/dse_open.c:164:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			util_out_print("Current output file:  !AD", TRUE, strlen(patch_ofile), &patch_ofile[0]);
data/fis-gtm-6.3-007/sr_unix/fgncalsp.h:37:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(err_buf, err_ptr, len);					\
data/fis-gtm-6.3-007/sr_unix/file_head_read.c:94:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	CHECK_DB_ENDIAN(header, strlen(fn), fn);	/* BYPASSOK */
data/fis-gtm-6.3-007/sr_unix/getcaps.c:96:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ebc_len = strlen(CAP) + 1;					\
data/fis-gtm-6.3-007/sr_unix/getcaps.c:133:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ebc_len = strlen(cap);
data/fis-gtm-6.3-007/sr_unix/geteditor.c:47:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(edt) + 1;	/* for zero */
data/fis-gtm-6.3-007/sr_unix/gtm.c:61:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(varname);
data/fis-gtm-6.3-007/sr_unix/gtm_compile.c:97:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	orig_cmdstr.len = strlen(cli_lex_in_ptr->in_str) - strlen("MUMPS ");
data/fis-gtm-6.3-007/sr_unix/gtm_compile.c:97:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	orig_cmdstr.len = strlen(cli_lex_in_ptr->in_str) - strlen("MUMPS ");
data/fis-gtm-6.3-007/sr_unix/gtm_compile.c:99:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memcpy(orig_cmdstr.addr, cli_lex_in_ptr->in_str + strlen("MUMPS "), orig_cmdstr.len);
data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:47:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmdlen = strlen(command);
data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:52:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tok_len = strlen(path_tok);
data/fis-gtm-6.3-007/sr_unix/gtm_confstr.c:66:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cmdlen = strlen(cmd_path);
data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:150:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cwdlen = strlen(cwd);
data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:152:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						 + strlen(PUTENV_BPXK_MDUMP_PREFIX));
data/fis-gtm-6.3-007/sr_unix/gtm_env_init_sp.c:154:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			gtm_core_file = cwdptr = gtm_core_putenv + strlen(PUTENV_BPXK_MDUMP_PREFIX);
data/fis-gtm-6.3-007/sr_unix/gtm_filter_command.c:52:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							LEN_AND_LIT(ROUTINE), strlen(err_str), err_str);	\
data/fis-gtm-6.3-007/sr_unix/gtm_filter_command.c:54:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							strlen(err_str), err_str);				\
data/fis-gtm-6.3-007/sr_unix/gtm_fork_n_core.c:135:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				trcsuffix = newname + strlen(newname);	/* point to null at end of line */
data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:52:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cp += strlen(ERR_TAG);
data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:63:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	m_len = strlen(msgp);
data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:66:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		m_len += (faclen = strlen(fac));
data/fis-gtm-6.3-007/sr_unix/gtm_getmsg.c:68:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		m_len += (taglen = strlen((const char *)tag));
data/fis-gtm-6.3-007/sr_unix/gtm_icu.c:328:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((2 == strlen(pieceptr)) && (('0' <= pieceptr[0]) && ('9' >= pieceptr[0]))
data/fis-gtm-6.3-007/sr_unix/gtm_main.c:137:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memmove(strlen("MUMPS ") + ptr, ptr, strlen(ptr) + 1);	/* BYPASSOK */
data/fis-gtm-6.3-007/sr_unix/gtm_main.c:137:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memmove(strlen("MUMPS ") + ptr, ptr, strlen(ptr) + 1);	/* BYPASSOK */
data/fis-gtm-6.3-007/sr_unix/gtm_main.c:150:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!((ptr = GETENV(CHILD_FLAG_ENV)) && strlen(ptr)) && (RESTRICTED(dmode))) /* note assignment */
data/fis-gtm-6.3-007/sr_unix/gtm_main.c:167:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((NULL != (ptr = (char *)getenv(GTM_PASSWD_ENV))) && (0 == strlen(ptr)))
data/fis-gtm-6.3-007/sr_unix/gtm_main.c:200:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (0 != strlen(eq + 1))
data/fis-gtm-6.3-007/sr_unix/gtm_permissions.c:351:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pdd->print_gid_list_len = strlen(pdd->print_gid_list);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:233:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			optionend = charptr + strlen(charptr);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:245:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((optionlen == strlen(opt_table[index].opt_str))
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:387:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, pwent->passwd, size);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:572:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				parse_len = strlen(parse_ptr);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:594:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				parse_len = strlen(parse_ptr);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:699:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				parse_len = strlen(parse_ptr);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:776:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(env_name_ptr, tlsid, (PASSPHRASE_ENVNAME_MAX - (SIZEOF(GTMTLS_PASSWD_ENV_PREFIX) - 1)));
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:887:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy(cfg_path, "tls", SIZEOF("tls"));
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1001:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					parse_len = strlen(parse_ptr);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1029:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					parse_len = strlen(parse_ptr);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1132:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (((SIZEOF("PEM") - 1) != strlen(format))
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1242:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					parse_len = strlen(parse_ptr);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1361:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(socket->tlsid, (const char *)id, SIZEOF(socket->tlsid));
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1472:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				parse_len = strlen(parse_ptr);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1494:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				parse_len = strlen(parse_ptr);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_impl.c:1683:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(conn_info->protocol, ssl_version_ptr, MAX_ALGORITHM_LEN);
data/fis-gtm-6.3-007/sr_unix/gtm_tls_loadlibrary.c:96:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(save_libpath, save_libpath_ptr, SIZEOF(save_libpath));
data/fis-gtm-6.3-007/sr_unix/gtm_tparm.c:37:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(c) + 1;
data/fis-gtm-6.3-007/sr_unix/gtm_tparm.c:43:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(retptr) + 1;
data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:392:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		DOWRITERC(rtnfd, ERROR_CAUSING_JUNK, strlen(ERROR_CAUSING_JUNK), rc); /* BYPASSOK */
data/fis-gtm-6.3-007/sr_unix/gtm_trigger.c:408:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		DOWRITERC(rtnfd, NEWLINE, strlen(NEWLINE), rc);			/* BYPASSOK */
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:320:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	keynamelen = strlen(keyname);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:326:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(lcl_keyname, keyname, keynamelen - STRLEN(EXT_NEW));
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:394:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			search_field_len = strlen(search_field1);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:476:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					name_length = strlen(curr->key_name);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:509:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					path_length = strlen(curr->key_path);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:621:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (0 == (envvar_len = strlen(config_env))) /* inline assignment */
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:648:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(gc_config_filename, config_env, GTM_PATH_MAX);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:725:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		name_length = strlen(key_name) + 1;
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:802:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		name_length = strlen(key_name) + 1 + STR_LIT_LEN(EXT_NEW);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:905:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(node->key_name, keyname, GTM_PATH_MAX);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_dbk_ref.c:907:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(node->key_path, keypath, GTM_PATH_MAX);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_entry.c:184:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(save_libpath, save_libpath_ptr, SIZEOF(save_libpath));
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:195:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pathlen = strlen(ptr);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.c:207:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(pathname, ptr, pathlen);
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_pk_ref.h:61:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(info->version);										\
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:167:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while ((-1 == (status = read(fd, &c, 1))) && (EINTR == errno))
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.c:350:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(env_name, name, SIZEOF(pwent->env_name));
data/fis-gtm-6.3-007/sr_unix/gtmcrypt_util.h:114:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define ELLIPSIZE(STR)			STR, (strlen(STR) > MAX_GTMCRYPT_STR_ARG_LEN ? "..." : "")
data/fis-gtm-6.3-007/sr_unix/gtmio.h:76:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define DOREAD_A	read
data/fis-gtm-6.3-007/sr_unix/gtmio.h:451:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (-1 != (gtmioStatus = read(FDESC, gtmioBuff, gtmioBuffLen)))			\
data/fis-gtm-6.3-007/sr_unix/gtmio.h:478:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (-1 != (gtmioStatus = read(FDESC, gtmioBuff, gtmioBuffLen)))			\
data/fis-gtm-6.3-007/sr_unix/gtmio.h:513:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				if (-1 != (gtmioStatus = read(FDESC, gtmioBuff, 1)))				\
data/fis-gtm-6.3-007/sr_unix/gtmio.h:551:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (-1 != (gtmioStatus = read(FDESC, gtmioBuff, gtmioBuffLen)))					\
data/fis-gtm-6.3-007/sr_unix/gtmio.h:855:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		RC = getc(STREAM);						\
data/fis-gtm-6.3-007/sr_unix/gtmrecv.h:191:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	volatile uint4	read; 			/* Relative offset from recvdata_base_off of the next journal record to be
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:610:72:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		space_used = write_pos + recvpool_size - (read_pos = upd_proc_local->read);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:612:56:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		space_used = write_pos - (read_pos = upd_proc_local->read);
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1620:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	upd_read = upd_proc_local->read;
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1631:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		upd_read = upd_proc_local->read;
data/fis-gtm-6.3-007/sr_unix/gtmrecv_process.c:1646:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (upd_proc_local->read != recvpool_ctl->write)
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:295:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ('a' <= client_addr.sun_path[strlen(client_addr.sun_path) - 1])
data/fis-gtm-6.3-007/sr_unix/gtmsecshr.c:453:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(0);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:156:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	srclen = strlen(src);
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:311:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(strlen(env_var_ptr) + STR_LIT_LEN(SUB_PATH_TO_GTMSECSHRDIR) + STR_LIT_LEN(GTMSECSHR_BASENAME)))
data/fis-gtm-6.3-007/sr_unix/gtmsecshr_wrapper.c:335:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (MAX_ALLOWABLE_LEN < strlen(env_var_ptr))
data/fis-gtm-6.3-007/sr_unix/gtmsource.h:428:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	uint4			read; 		/* Offset relative to jnldata_base_off of the next journal record from the pool */
data/fis-gtm-6.3-007/sr_unix/gtmsource_get_opt.c:200:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			port_len = strlen(++c);
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:707:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		cur_read = gtmsource_local->read;
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:826:66:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
						  INT8_PRINT(gtmsource_local->read_addr), gtmsource_local->read);
data/fis-gtm-6.3-007/sr_unix/gtmsource_process_ops.c:841:99:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		REPL_DPRINT3(" read : %d corresponding to save_read_jnl_seqno : "INT8_FMT"\n", gtmsource_local->read,
data/fis-gtm-6.3-007/sr_unix/gtmsource_readfiles.c:2089:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				INT8_PRINT(read_addr), gtmsource_local->read);
data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:58:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int64_t			read, wrap_size; /* This can be negative. Must handle a signed 4G value */
data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:80:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		read = gtmsource_local->read;
data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:98:51:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		jnl_header = (jnldata_hdr_ptr_t)(jnldata_base + read);
data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:236:55:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					REPL_DPRINT4("Read %u : Next read : %ld : %s\n", read,
data/fis-gtm-6.3-007/sr_unix/gtmsource_readpool.c:276:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					gtmsource_local->read = read;
data/fis-gtm-6.3-007/sr_unix/gtmsource_statslog.c:61:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen("ON") : strlen("OFF"), gtmsource_options.statslog ? "ON" : "OFF");
data/fis-gtm-6.3-007/sr_unix/gtmsource_statslog.c:61:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen("ON") : strlen("OFF"), gtmsource_options.statslog ? "ON" : "OFF");
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:185:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			assert(strlen(csa->nl->now_running) < SIZEOF(now_running));						\
data/fis-gtm-6.3-007/sr_unix/gvcst_init_sysops.c:743:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(machine_name) < MAX_MCNAMELEN);
data/fis-gtm-6.3-007/sr_unix/io_open_try.c:413:16:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask_orig = umask(000);	/* determine umask (destructive) */
data/fis-gtm-6.3-007/sr_unix/io_open_try.c:414:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		(void)umask(umask_orig);	/* reset umask */
data/fis-gtm-6.3-007/sr_unix/iob_open_rd.c:66:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    file->path = malloc(strlen(path) + 1);
data/fis-gtm-6.3-007/sr_unix/iob_open_wt.c:52:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    file->path = malloc(strlen(path) + 1);
data/fis-gtm-6.3-007/sr_unix/iopi_open.c:409:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (!strlen(filtered_command.address)) /*empty command returned*/
data/fis-gtm-6.3-007/sr_unix/iorm_get.c:164:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		status = read(fildes, &rm_ptr->bom_buf[rm_ptr->bom_buf_cnt], bom_bytes2read - rm_ptr->bom_buf_cnt);
data/fis-gtm-6.3-007/sr_unix/iorm_get.c:367:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			status = read(fildes, temp, (int)bytes2read - bytes_count);
data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:565:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					status = read(fildes, temp, width - bytes_count);
data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:765:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
						status = read(fildes, rm_ptr->tmp_buffer, CHUNK_SIZE);
data/fis-gtm-6.3-007/sr_unix/iorm_readfl.c:1284:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
							status = read(fildes, rm_ptr->tmp_buffer, CHUNK_SIZE);
data/fis-gtm-6.3-007/sr_unix/iott_edit.c:215:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				DOWRITERC(fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL), ret);
data/fis-gtm-6.3-007/sr_unix/iott_edit.c:256:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    		DOWRITERC(fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL), ret);
data/fis-gtm-6.3-007/sr_unix/iott_edit.c:341:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				DOWRITERC(fildes, CURSOR_UP, strlen(CURSOR_UP), ret);
data/fis-gtm-6.3-007/sr_unix/iott_edit.c:355:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			DOWRITERC(fildes, CURSOR_UP, strlen(CURSOR_UP), ret);
data/fis-gtm-6.3-007/sr_unix/iott_edit.c:390:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		DOWRITERC(fildes, NATIVE_TTEOL, strlen(NATIVE_TTEOL), ret);
data/fis-gtm-6.3-007/sr_unix/iott_edit.c:417:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			DOWRITERC(fildes, str, strlen((char *)str), ret);
data/fis-gtm-6.3-007/sr_unix/iott_rdone.c:263:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		} else if ((rdlen = (int)(read(tt_ptr->fildes, &inbyte, 1))) == 1)	/* This read is protected */
data/fis-gtm-6.3-007/sr_unix/iott_readfl.c:413:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		} else if (0 < (rdlen = (int)(read(tt_ptr->fildes, &inbyte, 1))))	/* This read is protected */
data/fis-gtm-6.3-007/sr_unix/jnl_prc_vector.c:77:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for (s = c + strlen((char*)c);  s > c;  --s)
data/fis-gtm-6.3-007/sr_unix/jobchild_init.c:86:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((c = GETENV(CHILD_FLAG_ENV)) && strlen(c))
data/fis-gtm-6.3-007/sr_unix/list_file.c:187:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c_len = (short)strlen(c);
data/fis-gtm-6.3-007/sr_unix/mu_cre_file.c:202:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(path, file.addr, file.len);
data/fis-gtm-6.3-007/sr_unix/mu_op_open.c:328:16:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask_orig = umask(000);	/* determine umask (destructive) */
data/fis-gtm-6.3-007/sr_unix/mu_op_open.c:329:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		(void)umask(umask_orig);	/* reset umask */
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:152:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			gv_cur_region->dyn.addr->fname_len = strlen(fname);
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_all.c:335:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		gv_cur_region->dyn.addr->fname_len = strlen(fname);
data/fis-gtm-6.3-007/sr_unix/mu_rndwn_repl_instance.c:143:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	reg->dyn.addr->fname_len = strlen(instfilename);
data/fis-gtm-6.3-007/sr_unix/mu_size_scan.c:85:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	boolean_t		equal, tn_aborted, verify_reads;
data/fis-gtm-6.3-007/sr_unix/mupip_restore.c:731:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (0 != (got = (int)(read(bf->fd, curr, needed))))
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:962:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							TRUE, fn_len, fn, strlen("EXISTING"), (pvt_csd->null_subs == ALWAYS) ?
data/fis-gtm-6.3-007/sr_unix/mupip_set_file.c:979:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							strlen("M standard null collation"),
data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:82:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask_orig = umask(000);	/* Determine umask (destructive) */
data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:83:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	(void)umask(umask_orig);	/* Reset umask */
data/fis-gtm-6.3-007/sr_unix/obj_fileu.c:137:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(!fstr.len || strlen(fstr.addr) == fstr.len);
data/fis-gtm-6.3-007/sr_unix/ojchildioset.c:87:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(fname_buf, jparms->params.input.buffer, jparms->params.input.len);
data/fis-gtm-6.3-007/sr_unix/ojchildioset.c:123:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(fname_buf, jparms->params.output.buffer, jparms->params.output.len);
data/fis-gtm-6.3-007/sr_unix/ojchildioset.c:172:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(fname_buf, jparms->params.error.buffer, jparms->params.error.len);
data/fis-gtm-6.3-007/sr_unix/ojchkfs.c:50:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(es, addr, len);
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:122:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(50000);					\
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:425:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(fname_buf, jparms->params.input.buffer, jparms->params.input.len);
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:464:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(pbuff, jparms->params.directory.buffer, jparms->params.directory.len);
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:739:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(pbuff, jparms->params.gbldir.buffer, jparms->params.gbldir.len);
data/fis-gtm-6.3-007/sr_unix/ojstartchild.c:772:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				assert(env_len <= strlen(*old_env_cur));
data/fis-gtm-6.3-007/sr_unix/op_fnztrnlnm.c:80:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				retlen = strlen(status);
data/fis-gtm-6.3-007/sr_unix/op_zlink.c:537:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					&& strlen(cmd_qlf.object_file.str.addr) == cmd_qlf.object_file.str.len);
data/fis-gtm-6.3-007/sr_unix/reg_cmcheck.c:44:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(fbuff,file.addr,file.len);
data/fis-gtm-6.3-007/sr_unix/relinkctl.c:481:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			assert(ARRAYSIZE(shm_base->relinkctl_fname) > strlen(linkctl->relinkctl_path));
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:576:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (22 >= strlen(jnlpool_ctl->jnlpool_id.instfilename))
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:856:56:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		PRINT_OFFSET_PREFIX(offsetof(gtmsource_local_struct, read), SIZEOF(gtmsourcelocal_ptr->read));
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:856:90:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		PRINT_OFFSET_PREFIX(offsetof(gtmsource_local_struct, read), SIZEOF(gtmsourcelocal_ptr->read));
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:858:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			gtmsourcelocal_ptr->read, gtmsourcelocal_ptr->read);
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:858:50:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			gtmsourcelocal_ptr->read, gtmsourcelocal_ptr->read);
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:904:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (20 >= strlen(gtmsourcelocal_ptr->secondary_host))
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:941:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (20 >= strlen(gtmsourcelocal_ptr->log_file))
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:957:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (20 >= strlen(gtmsourcelocal_ptr->statslog_file))
data/fis-gtm-6.3-007/sr_unix/repl_inst_dump.c:1012:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (20 >= strlen(gtmsourcelocal_ptr->filter_cmd))
data/fis-gtm-6.3-007/sr_unix/repl_log_init.c:144:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   strlen(log),
data/fis-gtm-6.3-007/sr_unix/sleep.h:95:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(usecs);							\
data/fis-gtm-6.3-007/sr_unix/sleep.h:105:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(usecs);							\
data/fis-gtm-6.3-007/sr_unix/util_input.c:130:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			in_len = strlen(buffer);
data/fis-gtm-6.3-007/sr_unix/util_output.c:305:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					message_top = message + strlen(message);
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pkdisp.c:97:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if ((cc = (int)(read(fd, &bptr[blen], cc))) < 0)
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_pktdmp.c:75:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (curr_conn && (512-strlen(msg)) > 25)
data/fis-gtm-6.3-007/sr_unix_cm/gtcm_shmclean.c:191:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (1 != read(0, &resp, 1))  /*unable to read response*/
data/fis-gtm-6.3-007/sr_unix_cm/omi_prc_qry.c:102:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (grp += grl + 1; *grp; grp += strlen(grp) + 1) {
data/fis-gtm-6.3-007/sr_unix_cm/omi_srvc_xct.c:96:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (!servtime_expired && (cc = (int)(read(cptr->fd, &cptr->bptr[cptr->blen], cc))) < 0  &&  errno == EINTR)
data/fis-gtm-6.3-007/sr_unix_cm/omi_srvc_xct.c:139:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((cc = (int)read(cptr->fd, &cptr->bptr[cptr->blen], 4)) <= 0)
data/fis-gtm-6.3-007/sr_unix_cm/omi_srvc_xct.c:146:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((cc = (int)read(cptr->fd, &cptr->bptr[cptr->blen], mlen.value)) <= 0)
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:28:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((SIZEOF(newmsg)-strlen(msg)) > 25)
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:32:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmi_peer_info(lnk, &newmsg[strlen(newmsg)], SIZEOF(newmsg)-strlen(newmsg)-1);
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:32:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmi_peer_info(lnk, &newmsg[strlen(newmsg)], SIZEOF(newmsg)-strlen(newmsg)-1);
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:33:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(newmsg) && strlen(newmsg) < (strlen(msg) + 3))
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:33:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(newmsg) && strlen(newmsg) < (strlen(msg) + 3))
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_pktdmp.c:33:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(newmsg) && strlen(newmsg) < (strlen(msg) + 3))
data/fis-gtm-6.3-007/sr_unix_gnp/gtcm_gnp_server.c:390:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memmove(ptr + SIZEOF("GTCM_GNP_SERVER ") - 1, ptr, strlen(ptr) + 1); /* BYPASSOK */

ANALYSIS SUMMARY:

Hits = 4014
Lines analyzed = 435130 in approximately 13.38 seconds (32533 lines/second)
Physical Source Lines of Code (SLOC) = 333746
Hits@level = [0]  74 [1] 335 [2] 3488 [3]  63 [4] 126 [5]   2
Hits@level+ = [0+] 4088 [1+] 4014 [2+] 3679 [3+] 191 [4+] 128 [5+]   2
Hits/KSLOC@level+ = [0+] 12.2488 [1+] 12.0271 [2+] 11.0234 [3+] 0.572292 [4+] 0.383525 [5+] 0.00599258
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.